Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. This year's conference topic covers security of innovative services and infrastructure in traffic, transport and logistic ecosystems. The 30 revised full papers were carefully reviewed and selected from 60 submissions. The papers are organized in thematic sessions on: Internet of things and smart city; smart environment applications; information and communications technology; smart health applications; sustainable communications and computing infrastructures.
Effectiveness of Mobile Wiping Applications.- A Self-organized Adaptation of Spreading Factor for LoRa Radio Layer Based on Experimental Study.- A Design of Energy Efficient Nanorouting Protocol using Flash crowd management in Beyond 5G systems.- Mutual Authentication Protocol for Secure VANET Data Exchanges.- Analysis of MPLS and SD-WAN Network Performances Using GNS3.- The role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs.- Automation of Network Device Configuration Using Zero-Touch Provisioning - A Case Study.- Multilayer network analysis: the identification of key actors in a Sicilian Mafia operation.- Enhanced European Internet of Things (IoT) Platform Assessment Key Performance Indicators (KPIs) .- Categorizing IoT Services According to Security Risks.- Analysis of IoT Concept Applications: Smart Home Perspective.- SMART production system with full digitalization for assembly and inspection in concept of Industry 4.0.- Production quality control using the Industry 4.0 concept.- Smart Factory Environment Review of Security Threats and Risks.- Embedded Machine Learning for machine condition monitoring.- Analysis of aviation pollution in the selected regions of the world.- Smart UAV Monitoring system for Parking Supervision.- Object Detection and Mapping with an Unmanned Aerial Vehicles Using Neural Convolution Network.- Information and communication architecture of the passenger information system on the railway network of the Republic of Croatia.- Application of Gaussian Processes for Magnetic Field Maps Estimation.- User Quality of Experience Comparison between Skype, Microsoft Teams and Zoom Video Conferencing Tools.- Investigating Protected Health Information Leakage from Android Medical Applications.- Multifunctional Smart Disinfector.- Augmented Reality as a Tool of Increasing of Competitiveness of Enterprise.- Sustainable constructions supported by ecological smart technologies.- The utilization of renewable energysources in the construction and maintenance of transport infrastructure.- Evaluation Methods of Investments to Mobile Applications and Smart Technology in Construction Projects.- Robust Stability and Performance Investigation of Electrohydraulic Steering Control System.- Augmented reality as a Tool of Increasing the Efficiency of RFID Technology.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.