Mobile and Wireless Technology 2015

Buch | Hardcover
X, 214 Seiten
2015 | 2015
Springer Berlin (Verlag)
978-3-662-47668-0 (ISBN)

Lese- und Medienproben

Mobile and Wireless Technology 2015 -
160,49 inkl. MwSt

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.

The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.

Dr. Kuinam J. Kim is a professor and chairman of convergence Security Department, Kyonggi University, Korea. He is the founding Editor in Chief of the ICAT Transactions on Digital Security and Forensics. He is currently on the advisory editorial board of the Convergence Security Journal. His research interests include cloud computing, wireless and mobile computing, digital forensics, video surveillance, information and convergence security. He has published extensively in these areas and received several Journals and conferences best paper awards.Dr. Naruemon Wattanapongsakorn is an associate professor at King Mongkut’s University of Technology Thonburi, Thailand. She is a current Computer Engineering & Electrical and Computer Engineering Graduate Program Chair at her university. Her interests are Software Fault, Optimization Algorithms, Digital Embedded System Modeling, and Statistical Analysis of System Reliability.

Part 1.- VCloud: A Security Framework for VANET; Wiseborn Manfe Danquah, Altilar D. Turgay.- Design of Dual Band H-Shaped Antenna For DCS And WLAN Applications; K.ThanaPakkiam, et al.- Secrecy Rate of the Amplify-and-Forward Relay Wire-Tap Channel in Rayleigh Fading; Cuong Dang, et al.- A Robust On-Demand Routing Protocol for Cognitive Radio Ad Hoc Networks; Zamree Che-aron, et al.- Guiding Users to Shops using the Near-field Communication between Signages and Mobile Terminals; Yoshio SUGA, et al.- MANETs Routing Method for Calls with Predefined Duration in Audio/video Communications; Hiroyuki TODOROKI, Kazumasa TAKAMI.- Enhanced Adaptive Modulation and coding (AMC) Technique using ILDPCA coders over MIMO channel; J.sofia Priya Dharshini, et al.- A weighted T2F scheme for WLANs; Huan Zhang, et al.- Illustrating PNC using rectangular pulses; Li Feng.- Application of Wireless Personal Area Networks to a Ship Area Piconet; Dong-Keun Jeon, et al.- Design and Development of a Wireless Sensor Network Framework for Water Quality Remote Monitoring; Francis Jerome Tiausas, et al.- Fun Learn: An Interactive Mobile Platform for Kids Learning; Shafiq Rehman.- A Compressive Sensing Detection Approach based on Spectral Kurtosis for Frequency Hopping Signal; Jin Young Kim, et al.- Packet Loss Concealment for Improving Audio Streaming Service; Jun-Yong Lee, et al.- Secure IP Mobility Support in Software Defined Networks; Shimun Sun, et al.- Part 2.- Comparative Performance Analysis of MANET Routing Protocols under Security Attacks; Muhammad Saleem Khan, et al.- Part 3.- Enhanced Speaker Verification Using GMM-Supervector based Modified Adaptive GMM Training; Tan Dat Trinh, et al.- Part 4.- Fit Buddy: A Mobile Application for Fitness Tracking Using the Always-On Low-Power Sensor; Kasidit Wijitsopon, et al.- Firenzina: Porting a Chess Engine to Android; Corey Abshire, Dmitri Gusev.- SPEARS: Smart Phone Emergencyand Accident Reporting System using Social Network Service and Dijkstra's Algorithm on Android; Chakkrit Snae Namahoot, Michael Brückner.- Descubre PUCP: Mobile App to improve academic experience inside campus; Pedro Jesús Carrión Castagnola, et al.- Part Workshop.- Localizing a Flying Object on Target Place Using Heterogeneous Binary Sensors; Hyunyoung Kim, et al.- Biometric Authentication Technology Trends in Smart Device Environment; HyunJin Kim, et al.- SLAN based User-Customized Cloud Interface Sharing for Smart Mobile Devices; Sanghyun Park, et al.

Erscheint lt. Verlag 25.6.2015
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo X, 214 p. 126 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Mathematik / Informatik Informatik Software Entwicklung
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Data Management for Mobile • Data Mining and Data Streaming • Mobile and wireless communications • Mobile malware and platform security • Mobility protocols & Mobile sensing • Mobility protocols & Mobile sensing • Privacy in Wireless Communications • Security for Mobile Sensing and Sensor Networks • Security in Mobile and Wireless • Sensor Network applications • Wireless application protocols (WAP) • wireless sensor networks
ISBN-10 3-662-47668-1 / 3662476681
ISBN-13 978-3-662-47668-0 / 9783662476680
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Entwurfsmuster für effektive Softwareentwicklung

von Karl Eilebrecht; Gernot Starke

Buch | Softcover (2024)
Springer Vieweg (Verlag)
19,99