Cantitate/Preț
Produs

Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 2: Advances in Intelligent Systems and Computing, cartea 409

Editat de Suresh Chandra Satapathy, Amit Joshi, Nilesh Modi, Nisarg Pathak
en Limba Engleză Paperback – 26 feb 2016
The two volumes of this bookcollect high-quality peer-reviewed research papers presented in theInternational Conference on ICT for Sustainable Development (ICT4SD 2015) heldat Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Informationand Communication Technologies and its applications in field for engineeringand management. The main focus of the volumes are on applications of ICTfor Infrastructure, e-Governance, andcontemporary technologies advancements on Data Mining, Security,Computer Graphics, etc.  The objective of this International Conferenceis to provide an opportunity for the researchers, academicians, industrypersons and students to interact and exchange ideas, experience and expertisein the current trend and strategies for Information and CommunicationTechnologies.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 122676 lei  6-8 săpt.
  Springer Nature Singapore – 11 feb 2016 122676 lei  6-8 săpt.
  Springer Nature Singapore – 26 feb 2016 122957 lei  6-8 săpt.

Din seria Advances in Intelligent Systems and Computing

Preț: 122957 lei

Preț vechi: 153697 lei
-20% Nou

Puncte Express: 1844

Preț estimativ în valută:
23547 25482$ 19630£

Carte tipărită la comandă

Livrare economică 09-23 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811001338
ISBN-10: 9811001332
Pagini: 819
Ilustrații: XX, 819 p. 409 illus.
Dimensiuni: 155 x 235 x 42 mm
Greutate: 1.15 kg
Ediția:1st ed. 2016
Editura: Springer Nature Singapore
Colecția Springer
Seria Advances in Intelligent Systems and Computing

Locul publicării:Singapore, Singapore

Cuprins

Chapter 1. Implementing the Logical SecurityFramework for E-commerce Based on Service Oriented Architecture.- Chapter 2. Indian Sign Language Translator Using Kinect.- Chapter 3.Formal Transformation of UML Diagram: Use Case,Class, Sequence Diagram with Z Notation for Representing the Static &Dynamic Perspectives of System.- Chapter4. A Surveyof Android Malware Detection Strategy and Techniques.- Chapter 5.A Review on Dynamic View Selection.- Chapter 6. Software Project EstimationUsing Fuzzy Inference System.- Chapter7. Linear andNon Linear Modeling of Protein Kinase B/AkT.- Chapter 8. Lost Connectivity Restoration in PartitionedWireless Sensor Networks.- Chapter9. Analysisof Authentication Techniques Adopted by End Users in Real Life Cloud Implementation.-Chapter 10. NetworkAnalysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN.- Chapter 11. Schedulingin Big Data Heterogeneous Distributed System Using Hadoop.- Chapter 12.A New Differential Scan-Based Side-Channel Attacksagainst RSA Cryptosystem.- Chapter13. Grey WolfOptimizer (GWO) algorithm for minimum weight planer frame design subjected toAISC-LRFD.- Chapter 14. ChildGrowth Mentor – A Proposed Model for Effective Use of Mobile Application forBetter Growth of Child.- Chapter15.Design & Development of a RuleBased Urdu Lemmatizer.- Chapter16. EnhancedMicrostrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless SystemApplications.- Chapter 17. An Enhanced Strategy to Minimize Makespan in CloudEnvironment to Accelerate the Performance.- Chapter 18. PrefixLength Based Disjoint Set Tries For IPv6 Lookup.- Chapter 19. Implementation of FAST Clustering-based FeatureSubset Selection Algorithm for High-Dimensional Data.- Chapter 20.Performance Comparison of 2D and 3D Zigbee WirelessSensorNetworks.- Chapter 21. Enhancement of Data Security by PMK Technique.- Chapter 22.Privacy-Leveled Perturbation Model for PrivacyPreserving Collaborative Data Mining.- Chapter 23. ExtendedBellman Ford Algorithm with Optimized Time of Computation.- Chapter 24.Supervised Link Prediction using Forecasting Modelson Weighted Online Social Network.- Chapter25. Dual BandRectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN andWiMax Application.- Chapter 26. AFramework to Rank Nodes in Social Media Graph Based on Sentiment RelatedParameters.- Chapter 27. Developmentof Analytical method to determine the deflection of tapered cantilever beamwith inclined loading condition using software simulation.- Chapter 28.Bio-Inspired Ultra Low Power Design of comparatorwith Noise Compensation using Hysteresis technique designed for BiomedicalEngineering (Pacemaker).- Chapter29. ComparativeAnalysis of Different Architectures of MCML Square Root Carry Select Adders forLow Power Applications.- Chapter30. Improvementin Quality of Extractive Text Summaries using Modified Reciprocal Ranking.- Chapter 31.A Novel Compact Monopole Multiband Antenna forWiMAX/Satellite/Military Applications.- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens.-Chapter 33. InformationCommunication Technologies for Research and Academic Development.- Chapter 34.An Insider Cyber Threat Prediction Mechanism basedon Behavioral Analysis.- Chapter35. EnhancingAmplifier characteristics using Quantum dots.- Chapter 36. An Approach to Secure Internet of Things againstDDoS.- Chapter 37. Issues inQuantitative Association Rule Mining: A Big Data Perspective.- Chapter 38.A Framework for temporal information search andexploration.- Chapter 39. ItemAmalgamation Approach for SerendipityOriented Recommender System.- Chapter 40.A Two Stage Integrated Approach of DNA Cryptography.-Chapter 41. ADVANCED IRRIGATION SYSTEMS IMPACTING SUSTAINABILITYAND REDUCING WATER NEEDS – ROLE OF ICT IN IRRIGATION.- Chapter 42. Parallelizationof Load Flow Analysis.- Chapter43. HierarchicalRole-Based Access Control with Homomorphic Encryption for Database as a Service.-Chapter 44. HybridMiner Tracking System at 2.4GHz for Underground Mines.- PARTITIONBASED FREQUENT CLOSED PATTERN MINER.- Chapter 46. A Study OnWorking Of Ad Auctioning by Google AdWords.- Chapter 47. A Novel Approach for Polarity Determination UsingEmoticons: Emoticon-Graph.- Chapter48. Schedulingfor Distributed Applications in Mobile Cloud Computing.- Chapter 49.High Availability of Databases for Cloud.- Chapter 50. CustomizedParameter Configuration Framework for Performance Tuning in Apache Hadoop.- Chapter 51. Hand SkinClassification from Other Skin Objects Using Multi-Direction 3D Color-TextureFeature & Cascaded Neural Network Classifier.- Chapter 52. TextureFeatures for the Detection of Acute Lymphoblastic Leukemia.- Chapter 53. Design andImplementation of Non Touch Enable Password System.- Chapter 54.Intelligent Web Security Testing with ThreatAssessment and Client Server Penetration Using Burp Suite.- Chapter 55.QoS-aware Autonomic Cloud Computing for ICT.- Chapter 56. EmergingGreen ICT: Heart Disease Prediction Model in Cloud Environment.- Chapter 57.Energy Conscious Allocation and Scheduling of Tasksin ICT Cloud Paradigm.- Chapter58. Controllingof FPGA Based Optical Polarimeter Using LabVIEW.- Chapter 59. Automatic Intelligent Traffic Controlling forEmergency Vehicle Rescuing.- Chapter60. A CapacityConstraint Distributed Data Dissemination Protocol for Ad-hoc Cognitive RadioNetworks.- Chapter 61. EnhancingPerformance of Security Log Analysis Using Correlation-Prediction Technique.- Chapter 62. DifferentialWeight Based Hybrid Approach to Detect Software Plagiarism.- Chapter 63. SelectingFavorable Reference Nodes to aid Localization in Wireless Sensor Networks.- Chapter 64.A Scientometric Analysis of Smart GridImplementation at Distribution Feeder.- Chapter 65. Enhancing Web Search Results Using AggregatedSearch.- Chapter 66. ManagingHeterogeneity by Synthesizing Composite Data.- Chapter 67. A Novel Approach to Filter Topic Related ImportantTerms within Document.- Chapter68. DomainDriven Density Based Clustering Algorithm.- Chapter 69. Adoptive Approach of AODV and DSDV RoutingProtocols using Optimal Probabilistic Logical Key Hierarchy in MANET.- Chapter 70.Re-Clustering Approach Using WCA in AODV and DSDVRouting Protocols in MANET.-Chapter71. Issues andChallenges of Heterogeneous Datasets in Map Reduce framework of Big DataEnvironment.- Chapter 72. Strong Virtual Password Scheme Using ReferenceSwitching on Coded User Parameters and Phishing Attack.- Chapter 73.Need Of ICT For Sustainable Development InPetroleum Industry.- Chapter 74. Hybrid K-mean and Refinement Based on Ant for ColorImage Clustering.- Chapter 75. AFramework for Secure Data Storage in Mobile Cloud Computing.- Chapter 76.Hindi Word Sense Disambiguation Using CosineSimilarity.- Chapter 77. AMulti-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic.
 

Notă biografică

Dr. SureshChandra Satapathy is currently working as Professor and Head, Dept. of CSEat Anil Neerukonda Institute of Technology and Sciences (ANITS), AndhraPradesh, India. He obtained his Ph. D. in Computer Science and Engineering fromJNTU Hyderabad and M. Tech in CSE from NIT, Rourkela, Odisha, India. He has 26years of teaching experience. His research interests are data mining, machineintelligence and swarm intelligence. He has acted as program chair of manyinternational conferences and edited 6 volumes of proceedings from SpringerLNCS and AISC series. He is currently guiding 8 scholars for Ph. Ds. Dr.Satapathy is also a Sr. Member IEEE.
Mr. Amit Joshi has an experience of around 6 years in academic andindustry in prestigious organizations of Rajasthan and Gujarat. Currently, heis working as an Assistant Professor in Department of Information Technology atSabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE,IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies.Currently, he is Honorary Secretary of CSI Udaipur Chapter andHonorary Secretary for ACM Udaipur Chapter. He has presented and publishedmore than 40 papers in National and International Journals/Conferences of IEEE,Springer, and ACM. He has also edited three books on diversified subjectsincluding Advances in Open Source Mobile Technologies, ICT for Integrated RuralDevelopment and ICT for Competitive Strategies. He has also organized more than25 National and International Conferences and Workshops including InternationalConference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS –2014 at Udaipur through ACM, International Conference ICT4SD 2015 – by Springerrecently. He has also served on Organising and Program Committee of more than50 Conferences/Seminars/Workshops throughout the World and presented 6 invitedtalks in various conferences. For his contribution towards the society, TheInstitutionof Engineers (India), ULC, has given him Appreciation award on thecelebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE, 2012.
Dr. NileshModi is having rich experience of around 13 years in academics and ITindustry. He is holding Doctorate in e-Security (Computer Science andApplication).  Continuing his research on cyber security, presently he ispursuing post-doctoral research on Wireless Communication and Security andcertification as an Ethical Hacking. He has very good number of researchunder his name and presented more than 75 research papers in International andNational Journals and Conferences. He has delivered number of expert talk on e-Securityand hacking in National and International Conferences. Dr. Modi, a person withvibrancy having his active involvement as a life member of CSI, ACM IEEE,IACSIT, IACSI, IAEng apart from his academic and industrial career. As aconsultant, he is contributing for different system development projects withIT industry and carried out different Government Projects. 
Dr. Nisrag Pathak has been an astute and result orientedprofessional with 10 years of experience in teaching and carving state,national and international events like workshops, seminars and conferences.Being a mathematics scholar and computer science professional, he is activelyinvolved in research of data mining and big data analytic. He has strong listof national and international publication in his name. Dr. Pathak is currentlyAssociate Professor of Computer Science and Application at NarsinhbhaiInstitute of Computer Studies and Management affiliated to Kadi SarvaVishvavidyalaya. He received his Ph.D. from Hemchandracharya North GujaratUniversity in Computer Science and his Master's in Mathematics from the sameuniversity. His other tenures include research fellow at Indian StatisticalInstitute, Kolkata and Indian Institute of Science, Bengaluru.
 

Textul de pe ultima copertă

The two volumes of this book collect high-quality peer-reviewed research papers presented in the International Conference on ICT for Sustainable Development (ICT4SD 2015) held at Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Information and Communication Technologies and its applications in field for engineering and management. The main focus of the volumes are on applications of ICT for Infrastructure, e-Governance, andcontemporary technologies advancements on Data Mining, Security,Computer Graphics, etc. The objective of this International Conference is to provide an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend and strategies for Information and CommunicationTechnologies.

Caracteristici

Discusses all areas of Information and Communication Technologies (ICT) and its applications in field for engineering and management Focusses on the applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc. Provides an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend Includes supplementary material: sn.pub/extras