Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020 Volume 2 1st edition by Tomonobu Senjyu, Parikshit Mahalle, Thinagaran Perumal – Ebook PDF Instant Download/Delivery. 9789811570629 9811570620
Full download Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020 Volume 1 1st edition after payment
Product details:
ISBN 10: 9811570620
ISBN 13: 9789811570629
Author: Tomonobu Senjyu; Parikshit N. Mahalle; Thinagaran Perumal
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020 Volume 1 1st Table of contents:
-
- Internet of Things: Challenges, Security Issues and Solutions
- Modeling and Performance Evaluation of Auction Model in Cloud Computing
- Framework for Resource Management in Cloud Computing
- Unique Stego Key Generation from Fingerprint Image in Image Steganography
- Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm
- Phrase-Based Statistical Machine Translation of Hindi Poetries into English
- A Smart Education Model for Future Learning and Teaching Using IoT
- Internet of Things (IoT)-Based Advanced Voting Machine System Enhanced Using Low-Cost IoT Embedded Device and Cloud Platform
- IoT: Security Issues and Challenges
- Coronary Artery Disease Prediction Using Neural Network and Random Forest-Based Feature Selection
- A Collaborative Approach to Decision Making in Decentralized IoT Devices
- Analysis of MRI Images for Brain Tumor Detection Using Fuzzy C-Means and LSTM
- A Survey on Recognizing and Significance of Self-portrait Images
- Anomaly Detection in Distributed Streams
- Envisaging Bugs by Means of Entropy Measures
- TRANSPR—Transforming Public Accountability Through Blockchain Technology
- The Scope of Tidal Energy in UAE
- Knowledge Engineering in Higher Education
- Building a Graph Database for Storing Heterogeneous Healthcare Data
- Analysis and Optimization of Cash Withdrawal Process Through ATM in India from HCI and Customization
- Survey of Mininet Challenges, Opportunities, and Application in Software-Defined Network (SDN)
- Some Novelties in Map Reducing Techniques to Retrieve and Analyze Big Data for Effective Processing
- A Study Based on Advancements in Smart Mirror Technology
- Unidirectional Ensemble Recognition and Translation of Phrasal Sign Language from ASL to ISL
- Unravelling SAT: Discussion on the Suitability and Implementation of Graph Convolutional Networks for Solving SAT
- CES: Design and Implementation of College Exam System
- ANN-Based Multi-class Malware Detection Scheme for IoT Environment
- Secure Web Browsing Using Trusted Platform Module (TPM)
- CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications
- Viral Internet Challenges: A Study on the Motivations Behind Social Media User Participation
- Early Flood Monitoring System in Remote Areas
- A Survey on Securing Payload in MQTT and a Proposed Ultra-lightweight Cryptography
- Life Cycle Assessment and Management in Hospital Units Using Applicable and Robust Dual Group-Based Parameter Model
- A Novel Approach to Stock Market Analysis and Prediction Using Data Analytics
- Energy Trading Using Ethereum Blockchain
- Supply Chain Management for Selling Farm Produce Using Blockchain
- Design and Construction of a Multipurpose Solar-Powered Water Purifier
- Named Entity Recognition for Rental Documents Using NLP
- Empirical Analysis of Various Seed Selection Methods
- A Comparative Study on Interactive Segmentation Algorithms for Segmentation of Animal Images
- Implications of Quantum Superposition in Cryptography: A True Random Number Generation Algorithm
- Influences of Purchase Involvement on the Relationship Between Customer Satisfaction and Loyalty in Vietnam
- A Study on Factors Influencing Consumer Intention to Use UPI-Based Payment Apps in Indian Perspective
- A Proposed SDN-Based Cloud Setup in the Virtualized Environment to Enhance Security
- A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0
- Conventional Biometrics and Hidden Biometric: A Comparative Study
- Performance Analysis of Various Trained CNN Models on Gujarati Script
- Real-Time Human Intrusion Detection for Home Surveillance Based on IOT
- Token Money: A Study on Purchase and Spending Propensities in E-Commerce and Mobile Games
- Data Augmentation for Handwritten Character Recognition of MODI Script Using Deep Learning Method
- Improved Automatic Speaker Verification System Using Deep Learning
- Detection and Prevention of Attacks on Active Directory Using SIEM
- Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices
- Implication of Web-Based Open-Source Application in Assessing Design Practice Reliability: In Case of ERA’s Road Projects
- Influencer Versus Peer: The Effect of Product Involvement on Credibility of Endorsers
- The Influence of Fan Behavior on the Purchase Intention of Authentic Sports Team Merchandise
- Purchase Decisions of Brand Followers on Instagram
- Deep Learning Based Parking Prediction Using LSTM Approach
- Beyond Kirana Stores: A Study on Consumer Purchase Intention for Buying Grocery Online
- Car Damage Recognition Using the Expectation Maximization Algorithm and Mask R-CNN
- Deep Learning Methods for Animal Recognition and Tracking to Detect Intrusions
- VR Based Underwater Museum of Andaman and Nicobar Islands
- Network Performance Evaluation in Software-Defined Networking
- Performance Improvement in Web Mining Using Classification to Investigate Web Log Access Patterns
- Array Password Authentication Using Inhibitor Arc Generating Array Language and Colored Petri Net Generating Square Arrays of Side 2k
- sVana—The Sound of Silence
- Coreveillance—Making Our World a “SAFER” Place
- RETRACTED CHAPTER: Large-Scale Video Classification with Convolutional Neural Networks
- Saathi—A Smart IoT-Based Pill Reminder for IVF Patients
- Predictive Analysis of Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN
- A Novel Method for Enabling Wireless Communication Technology in Smart Cities
- Electronic Aid Design of Fruits Image Classification for Visually Impaired People
- Temperature Regulation Based on Occupancy
- Score Prediction Model for Sentiment Classification Using Machine Learning Algorithms
- CFD Analysis Applied to Hydrodynamic Journal Bearing
- Retraction Note to: Large-Scale Video Classification with Convolutional Neural Networks
- Back Matter
People also search for Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020 Volume 1 1st :
define information and communication technology
introduction to information and communication technology
ministry of information and communication technology
ict information and communication technology