Cantitate/Preț
Produs

Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 1: Advances in Intelligent Systems and Computing, cartea 408

Editat de Suresh Chandra Satapathy, Amit Joshi, Nilesh Modi, Nisarg Pathak
en Limba Engleză Paperback – 11 feb 2016
The two volumes of this bookcollect high-quality peer-reviewed research papers presented in theInternational Conference on ICT for Sustainable Development (ICT4SD 2015) heldat Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Informationand Communication Technologies and its applications in field for engineeringand management. The main focus of the volumes are on applications of ICTfor Infrastructure, e-Governance, andcontemporary technologies advancements on Data Mining, Security,Computer Graphics, etc.  The objective of this International Conferenceis to provide an opportunity for the researchers, academicians, industrypersons and students to interact and exchange ideas, experience and expertisein the current trend and strategies for Information and CommunicationTechnologies.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 129534 lei  6-8 săpt.
  Springer Nature Singapore – 11 feb 2016 129534 lei  6-8 săpt.
  Springer Nature Singapore – 26 feb 2016 129833 lei  6-8 săpt.

Din seria Advances in Intelligent Systems and Computing

Preț: 129534 lei

Preț vechi: 161917 lei
-20% Nou

Puncte Express: 1943

Preț estimativ în valută:
24789 25723$ 20719£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811001277
ISBN-10: 9811001278
Pagini: 757
Ilustrații: XX, 757 p. 426 illus. in color.
Dimensiuni: 155 x 235 x 39 mm
Greutate: 1.07 kg
Ediția:1st ed. 2016
Editura: Springer Nature Singapore
Colecția Springer
Seria Advances in Intelligent Systems and Computing

Locul publicării:Singapore, Singapore

Cuprins

Chapter 1. A Compact Triple and Quadruple BandAntenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2.DDA: An Approach to Handle DDoS (Ping Flood) Attack.-Chapter 3. Approachto Accurate Circle Detection: Multithreaded Implementation of Modified CircularHough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Basedon CPU Utilization and Performance Evaluation on Multi Cluster HeterogeneousEnvironment.- Chapter 5. FasterLoad Flow Analysis.- Chapter 6. Fuzzy LinkBased Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-BasedOptimization (TLBO) Approach to Truss Structure Subjected to Static and DynamicConstraints.- Chapter 8. EnforcingIndexing Techniques in Berkeley DB Using Implementation of Hilbert TreeAlgorithm.- Chapter 9. AnImprovement in Performance of Optical Communication System using LinearlyChirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11.Feasibility Study of Proposed Architecture forAutomatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User BasedCollaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT BasedFacilities Management Tools for Buildings.- Chapter 15. Study theEffect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Nodein MANET.- Chapter 16. UDPFlooding Attack Detection Using Information Metric Measure.- Chapter 17.Generalized MCDM Based Decision Support System forPersonnel Prioritization.- Chapter18.A Proactive Dynamic Rate Control Schemefor AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoSover MANET.- Chapter 20. HybridApproach to Reduce Time Complexity of String Matching Algorithm usingHashingwith Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step TowardsTemporal Information Retrieval.- Chapter22. A SecureText Communication Scheme Based on Combination of Compression, Cryptography andSteganography.- Chapter 23. AComparative Analysis of Feature Selection Methods and Associated MachineLearning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24.ACE (Advanced Compression Encryption)  Scheme for Image Authentication.- Chapter25. AnEfficient and Interactive Approach for Association Rules Generation byIntegrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless SensorNetworks.- Chapter 27. Comparative Analysis of MCML Compressor with andwithout Concept of Sleep Transistor.- Chapter 28. Design& Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2DPhotonic Crystal.- Chapter 29. Designingand Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30.Classifying Nodes in Social Media Space.- Chapter 31.A Novel Hexagonal Shaped Based Band Stop FrequencySelective Surface with Multi-Band Applications.- Chapter 32. AXSM : An Automated Tool for XML Schema Matching.- Chapter 33.Development of Web Map Service For Open Street Maps(OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS andDirectional Antenna Integrating With RFID and Wireless Technology.- Chapter 35.Secured Cloud Data Storage – Prototype Trust Modelfor Public Cloud Storage.- Chapter36.A Semi Circular Monopole Antenna forUltra Wide Band Applications.- Chapter37. Security Analysisof Different LFSR Based Ciphers to Propose a Novel Approach Compatible withParallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.-Chapter 38. Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- Chapter 39.Support Vector Machine Based Model for HostOverload Detection in Clouds.- Chapter40. A HybridFace Recognition Scheme Using Contour and Gabor Wavelet.- Chapter 41. DataDissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hocNetworks.- Chapter 42. DataAcquisition with FPGA using Xilinx and LabVIEW.- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna withMultiband Notch Characteristics.- Chapter 44.Wireless Resonant Power Transmission.- Chapter 45.Fuzzy Clustering based Efficient ClassificationModel for large TCPdump data set using Hadoop framework.- Chapter 46.System-related Characteristic Based Leader ElectionProtocol for Cognitive Radio Networks.- Chapter 47. Passive Image Manipulation Detection using WaveletTransform and Support Vector Machine Classifier.- Chapter 48. Intrusion Detection System with Snort in CloudComputing.- Chapter 49. RuralE-Health Care Model.- Chapter 50. An Implementation Model for Privacy Aware AccessControl in Web Services Environment.- Chapter 51. Comprehensive Review on Eye Close and Eye Open ActivitiesUsing EEG in Brain Computer Interface.- Chapter 52. Design of High Data Rate and Multipath EfficientUnderwater Acoustic Communication System Using OFDM-DQPSK.- Chapter 53.A Hybrid Approach for Big Data Analysis of CricketFan Sentiments in Twitter.- Chapter54. PerformanceAnalysis of Medical Image Compression Techniques.- Chapter 55. Integrated Framework Using Frequent Pattern forClustering Numeric and Nominal Data Sets.- Chapter 56. Image Encryption by Using Block Based SymmetricTransformation Algorithm (International Data Encryption Algorithm).- Chapter 57.Content Based Watermarking Using MCA.- Chapter 58.Image Enhancement Based on Log-Gabor Filter forNoisy Fingerprint Image.- Chapter59. ComputationalPerformance Analysis of Ant Colony Optimization Algorithms for Travelling SalesPerson Problem.- Chapter 60.Evaluating Performance of Reactive and HybridRouting Protocol in Mobile Ad-Hoc Network.- Chapter 61. Sentiment Based Data Mining Approach forClassification and Analysis.- Chapter62. OfflineHandwritten Sanskrit Simple and Compound Character Recognition Using NeuralNetwork.- Chapter 63. Need ofICT for Sustainable Development of Power Sector.- Chapter 64. Development of Optical Impairment MinimizationTechnique for Radio Over Fiber Link.- Chapter 65. Mobile Waste Management for Smart Cities: MonitoringSanitation through Living Labs.- Chapter66. OptimizedImplementation of Location Aware and Network Based Services for Power EfficientAndroid Applications.- Chapter67. PowerConsumption and Congestion Control of Rendezvous Node for Wireless BiosensorNetwork.- Chapter 68. Comparisonof Different SimilarityFunctions on Hindi QA System.- Chapter 69.Preventing Faults: Fault Monitoring and ProactiveFault tolerance in Cloud Computing.- Chapter 70. Evolving the Reliability for Cloud System UsingPriority Metric.- Chapter 71. MultilevelPriority Based Task Scheduling Algorithm for Workflows in Cloud ComputingEnvironment.- Chapter 72. EfficientDNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack inMANETs.- Chapter 74. Opinion Mining Classification Based on Extension ofOpinion Mining Phrases.- Chapter75. FacialExpression Recognition Using variants of LBP and Classifier Fusion.- Chapter 76.FLSU Based Energy Efficient Protocol Design for WSNwith Mobile Sink.- Chapter 77. Goal basedConstraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.

Notă biografică

Dr. Suresh Chandra Satapathy is currently workingas Professor and Head, Dept. of CSE at Anil Neerukonda Institute of Technologyand Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph. D. in ComputerScience and Engineering from JNTU Hyderabad and M. Tech in CSE from NIT,Rourkela, Odisha, India. He has 26 years of teaching experience. His researchinterests are data mining, machine intelligence and swarm intelligence. He hasacted as program chair of many international conferences and edited 6 volumesof proceedings from Springer LNCS and AISC series. He is currently guiding 8scholars for Ph. Ds. Dr. Satapathy is also a Sr. Member IEEE.

Mr. Amit Joshi has an experience of around 6years in academic and industry in prestigious organizations of Rajasthan andGujarat. Currently, he is working as an Assistant Professor in Department ofInformation Technology at Sabar Institute in Gujarat. He is an active member ofACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many otherprofessional societies. Currently, he is Honorary Secretary of CSI UdaipurChapter and Honorary Secretary for ACM Udaipur Chapter. He has presentedand published more than 40 papers in National and InternationalJournals/Conferences of IEEE, Springer, and ACM. He has also edited three bookson diversified subjects including Advances in Open Source Mobile Technologies,ICT for Integrated Rural Development and ICT for Competitive Strategies. He hasalso organized more than 25 National and International Conferences andWorkshops including International Conference ETNCC 2011 at Udaipur throughIEEE, International Conference ICTCS – 2014 at Udaipur through ACM,International Conference ICT4SD 2015 – by Springer recently. He has also servedon Organising and Program Committee of more than 50Conferences/Seminars/Workshops throughout the World and presented 6 invitedtalks in various conferences. For his contribution towards the society, TheInstitution of Engineers (India), ULC, has given him Appreciation award on thecelebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE, 2012.
Dr. Nilesh Modi is having richexperience of around 13 years in academics and IT industry. He is holdingDoctorate in e-Security (Computer Science and Application).  Continuinghis research on cyber security, presently he is pursuing post-doctoral researchon Wireless Communication and Security and certification as an EthicalHacking. He has very good number of research under his name and presentedmore than 75 research papers in International and National Journals andConferences. He has delivered number of expert talk on e-Security and hackingin National and International Conferences. Dr. Modi, a person with vibrancyhaving his active involvement as a life member of CSI, ACM IEEE, IACSIT, IACSI,IAEng apart from his academic and industrial career. As a consultant, he iscontributing for differentsystem development projects with IT industry andcarried out different Government Projects. 

Dr. Nisrag Pathak has been an astute and resultoriented professional with 10 years of experience in teaching and carvingstate, national and international events like workshops, seminars andconferences. Being a mathematics scholar and computer science professional, heis actively involved in research of data mining and big data analytic. He hasstrong list of national and international publication in his name. Dr. Pathakis currently Associate Professor of Computer Science and Application atNarsinhbhai Institute of Computer Studies and Management affiliated to KadiSarva Vishvavidyalaya. He received his Ph.D. from Hemchandracharya NorthGujarat University in Computer Science and his Master's in Mathematics from thesame university. His other tenures include research fellow at IndianStatistical Institute, Kolkata and Indian Institute of Science, Bengaluru.

Textul de pe ultima copertă

The two volumes of this book collect high-quality peer-reviewed research papers presented in the International Conference on ICT for Sustainable Development (ICT4SD 2015) held at Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Information and Communication Technologies and its applications in field for engineering and management. The main focus of the volumes are on applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc.  The objective of this International Conference is to provide an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend and strategies for Information and Communication Technologies.

Caracteristici

Discusses all areas of Information and Communication Technologies (ICT) and its applications in field for engineering and management Focusses on the applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc. Provides an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend Includes supplementary material: sn.pub/extras