E-Book, Englisch, Band 409, 787 Seiten, eBook
Satapathy / Joshi / Modi Proceedings of International Conference on ICT for Sustainable Development
1. Auflage 2016
ISBN: 978-981-10-0135-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
ICT4SD 2015 Volume 2
E-Book, Englisch, Band 409, 787 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-981-10-0135-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. Implementing the Logical Security
Framework for E-commerce Based on Service Oriented Architecture.- Chapter 2. Indian Sign Language Translator Using Kinect.- Chapter 3.
Formal Transformation of UML Diagram: Use Case,
Class, Sequence Diagram with Z Notation for Representing the Static &
Dynamic Perspectives of System.- Chapter
4. A Survey
of Android Malware Detection Strategy and Techniques.- Chapter 5.
A Review on Dynamic View Selection.- Chapter 6. Software Project Estimation
Using Fuzzy Inference System.- Chapter
7. Linear and
Non Linear Modeling of Protein Kinase B/AkT.- Chapter 8. Lost Connectivity Restoration in Partitioned
Wireless Sensor Networks.- Chapter
9. Analysis
of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation.-
Chapter 10. Network
Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN.- Chapter 11. Scheduling
in Big Data Heterogeneous Distributed System Using Hadoop.- Chapter 12.
A New Differential Scan-Based Side-Channel Attacks
against RSA Cryptosystem.- Chapter
13. Grey Wolf
Optimizer (GWO) algorithm for minimum weight planer frame design subjected to
AISC-LRFD.- Chapter 14. Child
Growth Mentor – A Proposed Model for Effective Use of Mobile Application for
Better Growth of Child.- Chapter
15.
Design & Development of a Rule
Based Urdu Lemmatizer.- Chapter
16. Enhanced
Microstrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless System
Applications.- Chapter 17. An Enhanced Strategy to Minimize Makespan in Cloud
Environment to Accelerate the Performance.- Chapter 18. Prefix
Length Based Disjoint Set Tries For IPv6 Lookup.- Chapter 19. Implementation of FAST Clustering-based Feature
Subset Selection Algorithm for High-Dimensional Data.- Chapter 20.
Performance Comparison of 2D and 3D Zigbee Wireless
SensorNetworks.- Chapter 21. Enhancement of Data Security by PMK Technique.- Chapter 22.
Privacy-Leveled Perturbation Model for Privacy
Preserving Collaborative Data Mining.- Chapter 23. Extended
Bellman Ford Algorithm with Optimized Time of Computation.- Chapter 24.
Supervised Link Prediction using Forecasting Models
on Weighted Online Social Network.- Chapter
25. Dual Band
Rectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN and
WiMax Application.- Chapter 26. A
Framework to Rank Nodes in Social Media Graph Based on Sentiment Related
Parameters.- Chapter 27. Development
of Analytical method to determine the deflection of tapered cantilever beam
with inclined loading condition using software simulation.- Chapter 28.
Bio-Inspired Ultra Low Power Design of comparator
with Noise Compensation using Hysteresis technique designed for Biomedical
Engineering (Pacemaker).- Chapter
29. Comparative
Analysis of Different Architectures of MCML Square Root Carry Select Adders for
Low Power Applications.- Chapter
30. Improvement
in Quality of Extractive Text Summaries using Modified Reciprocal Ranking.- Chapter 31.
A Novel Compact Monopole Multiband Antenna for
WiMAX/Satellite/Military Applications.- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens.-
Chapter 33. Information
Communication Technologies for Research and Academic Development.- Chapter 34.
An Insider Cyber Threat Prediction Mechanism based
on Behavioral Analysis.- Chapter
35. Enhancing
Amplifier characteristics using Quantum dots.- Chapter 36. An Approach to Secure Internet of Things against
DDoS.- Chapter 37. Issues in
Quantitative Association Rule Mining: A Big Data Perspective.- Chapter 38.
A Framework for temporal information search and
exploration.- Chapter 39. Item
Amalgamation Approach for SerendipityOriented Recommender System.- Chapter 40.
A Two Stage Integrated Approach of DNA Cryptography.-
Chapter 41. ADVANCED IRRIGATION SYSTEMS IMPACTING SUSTAINABILITY
AND REDUCING WATER NEEDS – ROLE OF ICT IN IRRIGATION.- Chapter 42. Parallelization
of Load Flow Analysis.- Chapter
43. Hierarchical
Role-Based Access Control with Homomorphic Encryption for Database as a Service.-
Chapter 44. Hybrid
Miner Tracking System at 2.4GHz for Underground Mines.- PARTITION
BASED FREQUENT CLOSED PATTERN MINER.- Chapter 46. A Study On
Working Of Ad Auctioning by Google AdWords.- Chapter 47. A Novel Approach for Polarity Determination Using
Emoticons: Emoticon-Graph.- Chapter
48. Scheduling
for Distributed Applications in Mobile Cloud Computing.- Chapter 49.
High Availability of Databases for Cloud.- Chapter 50. Customized
Parameter Configuration Framework for Performance Tuning in Apache Hadoop.- Chapter 51. Hand Skin
Classification from Other Skin Objects Using Multi-Direction 3D Color-Texture
Feature & Cascaded Neural Network Classifier.- Chapter 52. Texture
Features for the Detection of Acute Lymphoblastic Leukemia.- Chapter 53. Design and
Implementation of Non Touch Enable Password System.- Chapter 54.
Intelligent Web Security Testing with Threat
Assessment and Client Server Penetration Using Burp Suite.- Chapter 55.
QoS-aware Autonomic Cloud Computing for ICT.- Chapter 56. Emerging
Green ICT: Heart Disease Prediction Model in Cloud Environment.- Chapter 57.
Energy Conscious Allocation and Scheduling of Tasks
in ICT Cloud Paradigm.- Chapter
58. Controlling
of FPGA Based Optical Polarimeter Using LabVIEW.- Chapter 59. Automatic Intelligent Traffic Controlling for
Emergency Vehicle Rescuing.- Chapter
60. A Capacity
Constraint Distributed Data Dissemination Protocol for Ad-hoc Cognitive Radio
Networks.- Chapter 61. Enhancing
Performance of Security Log Analysis Using Correlation-Prediction Technique.- Chapter 62. Differential
Weight Based Hybrid Approach to Detect Software Plagiarism.- Chapter 63. Selecting
Favorable Reference Nodes to aid Localization in Wireless Sensor Networks.- Chapter 64.
A Scientometric Analysis of Smart Grid
Implementation at Distribution Feeder.- Chapter 65. Enhancing Web Search Results Using Aggregated
Search.- Chapter 66. Managing
Heterogeneity by Synthesizing Composite Data.- Chapter 67. A Novel Approach to Filter Topic Related Important
Terms within Document.- Chapter
68. Domain
Driven Density Based Clustering Algorithm.- Chapter 69. Adoptive Approach of AODV and DSDV Routing
Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET.- Chapter 70.
Re-Clustering Approach Using WCA in AODV and DSDV
Routing Protocols in MANET.-Chapter
71. Issues and
Challenges of Heterogeneous Datasets in Map Reduce framework of Big Data
Environment.- Chapter 72. Strong Virtual Password Scheme Using Reference
Switching on Coded User Parameters and Phishing Attack.- Chapter 73.
Need Of ICT For Sustainable Development In
Petroleum Industry.- Chapter 74. Hybrid K-mean and Refinement Based on Ant for Color
Image Clustering.- Chapter 75. A
Framework for Secure Data Storage in Mobile Cloud Computing.- Chapter 76.
Hindi Word Sense Disambiguation Using Cosine
Similarity.- Chapter 77. A
Multi-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic.