{"id":88,"date":"2020-07-28T08:54:36","date_gmt":"2020-07-28T08:54:36","guid":{"rendered":"https:\/\/lighthousebooks.org\/index.php\/product\/the-world-versus-everthing-beyond-2\/"},"modified":"2026-03-28T10:17:24","modified_gmt":"2026-03-28T10:17:24","slug":"current-approaches-in-computing-and-information-technology-vol-1","status":"publish","type":"product","link":"https:\/\/lighthousebooks.org\/index.php\/product\/current-approaches-in-computing-and-information-technology-vol-1\/","title":{"rendered":"Current Approaches in Computing, and Information Technology Vol. 1"},"content":{"rendered":"<div class=\"content-box\">\n<div class=\"box-img\"><strong>Current Approaches in Computing, and Information Technology Vol. 1<\/strong><\/div>\n<div class=\"box-content\">\n<p><strong>Dr. Alexander Fink, (Editor)<\/strong><\/p>\n<p>This book covers keys areas of management. The contributions by the authors include Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks: Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Chapters of the book:<\/strong><\/span><br \/>\n<strong>Chapter 1<\/strong>: An Approach for Diabetic Retinopathy Detection using Image Processing Techniques<br \/>\nAmruta V. Anasane<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 7-18<\/p>\n<p><strong>Chapter 2<\/strong>: Risk Management in Construction Project<br \/>\nS. Sathyajith, M. Naveen, S. Bharathivasan, A. S. Hariharan, M. Manoj Kumar<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 19-34<\/p>\n<p><strong>Chapter 3<\/strong>: Darksort: A New Linear Sorting Algorithm<br \/>\nBlake MacKenzie Burns<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 35-52<\/p>\n<p><strong>Chapter 4<\/strong>: Effects of Different Fine Aggregate on Concrete Strength<br \/>\nKiambigi Maina, Gwaya A., Koteng D.<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 53-66<\/p>\n<p><strong>Chapter 5<\/strong>: Audio Steganography using RSA Algorithm<br \/>\nHarshal Chhadwa, Glynes D\u2019souza, Swaradi Godane, Pooja Sharma<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 67-80<\/p>\n<p><strong>Chapter 6<\/strong>: eFresh \u2013 A Device to Detect Food Freshness<br \/>\nNaveed Shahzad, Usman Khalid, Atif Iqbal, Meezan-Ur-Rahman<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 81-88<\/p>\n<p><strong>Chapter 7<\/strong>: A More Effective Labour Management Model for Construction Projects to Increase Productivity and Enhance Profitability<br \/>\nDennis Mumo Ndolo, Diang\u2019a Stephen, Gwaya Abednego<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 89-100<\/p>\n<p><strong>Chapter 8<\/strong>: Solving Management Constraints of Traditional Networks using the Concept of Software Defined Networking<br \/>\nMuhamed Begovi\u0107, Himzo Bajri\u0107<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 101-113<\/p>\n<p><strong>Chapter 9<\/strong>: Towards Context-Aware Computation Offloading for Resource-Poor Mobile and Smart Computing Devices<br \/>\nCollinson Colin M. Agbesi, Katsriku Apietu Ferdinand, Jamal-Deen Abdulai, Kofi Adu-Manu Sarpong<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 114-131<\/p>\n<p><strong>Chapter 10<\/strong>: System Reliability using Generalized Intuitionistic Fuzzy Exponential Lifetime Distribution<br \/>\nE. Baloui Jamkhaneh<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 132-147<\/p>\n<p><strong>Chapter 11<\/strong>: Synthesis of Effect of Self Heating Effect on Electrical Characteristics in SOI MOSFET<br \/>\nJyoti Kumawat, Mukesh Kumar Yadav<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 148-165<\/p>\n<p><strong>Chapter 12<\/strong>: Hardware Based Offline Licensing System<br \/>\nP. Julia Grace, S. Sumathy<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 166-184<\/p>\n<p><strong>Chapter 13<\/strong>: Pitch Mode Control System Design of Guided Missile<br \/>\nMuhammad A. R Yass, Mohammed Wajeeh Ameen<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 185-217<\/p>\n<p><strong>Chapter 14<\/strong>: Application of the Guided Method to study the Characteristics of the Frequency Modulation Circuits<br \/>\nMaha Abdul Ameer Kadhum<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 218-232<\/p>\n<p><strong>Chapter 15<\/strong>: Data Clustering Approach for Automatic Text Summarization of Hindi Documents using Particle Swarm Optimization and Semantic Graph<br \/>\nVipul Dalal, Latesh Malik<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 233-248<\/p>\n<p><strong>Chapter 16<\/strong>: A Survey on Soft Computing Based Approaches for Fuzzy Model Identification<br \/>\nNeety Bansal, Parvinder Kaur<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 249-264<\/p>\n<p><strong>Chapter 17<\/strong>: Analysis and Design of Reinforced Concrete Beams and Columns using open STAAD<br \/>\nFernandes R. J, Javali F. M, Patil S. B<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 265-273<\/p>\n<p><strong>Chapter 18<\/strong>: EU and Cyber Security<br \/>\nDragos Ionut ONESCU<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 274-284<\/p>\n<p><strong>Chapter 19<\/strong>: An Empirical Research in Autonomous Vehicles Control<br \/>\nNgo Tung Son, Tran Binh Duong, Bui Ngoc Anh, Luong Duy Hieu<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 285-299<\/p>\n<p><strong>Chapter 20<\/strong>: Intelligent Electronic Surveillance Systems for Personal and Team Security in Public Places<br \/>\nAshwani Kumar Aggarwal<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 300-325<\/p>\n<p><strong>Chapter 21<\/strong>: Identifying Efficient Frequency Standards of Wireless Network<br \/>\nPriyanka B Karande, Rupali S Kumbhar, Priydarshanee A Pawale, Ajinkya. C. Bapat<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 326-355<\/p>\n<p><strong>Chapter 22<\/strong>: Hardware Implementation of Fuzzy Logic Controller for Triple-Lift Luo Converter<br \/>\nN. Dhanasekar, R. Kayalvizhi<br \/>\nCurrent Approaches in Computing, and Information Technology Vol. 1, 5 March 2022, Pages: 356-375<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><strong>Dr. Alexander Fink, (Editor)<\/strong><\/p>\n","protected":false},"featured_media":398,"comment_status":"open","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":""},"product_cat":[66,52,69],"product_tag":[25,26,27],"_links":{"self":[{"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/product\/88"}],"collection":[{"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/comments?post=88"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/media\/398"}],"wp:attachment":[{"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/product_cat?post=88"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/lighthousebooks.org\/index.php\/wp-json\/wp\/v2\/product_tag?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}