Information and Communication Technology for Competitive Strategies Proceedings of Third International Conference on ICTCS 2017 /

This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Ch...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Fong, Simon (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Akashe, Shyam (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Mahalle, Parikshit N. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Lecture Notes in Networks and Systems, 40
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06448nam a2200529 4500
001 978-981-13-0586-3
003 DE-He213
005 20191022151754.0
007 cr nn 008mamaa
008 180830s2019 si | s |||| 0|eng d
020 |a 9789811305863  |9 978-981-13-0586-3 
024 7 |a 10.1007/978-981-13-0586-3  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
072 7 |a TJK  |2 thema 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Information and Communication Technology for Competitive Strategies  |h [electronic resource] :  |b Proceedings of Third International Conference on ICTCS 2017 /  |c edited by Simon Fong, Shyam Akashe, Parikshit N. Mahalle. 
250 |a 1st ed. 2019. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2019. 
300 |a XXVI, 775 p. 331 illus., 259 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Networks and Systems,  |x 2367-3370 ;  |v 40 
505 0 |a Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication -- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices -- Performance Analysis of Parallel Implementation of Morphological Operations -- US Dollar's Influence on Indian Gold price Assessment using Artificial Neural Network -- Attribute based storage mechanism with de-duplication filter: A Review Paper -- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm -- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph -- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization -- Digitization of Disaster Management: A Multimedia Ontological Approach -- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics -- Most Persistent Feature Selection method for Opinion mining of social media reviews -- Physical Layer Security with Energy Harvesting Techniques: A Study -- One-tip Secure: Nex-Gen of Text Based Password -- New Text Based User Authentication Scheme Using CAPTCHA -- FPGA Implementation of Parallel Transformative Approach in AES Algorithm -- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals -- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation -- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data -- Age classification with LPCC features using SVM and ANN -- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers -- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE -- Decision Tree Algorithms for prediction of Heart Diseases -- Green communication for wireless cooperative networks: A survey -- Instance Selection using Multi-objective CHC Evolutionary Algorithm -- Inclusive device to connect people with the surrounding World -- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method -- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry -- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants -- Hand Geometry and Palmprint Based Biometric System with Image Deblurring -- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology -- Syllable Based Concatenative Speech Synthesis for Marathi Language -- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications -- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique -- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs -- Privacy Preserving K-NN Classification Using Vector Operations -- A Comparative Study on Segmentation Techniques for Brain Tumor MRI -- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW -- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm -- Synthesis of Reversible Array Divider Circuit -- Finding Right Doctors and Hospitals: A Personalized Health Recommender -- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm -- Simulation of Phasor Measurement Unit for Research and Teaching Applications -- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks -- Various Machine Learning Algorithms for Twitter Sentiment Analysis. 
520 |a This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc. 
650 0 |a Electrical engineering. 
650 0 |a Data mining. 
650 0 |a Computational intelligence. 
650 1 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Data Mining and Knowledge Discovery.  |0 http://scigraph.springernature.com/things/product-market-codes/I18030 
650 2 4 |a Computational Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/T11014 
700 1 |a Fong, Simon.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Akashe, Shyam.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mahalle, Parikshit N.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811305856 
776 0 8 |i Printed edition:  |z 9789811305870 
776 0 8 |i Printed edition:  |z 9789811344589 
830 0 |a Lecture Notes in Networks and Systems,  |x 2367-3370 ;  |v 40 
856 4 0 |u https://doi.org/10.1007/978-981-13-0586-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)