Sisäänkirjautuminen

Joshi, Amit

Information and Communication Technology for Sustainable Development

Joshi, Amit - Information and Communication Technology for Sustainable Development, e-kirja

353,30€

E-kirja, PDF, Adobe DRM-suojattu
ISBN: 9789811039324
DRM-rajoitukset

TulostusEi sallittu
Kopioi leikepöydälleEi sallittu

Table of contents

1. Internet of Things Applications @ Urban Spaces (Tel Aviv Smart City: A Case Study)
Somayya Madakam, Siddharth Tripathi, Rajesh Kumar Arora

2. Impact of Consumer Gender on Expenditure Done in Mobile Shopping Using Test of Independence
Shanti Verma, Kalyani Patel

3. Detecting Phishing Websites Using Rule-Based Classification Algorithm: A Comparison
Sudhanshu Gautam, Kritika Rani, Bansidhar Joshi

4. Mobile Applications Usability Parameters: Taking an Insight View
Sakshi Goel, Renuka Nagpal, Deepti Mehrotra

5. Segmentation of Musculoskeletal Tissues with Minimal Human Intervention
Sourav Mishra, Ravitej Singh Rekhi, Anustha, Garima Vyas

6. Implementation of Modified ID3 Algorithm
Latika Mehrotra, Prashant Sahai Saxena, Nitika Vats Doohan

7. A Data Classification Model: For Effective Classification of Intrusion in an Intrusion Detection System Based on Decision Tree LearningAlgorithm
Latika Mehrotra, Prashant Sahai Saxena, Nitika Vats Doohan

8. Reliability-Aware Green Scheduling in Cloud Computing
Nidhi Rehani, Ritu Garg

9. Proposed Use of Information Dispersal Algorithm in User Profiling
Bhushan Atote, Saniya Zahoor, Mangesh Bedekar, Suja Panicker

10. Recent Research in Wireless Sensor Networks: A Trend Analysis
Prerak S. Shah, Neel N. Patel, Dhrumil M. Patel, Devanshi P. Patel, Rutvij H. Jhaveri

11. Profit Analysis of a Computing Machine with Priority and s/w Rejuvenation
Ashish Kumar, Monika Saini, Devesh Kumar Srivastava

12. V2V-DDS Approach to Provide Sheltered Communication Over ALTERATION ATTACK to Control Against Vehicular Traffic
P. Prittopaul, M. Usha, M. V. S. Santhosh, R. Sharath, E. Kughan

13. Enhancing Performance of Data Centers Using Location-Aware Live VM Migration
Narander Kumar, Swati Saxena

14. Progressive Visual Analytics in Big Data Using MapReduce FPM
Amit Kumar, Prabhat Ranjan

15. Energy Based Recent Trends in Delay Tolerant Networks
Nimish Ukey, Lalit Kulkarni

16. Smart Solar Panel: Wireless Sensor Network-Based Measurement and Monitoring of Performance Parameters of Solar Panel
Dhiraj Nitnaware

17. Efficiency Evaluation of Recommender Systems: Study of Existing Problems and Possible Extensions
Mugdha Sharma, Laxmi Ahuja

18. Comparative Analysis of Application Layer Internet of Things (IoT) Protocols
Himadri Chaudhary, Naman Vaishnav, Birju Tank

19. Machine-Learning-Based Android Malware Detection Techniques—A Comparative Analysis
Nishant Painter, Bintu Kadhiwala

20. Sensing Technology for Detecting Insects in a Paddy Crop Field Using Optical Sensor
Chandan Kumar Sahu, Prabira Kumar Sethy, Santi Kumari Behera

21. Novel Approach to Image Encryption: Using a Combination of JEX Encoding–Decoding with the Modified AES Algorithm
Sneha Birendra Tiwari Sharma, Manjeet Kantak, Nagaraj Vernekar

22. A Survey on Video Smoke Detection
Princy Matlani, Manish Shrivastava

23. Understanding Intrafactor Relationships in Cyberloafing Using Predictive Apriori Algorithm
Soham Banerjee, Sanjeev Thakur

24. Fault Detection and Recovery for Automotive Embedded System Using Rough Set Techniques
Pattanaik Balachandra

25. An Analysis on Pricing Strategies of Software ‘I-Med’ in Healthcare Industry
Pattnaik Manjula, Pattanaik Balachandra

26. FPGA-Based Partial Crypto-Reconfiguration of Nodes for WSN
Prajakta Patrikar, Gayatri Phade

27. Performance Scrutiny of Thinning Algorithms on Printed Gujarati Characters and Handwritten Numerals
Sanket B. Suthar, Rahul S. Goradia, Bijal N. Dalwadi, Sagar M. Patel, Sandip Patel

28. An Exploratory Analysis of Foreign Tourist Visits for Indian State Attractions Using Multinomial Logistic Regression Technique
Hari Bhaskar Sankaranarayanan

29. Performance Exploration of Different Dispersion Compensation Schemes with Binary and Duo Binary Modulation Formats Over Fiber-Optic Communication
Hiroshama Nain, Urvashi Jadon, Vivekanand Mishra

30. Cognitive Radio Networks: State of Research Domain in Next-Generation Wireless Networks—An Analytical Analysis
M. Anusha, Srikanth Vemuru

31. Smart Bike Through Server Using GPS Technology
Rajneesh Tanwar, Ashwani Chaudhary

32. Preventing Node Replication Attack in Mobile Wireless Sensor Networks
Aarti Singh, Kavita Gupta

33. Logistic Regression with Stochastic Gradient Ascent to Estimate Click Through Rate
Jenish Dhanani, Keyur Rana

34. Cloud-Based Pollution Scheming System Using Raspberry Pi
Vaishnavi Kulkarni, Prashant Salunke

35. A Deadlock Detection Technique Using Multi Agent Environment
Rashmi Priya, R. Belwal

36. Google AdWords: A Window into the Google Display Network
Vekariya Subhadra, Kapadiya Urvashi, Fruitwala Pranav, Vyas Tarjni

37. Clustering to Enhance Network Traffic Forecasting
Theyazn H. H. Aldhyani, Manish R. Joshi

38. Load Balancing Mechanism Using Fuzzy Row Penalty Method in Cloud Computing Environment
Narander Kumar, Diksha Shukla

39. Performance Evaluation of Data Mining Techniques
Mani, Bharti Suri, Manoj Kumar

40. Automatic White Blood Cell Segmentation for Detecting Leukemia
Pooja Deshmukh, C. R. Jadhav, N. Usha Rani

41. Indian Script Encoding Technique (ISET): A Hindi Text Steganography Approach
Sunita Chaudhary, Meenu Dave, Amit Sanghi, Hansraj Sidh

42. IC Technology to Support Children with Autism Spectrum Disorder
Nara Kalyani, Katta Shubhankar Reddy

43. Using Hybrid Cryptography and Improved EAACK Develop Secure Intrusion Detection System for MANETs
Sharad Awatade, Pankaj Chandre

44. Diversification in Tag Recommendation System Using Binomial Framework
Jayeeta Chakraborty, Vijay Verma

45. Optimized Task Scheduling Algorithm for Cloud Computing
Monika, Abhimanyu Jindal

46. “BOMEST” a Vital Approach to Extract the Propitious Information from the Big Data
V. K. Jain, Deepali Virmani, Preeti Arora, Ankit Arora

47. Information Privacy Using Stego-Data Element with Visual Cryptography
Manjeet Kantak, Sneha Birendra Tiwari Sharma

48. Power-Aware Virtual Machine Consolidation in Data Centers Using Rousseeuw and Croux Estimators
Lincolin Nhapi, Arun Kumar Yadav, Pallavi Khatri

49. A Rule-Based Self-Learning Model for Automatic Evaluation and Grading of C++Programs
Maxwell Christian

50. Study and Research on Raspberry PI 2 Model B Game Design and Development
Nishant Sahni, Kailash Srinivasan, Karan Vala, Saurabh Malgaonkar

51. Improved Churn Prediction Based on Supervised and Unsupervised Hybrid Data Mining System
J. Vijaya, E. Sivasankar

52. Simulation-Based Comparison of Vampire Attacks on Traditional Manet Routing Protocols
Joshua Reginald Pullagura, Dhulipalla Venkata Rao

Avainsanat: Engineering, Computational Intelligence, Data Mining and Knowledge Discovery, Computer-Aided Engineering (CAD, CAE) and Design, Communications Engineering, Networks

Toimittaja
 
 
Julkaisija
Springer
Julkaisuvuosi
2018
Kieli
en
Painos
1
Sarja
Lecture Notes in Networks and Systems
Sivumäärä
24 sivua
Kategoria
Tekniikka, energia, liikenne
Tiedostomuoto
E-kirja
eISBN (PDF)
9789811039324
Painetun ISBN
978-981-10-3931-7

Samankaltaisia e-kirjoja