ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020

دانلود کتاب ارتباطات رادیویی موبایل و شبکه های 5G: مجموعه مقالات MRCN 2020

Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020

مشخصات کتاب

Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020

دسته بندی: الکترونیک: ارتباطات از راه دور
ویرایش:  
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems, 140 
ISBN (شابک) : 9789811571299, 9789811571305 
ناشر: Springer Singapore 
سال نشر: 2020 
تعداد صفحات: 780 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 31 مگابایت 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ارتباطات رادیویی موبایل و شبکه های 5G: مجموعه مقالات MRCN 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ارتباطات رادیویی موبایل و شبکه های 5G: مجموعه مقالات MRCN 2020

این کتاب حاوی مقالات اصلی توسط محققان فعال است که در کنفرانس بین المللی ارتباطات رادیویی سیار و شبکه های 5G ارائه شده است. این شامل پیشرفت‌های اخیر و فناوری‌های آتی در زمینه سیستم‌های سلولی، 2G/2.5G/3G/4G/5G و فراتر از آن، LTE، WiMAX، WMAN، و سایر شبکه‌های بی‌سیم پهن باند نوظهور، WLAN، WPAN و شبکه‌های مختلف خانگی/شخصی است. فناوری‌ها، محاسبات و شبکه‌های فراگیر و پوشیدنی، شبکه‌های سلولی کوچک و فمتوسل، شبکه‌های مش بی‌سیم، شبکه‌های بی‌سیم خودرو، شبکه‌های رادیویی شناختی و کاربردهای آنها، شبکه‌های چندرسانه‌ای بی‌سیم، شبکه‌های بی‌سیم سبز، استانداردسازی فناوری‌های بی‌سیم در حال ظهور، مدیریت توان و تکنیک‌های صرفه‌جویی در انرژی .


توضیحاتی درمورد کتاب به خارجی

The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.



فهرست مطالب

Preface
Contents
Editors and Contributors
Analysis and Application of Vehicular Ad hoc Network as Intelligent Transportation System
	1 Introduction
	2 Related Works
	3 Comparative Analysis
	4 Research Challenges
	5 Conclusion
	References
Comprehensive Study on Internet of Things (IoT) and Design Considerations of Various Microstrip Patch Antennas for IoT Applications
	1 Introduction
	2 Applications of IoT for Microstrip Patch Antenna
	3 Conclusion
	References
Nonclassicality Used as Quantum Information Processing in Nonlinear Optical Systems
	1 Introduction
	2 Condition of Nonclassicality of a Nonlinear Optical System
		2.1 Condition of Normal Squeezing
		2.2 Condition of Photon Statistics
		2.3 Condition of Higher Order Antibunching (HOA) of Photons
	3 Seven-Wave Mixing Process in Pump Mode
		3.1 Squeezing in Seven-Wave Mixing Process
		3.2 Sub-Poissonian Photon Statistics in Seven-Wave Mixing Process
		3.3 Antibunching of Photons in Seven-Wave Mixing Process
	4 Result
	5 Conclusion
	References
Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances
	1 Introduction
	2 Topology
	3 Methodology
		3.1 Simulation and Formulations
	4 Results and Analysis
	5 Conclusion
	References
An Algorithm for Target Detection, Identification, Tracking and Estimation of Motion for Passive Homing Missile Autopilot Guidance
	1 Introduction
	2 Proposed Algorithm to Detect Object
	3 Results and Discussion
	4 Motion Estimation and Tracking
	5 Conclusion
	References
Community Discovery and Behavior Prediction in Online Social Networks Employing Node Centrality
	1 Introduction
	2 The Proposed Algorithm
		2.1 Objective Tasks
		2.2 Objective Tasks Employing Count of Detected Clusters
		2.3 Mutation
		2.4 Crossover
		2.5 Crossover on the Basis of Objective Task
	3 Experimentation Results
	4 Conclusion
	References
IoT–Blockchain Integration-Based Applications Challenges and Opportunities
	1 Introduction
	2 Blockchain
		2.1 Challenges
	3 IoT and Blockchain Integration
		3.1 Advantages of IoT and Blockchain Integration
		3.2 Integration Schemes for IoT and Blockchain
		3.3 Challenges in Blockchain IoT Integration
	4 IoT–Blockchain-Based Platforms and Applications
		4.1 Smart Contract
		4.2 Hyperledger
		4.3 Lisk Framework
		4.4 Quorum
	5 Experimental Analysis of Various Smart Contracts Used in IoT
	6 Conclusion and Future Work
	References
Analysis on Detection of Shilling Attack in Recommendation System
	1 Introduction
	2 Shilling Attack
	3 Categorization of Shilling Attack
		3.1 Intent Based
		3.2 Based on Knowledge
	4 Related Work
	5 Detection Attributes
		5.1 Generic Attributes
		5.2 Model Specific Attributes
	6 Evaluation Metrics
		6.1 Prediction Shift
		6.2 Recall
		6.3 Precision
		6.4 F1 Measure
		6.5 Mean Absolute Error
	7 Conclusion and Future Work
	References
A Comparative Analysis of Improvements in Leach Protocol: A Survey
	1 Introduction
	2 LEACH Protocols with Single-Hop Communication
	3 LEACH Protocols with Multi-Hop Communication
	4 Conclusion and Future Directions
	References
Deep Learning in Health Care: Automatic Cervix Image Classification Using Convolutional Neural Network
	1 Introduction
	2 Cervix Taxonomy
	3 Literature Survey
	4 Dataset
	5 Proposed Methodology
		5.1 Convolutional Neural Network(ConvNet)
		5.2 Pooling Layer
	6 Result and Discussion
	7 Conclusion and Future Work
	References
Review Paper on Leaf Diseases Detection and Classification Using Various CNN Techniques
	1 Introduction
	2 Literature Survey
	3 Conclusion
	References
Artificial Intelligence and Virtual Assistant—Working Model
	1 Introduction
		1.1 Difference Between Virtual Assistant and Chatbots
	2 Training Automation
	3 Analytics
	4 Related Work
	5 Future Work
	6 Conclusion
	References
Data Security in Wireless Sensor Networks: Attacks and Countermeasures
	1 Introduction
	2 Attacks in WSN
	3 Security Requirements in WSN
		3.1 Security Service
	4 Cryptographic Techniques
		4.1 Secret Key Cryptography
	5 Attacks on Cryptosystem
		5.1 Types of Active Attacks
	6 Existing Methods
		6.1 Application Based Methods
		6.2 Technique Based Methods
	7 Proposed Solution
	8 Conclusion
	References
Emerging Next-Generation TWDM-PON with Suitable Modulation Format
	1 Introduction
	2 TWDM-PON Architecture for Different Modulation Formats
		2.1 Downstream System Design
		2.2 Upstream System Design
		2.3 Different Modulation Formats
	3 Results and Discussion
		3.1 Comparative Analysis for Downstream Transmission
		3.2 Comparative Analysis for Upstream Transmission
	4 Conclusion
	References
Big Data and Analytics in Higher Educational Institutions
	1 Introduction
	2 Evolution of Big Data
		2.1 Data Collection
		2.2 Data Analysis
		2.3 Data Visualization
	3 Big Data and Analytics in Higher Education
		3.1 Institutional Analytics
		3.2 Information Technology (IT) Analytics
		3.3 Academic Analytics
		3.4 Learning Analytics
	4 Opportunities
	5 Challenges of Implementation
	6 Conclusion
	References
A Hybrid Channel Access Method to Optimize Congested Switched Network
	1 Introduction
	2 Related Work
	3 Contributions
	4 Design Philosophy
		4.1 Network Parametric Analysis
		4.2 HMCC Procedure
		4.3 Exponential Back-Off Algorithm
	5 Findings
	6 Conclusions
	References
Automated Object Detection System in Marine Environment
	1 Introduction
	2 Proposed Methodology
	3 Experimental Results and Discussion
	4 Conclusion and Future Work
	References
Passive Authentication Image Forgery Detection Using Multilayer CNN
	1 Introduction
		1.1 Types of Image Forgery
		1.2 Passive Image Forgery Attacks
	2 Related Work
	3 Proposed Model
		3.1 Architecture of Model
		3.2 Preprocessing
		3.3 Convolution Layer
		3.4 Polling Layer
		3.5 Dense Layer
		3.6 Dropout Layer
		3.7 Completing the Network
		3.8 Database Specification
	4 Results
	5 Conclusion
	References
Contiki Cooja Security Solution (CCSS) with IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things Applications
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Result and Analysis
	5 Conclusions and Future Scope
	References
Characterization of Thimbles Based upon Different Sensors
	1 Introduction
	2 Architecture of the Thimbles
	3 Methods
	4 Data Recording
	5 Data Analysis
	6 Results
	7 Discussion
	References
Application of the Optimization Technique in Analytical and Electrochemistry for the Anticorrosive and Complexing Activity of 2,4-Dihydroxyacetophenone Benzoylhydrazone
	1 Introduction
	2 Experimental
		2.1 Preparation of 2,4-Dihydroxyacetophenone Benzoylhydrazone (DHABH)
		2.2 Materials Required for Anti-corrosion Potential
		2.3 Instrumentation and Materials Required for Spectrophotometric Determination of Tungsten (VI)
	3 Result and Discussion
		3.1 Anticorrosive Behaviour
		3.2 Electrochemical Measurements
		3.3 Adsorption Isotherms
		3.4 Quantum Chemical Parameters
		3.5 Spectrophotometric Determination of W(VI) Using DHABH as Complexing Agents
		3.6 Procedure Recommended for Extraction and Determination of Tungsten (VI)
		3.7 Stoichiometry of the Complex
	4 Computational Studies for Structural Elucidation
	5 Conclusions
	References
A Comprehensive Overview of Sentiment Analysis and Fake Review Detection
	1 Introduction to Sentiment Analysis
		1.1 Levels of Sentiment Analysis (SA)
		1.2 Architecture of Sentiment Analysis
	2 Fake Review
	3 Literature Review
	4 Approaches Used for Sentiment Analysis
	5 Real-Life Applications of Sentiment Analysis
	6 Conclusion
	References
Information Security in Software-Defined Network
	1 Introduction
	2 Virtualized Network Functions and Software-Defined Networks
	3 Related Work
	4 Proposed Work
		4.1 Requirement Specification
		4.2 Methodology
	5 Experimental Results
		5.1 Screenshots
	6 Conclusion
		6.1 Proposed Work Achievement
		6.2 Findings
		6.3 Advantages
	7 Future Scope
	References
Emotions Recognition Based on Wrist Pulse Analysis
	1 Introduction
	2 Methodology
		2.1 Data Acquisition
		2.2 Preprocessing
		2.3 Feature Extraction
	3 Result
	4 Conclusion
	References
Trace Determination of Zirconium (IV) as its 3-Hydroxy-2-[2′-(5′-Methylthienyl)]-4H-Chromen-4-One Complex and Structural Elucidation by Quantization Technique
	1 Introduction
	2 Experimental
		2.1 Equipments, Reagents and Solutions
		2.2 Synthetic and Technical Samples
		2.3 Procedure for Extraction and Determination
	3 Results and discussion
		3.1 Effect of Anions/Complexing Agents and Cations
		3.2 Spectral Characteristics
		3.3 Stoichiometry of Zr (IV)-HMTC Complex
		3.4 Structural Elucidation by Optimization Technique
		3.5 Analytical Applications
	4 Conclusion
	References
Barriers Which Impede the Implementation of an Effective Deep Web Data Extraction in VBPS
	1 Introduction
		1.1 The Recent Trends
		1.2 The Working Architecture
	2 Objectives
	3 Research Background
	4 Vision-Based Page Segmentation (VBPS)
		4.1 Deep Web Data Extraction in VBPS
		4.2 Barriers for Deep Web Data Extraction in VBPS
	5 Conclusions and Recommendations
	References
The Prediction of Stock Market Trends Using the Hybrid Model SVM-ICA-GA
	1 Introduction
	2 Literature Review
	3 Overview of  SVM
	4 SVM with ICA and GA
	5 Proposed Methodology
	6 Results and Discussions
	7 Conclusion
	References
Bone Fractured Detection Using Machine Learning and Digital Geometry
	1 Introduction
	2 Literature Review
	3 Methodology
	4 The Model
	5 Result
	6 Conclusion
	References
Assessment of Microgrid Communication Network Performance for Medium-Scale IEEE Bus Systems Using Multi-Agent System
	1 Introduction
	2 Materials and Methods
		2.1 Multi-Agent System
		2.2 IEEE Bus Systems for Microgrid
		2.3 Network Performance
		2.4 Protocol and Algorithm Description
	3 Performance Metrics
	4 Results and Discussion
	References
Optimum Digital Filter Design for Removal of Different Noises from Biomedical Signals
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
5G Inset Feed Antenna Array for 28 GHz Wireless Communication
	1 Introduction
	2 Antenna Design
	3 Result and Discussion
		3.1 Resonant Frequency
		3.2 Gain
		3.3 Radiation Pattern
	4 Conclusion
	References
Comparison of Various Attacks on WSN Layers—Based on the Site of the Attacker and Access Level
	1 Introduction
	2 WSN Architecture
		2.1 Organization of Wireless Sensor Network
	3 Limitations of Wireless Sensor Networks
	4 Security in WSN
	5 Classification of Attacks in WSN
		5.1 Based on the Site of the Attacker
		5.2 Attacks Based on Access Level
		5.3 Attacks Based on Network Layer
	6 Conclusion
	References
Non-conventional Energy Source-Based Home Automation System
	1 Introduction
	2 System Model
	3 System Design
		3.1 Logic Circuit
		3.2 Inverter Circuit
		3.3 Microcontroller Connections
	4 Results
	5 Conclusion
	References
Resource Scheduling on Basis of Cost-Effectiveness in Cloud Computing Environment
	1 Introduction
	2 Related Work
	3 Resource Scheduling
		3.1 Resource Scheduling Algorithms Based on Energy Conservation in Cloud Computing
		3.2 Resource Scheduling Algorithms Based on Virtualization in Cloud Computing
		3.3 Resource Scheduling Algorithms Based on Service-Level Agreement (SLA) in Cloud Computing
		3.4 Resource Scheduling Algorithms Based on Cost in Cloud Computing
	4 Directed Acyclic Graph
	5 Conclusion
	References
Optimized Multi-level Data Aggregation Scheme (OMDA) for Wireless Sensor Networks
	1 Introduction
		1.1 Requirements of Data Aggregation Over WSN
		1.2 Constraints for Data Aggregation Over WSN
	2 Existing Solutions for Data Aggregation Over WSN
	3 Optimized Multi-level Data Aggregation Scheme (OMDA) for WSN
	4 Simulation Scenario
	5 Simulation Results and Performance Analysis
		5.1 Throughput
		5.2 End-To-End Delay
		5.3 Energy Consumption
		5.4 Number of Alive Sensors Using TD-DA and OMDA
	6 Conclusion
	References
Potentiality of Nanotechnology in Development of Biosensors
	1 Introduction
	2 Intertwining Nanotechnology in Biosensors
	3 Different Components of Nanotechnology
		3.1 Nanotubes
		3.2 Nanoparticles
		3.3 Nanocrystals
		3.4 Nanowires
		3.5 Nanorods
	4 Conclusion
	References
Microstrip Patch Antenna for Future 5G Applications
	1 Introduction
	2 Antenna Structure and Dimensions
	3 Simulation Results
		3.1 Plot of Return Loss
		3.2 Plot of VSWR
		3.3 Gain Plot
		3.4 Radiation Pattern
	4 Conclusion
	References
Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment
	1 Introduction
		1.1 Cloud Computing Environment
	2 Literature Review
	3 Methodologies Used
		3.1 Multilayer Perceptron
	4 The Proposed System
		4.1 Workflow of the Proposed System
	5 Experimentation and Results
		5.1 Experimental Dataset
	6 Conclusions and Future Work
	References
Position Falsification Misbehavior Detection in VANETs
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Statistical Approach
		3.2 Machine Learning Approach
	4 Results
	5 Conclusion
	References
Artificial Intelligence Fuelling the Health Care
	1 Introduction and Impact of AI
	2 Scenario of AI with Health Care
	3 AI is the Future of Health Care
	4 Conclusion
	References
A Systematic Review of Risk Factors and Risk Assessment Models for Breast Cancer
	1 Introduction
		1.1 Overview of Breast Cancer Risk
		1.2 Significance of Risk Assessment
		1.3 Risk Assessment Modeling
	2 Risk Factors for Breast Cancer
		2.1 Risk Factors
		2.2 Lifestyle-Related Risk Factors
		2.3 Other Risk Factors
	3 Risk Factor Incorporation in Models for Risk Estimation
	4 Comparative Analysis of Model Accuracy
	5 Machine Learning in Breast Cancer Prediction
	6 Conclusion
	References
Reflection of Plane Harmonic Wave in Transversely Isotropic Magneto-thermoelastic with Two Temperature, Rotation and Multi-dual-Phase Lag Heat Transfer
	1 Introduction
	2 Basic Equations
	3 Formulation and Solution of the Problem
	4 Plane Wave Propagation
		4.1 Phase Velocity
		4.2 Attenuation Coefficient
		4.3 Specific Loss
		4.4 Penetration Depth
	5 Reflection at the Boundary Surfaces
	6 Boundary Conditions
	7 Numerical Results and Discussion
		7.1 Amplitude Ratios
		7.2 Energy Ratios
		7.3 Phase Velocity
		7.4 Attenuation Coefficients
		7.5 Specific Loss
		7.6 Penetration Depth
	8 Conclusions
	References
Deformation in Generalized Transversely Isotropic Magneto-Thermoelastic Rotating Solid Due to Inclined Load and Thermal Laser Pulse
	1 Introduction
	2 Basic Equations
	3 Formulation and Solution of the Problem
	4 Boundary Conditions
	5 Applications
	6 Special Cases
		6.1 Concentrated Force
		6.2 Uniformly Distributed Force
		6.3 Linearly Distributed Force
	7 Inversion of the Transformation
	8 Particular Cases
	9 Numerical Results and Discussion
		9.1 Concentrated Force Due to Inclined Load and with Laser Pulse
	10 Conclusions
	References
Impact of Integration of Wind Turbine on Dynamics of a Power System
	1 Introduction
	2 Problem Formulation
	3 System Model
	4 Wind Energy Source
	5 ANFIS
	6 Simulation Results
	7 Conclusion
	References
Hybrid Version of Apriori Using MapReduce
	1 Introduction
	2 Literature Review
	3 The Proposed Model
	4 Result
	5 Conclusion and Future Work
	References
A New Time Varying Adaptive Filtering System (TVAFS) for Ambulatory ECG Signals
	1 Introduction
	2 Adaptive Filtering System
	3 Proposed TVAFS Algorithm
	4 Experiments and Results
	5 Conclusion
	References
Ultrathin Compact Triple-Band Polarization-Insensitive Metamaterial Microwave Absorber
	1 Introduction
	2 Design and Simulation
		2.1 Design
		2.2 Simulation
		2.3 Absorption Mechanism
	3 Experimental Measurements
	4 Conclusion
	References
Optical Wireless Channel Characterization Based on OOK Modulation for Indoor Optical Wireless Communication System Using WT-ANN
	1 Introduction
	2 Indoor Optical Wireless Communication
	3 Wavelet Transform
		3.1 Discrete Wavelet Transform
		3.2 Stationary Wavelet Transform
	4 System Design
	5 Simulations
	6 Results and Discussions
		6.1 SNR Versus BER
		6.2 Efficiency
		6.3 NOPR Versus Data Rate
	7 Conclusion
	References
Indoor Optical Wireless Communication System Using Wavelet Transform and Neural Network Based on Pulse Position Modulation Intended for Optical Wireless Channel Characterization
	1 Introduction
	2 Indoor Optical Wireless Communication
	3 Discrete Wavelet Transform
	4 Stationary Wavelet Transform
	5 System Design
	6 Simulations
	7 Results and Discussions
		7.1 SNR Versus BER
		7.2 Efficiency
	8 Conclusion
	References
GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices
	1 Introduction
	2 Literature Survey
	3 Proposed Work to Preserve Group Security Among Hypercube Deployed IoT Devices
	4 Conclusion and Future Scope
	References
Depression Detection in Cancer Communities Using Affect Analysis
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Result and Analysis
	5 Conclusions and Future Work
	References
Triple-Band Polarization-Insensitive Wide Angle Ultrathin Hexagonal Circumscribed Metamaterial Absorber
	1 Introduction
	2 Unit Cell Design
	3 Simulation
	4 Absorption Mechanism
	5 Experimental Measurements
	6 Conclusion
	References
An Effective Fusion of a Color and Texture Descriptor for an Image Retrieval System: An Exploratory Analysis
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Color Feature Extraction
		3.2 Texture Feature Extraction
		3.3 Combination Techniques
	4 Experimental Setup and Results
		4.1 Experimental Setup
		4.2 Results
	5 Conclusion and Future Trends
	References
Power Consumption Reduction in IoT Devices Through Field-Programmable Gate Array with Nanobridge Switch
	1 Introduction
		1.1 Field-Programmable Gate Arrays (FPGA)
	2 Literature Survey
	3 Nanobridge Technology
		3.1 Performance Analysis of Nanobridge-FPGA
	4 Conclusion
	References
Li-Fi Technology—A Study on a Modernistic Way of Communication
	1 Introduction
	2 Li-Fi Design and Working
		2.1 How Does Li-Fi Work?
	3 Performance of Li-Fi
		3.1 Advantages of Li-Fi Over Wi-Fi
	4 Li-Fi Strengths and Weaknesses
	5 Applications of Li-Fi
	References
A 28 GHz Corporate Series-Fed Taper Antenna Array for Fifth-Generation Wireless Communication
	1 Introduction
	2 Antenna Design
	3 Result and Discussion
		3.1 Resonant Frequency
		3.2 Gain
		3.3 Radiation Pattern
	4 Conclusion
	References
Design and Analysis of Gain Enhancement THz Microstrip Curvature Patch PBG Antenna with Inset Feed
	1 Introduction
	2 Antenna Design
	3 Result and Discussion
		3.1 Resonant Frequency
		3.2 Gain
		3.3 Effect of Radius of Curvature on the Proposed Antenna
		3.4 Effect of Photonic Band Gap Hole Size on the Proposed Antenna
		3.5 Effect of Separation Distance Between the Photonic Crystals on the Proposed Antenna
		3.6 Radiation Pattern
	4 Conclusion
	References
Performance Analysis of Classification Methods in the Diagnosis of Heart Disease
	1 Introduction
	2 Research Methodology
		2.1 The Datasets
		2.2 The Software Tool
		2.3 The Performance Indicators
	3 Results and Discussion
		3.1 Cleveland Dataset
		3.2 Hungarian Dataset
		3.3 Switzerland Dataset
		3.4 VA Long Beach Dataset
	4 Conclusion
	References
A Critical Evaluation of Mathematical Modeling Approaches in the Scientific Research
	1 Introduction
	2 Theoretical Approach
	3 Qualitative Approach
	4 Dimensional Analysis Approach
	5 Specific Quantitative Approach
	6 General Quantitative Approach (Statistical Approach)
	7 Conclusion
	References
Cloud Load Balancing Using Optimization Techniques
	1 Introduction
		1.1 Load Balancing in Cloud Computing
		1.2 Load Balancing Optimization Algorithms
	2 Comparison and Important Findings
	3 Conclusion
	References
QoS Sensible Coalition-Based Radio Resource Management Scheme for 4G Mobile Networks
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Result and Discussion
	5 Conclusion
	References
Reliable and Energy-Efficient Data Transfer Routing in Wireless Body Area Networks
	1 Introduction
	2 Wireless Sensor Node
	3 Wireless Sensor Network
	4 Literature Review
	5 Problem Formulation
	6 Methodology
	7 Implementation and Results
	8 Radio Model
	9 Network Parameter
	10 Discussion
	11 Conclusion
	References
A Model on IoT Security Method and Protocols for IoT Security Layers
	1 Introduction
	2 Security Challenges in IoT
		2.1 Data Integrity
		2.2 Encryption and Decryption Capabilities
		2.3 Privacy Issues
		2.4 Common Framework
		2.5 Automation
		2.6 Updations
	3 Literature Review
	4 Proposed Model of IoT Security
		4.1 Implementation of Proposed Model
		4.2 Flowchart of Proposed Model
	5 Conclusion
	References
Structural Health Monitoring System for Bridges Using Internet of Things
	1 Introduction
	2 Related Work
	3 Problem Formulation
	4 Problem Statement
	5 Proposed Solution
	6 Iot Platform for Shm
	7 Challenges
	8 Conclusion and Future Scope
	References
Author Index




نظرات کاربران