Information and Communication Technology for Competitive Strategies (ICTCS 2020)
Intelligent Strategies for ICT
Herausgegeben:Kaiser, M. Shamim; Xie, Juanying; Rathore, Vijay Singh
Information and Communication Technology for Competitive Strategies (ICTCS 2020)
Intelligent Strategies for ICT
Herausgegeben:Kaiser, M. Shamim; Xie, Juanying; Rathore, Vijay Singh
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India during 11-12 December 2020. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security.
Andere Kunden interessierten sich auch für
- Information and Communication Technology for Competitive Strategies (ICTCS 2020)166,99 €
- Recent Advances in Information and Communication Technology 202074,99 €
- Proceedings of Sixth International Congress on Information and Communication Technology168,99 €
- Proceedings of Sixth International Congress on Information and Communication Technology168,99 €
- Proceedings of Sixth International Congress on Information and Communication Technology161,99 €
- Proceedings of Sixth International Congress on Information and Communication Technology168,99 €
- Recent Developments in Intelligent Computing, Communication and Devices147,99 €
-
-
-
This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India during 11-12 December 2020. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Networks and Systems 190
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-16-0881-0
- 1st ed. 2021
- Seitenzahl: 1256
- Erscheinungstermin: 6. Juli 2021
- Englisch
- Abmessung: 235mm x 155mm x 68mm
- Gewicht: 1874g
- ISBN-13: 9789811608810
- ISBN-10: 9811608814
- Artikelnr.: 61134459
- Lecture Notes in Networks and Systems 190
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-16-0881-0
- 1st ed. 2021
- Seitenzahl: 1256
- Erscheinungstermin: 6. Juli 2021
- Englisch
- Abmessung: 235mm x 155mm x 68mm
- Gewicht: 1874g
- ISBN-13: 9789811608810
- ISBN-10: 9811608814
- Artikelnr.: 61134459
Dr. M Shamim Kaiser is currently working as Professor at the Institute of Information Technology of Jahangirnagar University, Savar, Dhaka-1342, Bangladesh. He received his bachelor's and master's degrees in Applied Physics Electronics and Communication Engineering from the University of Dhaka, Bangladesh, in 2002 and 2004, respectively, and the Ph.D. degree in Telecommunication Engineering from the Asian Institute of Technology (AIT) Pathumthani, Thailand, in 2010. His current research interests include data analytics, machine learning, wireless network & signal processing, cognitive radio network, big data and cyber security, and renewable energy. He has authored more than 100 papers in different peer-reviewed journals and conferences. He is Associate Editor of the IEEE Access Journal, and Guest Editor of Brain Informatics Journal and Cognitive Computation Journal. Dr. Kaiser is a life member of Bangladesh Electronic Society; Bangladesh Physical Society. He isalso a senior member of IEEE, USA, and IEICE, Japan, and an active volunteer of the IEEE Bangladesh Section. He is Founding Chapter Chair of the IEEE Bangladesh Section Computer Society Chapter. Dr. JUANYING XIE is currently Professor with Shaanxi Normal University, Xi'an, China. He has been Full Professor at the School of Computer Science of Shaanxi Normal University in PR China. His research interests include machine learning, data mining, and biomedical data analysis. He has published around 50 research papers, and published 2 monograph books. He has been Associate Editor of Health Information Science and Systems. He has been a program committee member of several international conferences, such as the International Conference on Health Information Science. He has been a senior member of China Computer Federation (CCF), a member of Chinese Association for Artificial Intelligence (CAAI), a member of Artificial Intelligence and Pattern Recognition Committee of CCF, and a member of Machine Learning Committee of CAAI, etc. He has been a peer reviewer for many journals, such as "Information Sciences" and "IEEE trans. on cybernetics". He was awarded Ph.D. in signal and information processing from Xidian University. He cooperated with Prof. Xiaohui Liu at Brunel University in UK from 2010 to 2011 in machine learning and gene selection research. He received an engineering master's degree in the application technology of computers at Xidian University and a bachelor's degree of science in computer science at Shanxi Normal University. Dr. Vijay Singh Rathore is presently working as Professor in the Department of CS & IT, IIS (Deemed to be) University, Jaipur (India). He received Ph.D. from the University of Rajasthan and has teaching experience of 20 years. He is Secretary, ACM Jaipur Chapter, Past Chairman, CSI Jaipur Chapter, got two patents published, Ph.D. Supervised (Awarded: 16, Under Supervision: 07), 80+research papers, and 10+ books got published. He is handling international affairs of The IIS University, Jaipur. His research areas are Internet security, cloud computing, big data, and IoT.
Chapter 1. An Assessment of Internet Services Usage Among Postgraduate Students in the Nigerian Defence Academy.- Chapter 2. Smart Attendance Monitoring System using Local Binary Pattern Histogram.- Chapter 3. An energy efficient wireless sensor deployment for lifetime maximization by optimizing through Improved Particle Swarm Optimization.- Chapter 4. Improved Nutrition Management in Maize by Analyzing Leaf Images.- Chapter 5. Modified LEACH-B Protocol for Energy Aware Wireless Sensor Network for Efficient Network Lifetime.- Chapter 6. Web Content Authentication: A machine learning approach to identify fake and authentic web pages on Internet.- Chapter 7. Classification of Brain tumor By Convolution Neural Networks.- Chapter 8. Automated Multiple Face Recognition Using Deep Learning For Security and Survelliance applications.- Chapter 9. An App-Based IoT-NFC Con-trolled Remote access Security through Cryptography Algorithm.- Chapter 10. Pneumonia Detection Using X ray Images andDeep Learning.- Chapter 11. Autonomous Sailing Boat.- Chapter 12. A Proposed Method to Improve Efficiency in IPv6 Network using Machine Learning Algorithms: An Overview.- Chapter 13. Byte Shrinking Approach for Lossy Image Compression.- Chapter 14. Image Encryption using Matrix Attribute Value Techniques.- Chapter 15. Weather Prediction Based on Seasonal Parameters Using Machine Learning.
Chapter 1. An Assessment of Internet Services Usage Among Postgraduate Students in the Nigerian Defence Academy.- Chapter 2. Smart Attendance Monitoring System using Local Binary Pattern Histogram.- Chapter 3. An energy efficient wireless sensor deployment for lifetime maximization by optimizing through Improved Particle Swarm Optimization.- Chapter 4. Improved Nutrition Management in Maize by Analyzing Leaf Images.- Chapter 5. Modified LEACH-B Protocol for Energy Aware Wireless Sensor Network for Efficient Network Lifetime.- Chapter 6. Web Content Authentication: A machine learning approach to identify fake and authentic web pages on Internet.- Chapter 7. Classification of Brain tumor By Convolution Neural Networks.- Chapter 8. Automated Multiple Face Recognition Using Deep Learning For Security and Survelliance applications.- Chapter 9. An App-Based IoT-NFC Con-trolled Remote access Security through Cryptography Algorithm.- Chapter 10. Pneumonia Detection Using X ray Images andDeep Learning.- Chapter 11. Autonomous Sailing Boat.- Chapter 12. A Proposed Method to Improve Efficiency in IPv6 Network using Machine Learning Algorithms: An Overview.- Chapter 13. Byte Shrinking Approach for Lossy Image Compression.- Chapter 14. Image Encryption using Matrix Attribute Value Techniques.- Chapter 15. Weather Prediction Based on Seasonal Parameters Using Machine Learning.
Chapter 1. An Assessment of Internet Services Usage Among Postgraduate Students in the Nigerian Defence Academy.- Chapter 2. Smart Attendance Monitoring System using Local Binary Pattern Histogram.- Chapter 3. An energy efficient wireless sensor deployment for lifetime maximization by optimizing through Improved Particle Swarm Optimization.- Chapter 4. Improved Nutrition Management in Maize by Analyzing Leaf Images.- Chapter 5. Modified LEACH-B Protocol for Energy Aware Wireless Sensor Network for Efficient Network Lifetime.- Chapter 6. Web Content Authentication: A machine learning approach to identify fake and authentic web pages on Internet.- Chapter 7. Classification of Brain tumor By Convolution Neural Networks.- Chapter 8. Automated Multiple Face Recognition Using Deep Learning For Security and Survelliance applications.- Chapter 9. An App-Based IoT-NFC Con-trolled Remote access Security through Cryptography Algorithm.- Chapter 10. Pneumonia Detection Using X ray Images andDeep Learning.- Chapter 11. Autonomous Sailing Boat.- Chapter 12. A Proposed Method to Improve Efficiency in IPv6 Network using Machine Learning Algorithms: An Overview.- Chapter 13. Byte Shrinking Approach for Lossy Image Compression.- Chapter 14. Image Encryption using Matrix Attribute Value Techniques.- Chapter 15. Weather Prediction Based on Seasonal Parameters Using Machine Learning.
Chapter 1. An Assessment of Internet Services Usage Among Postgraduate Students in the Nigerian Defence Academy.- Chapter 2. Smart Attendance Monitoring System using Local Binary Pattern Histogram.- Chapter 3. An energy efficient wireless sensor deployment for lifetime maximization by optimizing through Improved Particle Swarm Optimization.- Chapter 4. Improved Nutrition Management in Maize by Analyzing Leaf Images.- Chapter 5. Modified LEACH-B Protocol for Energy Aware Wireless Sensor Network for Efficient Network Lifetime.- Chapter 6. Web Content Authentication: A machine learning approach to identify fake and authentic web pages on Internet.- Chapter 7. Classification of Brain tumor By Convolution Neural Networks.- Chapter 8. Automated Multiple Face Recognition Using Deep Learning For Security and Survelliance applications.- Chapter 9. An App-Based IoT-NFC Con-trolled Remote access Security through Cryptography Algorithm.- Chapter 10. Pneumonia Detection Using X ray Images andDeep Learning.- Chapter 11. Autonomous Sailing Boat.- Chapter 12. A Proposed Method to Improve Efficiency in IPv6 Network using Machine Learning Algorithms: An Overview.- Chapter 13. Byte Shrinking Approach for Lossy Image Compression.- Chapter 14. Image Encryption using Matrix Attribute Value Techniques.- Chapter 15. Weather Prediction Based on Seasonal Parameters Using Machine Learning.