Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017

Author:   Simon Fong ,  Shyam Akashe ,  Parikshit N. Mahalle
Publisher:   Springer Verlag, Singapore
Edition:   Softcover reprint of the original 1st ed. 2019
Volume:   40
ISBN:  

9789811344589


Pages:   775
Publication Date:   15 December 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $465.72 Quantity:  
Add to Cart

Share |

Information and Communication Technology for Competitive Strategies: Proceedings of Third International Conference on ICTCS 2017


Add your own review!

Overview

This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16–17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.

Full Product Details

Author:   Simon Fong ,  Shyam Akashe ,  Parikshit N. Mahalle
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
Edition:   Softcover reprint of the original 1st ed. 2019
Volume:   40
Weight:   1.211kg
ISBN:  

9789811344589


ISBN 10:   9811344582
Pages:   775
Publication Date:   15 December 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication.- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices.- Performance Analysis of Parallel Implementation of Morphological Operations.- US Dollar’s Influence on Indian Gold price Assessment using Artificial Neural Network.- Attribute based storage mechanism with de-duplication filter: A Review Paper.- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm.- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph.- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization.- Digitization of Disaster Management: A Multimedia Ontological Approach.- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics.- Most Persistent Feature Selection method for Opinion mining of social media reviews.- PhysicalLayer Security with Energy Harvesting Techniques: A Study.- One-tip Secure: Nex-Gen of Text Based Password.- New Text Based User Authentication Scheme Using CAPTCHA.- FPGA Implementation of Parallel Transformative Approach in AES Algorithm.- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals.- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation.- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data.- Age classification with LPCC features using SVM and ANN.- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers.- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE.- Decision Tree Algorithms for prediction of Heart Diseases.- Green communication for wireless cooperative networks: A survey.- Instance Selection using Multi-objective CHC Evolutionary Algorithm.- Inclusive device to connect people with the surrounding World.- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method.- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry.- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants.- Hand Geometry and Palmprint Based Biometric System with Image Deblurring.- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology.- Syllable Based Concatenative Speech Synthesis for Marathi Language.- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications.- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique.- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs.- Privacy Preserving K-NN Classification Using Vector Operations.- A Comparative Study on Segmentation Techniques for Brain Tumor MRI.- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW.- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm.- Synthesis of Reversible Array Divider Circuit.- Finding Right Doctors and Hospitals: A Personalized Health Recommender.- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm.- Simulation of Phasor Measurement Unit for Research and Teaching Applications.- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks.- Various Machine Learning Algorithms for Twitter Sentiment Analysis.

Reviews

Author Information

Simon Fong graduated from La Trobe University, Australia, with a 1st Class Honours B.Eng. Computer Systems degree and a Ph.D. Computer Science degree in 1993 and 1998, respectively. Simon is now working as an associate professor at the Computer and Information Science Department of the University of Macau, China. He is also one of the founding members of the Data Analytics and Collaborative Computing Research Group at the Faculty of Science and Technology. Prior to his academic career, Simon held various managerial and technical positions, such as systems engineer, IT consultant and e-commerce director in Australia and Asia. Dr. Fong has published over 300 international conference and peer-reviewed journal papers, mostly in the areas of data mining and optimization algorithms. Shyam Akashe is a professor at ITM University, Gwalior, Madhya Pradesh, India. He completed his Ph.D. at Thapar University, Punjab, India and M.Tech. in Electronics and Communication Engineering at the Institute of Technology & Management, Gwalior. His more than 190 publications include over 50 papers in SCI-indexed journals. The main focus of his research is low power system on chip (SoC) applications in which static random access memories (SRAMs) are omnipresent. He has authored two books entitled ‘Moore’s Law Alive: Gate-All-Around (GAA) Next Generation Transistor’ published by LAMBERT Academic Publishing, Germany and ‘Low Power High Speed CMOS Multiplexer Design’ published by Nova Science Publishers, Inc., New York, USA. He has also published over 120 papers in refereed journals of national and international repute. Dr. Akashe has participated in numerous national and international conferences and presented over 100 papers. Parikshit N. Mahalle obtained his B.E. degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He completed his Ph.D.in Computer Science and Engineering with specialization in Wireless Communication at Aalborg University, Aalborg, Denmark. He has more than 16 years of teaching and research experience, and has authored 8 books: Identity Management for Internet of Things, River Publishers, Identity Management Framework for Internet of Things, Aalborg University Press, Data Structures and Algorithms – Cengage Publications, Theory of Computations, Gigatech Publications, Fundamentals of Programming Languages – I, Gigatech Publications, Fundamentals of Programming Languages – II, Gigatech Publications, Design and Analysis of Algorithms: A Problem Solving Approach (In Process) – Cambridge University Press. He is the recipient of “Best Faculty Award” from Sinhgad Technical Education Society (STES) and Cognizant Technologies Solutions. He has also delivered an invited talk on “Identity Management in IoT” to Symantec Research Lab, Mountain View, California. Currently he is working as a professor and head of the Department of Computer Engineering at STES’s Smt. Kashibai Navale College of Engineering, Pune, India. His recent research interests include algorithms, Internet of Things, identity management and security.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List