語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of International Confere...
~
(1998 :)
Proceedings of International Conference on ICT for Sustainable DevelopmentICT4SD 2015. Volume 2 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proceedings of International Conference on ICT for Sustainable Developmentedited by Suresh Chandra Satapathy ... [et al.].
其他題名:
ICT4SD 2015.
其他題名:
ICT4SD 2015
其他作者:
Satapathy, Suresh Chandra.
團體作者:
出版者:
Singapore :Springer Singapore :2016.
面頁冊數:
xx, 819 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Information technology
電子資源:
http://dx.doi.org/10.1007/978-981-10-0135-2
ISBN:
9789811001352$q(electronic bk.)
Proceedings of International Conference on ICT for Sustainable DevelopmentICT4SD 2015. Volume 2 /
Proceedings of International Conference on ICT for Sustainable Development
ICT4SD 2015. Volume 2 /[electronic resource] :ICT4SD 2015edited by Suresh Chandra Satapathy ... [et al.]. - Singapore :Springer Singapore :2016. - xx, 819 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.4092194-5357 ;. - Advances in intelligent systems and computing ;176..
Chapter 1. Implementing the Logical Security Framework for E-commerce Based on Service Oriented Architecture -- Chapter 2. Indian Sign Language Translator Using Kinect -- Chapter 3. Formal Transformation of UML Diagram: Use Case, Class, Sequence Diagram with Z Notation for Representing the Static & Dynamic Perspectives of System -- Chapter 4. A Survey of Android Malware Detection Strategy and Techniques -- Chapter 5. A Review on Dynamic View Selection -- Chapter 6. Software Project Estimation Using Fuzzy Inference System -- Chapter 7. Linear and Non Linear Modeling of Protein Kinase B/AkT -- Chapter 8. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks -- Chapter 9. Analysis of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation -- Chapter 10. Network Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN -- Chapter 11. Scheduling in Big Data Heterogeneous Distributed System Using Hadoop -- Chapter 12. A New Differential Scan-Based Side-Channel Attacks against RSA Cryptosystem -- Chapter 13. Grey Wolf Optimizer (GWO) algorithm for minimum weight planer frame design subjected to AISC-LRFD -- Chapter 14. Child Growth Mentor - A Proposed Model for Effective Use of Mobile Application for Better Growth of Child -- Chapter 15. Design & Development of a Rule Based Urdu Lemmatizer -- Chapter 16. Enhanced Microstrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless System Applications -- Chapter 17. An Enhanced Strategy to Minimize Makespan in Cloud Environment to Accelerate the Performance -- Chapter 18. Prefix Length Based Disjoint Set Tries For IPv6 Lookup -- Chapter 19. Implementation of FAST Clustering-based Feature Subset Selection Algorithm for High-Dimensional Data -- Chapter 20. Performance Comparison of 2D and 3D Zigbee Wireless Sensor Networks -- Chapter 21. Enhancement of Data Security by PMK Technique -- Chapter 22. Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining -- Chapter 23. Extended Bellman Ford Algorithm with Optimized Time of Computation -- Chapter 24. Supervised Link Prediction using Forecasting Models on Weighted Online Social Network -- Chapter 25. Dual Band Rectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN and WiMax Application -- Chapter 26. A Framework to Rank Nodes in Social Media Graph Based on Sentiment Related Parameters -- Chapter 27. Development of Analytical method to determine the deflection of tapered cantilever beam with inclined loading condition using software simulation -- Chapter 28. Bio-Inspired Ultra Low Power Design of comparator with Noise Compensation using Hysteresis technique designed for Biomedical Engineering (Pacemaker) -- Chapter 29. Comparative Analysis of Different Architectures of MCML Square Root Carry Select Adders for Low Power Applications -- Chapter 30. Improvement in Quality of Extractive Text Summaries using Modified Reciprocal Ranking -- Chapter 31. A Novel Compact Monopole Multiband Antenna for WiMAX/Satellite/Military Applications -- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens -- Chapter 33. Information Communication Technologies for Research and Academic Development -- Chapter 34. An Insider Cyber Threat Prediction Mechanism based on Behavioral Analysis -- Chapter 35. Enhancing Amplifier characteristics using Quantum dots -- Chapter 36. An Approach to Secure Internet of Things against DDoS -- Chapter 37. Issues in Quantitative Association Rule Mining: A Big Data Perspective -- Chapter 38. A Framework for temporal information search and exploration -- Chapter 39. Item Amalgamation Approach for Serendipity Oriented Recommender System -- Chapter 40. A Two Stage Integrated Approach of DNA Cryptography -- Chapter 41. ADVANCED IRRIGATION SYSTEMS IMPACTING SUSTAINABILITY AND REDUCING WATER NEEDS - ROLE OF ICT IN IRRIGATION -- Chapter 42. Parallelization of Load Flow Analysis -- Chapter 43. Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service -- Chapter 44. Hybrid Miner Tracking System at 2.4GHz for Underground Mines -- <Chapter 45. PARTITION BASED FREQUENT CLOSED PATTERN MINER -- Chapter 46. A Study On Working Of Ad Auctioning by Google AdWords -- Chapter 47. A Novel Approach for Polarity Determination Using Emoticons: Emoticon-Graph -- Chapter 48. Scheduling for Distributed Applications in Mobile Cloud Computing -- Chapter 49. High Availability of Databases for Cloud -- Chapter 50. Customized Parameter Configuration Framework for Performance Tuning in Apache Hadoop -- Chapter 51. Hand Skin Classification from Other Skin Objects Using Multi-Direction 3D Color-Texture Feature & Cascaded Neural Network Classifier -- Chapter 52. Texture Features for the Detection of Acute Lymphoblastic Leukemia -- Chapter 53. Design and Implementation of Non Touch Enable Password System -- Chapter 54. Intelligent Web Security Testing with Threat Assessment and Client Server Penetration Using Burp Suite -- Chapter 55. QoS-aware Autonomic Cloud Computing for ICT -- Chapter 56. Emerging Green ICT: Heart Disease Prediction Model in Cloud Environment -- Chapter 57. Energy Conscious Allocation and Scheduling of Tasks in ICT Cloud Paradigm -- Chapter 58. Controlling of FPGA Based Optical Polarimeter Using LabVIEW -- Chapter 59. Automatic Intelligent Traffic Controlling for Emergency Vehicle Rescuing -- Chapter 60. A Capacity Constraint Distributed Data Dissemination Protocol for Ad-hoc Cognitive Radio Networks -- Chapter 61. Enhancing Performance of Security Log Analysis Using Correlation-Prediction Technique -- Chapter 62. Differential Weight Based Hybrid Approach to Detect Software Plagiarism -- Chapter 63. Selecting Favorable Reference Nodes to aid Localization in Wireless Sensor Networks -- Chapter 64. A Scientometric Analysis of Smart Grid Implementation at Distribution Feeder -- Chapter 65. Enhancing Web Search Results Using Aggregated Search -- Chapter 66. Managing Heterogeneity by Synthesizing Composite Data -- Chapter 67. A Novel Approach to Filter Topic Related Important Terms within Document -- Chapter 68. Domain Driven Density Based Clustering Algorithm -- Chapter 69. Adoptive Approach of AODV and DSDV Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET -- Chapter 70. Re-Clustering Approach Using WCA in AODV and DSDV Routing Protocols in MANET -- Chapter 71. Issues and Challenges of Heterogeneous Datasets in Map Reduce framework of Big Data Environment -- Chapter 72. Strong Virtual Password Scheme Using Reference Switching on Coded User Parameters and Phishing Attack -- Chapter 73. Need Of ICT For Sustainable Development In Petroleum Industry -- Chapter 74. Hybrid K-mean and Refinement Based on Ant for Color Image Clustering -- Chapter 75. A Framework for Secure Data Storage in Mobile Cloud Computing -- Chapter 76. Hindi Word Sense Disambiguation Using Cosine Similarity -- Chapter 77. A Multi-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic.
The two volumes of this book collect high-quality peer-reviewed research papers presented in the International Conference on ICT for Sustainable Development (ICT4SD 2015) held at Ahmedabad, India during 3 - 4 July 2015. The book discusses all areas of Information and Communication Technologies and its applications in field for engineering and management. The main focus of the volumes are on applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc. The objective of this International Conference is to provide an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend and strategies for Information and Communication Technologies.
ISBN: 9789811001352$q(electronic bk.)
Standard No.: 10.1007/978-981-10-0135-2doiSubjects--Topical Terms:
244584
Information technology
LC Class. No.: T58.5
Dewey Class. No.: 004
Proceedings of International Conference on ICT for Sustainable DevelopmentICT4SD 2015. Volume 2 /
LDR
:08987nmm a2200337 a 4500
001
483388
003
DE-He213
005
20160824091405.0
006
m d
007
cr nn 008maaau
008
161007s2016 si s 0 eng d
020
$a
9789811001352$q(electronic bk.)
020
$a
9789811001338$q(paper)
024
7
$a
10.1007/978-981-10-0135-2
$2
doi
035
$a
978-981-10-0135-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
T58.5
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
004
$2
23
090
$a
T58.5
$b
.I61 2015
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Proceedings of International Conference on ICT for Sustainable Development
$h
[electronic resource] :
$b
ICT4SD 2015.
$n
Volume 2 /
$c
edited by Suresh Chandra Satapathy ... [et al.].
246
3
$a
ICT4SD 2015
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2016.
300
$a
xx, 819 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.409
505
0
$a
Chapter 1. Implementing the Logical Security Framework for E-commerce Based on Service Oriented Architecture -- Chapter 2. Indian Sign Language Translator Using Kinect -- Chapter 3. Formal Transformation of UML Diagram: Use Case, Class, Sequence Diagram with Z Notation for Representing the Static & Dynamic Perspectives of System -- Chapter 4. A Survey of Android Malware Detection Strategy and Techniques -- Chapter 5. A Review on Dynamic View Selection -- Chapter 6. Software Project Estimation Using Fuzzy Inference System -- Chapter 7. Linear and Non Linear Modeling of Protein Kinase B/AkT -- Chapter 8. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks -- Chapter 9. Analysis of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation -- Chapter 10. Network Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN -- Chapter 11. Scheduling in Big Data Heterogeneous Distributed System Using Hadoop -- Chapter 12. A New Differential Scan-Based Side-Channel Attacks against RSA Cryptosystem -- Chapter 13. Grey Wolf Optimizer (GWO) algorithm for minimum weight planer frame design subjected to AISC-LRFD -- Chapter 14. Child Growth Mentor - A Proposed Model for Effective Use of Mobile Application for Better Growth of Child -- Chapter 15. Design & Development of a Rule Based Urdu Lemmatizer -- Chapter 16. Enhanced Microstrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless System Applications -- Chapter 17. An Enhanced Strategy to Minimize Makespan in Cloud Environment to Accelerate the Performance -- Chapter 18. Prefix Length Based Disjoint Set Tries For IPv6 Lookup -- Chapter 19. Implementation of FAST Clustering-based Feature Subset Selection Algorithm for High-Dimensional Data -- Chapter 20. Performance Comparison of 2D and 3D Zigbee Wireless Sensor Networks -- Chapter 21. Enhancement of Data Security by PMK Technique -- Chapter 22. Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining -- Chapter 23. Extended Bellman Ford Algorithm with Optimized Time of Computation -- Chapter 24. Supervised Link Prediction using Forecasting Models on Weighted Online Social Network -- Chapter 25. Dual Band Rectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN and WiMax Application -- Chapter 26. A Framework to Rank Nodes in Social Media Graph Based on Sentiment Related Parameters -- Chapter 27. Development of Analytical method to determine the deflection of tapered cantilever beam with inclined loading condition using software simulation -- Chapter 28. Bio-Inspired Ultra Low Power Design of comparator with Noise Compensation using Hysteresis technique designed for Biomedical Engineering (Pacemaker) -- Chapter 29. Comparative Analysis of Different Architectures of MCML Square Root Carry Select Adders for Low Power Applications -- Chapter 30. Improvement in Quality of Extractive Text Summaries using Modified Reciprocal Ranking -- Chapter 31. A Novel Compact Monopole Multiband Antenna for WiMAX/Satellite/Military Applications -- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens -- Chapter 33. Information Communication Technologies for Research and Academic Development -- Chapter 34. An Insider Cyber Threat Prediction Mechanism based on Behavioral Analysis -- Chapter 35. Enhancing Amplifier characteristics using Quantum dots -- Chapter 36. An Approach to Secure Internet of Things against DDoS -- Chapter 37. Issues in Quantitative Association Rule Mining: A Big Data Perspective -- Chapter 38. A Framework for temporal information search and exploration -- Chapter 39. Item Amalgamation Approach for Serendipity Oriented Recommender System -- Chapter 40. A Two Stage Integrated Approach of DNA Cryptography -- Chapter 41. ADVANCED IRRIGATION SYSTEMS IMPACTING SUSTAINABILITY AND REDUCING WATER NEEDS - ROLE OF ICT IN IRRIGATION -- Chapter 42. Parallelization of Load Flow Analysis -- Chapter 43. Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service -- Chapter 44. Hybrid Miner Tracking System at 2.4GHz for Underground Mines -- <Chapter 45. PARTITION BASED FREQUENT CLOSED PATTERN MINER -- Chapter 46. A Study On Working Of Ad Auctioning by Google AdWords -- Chapter 47. A Novel Approach for Polarity Determination Using Emoticons: Emoticon-Graph -- Chapter 48. Scheduling for Distributed Applications in Mobile Cloud Computing -- Chapter 49. High Availability of Databases for Cloud -- Chapter 50. Customized Parameter Configuration Framework for Performance Tuning in Apache Hadoop -- Chapter 51. Hand Skin Classification from Other Skin Objects Using Multi-Direction 3D Color-Texture Feature & Cascaded Neural Network Classifier -- Chapter 52. Texture Features for the Detection of Acute Lymphoblastic Leukemia -- Chapter 53. Design and Implementation of Non Touch Enable Password System -- Chapter 54. Intelligent Web Security Testing with Threat Assessment and Client Server Penetration Using Burp Suite -- Chapter 55. QoS-aware Autonomic Cloud Computing for ICT -- Chapter 56. Emerging Green ICT: Heart Disease Prediction Model in Cloud Environment -- Chapter 57. Energy Conscious Allocation and Scheduling of Tasks in ICT Cloud Paradigm -- Chapter 58. Controlling of FPGA Based Optical Polarimeter Using LabVIEW -- Chapter 59. Automatic Intelligent Traffic Controlling for Emergency Vehicle Rescuing -- Chapter 60. A Capacity Constraint Distributed Data Dissemination Protocol for Ad-hoc Cognitive Radio Networks -- Chapter 61. Enhancing Performance of Security Log Analysis Using Correlation-Prediction Technique -- Chapter 62. Differential Weight Based Hybrid Approach to Detect Software Plagiarism -- Chapter 63. Selecting Favorable Reference Nodes to aid Localization in Wireless Sensor Networks -- Chapter 64. A Scientometric Analysis of Smart Grid Implementation at Distribution Feeder -- Chapter 65. Enhancing Web Search Results Using Aggregated Search -- Chapter 66. Managing Heterogeneity by Synthesizing Composite Data -- Chapter 67. A Novel Approach to Filter Topic Related Important Terms within Document -- Chapter 68. Domain Driven Density Based Clustering Algorithm -- Chapter 69. Adoptive Approach of AODV and DSDV Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET -- Chapter 70. Re-Clustering Approach Using WCA in AODV and DSDV Routing Protocols in MANET -- Chapter 71. Issues and Challenges of Heterogeneous Datasets in Map Reduce framework of Big Data Environment -- Chapter 72. Strong Virtual Password Scheme Using Reference Switching on Coded User Parameters and Phishing Attack -- Chapter 73. Need Of ICT For Sustainable Development In Petroleum Industry -- Chapter 74. Hybrid K-mean and Refinement Based on Ant for Color Image Clustering -- Chapter 75. A Framework for Secure Data Storage in Mobile Cloud Computing -- Chapter 76. Hindi Word Sense Disambiguation Using Cosine Similarity -- Chapter 77. A Multi-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic.
520
$a
The two volumes of this book collect high-quality peer-reviewed research papers presented in the International Conference on ICT for Sustainable Development (ICT4SD 2015) held at Ahmedabad, India during 3 - 4 July 2015. The book discusses all areas of Information and Communication Technologies and its applications in field for engineering and management. The main focus of the volumes are on applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc. The objective of this International Conference is to provide an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend and strategies for Information and Communication Technologies.
650
0
$a
Information technology
$3
244584
650
0
$a
Computer networks
$v
Congresses.
$3
384494
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Data mining
$v
Congresses.
$3
380776
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
275288
650
2 4
$a
Computer-Aided Engineering (CAD, CAE) and Design.
$3
274500
650
2 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Innovation/Technology Management.
$3
514149
700
1
$a
Satapathy, Suresh Chandra.
$3
559144
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
176.
$3
567349
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-0135-2
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000123225
電子館藏
1圖書
電子書
EB T58.5 I61 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-981-10-0135-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入