𝔖 Scriptorium
✩   LIBER   ✩

📁

Data Engineering and Communication Technology: Proceedings of ICDECT 2020 (Lecture Notes on Data Engineering and Communications Technologies, 63)

✍ Scribed by K. Ashoka Reddy (editor), B. Rama Devi (editor), Boby George (editor), K. Srujan Raju (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
682
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25–26 September 2020. It features advanced, multidisciplinary research towards the design of smart computing, information systems and electronic systems. It also focuses on various innovation paradigms in system knowledge, intelligence and sustainability which can be applied to provide viable solutions to diverse problems related to society, the environment and industry.

✩ Table of Contents


Preface
Organization
Contents
About the Editors
Innovative Light Management System for Outdoor Applications
1 Introduction
2 Rationale of the Study and Background Information
3 Innovative Light Management System for Outdoor Applications
4 Results
5 Conclusion
References
Authentic User-Based Luminary Intensity Control System
1 Introduction
2 Outdoor Lighting Current Status in Literature
3 System Model and Implementation
4 Results
4.1 Autorun Self-Test Mode
4.2 Testing Normal Mode Operation
5 Conclusion
References
A Simple Method to Detect Partial Shading in PV Systems
1 Introduction
2 System Configuration
2.1 Modelling of a PV Cell
3 Proposed Method
3.1 Modelling of a PV Cell
3.2 Flowchart
4 Partial Shading Detection in PV Array
4.1 Change Over from Constant to Constant Insolation
4.2 Simulated Waveform Unifrom to Unifrom Isolation
4.3 Change Over from Constant to Uncertain Iradiation
4.4 Simulated Waveform Uniform to Nonuniform Insolation
4.5 I–V Curves When Two Different Irradiations Have Equal Power Under Uniform to Non-uniform Irradiation
5 Results and Discussion
6 Conclusion
References
Capsule Networks for Classifying Conflicting Double-Handed Classical Dance Gestures
1 Introduction
2 Literature Review
3 Capsule Networks
3.1 Capsules
3.2 Squashing Function
3.3 Dynamic Routing Algorithm
3.4 Decoder
3.5 Loss Function
4 Proposed Hasta Capsule Network
5 Experimental Results
6 Conclusion and Future Scope
References
Wormhole Attack Detection in Wireless Sensor Network Using SVM and Delay Per-hop Indication
1 Introduction
2 Security Measures Against the Wormhole Attack on WSNs
2.1 Related Work
2.2 Working Model
3 Simulations and Results
3.1 Simulation Results
3.2 Training and Testing
4 Conclusion
References
Performance Enhancement of Dielectric Pocket-Based Dual-Gate FinFET
1 Introduction
1.1 TFET with DP
2 Proposed Design
3 Results
4 Conclusion
References
Cooperative Spectrum Sensing for PU Detection in Cognitive Radio Using SVM
1 Introduction
2 System Model and Assumption
3 SVM-Based Cooperative Detection
3.1 CSS Simulation and Data Generation
3.2 Balancing of Data Set
3.3 Classification of Signal
4 Results and Discussion
5 Conclusions
Reference
Number Plate Detection Using Morphology and Geometrical Properties
1 Introduction
2 Literature Review
3 Proposed System
3.1 RGB to Gray Conversion
3.2 Morphological Image Processing Techniques
4 Experimental Results
5 Conclusion
References
Fast and Robust Segmentation of Images Using FRFCM Clustering with Active Contour Model
1 Introdudction
2 Literature Review on FCM Clustering
3 Proposed FRFCM Clustering Method
3.1 Morphological Reconstruction
3.2 Membership Filtering
4 Implementation to Active Contour Model (ACM)
5 Simulation Results and Discussions
6 Conclusion
References
A Microstrip Patch Antenna Design with Two Ground Slots for 5G Mobile Applications
1 Introduction
2 Antenna Structure and Design
2.1 Calculation of the Proposed Antenna Design
2.2 Ground Slots
3 Simulation Results and Discussion
3.1 Return Loss of the Proposed Antenna
3.2 Antenna Radiation of the Proposed Antenna
4 Conclusion
References
An Intelligent ANFIS Controller based PV Custom Device to enhance Power Quality
1 Introduction
2 System Configuration
3 Control Scheme
3.1 Fuzzy-Based VSI Controller Design
3.2 RECKF-Based VSI Controller Design
3.3 ANFIS-Based VSI Controller Design
4 Simulation Discussion
4.1 Without Any Control Scheme
4.2 With FLC-PI Controller
4.3 With RECKNF Controller
4.4 Proposed Simulation Results
5 Conclusion
References
Privacy by Design Approach for Vehicular Tripdata Using k-Anonymity Perturbation
1 Introduction
2 Types of Message Standardization Service Models(MSSM)
3 Proposed Work and Methodology
4 Results Discussion
5 Conclusion
References
Self-powered Implantable Device Using Thermo Electric Generator with DC-DC Converter for Elimination of Bradycardia
1 Introduction
2 Objectives
3 Proposed Methodology
3.1 Modeling of Thermoelectric Generator Mathematically is Given as Follows:
4 Conclusion
References
High Performance AXI4 Interface Protocol for Multi-Core Memory Controller on SoC
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Write Transaction
3.2 Read Transaction
4 Real-Time Implementation Results
5 Conclusion
Reference
Compensation of Delay in Real-Time HILS for Aerospace Systems
1 Introduction
2 Analysis of HILS Configurations, Results, and Issues
2.1 OBC-Sensor-In-The-Loop Simulation
2.2 OBC-Sensor-Actuator-In-The-Loop Simulation (Complete HILS)
3 Problem Discussion of HILS Results
4 Delay Compensation Methods
4.1 Inverse Compensation Method
4.2 Polynomial Extrapolation Method
4.3 Smith Predictor Strategy
4.4 Static and Dynamic Compensation
5 Implementation of Delay Compensation
6 Conclusions
References
Malware Detection System Using Ensemble Learning: Tested Using Synthetic Data
1 Introduction
2 Literature Work
3 Proposed System
4 Result Analysis and Further Work
5 Conclusion
References
Low Complexity Fused Floating Point FFT Using CSD Arithmetic for OMP CS System
1 Introduction
2 FFT to Reconstruct CS Signal
3 Floating Point Optimization
3.1 FAS-MO-FDP: Fused Add Sub-Multi Operand-Fused Dot Product
3.2 CSD-BO: Reconfigurable Canonical Signed Digit Recoding and Bit Optimization
4 FFT Factorization
4.1 Radix 22 FFT Algorithm
4.2 Floating Point FFT for OMP CS
5 Experimental Results
5.1 Performance Analysis
5.2 Delay Optimization
6 Conclusion
References
CreepOnto: An Avant-Garde Scheme for Framing and Evaluating Ontologies Using Domain Knowledge of Creep Mechanism
1 Introduction
2 Related Literature
3 Design of the Ontology
4 Ontology Development
5 OWL Representation
6 Ontology Evaluation
7 Conclusions
References
Analysis of Coupling Transition for the Encoded Data and Its Logical Level Power Analysis
1 Introduction
2 Basic Definitions
3 Data Bus Models and Encoding Types
4 Energy Model Platform
5 Transmission of Data Bit and Coupling Effect
6 Proposed Technique
7 Conclusions
References
5G Enabled Industrial Internet of Things (IIoT) Architecture for Smart Manufacturing
1 Introduction
2 5G Network Technologies
3 Literature Review for 5G Enabled IIoT Architecture
4 The General Characters of Smart Manufacturing Process of 5G Network Enabled Industry Internet of Things (IIoT)
5 Applications of Intelligent Industrial Production Based on 5G Enabled Industry Internet of Things (IIoT)
6 Proposed 5G Network Enabled Industrial Internet of Things (IIoT) Architecture Model for Intelligent Manufacturing
7 Conclusion and Future Work
References
IoT-Enabled Entry in COVID Situation for Corporate Environments
1 Introduction
2 Methodology
2.1 Architecture
3 Results and Discussions
3.1 XAMPP Server Utility Tool
3.2 SQL Database Integration with PHP Coding
3.3 Hardware Coding in the NodeMCU Firmware
4 Conclusion and Future Scope
References
PAPR Reduction Scheme for OFDM/OQAM Signals Using Novel Phase Sequence
1 Introduction
2 SLM and PTS Algorithms
2.1 SLM Algorithm
2.2 PTS Algorithm
3 Proposed Method
4 Simulation Results
5 Conclusion
References
Load Immune Based Stator Incipient Faults Detection Algorithm for Three-Phase Electrically-Excited Synchronous Motor
1 Introduction
2 Wavelet Analysis
3 Fault Detection Algorithm
4 Verification of Algorithm with Experimental Data
5 Conclusions
References
Segmentation of Remote Sensing Images Using Fuzzy Gaussian Mixture Level Set (FGML) Method
1 Introduction
2 Materials and Methods
2.1 Fuzzy Gaussian Mixer (FGM) Segmentation Approach
3 Implementation of FGM Model to Level Set Method
4 Simulation Results and Discussions
5 Conclusion
References
Performance Improvement in Long-Term Evolution-Advanced (LTE-A) Network Towards 5G Network
1 Introduction
2 Related Works
3 Proposed Method
3.1 UG-SSDB
3.2 Dinkelbach’s Method to Improve Energy Efficiency
3.3 Incremental Redundancy and Regression Monitoring Technique with (HARQ)
4 Results and Discussion
5 Conclusion
References
Performance Analysis of OFDM and GFDM with MIMO for 5G Wireless Communications
1 Introduction
2 Mathematical Model of OFDM and GFDM
3 Performance Analysis of OFDM and GFDM
4 Performance Analysis of MIMO with MCM
5 Conclusion
References
Performance Analysis of OFDM and UFMC with MIMO Wireless Communications
1 Introduction
2 System Model for OFDM and UFMC
2.1 OFDM
2.2 UFMC
3 Comparative analysis of OFDM and UFMC
4 Comparison of MIMO-OFDM and MIMO-UFMC
5 Conclusion
References
Analysis of Software Tool for Voltage Profile Improvement in IEEE 14-Bus System Using SVC
1 Introduction
2 Computational Software Tools
3 Design of IEEE 14-Bus System
3.1 MATLAB/SIMULINK Based IEEE 14-Bus System
3.2 NEPLAN Based IEEE 14-Bus System
4 Design of IEEE 14-Bus System with Static VAR Compensator
4.1 SVC Based IEEE 14-Bus System
4.2 NEPLAN Based IEEE 14-Bus System with SVC
5 Conclusion and Future Scope
References
Evaluation of Particle Size, Lattice Strain and Estimation of Mean Square Amplitudes of Vibration, Debye Waller Factor and Debye Temperature for Metal Oxide Nanoparticles
1 Introduction
2 Experimental Procedures
3 Analysis
3.1 Williamson–Hall Method
4 Results and Discussion
5 Conclusion
References
Kalman Filter-Based MPC Control Design and Performance Assessment of MIMO System
1 Introduction
2 Problem Formulation of MPC for MIMO System
3 Control System Performance
4 Case Study
5 Results and Discussion
6 Conclusion
References
On the Use of Region Convolutional Neural Network for Object Detection
1 Introduction
2 Related Work
3 Deep Neural Networks
3.1 Evaluation Metric for Object Detection
3.2 Convolutional Neural Networks
4 Proposed Method
4.1 Region Convolutional Neural Networks (R-CNN)
5 Results
6 Conclusion
References
An Improved Impulse Noise Removal VLSI Architecture Using DTBDM Method
1 Introduction
2 Proposed Method
3 Implementation
4 Results and Discussion
4.1 Comparison of Device Utilization Summary, Area, and Power of 33 and 55 Window DTBDM Algorithm
5 Conclusion
References
Performance Analysis of Vehicular Network Scenarios Using SUMO and NS2 Simulators
1 Introduction
2 Literature Review
3 Real-Time Traffic Generation
4 Integration of SUMO and NS2
4.1 VANET Simulation Scenarios
5 Performance Analysis and Results
6 Conclusion
References
Novel Channel Estimation Technique for 5G MIMO Communication Systems
1 Introduction
2 System Model
3 Least Squares Channel Estimation
4 Proposed Channel Estimation
5 Simulation Results
6 Conclusions
References
Channel Estimation for Broadband Wireless Access OFDM/OQAM System
1 Introduction
2 OFDM/OQAM Channel Estimation
2.1 System and Channel Model
2.2 OFDM/OQAM Channel Estimation Algorithm
2.3 LS Algorithm
2.4 Transform Algorithm
2.5 LMMSE Algorithm
3 Simulation Results
4 Conclusion
References
Digital Image Falsification Detection Based on Dichromatic Model
1 Introduction
2 Creation of Color Images—Essentials
3 Falsification Detection Through Estimate Color of Illumination in a Region of Specular
3.1 Preprocessing
3.2 Segmentation of Levels
3.3 Falsification Detection Using Plane of Dichromatic
4 Results and Analysis
5 Conclusion
References
Half-Circled Fractal Boundary Linearly Polarized Triangular Patch Antenna for Wireless Applications
1 Introduction
2 Antenna Design
3 Simulation Results
4 Experimental Results
5 Conclusions
References
Authorship Attribution using Filtered N-grams as Features
1 Introduction
2 Related Work
2.1 Features for Authorship Attribution
3 Methodology
3.1 Filtered N-grams
3.2 Dataset
3.3 Classification and Evaluation Procedure
4 Experiments and Results
4.1 Comparing the Performance of Filtered and Unfiltered n-grams
4.2 Feature Ablation Study
5 Conclusion and Future Scope
References
Design and Performance Evaluation of Monarch Butterfly Optimization-Based Artificial Neural Networks for Financial Time Series Prediction
1 Introduction
2 Methods and Materials
2.1 Artificial Neural Network
2.2 Monarch Butterflies Optimization
3 Design of MBO-ANN Forecast
4 Simulation Studies and Results
5 Conclusions
References
Interference-Aware Efficiency Maximization in 5G Ultra-Dense Networks
1 Introduction
2 Trade-Off, Densification and Cooperation Bargaining Games, Ultra-Dense Networks and Challenges
3 Trade-Off Analysis and Opportunities of Cooperation Gains
4 CE2MG (Cooperative Energy Efficiency Maximization Game) and Formulation of Problem
5 Optimal spectrum efficiency analysis without constraints
6 Survey of Optimal SE to Increase Energy Efficiency
7 Simulation results
8 Conclusion
References
Minıaturızed Printed Bowtie Antenna for WLAN Applications
1 Introduction
2 Antenna Structure
3 Simulation Results
4 Parametric Study
5 Conclusion
References
Integrating SSIM in GANs to Generate High-Quality Brain MRI Images
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Preprocessing
3.3 Network Architecture
4 Results
5 Conclusion
References
Generation of Pseudo-Random Binary Sequence Based on Cipher Feedback Chaotic System for Cryptographic Applications
1 Introduction
2 Background
2.1 Chaos
3 Proposed System
4 Results and Discussions
4.1 FIPS—141 Test
4.2 Auto-Correlation and Cross-Correlation Tests
4.3 NIST SP 800-22 REV.1a Test
5 Conclusion
References
Face Mask Detection Using Feature Extraction
1 Introduction
2 Objective of the Paper
3 Principle Involved
3.1 Haar-Like Feature
3.2 Integral Images
3.3 AdaBoost Algorithm
3.4 Cascade Classifier
4 Flowchart and Working
4.1 Flowchart
4.2 Working
5 Simulation and Results
6 Advantages, Drawbacks and Future Scope
7 Conclusion
References
Performance Analysıs of Polycystıc Ovary Syndrome (PCOS) Detectıon System Usıng Neural Network Approach
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Description
3.2 Preprocessing
3.3 Artificial Neural Network
3.4 Feature Extraction and Feature Scaling
4 Results and Discussion
4.1 Preprocessor Analysis
4.2 Optimizer Analysis
4.3 Learning Rate Analysis
5 Conclusion
References
Noise Removal in Long-Term ECG Signals Using EMD-Based Threshold Method
1 Introduction
2 EMD Algorithm
3 Proposed Methodology
4 Experımental Results
5 Conclusıon
References
Teaching “Design Thinking” Using “Project-Based Learning” Model to Undergraduate Students Through EPICS Course
1 Introduction
2 Design Thinking
3 Project-Based Learning
4 Design Thinking and PBL Through EPICS
5 Case Study: “She Bracelet” Project
6 Conclusion
References
Assessment Techniques in Engineering Education—Tools and Strategies of the Faculty
1 Introduction
2 Assessment/evaluation of Learning (AFL)
2.1 Tools and Strategies
2.2 Expected Responsibilities
2.3 The Main Objectives of the Learning Assessment
2.4 The Strategies and Techniques of AFL (Assessment of Learning)
2.5 Formative Assessment
2.6 Summative Assessment
2.7 Student Learning—Formative Assessment
2.8 Formative Assessment of Faculty Teaching
3 Conclusion
References
Mechanical Compression Properties of Apple Fruit: Errors During Penetrometer Measurements
1 Introduction
2 Literature Overview
2.1 Materials and Methods
3 Results and Discussion
4 Conclusions
References
Detailed Review on Breast Cancer Diagnosis Using Different ML Algorithms
1 Introduction
1.1 Breast Cancer
1.2 Machine Learning—History
1.3 Machine Learning—Types
2 Related Works on Diagnosis of Breast Cancer Using Different Machine Learning Algorithms
2.1 Breast Cancer Identification Using Support Vector Machine
2.2 Breast Cancer Detection and Diagnosis Using SVM and Other ML Algorithms
2.3 Breast Cancer Detection and Diagnosis Using Artificial Neutal Netwoks
2.4 Breast Cancer Using Thermography
2.5 Breast Cancer Detection Using Ensemble Techniques
2.6 Breast Cancer Detection and Diagnosis Using Some More ML Algorithms
2.7 Comparision of Different ML Algorithms in Breast Cancer Detection and Diagnosis
3 Evaluation of the Classifiers in Diagnosing Breast Cancer
4 Conclusion
References
Study of Comparison on Efficient Malicious URL Detection System Using Data Mining Algorithms
1 Introduction
1.1 Intrusion Detection System
2 Comparative Study of Intrusion Detection System
3 Conclusion
References
Comparison of PAPR in OFDM and FBMC/OQAM Using PAPR Reduction Methods
1 Introduction
2 System Model
2.1 OFDM System Model
2.2 FBMC System Model
2.3 OQAM
2.4 PPN FBMC
2.5 PAPR
2.6 PAPR Reduction Method
3 Simulation Results
4 Conclusion
References
A Data Warehouse System for University Administration with UML Schema and Relational Decisive Approach
1 Introduction
2 Literature Review
3 Background Methodology
3.1 Multidimensional Framework
3.2 Rough Sets
4 Proposed Work
4.1 Analysis of User Requirement
4.2 Attribute Tree Generation
4.3 Relational Decisive Rough Set
5 Results and Discussion
5.1 Comparative Analysis
6 Conclusion
References
Latency Improvement by Using Fill VC Allocation for Network on Chip
1 Introduction
2 Motivation and Background
2.1 Non-uniform VC Allocation
2.2 ViChaR: A Dynamic VC Regulator
2.3 VCs and Multiple Physical Channels
2.4 VCs and SA
2.5 Dynamically Allocated Multiple Queues (DAMQs)
2.6 Adaptive Inter-Port Buffer Sharing
3 Proposed Fill VC Allocation Architecture
3.1 Fill VC Allocation
3.2 Packet Transfer
4 Implementation Results and Evaluation
5 Conclusion
References
Review on Sensors for Emotion Recognition
1 Introduction
2 Emotion Recognition
2.1 Electroencephalography
2.2 Electrocardiography
2.3 Galvanic Skin Response
3 Related Work
4 Proposed Work
5 Conclusions
References
Implementation of Rough Set for Decision Making
1 Introduction
2 Features Rough Set
3 Application and Operation
4 Conclusion
References
Concept of Color Utilization and Its Application in Knowledge Graph Visualization
1 Introduction
2 Colors Effect on Humans
3 The Color Wheel
4 Visualizing a Graph
5 Minimizing the Number of Color Utilization in Knowledge Graph
6 Knowledge Graph: Basic Concept and Characteristic
6.1 Key Characteristics of Knowledge Graph
6.2 Conceptualizing the Knowledge Graph Construction
7 Conclusion
References
COVID-19 Isolation Monitoring System
1 Introduction
2 Related Work
2.1 Existing System
3 Proposed Method
4 Results and Discussion
5 Conclusion
References
An Automated Approach for Detection of Intracranial Haemorrhage Using DenseNets
1 Introduction
2 Related Work
3 Intracranial Haemorrhage Detection
4 Experimental Results and Discussion
5 Conclusions and Future Scope
References
Analysis of COVID-19-Impacted Zone UsingMachine Learning Algorithms
1 Introduction
2 Methodology
3 Results
4 Conclusion
References
Road Detection Using Semantic Segmentation-Based Convolutional Neural Network for Intelligent Vehicle System
1 Introduction
2 Related Works
3 Material and Methods
3.1 Dataset
3.2 Network Architecture
4 Experimental Results and Discussion
4.1 Performance of U-Net, Seg-Net and FCN
5 Conclusion
References
Issues and Challenges in Incorporating the Internet of Things with the Healthcare Sector
1 Introduction
1.1 Motivation
1.2 Paper Organization
2 Literature Review
3 IoT Background
3.1 IoT in Health Care
4 Various Issues and Challenges
4.1 Interoperability
4.2 Data Compression and Optimization
4.3 Issues and Challenges in Network
4.4 Implementing Personalized Health Care
4.5 Managing Security Threats
4.6 Converges of AI, Big Data in IoT
4.7 Inclusion of 5G with Health Care
5 Conclusion
References
GFDM-Based Device to Device Systems in 5G Cellular Networks
1 Introduction
2 Related Works
3 Proposed Method
4 Experimental Result
5 Conclusion
References
A Mobility Adaptive Efficient Power Optimized Protocol for MANETs Based on Cross-Layering Concept
1 Introduction
2 Cross-Layering Concept
3 Associated Work
4 Mobility Adaptive Power Optimized Protocol
5 Analyzing Performance and Results
6 Conclusion
References
Evaluating the AdaBoost Algorithm for Biometric-Based Face Recognition
1 Introduction
2 The Proposed Method
2.1 Face Detection AdaBoost Algorithm
2.2 Feature Extraction
2.3 Dimensionality Reduction
3 Result and Discussion
4 Conclusion
References
Analysis of Channel Estimation in GFDM System
1 Introduction
2 Related Works
3 Proposed Method
4 Experimental Result
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Innovative Data Communication Technologi
✍ Jennifer S. Raj (editor), Abdullah M. Iliyasu (editor), Robert Bestak (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented a

Innovative Data Communication Technologi
✍ Jennifer S. Raj (editor), Khaled Kamel (editor), Pavel Lafata (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing, and big data analytics. The best selected papers, presented

Computer Networks and Inventive Communic
✍ S. Smys (editor), Ram Palanisamy (editor), Álvaro Rocha (editor), Grigorios N. B 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data

Intelligent Data Communication Technolog
✍ Jude Hemanth (editor), Robert Bestak (editor), Joy Iong-Zong Chen (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The proliferation of various mobile and wireless communication networks has paved way to foster a high demand for intelligent data processing and co

Computer Networks and Inventive Communic
✍ S. Smys (editor), Pavel Lafata (editor), Ram Palanisamy (editor), Khaled A. Kame 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book is a collection of peer-reviewed best selected research papers presented at 5th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2022). The book covers new results in theory, methodology, and applications of computer networks and data com

Computer Networks and Inventive Communic
✍ S. Smys (editor), Robert Bestak (editor), Ram Palanisamy (editor), Ivan Kotuliak 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data com