• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Data, Engineering and Applications: Volume 2 » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Data, Engineering and Applications: Volume 2

ISBN-13: 9789811363535 / Angielski / Miękka / 2020 / 343 str.

Rajesh Kumar Shukla; Jitendra Agrawal; Sanjeev Sharma
Data, Engineering and Applications: Volume 2 Rajesh Kumar Shukla Jitendra Agrawal Sanjeev Sharma 9789811363535 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Data, Engineering and Applications: Volume 2

ISBN-13: 9789811363535 / Angielski / Miękka / 2020 / 343 str.

Rajesh Kumar Shukla; Jitendra Agrawal; Sanjeev Sharma
cena 363,12 zł
(netto: 345,83 VAT:  5%)

Najniższa cena z 30 dni: 346,96 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!
inne wydania
Kategorie:
Informatyka, Internet
Kategorie BISAC:
Computers > Database Administration & Management
Computers > Data Science - Data Analytics
Computers > Artificial Intelligence - General
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9789811363535
Rok wydania:
2020
Wydanie:
2019
Ilość stron:
343
Waga:
0.50 kg
Wymiary:
23.39 x 15.6 x 1.88
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Volume 2: 


Section 3:Big Data and Cloud Computing  32 A Survey on Big Data Analytics using Apache Hadoop Praveen Sahu, Shikha Agrawal, Raju Barasker  Department of CSE, UIT RGPV, Bhopal, India  praveenuit15@gmail.com, shikha@rgtu.net, rajubaraskar@rgtu.net 33 A Review of Anomaly Detection in Hadoop Platform Using Machine Learning Technique Anushka Bhargava, Varsha Sharma, Sanjeev Sharma   School of IT, UTD, RGPV, Bhopal  anushka.bhargava858@gmail.com, varshasharma@rgtu.net, sanjeev@rgtu.net 34 Efficient Map-Reduce Framework Using Summation  Sahiba Suryawanshi,  Department of Computer Science and Engineering Maulana Azad National Institute of Technology (MANIT), Bhopal, India  sahiba686@gmail.com, kaushikp@manit.ac.in  Dr. Praveen Kaushik   35 Secret image sharing over cloud using one dimensional chaotic map Priyamwada Sharma School of IT, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,India priyamwada14@gmail.com, vedant1998@gmail.com Vedant Sharma Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India   36 Design and Development of a Cloud-based Electronic Medical Records (EMR) System Victoria SAMUELa,1 Adewole ADEWUMI a Benjamin DADA Nicholas Omoregbe and Sanjay MISRA  Center of ICT/ICE Research, CUCRID Building, Covenant University, Nigeria    37 Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography Bappaditya  Jana, Saptarshi Mitra, Jayanta  Poray  Techno India University West Bengal Kolkata, West Bengal,India  bappaditya.j.in@ieee.org, mitra.saptarshi89@gmail.com, jayanta.poray@gmail.com  38  Log-based Approach for Security Implementation in Cloud CRM’s Madhur Patidar, Dr Pratosh Bansal Department of Information Technology, Devi Ahilya Vishwavidyalaya, Indore, MP, India
madhurpatidar15@gmail.com, pratosh@hotmail.com  39 Performance Analysis of Scheduling Algorithms in Apache Hadoop Ankit Shah Shankersinh Vaghela Bapu Institute of Technology, Gandhinagar, India shah_ankit101@yahoo.co.in, mpadole29@rediffmail.com Dr. Mamta Padole  The Maharaja Sayajjirao University of Baroda, India   40 Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment Durga Patel, Rajeev Kumar Gupta, R. K. Pateriya  Department of CSE, MANIT, Bhopal, India durgapatel28@gmail.com, rajeevmanit12276@gmail.com,pateriyark@gmail.com 41  ObjectRecognitionwithLocalDifferenceBinaryApproachUsing Grid Technique Reema Dhar, Swati Sharma Jodhpur National University, Rajasthan India reema.etrx@gmail.com,swati.sharma15@gmail.com,deepak@cripac.ia.ac.cn Deepak Kumar Jain University of Chinese and Academy of Science, Beijing, China   Section 4:Network and Securities    42 Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network  Praveen Gupta*    Pratosh Bansal  PITM, Indore    IET, DAVV, Indore    43 Certificate Revocation in Hybrid Ad-hoc Network  Anubha Chaturvedi, Brijesh Kumar Chaurasia Department of Computer Science & Engineering, ITM University Gwalior, Gwalior, M. P. India  er.anubha.chobey@gmail.com,  bkchaurasia.itm@gmail.com 44 NB tree based Intrusion detection technique using Rough set theory model Neha Gupta, Ritu Prasad Technocrats Institute of Technology (Excellence), Bhopal, India neha.guptainfo92@gmail.com, rit7ndm@gmail.com, praneetsaurabh@gmail.com, bkverma3@gmail.com Praneet Saurabh, Bhupendra Verma Technocrats Institute of Technology, Bhopal, India 45 AN ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Preeti Pandey, Atul Barve  Oriental Institute of Science & Technology, Bhopal India  preetipandey940785@gmail.com, barve.atul@gmail.com

46 DDoS Attack Mitigation using Random and Flow Based Scheme Bansidhar Joshi Jaypee Institute of Information Technology, Noida, India bansidhar.joshi@jiit.ac.in, bineetjoshi@gmail.com,   kritika.rani17@gmail.com Bineet Joshi SRHU, Dehradun, India    Kritika Rani  Jaypee Institute of Information Technology, Noida, India   47 Digital Image Watermarking Against Geometrical Attack Sandeep Rai , Rajesh Boghey, Dipesh Shahane, Priyanka Saxena Computer Science and Engineering
 Technocrats Institute Technology (Excellence)
Bhopal, India
sandtec@gmail.com, rajeshboghey@gmail.com, dipeshshahane@gmail.com, priyanka_0789@yahoo.com 48 Reverse Image Data Hiding Using Transform Techniques  Nishi Vishwakarma , Neelesh Gupta , Neetu Sharma  TRUBA Bhopal neelesh.gupta@trubainstitute.ac.in,neetusharma85@gmail.com 49 Efficient key Management Approach for Vehicular Ad-hoc Network ShikhaRathore,Jitendra Agrawal, Sanjeev Sharma, Santosh Sahu School of IT, UTD, RGPV, Bhopal Shikharathore257@gmail.com, jitendra@rgtu.net, sanjeev@rgtu.net, santoshsahu@rgtu.net  50 Image Forgery Detection: Survey and Future directions Kunj Bihari Meena and Vipin Tyagi  Jaypee University of Engineering and Technology Raghogarh, Guna - MP INDIA   dr.vipin.tyagi@gmail.com  51 Comparative Study of Digital Forensic Tools  MayankLovanshi, Pratosh Bansal Department of Information Technology
Devi Ahilya vishwavidyalaya,Indore,MP, India
lovanshi123mayank@gmail.com, pratosh@hotmail.com 52 A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications Nirneeta Gupchup and Dr. Nishchol Mishra  School of Information Technology, RGPV University, Bhopal India nirneeta.gupchup@gmail.com, nishchol@rgtu.net 53 Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique  Aumreesh Kumar Saxena,  Dr. Sitesh Kumar Sinha
Dr. Piyush Shukla AISECT University, Bhopal, India,  aumreesh@gmail.com , phdpwd@gmail.com , siteshkumarsinha@gmail.com  UIT RGPV. Bhopal,India   54 New Chaos-Based Algorithm for Bmp Image Encryption and Decryption using chaotic logistic map   Pooja Kathil*,  sachin goyal, Ratish Agrawal,  Mahesh Pawar                                                                                                                      Dept. of Information Technology, Rajiv Gandhi Technical University Bhopal (M.P.), India   kathil1995pooja@gmail.com, sachingoyal@rgtu.net,  ratish@rgtu.net ,  mkpawar24@gmail.com 55 Performance Evaluation of Efficient Coverage and Connectivity Preservation with Load Balance for WSN Bharti Yaduwanshi , IEEE Member Ramnath Narhete  Onprice Infotech Pvt. Limited  bhartisarni@rediffmail.com, ramnath@dstarena.com 56 Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B
Raghuraj Suryavanshi  Pranveer Singh Institute of Technology, Kanpur, India  raghuraj_singh09@yahoo.co.in;aksingh_uptu@rediffmail.com;divakar_yadav@ rediffmail.com Arun Kumar Singh
Goel Institute of Technology and Management Lucknow, India    Divakar Yadav  Institute of Engineering and Technology Lucknow, India    57 A Novel Approach of Data Deduplication for Distributed Storage  Shubhanshi Singhal, Naresh Kuma,   Computer Science and Engg. Deptt, UIET, Kurukshetra University, Kurukshetra-, India  Shubhanshi17@gmail.com, naresh_duhan@rediffmail.com,  scjain1@yahoo.com  S.C. Jain   Computer Science and Engg. Deptt,Rajasthan Technical University, Kota-India    Section 5: Internet of things and related areas    58 A Surveyon different techniques used in Wireless Fire Warning System  Himshi Chouksey, Manish Ahirwar, Shikha Agrawal  UIT RGPV, Bhopal, India  himshichouksey14@gmail.com, ahirwarmanish@gmail.com, shikha@rgtu.net 59 An IOT Based Architecture for Crime Management in Nigeria Olusola Abayomi-Alli,  Sanjay Misra  Center of ICT/ICE Research, CUCRID Building, Covenant University, Ota, Nigeria adesola.falade@covenantuniversity.edu.ng, sanjay.misra@covenantuniversity.edu.ng, nicholas.omoregbe@covenantuniversity.edu.ng, robertas.damasevicius@ktu.lt, rytis.maskeliunas@ktu.lt Robertas Damasevicius, Rytis
Maskeliunas
Kaunas University of Technology, Kaunas, Lithuania 60 A Comparative Analysis of Techniques for Executing Branched Instructions Sanjay Misra, Modupe Odusami, Olusola Abayomi-Alli Center of ICT/ICE Research, CUCRID Building, Covenant University, Otta, Nigeria      Ayegba AlfaAbraham, Ajagbe Douglas Kehinde Kogi State College of Education, Ankpa, Nigeria,   61 Design and Implementation of an E-Policing System to Report Crimes in Nigeria Nicholas Omoregbe, Sanjay Misra,  Adesola Falade, Adewole Adewumi Department of Computer and Information Sciences, Covenant University, Ota, Nigeria nicholas.omoregbe@covenantuniversity.edu.ng, sanjay.misra@covenantuniversity.edu.ng, adesola.falade@covenantuniversity.edu.ng, wole.adewumi@covenantuniversity.edu.ng; rytis.maskeliunas@ktu.lt, robertas.damasevicius@ktu.lt Rytis Maskeliunas, Robertas Damasevicius Kaunas University of Technology, Kaunas, Lithuania.   62 Performance Evaluation of Ensemble Learner on Smart Phone Sensor Generated Human Activity Data Set Dilip Singh Sisodia,
Ankit Kumar Yogi  National Institute of Technology Raipur, India dssisodia.cs@nitrr.ac.in, yogiankit73@gmail.com  Jaypee University of Engineering & Technology Guna    63 An Insight into Time Synchronization Algorithms in IoT Ms. Neha Dalwadi Vadodara Institute of Engineering, Vadodara, India  neha.dalwadi@gmail.com, mpadole29@rediffmail.com Dr. Mamta Padole The Maharaja Sayajirao University of Baroda, Vadodara, India   64 Comparative study of the electrical energy consumption and cost for a residential building with conventional appliances vis-a-vis one with energy efficient appliances Adeyemi Alabi, Oluwasikemi Ogunleye, Sanjay Misra, Olusola Abayomi-Alli, Modupe Odusami
Center of ICT/ICE Research, CUCRID Building, Covenant university Ota, Nigeria  adeyemi.alabi@stu.cu.edu.ng, oluwasikemi.ogunleye@stu.cu.edu.ng, sanjay.misra@covenantuniversity.edu.ng, olusola.abayomi-alli@covenantuniversity.edu.ng,modupe.odusami@covenantuniversity.edu.ng, ravinahujadce@gmail.com Ravin Ahuja Department of Computer Engineering, University of Delhi, India 65 Particle Swarm Optimization Based MPPT Controller for Wind Turbine Systems  Shefali Jagwani BMSCE, Bangalore, India  shefalijagwani@gmail.com , lvenkatesha.eee@bmsce.ac.in  L. Venkatesha              66 Developing a Multi-modal Listing Service for Real Estate Agency Practice in Nigeria Adewole Adewumi, Chukwuemeka Iroham, Daniel Audu, Sanjay Misra


 Ravin Ahuja  Center of ICT/ICE Research, CUCRID Building, Covenant University, Nigeria

wole.adewumi@covenantuniversity.edu.ng,osmond.iroham@covenantuniversity.edu.ng,daniel.audu@covenantuniversity.edu.ng, sanjay.misra@covenantuniversity.edu.ng University of Delhi, Delhi, India
67 A new model of M-secure image via quantization  Vijay Bhandari, Dr.Sitendra Tamarkar  AISECT Bhopal vphd2k14@gmail.com, drsitendra@gmail.com, pphdwss@gmail.com , arpanabhandari08@gmail.com Dr Piyush Shukla, Arpana Bhandari      68 Analysis on Applicability and Feasibility of Dynamic Programming on the basis of Time Complexity and Space through Case Studies Mohd Aijaj Khan

Department of Electronics Engineering
Madhav Institute of Technology and Science, Gwalior, India

 AijajKhan@ieee.org, ManishDixit@ieee.org Manish Dixit Department of CSE and IT
Madhav Institute of Technology and Science, Gwalior, India 

Dr Rajesh K Shukla is a Professor and Head of the Department of Computer Science and Engineering, SIRT, Bhopal, India. With more than 20 years of teaching and research experience he has authored 8 books and has published/presented has more than 40 papers in international journals and conferences. Dr Shukla received an ISTE U.P. Government National Award in 2015 and various prestigious awards from the Computer Society of India. His research interests include recommendation systems and machine learning. He is fellow of IETE, a senior member of IEEE, a life member of ISTE, ISCA, and a member of ACM and IE(I).  

Dr Jitendra Agrawal is a faculty member in the Department of Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India. His research interests include data mining and computational intelligence. He has authored 02 books and published more than 60 papers in international journals and conferences. Dr Agrawal is a senior member of IEEE, life member of CSI, ISTE and member of IAENG. He has served as part of the program committees for several international conferences organised in countries such as the USA, India, New Zealand, Korea, Indonesia and Thailand. 

Dr Sanjeev Sharma is a Professor and Head of the School of Information Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, MP, India. He has over 29 years of teaching and research experience and received the World Education Congress Best Teacher Award in Information Technology. His research interests include mobile computing, ad-hoc networks, image processing and information security. He has edited proceedings of several national and international conferences and published more than 150 research papers in reputed journals. He is a member of IEEE, CSI, ISTE and IAENG.

Dr G S Tomer is the Director of THDC Institute of Hydropower Engineering and Technology (Government of Uttarakhand), Tehri, India. He received the International Plato award for Educational Achievements in 2009. He completed his doctorate in Electronics Engineering from RGPV Bhopal and postdoctorate from the University of Kent, United Kingdom. 
Dr Tomar has more than 30 years of teaching and research experience and has published over 200 research papers in reputed journals, as well as 11 books and 7 book chapters. He is a senior member of IEEE, ACM and IACSIT, a fellow of IETE and IE(I), and a member of CSI and ISTE. He has also edited the proceedings of more than 20 IEEE conferences and has been the general chair of over 30 Conferences.

This book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new solutions. 
Given its scope, the book offers a valuable reference guide for all graduate students, researchers, and scientists interested in exploring the potential of Big Data applications.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia