| TÃtulo : |
Second International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Miraz, Mahdi H., ; Excell, Peter S., ; Ware, Andrew, ; Soomro, Safeeullah, ; Ali, Maaruf, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XV, 316 p. 149 ilustraciones, 102 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-23943-5 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Red de computadoras Computadoras Propósitos especiales Computadoras digitales electrónicas Protección de datos Software de la aplicacion Inteligencia artificial Redes de comunicación informática Sistemas de propósito especial y basados ​​en aplicaciones Rendimiento y evaluación del sistema Seguridad de datos e información Aplicaciones informáticas y de sistemas de información |
| Ãndice Dewey: |
004.6 Ciencia de los computadores (Interfaces y comunicaciones) |
| Resumen: |
Este libro constituye las actas de la conferencia arbitrada de la Segunda Conferencia Internacional sobre TecnologÃas Emergentes en Computación, iCEtiC 2019, celebrada en Londres, Reino Unido, en agosto de 2019. Los 24 artÃculos completos revisados ​​fueron revisados ​​y seleccionados entre 52 presentaciones y están organizados en secciones temáticas que cubren blockchain y computación en la nube, seguridad, redes de sensores inalámbricos e Internet de las cosas (IoT), FinTech, IA, big data y análisis de datos. |
| Nota de contenido: |
Performance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms -- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs -- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding -- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies -- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing -- Security, Wireless Sensor Networks and Internet of Things (IoT) -- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting -- A trust based mutual authentication and data encryption scheme for MANET security -- A Review and Survey on Smartphones: The Closest Enemy to Privacy -- Hybrid rule-based model for phishing URLs detection -- Smart Airports: Review and Open Research Issues -- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network -- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks -- A Data Science Methodology for Internet-of-Things -- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment -- Proposing a service quality framework for mobile commerce -- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text -- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio -- Automatic Speech Recognition in Taxi Call Service Systems -- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education -- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application -- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies -- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique -- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images -- Building Energy Management System Based on Microcontrollers. . |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Second International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings [documento electrónico] / Miraz, Mahdi H., ; Excell, Peter S., ; Ware, Andrew, ; Soomro, Safeeullah, ; Ali, Maaruf, . - 1 ed. . - [s.l.] : Springer, 2019 . - XV, 316 p. 149 ilustraciones, 102 ilustraciones en color. ISBN : 978-3-030-23943-5 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Red de computadoras Computadoras Propósitos especiales Computadoras digitales electrónicas Protección de datos Software de la aplicacion Inteligencia artificial Redes de comunicación informática Sistemas de propósito especial y basados ​​en aplicaciones Rendimiento y evaluación del sistema Seguridad de datos e información Aplicaciones informáticas y de sistemas de información |
| Ãndice Dewey: |
004.6 Ciencia de los computadores (Interfaces y comunicaciones) |
| Resumen: |
Este libro constituye las actas de la conferencia arbitrada de la Segunda Conferencia Internacional sobre TecnologÃas Emergentes en Computación, iCEtiC 2019, celebrada en Londres, Reino Unido, en agosto de 2019. Los 24 artÃculos completos revisados ​​fueron revisados ​​y seleccionados entre 52 presentaciones y están organizados en secciones temáticas que cubren blockchain y computación en la nube, seguridad, redes de sensores inalámbricos e Internet de las cosas (IoT), FinTech, IA, big data y análisis de datos. |
| Nota de contenido: |
Performance Analytical Comparison of Blockchain-as-a-Service (BaaS) Platforms -- A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs -- An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding -- Economic Impact of Resource Optimisation in Cloud Environment Using Different Virtual Machine Allocation Policies -- SOSE: Smart Offloading Scheme using Computing Resources of Nearby Wireless Devices for Edge Computing -- Security, Wireless Sensor Networks and Internet of Things (IoT) -- Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting -- A trust based mutual authentication and data encryption scheme for MANET security -- A Review and Survey on Smartphones: The Closest Enemy to Privacy -- Hybrid rule-based model for phishing URLs detection -- Smart Airports: Review and Open Research Issues -- Context-aware Indoor Environment Monitoring and Plant Prediction using Wireless Sensor Network -- Achieving Fairness by Using Dynamic Fragmentation and Buffer Size in Multihop Wireless Networks -- A Data Science Methodology for Internet-of-Things -- A comparison of the different types of risk perceived by users that are hindering the adoption of mobile payment -- Proposing a service quality framework for mobile commerce -- Sentiment Analysis in E-Commerce using SVM on Roman Urdu Text -- Prediction and Optimization of Export Opportunities Using Trade Data and Portfolio -- Automatic Speech Recognition in Taxi Call Service Systems -- Accuracy Comparison of Machine Learning Algorithms for Predictive Analytics in Higher Education -- Generic Framework of Knowledge-Based Learning: Designing and Deploying of Web Application -- The Bearing of Culture upon Intention to utilize Dlearning amongst Jordanian University Students: Modernizing with Emerging Technologies -- Tracking, Recognizing, and Estimating Size of Objects using Adaptive Technique -- Analysis Filling Factor Catalogue of Different Wavelength SODISM Images -- Building Energy Management System Based on Microcontrollers. . |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |