Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Chee-Onn Chow received his Bachelor ofEngineering (Hons) and Master of Engineering Science degrees from University of Malaya, Malaysia in 1999 and 2001, respectively. He received his Doctorate of Engineering from the Tokai University, Japan in 2008. He joined the Department of Electrical Engineering as tutor in 1999, and subsequently been offered a lecturer position in 2001. He is currently an Associate Professor in the same department since 2015. His research interests include various issues related to wireless communications. He is a Chartered Engineer (IET, UK), a Professor Engineer (BEM, Malaysia) and a Senior Members of IEEE.
Part I .- Designing an ML - Based Congestion Detection Algorithm for Routing Data in MANETs.- Empirical Analysis of Effect of Resampling on Supervised Learning Algorithms in Predicting Types of Lung Cancer on Multiclass Imbalanced Micro Array Gene Expression Data.- Artificial Intelligence to Protect Cyber Security Attack on Cloud E-Learning Tools (AI- PCE).- Online OPD Management with Rating and Review System to Hospitals and Doctors.- Design and Analysis of Various Non-Radiating Transmission Line Structures on a High-Speed PCB's.- Mediating Effect of Quality Enhancement between ICT-Related Factors and Student Satisfaction in Open and Distance Education.- Synthesis and Characterization of Nano Particles.- Unisum Labeling of Hydra Hexagons.- An Implementation of Mobile Shareable Content Oject Reference Model for Online Assessment using Virtal Learning Environment.- A Finest Secured Routing Techniques With Transmision Of Data In Mobile Adhoc Newtorks.- Evaluation of Various Cryptographic Techniques Based on File Size on Cloud Storage Security.- Cloud Based Bio-Metric Enhanced ATM Powered by Deep Learning.- Data Mining In Health Care: Application Perspective.- A Hybrid Filter Wrapper Embedded Feature Selection for Selecting Important Attributes and Prediction of Chronic Kidney Disease.- A Survey on Algorithms in Game Theory in Big Data.- RG Technique to Reduce the Fuel Consumption and Co2 Emission in Vanet.- Emphasizing a productive and protective access control to improve authentication using 802.1X with Software Defined Networks.- Feature Extraction by Rework Image Recognition (RIR) Learning Model.- Part II .- Comprehensive Deep Recurrent Artificial Neural Network (CDRANN) - Evolutionary Model for Future Prediction.- An Efficient Navigation Approach for Toll Plaza using Map Matching Algorithm with Hidden Markov Model.- Mining Of Customer Review Feedback Using Sentiment Analysis For Smart Phone Product.- Privacy Preservation framework for Bigdata Analysis.- Interactive artificial neural network model for UX design.- Multimodal Biometric Person Identification System Based on Speech and Keystroke Dynamics.- Predictive Water Quality Modelling using ARIMA and VAR for Locations of Krishna River, Andhra Pradesh, India.- Selection of Routing Protocol Based Qos Improvement for Mobile Adhoc Network.- Multi Clustering Management (MC-M) based Segmentation of multiple organs from Abdominal CT images.- Efficient Performance of Data Science Application in Medical Field.- Enhancing Social Divergence using Genetic Algorithms and Linked Open Data for improving Immunity System against COVID-19.- Ethereum Based P2P Lending System (Dao App) - Qualitative Review of a Possible Replacement for Lending Practices.- Malware Detection based on Portable Executable file features.- Design IoT Based Blind Stick for Visually Disabled Persons.- Collaborative Interactive Workspace Environment using Augmented Reality.- Analysis andPrediction of Covid-19 Cases Using Machine Learning Algorithms.- Food Detection and Nutritional Recognition System using Neural Networks.- Online shipping management firm with route and cost optimization for warehouses.- Digital Certificate Based User Authentication to Access Networks and Hosts.- Wield Nodemcu IOT To Shelter Coal Mining.- Pancreases Segmentation and classification based on RCNN and AlexNet.- A Compact Wideband dielectric resonator antenna for 5G applications.- Development of FLC Based AC to AC Converter for Wind Energy.- Energy management system for small scale hybrid wind solar battery based microgrid.- EYE-TM :An Automatic Teller Machine for the visually- impaired.- High-Capacity Reversible Data hiding using lossless LZW compression.- Tropical Cyclone detection using Optical flow estimation Deep Learning.- Importance of Information and Communication Technology (ICT) in Higher Education Paper.- A brief analysis of Border Gateway Protocol for Internet Controllingand Malicious Attacks.- Hybrid Blind Watermarking using RDWT-DCT in Singular Value Decomposition Domain.- A Real and Accurate Data Traffic Control in Wireless Sensor Networks Using CSMA Model.- A Novel Approach for File Security in Cloud.- Malicious Firmware Injection Detection on Wireless Networks using Deep Learning TF-IDF Normalization (MFI-IDF).- An Efficient Authentication Using Monitoring Scheme for Node Misbehavior Detection in Manet.- A Framework for Analysis of Network Traffic using Predictive Algorithm.- A Review on Deep Learning Technique on Basis of Different Types of Crop Diseases.- Food Plant Diversity of Homestead Gardens in Cherangode Panchayath of Nilgiri District, TamilNadu.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.