語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of International Confere...
~
International Conference on Communication and Networks ((2016 :)
FindBook
Google Book
Amazon
博客來
Proceedings of International Conference on Communication and Networks = ComNet 2016 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proceedings of International Conference on Communication and Networks/ edited by Nilesh Modi, Pramode Verma, Bhushan Trivedi.
其他題名:
ComNet 2016 /
其他題名:
ComNet 2016
其他作者:
Modi, Nilesh.
團體作者:
International Conference on Communication and Networks
出版者:
Singapore :Springer Singapore : : 2017.,
面頁冊數:
xx, 757 p. :ill., digital ;24 cm.
內容註:
Chapter 1. A Novice Approach for Web Application Security -- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R' -- Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect -- Chapter 4. Enhancement of Security in IoTSyS Framework -- Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect -- Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers -- Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network -- Chapter 8. Use of ICT for Development of Smart City-Ahmedabad -- Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering -- Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network -- Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming -- Chapter 12. Control of Robot Using Neural Networks -- Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment -- Chapter 14. Information Security Emergency Plan Management System -- Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud -- Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation -- Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards -- Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing -- Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix -- Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics -- Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH -- Chapter 22. MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol -- Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment -- Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment -- Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology -- Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application -- Chapter 27. Objective Quality Assessments of Restoration Images -- Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications -- Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering -- Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges -- Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm -- Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village -- Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India -- Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment -- Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression -- Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images -- Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks -- Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks -- Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries -- Chapter 40. Internet of Things based Smart Home with Intel Edison -- Chapter 41. Image Classification Using Discrete Block Truncation Coding -- Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination -- Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits -- Chapter 44. Security Requirements for Internet of Things (IoT) -- Chapter 45. Identity Based Secure RSA Encryption System -- Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels -- Chapter 47. An Extensive Conception of Reusability in Software Component Engineering -- Chapter 48. Opportunistic Location Update - A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks -- Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective -- Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters -- Chapter 51. Target Tracking Accuracy in Context of Energy Consumption in Wireless Sensor Network -- Chapter 52. Security in Mobile Ad hoc Networks -- Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator -- Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases -- Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System -- Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems -- Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration -- Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem -- Chapter 59. Differential Voltage Controlled Ring Oscillators - A Review -- Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach -- Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization -- Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things -- Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows -- Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person -- Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport -- Chapter 66. Real Time Street Light System Using Low Power Microcontroller -- Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes -- Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks -- Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images -- Chapter 70. LTTC: A Load Testing Tool for Cloud -- Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine -- Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching -- Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection -- Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks -- Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.
Contained By:
Springer eBooks
標題:
Computer networks - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-981-10-2750-5
ISBN:
9789811027505
Proceedings of International Conference on Communication and Networks = ComNet 2016 /
Proceedings of International Conference on Communication and Networks
ComNet 2016 /[electronic resource] :ComNet 2016edited by Nilesh Modi, Pramode Verma, Bhushan Trivedi. - Singapore :Springer Singapore :2017. - xx, 757 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5082194-5357 ;. - Advances in intelligent systems and computing ;v.508..
Chapter 1. A Novice Approach for Web Application Security -- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R' -- Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect -- Chapter 4. Enhancement of Security in IoTSyS Framework -- Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect -- Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers -- Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network -- Chapter 8. Use of ICT for Development of Smart City-Ahmedabad -- Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering -- Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network -- Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming -- Chapter 12. Control of Robot Using Neural Networks -- Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment -- Chapter 14. Information Security Emergency Plan Management System -- Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud -- Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation -- Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards -- Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing -- Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix -- Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics -- Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH -- Chapter 22. MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol -- Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment -- Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment -- Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology -- Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application -- Chapter 27. Objective Quality Assessments of Restoration Images -- Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications -- Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering -- Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges -- Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm -- Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village -- Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India -- Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment -- Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression -- Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images -- Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks -- Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks -- Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries -- Chapter 40. Internet of Things based Smart Home with Intel Edison -- Chapter 41. Image Classification Using Discrete Block Truncation Coding -- Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination -- Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits -- Chapter 44. Security Requirements for Internet of Things (IoT) -- Chapter 45. Identity Based Secure RSA Encryption System -- Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels -- Chapter 47. An Extensive Conception of Reusability in Software Component Engineering -- Chapter 48. Opportunistic Location Update - A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks -- Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective -- Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters -- Chapter 51. Target Tracking Accuracy in Context of Energy Consumption in Wireless Sensor Network -- Chapter 52. Security in Mobile Ad hoc Networks -- Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator -- Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases -- Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System -- Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems -- Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration -- Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem -- Chapter 59. Differential Voltage Controlled Ring Oscillators - A Review -- Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach -- Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization -- Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things -- Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows -- Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person -- Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport -- Chapter 66. Real Time Street Light System Using Low Power Microcontroller -- Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes -- Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks -- Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images -- Chapter 70. LTTC: A Load Testing Tool for Cloud -- Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine -- Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching -- Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection -- Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks -- Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.
The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19-20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Association of Computing Machinery (ACM), Ahmedabad Chapter. The book aims to provide a forum to researchers to propose theory and technology on the networks and services, share their experience in IT and telecommunications industries and to discuss future management solutions for communication systems, networks and services. It comprises of original contributions from researchers describing their original, unpublished, research contribution. The papers are mainly from 4 areas - Security, Management and Control, Protocol and Deployment, and Applications. The topics covered in the book are newly emerging algorithms, communication systems, network standards, services, and applications.
ISBN: 9789811027505
Standard No.: 10.1007/978-981-10-2750-5doiSubjects--Topical Terms:
569849
Computer networks
--Congresses.
LC Class. No.: TK5105.5
Dewey Class. No.: 004.6
Proceedings of International Conference on Communication and Networks = ComNet 2016 /
LDR
:09144nmm a2200337 a 4500
001
2097601
003
DE-He213
005
20171117165926.0
006
m d
007
cr nn 008maaau
008
171229s2017 si s 0 eng d
020
$a
9789811027505
$q
(electronic bk.)
020
$a
9789811027499
$q
(paper)
024
7
$a
10.1007/978-981-10-2750-5
$2
doi
035
$a
978-981-10-2750-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.5
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
082
0 4
$a
004.6
$2
23
090
$a
TK5105.5
$b
.I61 2016
111
2
$a
International Conference on Communication and Networks
$d
(2016 :
$c
Ahmadabad, India)
$3
3236488
245
1 0
$a
Proceedings of International Conference on Communication and Networks
$h
[electronic resource] :
$b
ComNet 2016 /
$c
edited by Nilesh Modi, Pramode Verma, Bhushan Trivedi.
246
3
$a
ComNet 2016
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2017.
300
$a
xx, 757 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.508
505
0
$a
Chapter 1. A Novice Approach for Web Application Security -- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R' -- Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect -- Chapter 4. Enhancement of Security in IoTSyS Framework -- Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect -- Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers -- Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network -- Chapter 8. Use of ICT for Development of Smart City-Ahmedabad -- Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering -- Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network -- Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming -- Chapter 12. Control of Robot Using Neural Networks -- Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment -- Chapter 14. Information Security Emergency Plan Management System -- Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud -- Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation -- Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards -- Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing -- Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix -- Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics -- Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH -- Chapter 22. MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol -- Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment -- Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment -- Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology -- Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application -- Chapter 27. Objective Quality Assessments of Restoration Images -- Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications -- Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering -- Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges -- Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm -- Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village -- Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India -- Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment -- Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression -- Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images -- Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks -- Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks -- Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries -- Chapter 40. Internet of Things based Smart Home with Intel Edison -- Chapter 41. Image Classification Using Discrete Block Truncation Coding -- Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination -- Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits -- Chapter 44. Security Requirements for Internet of Things (IoT) -- Chapter 45. Identity Based Secure RSA Encryption System -- Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels -- Chapter 47. An Extensive Conception of Reusability in Software Component Engineering -- Chapter 48. Opportunistic Location Update - A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks -- Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective -- Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters -- Chapter 51. Target Tracking Accuracy in Context of Energy Consumption in Wireless Sensor Network -- Chapter 52. Security in Mobile Ad hoc Networks -- Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator -- Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases -- Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System -- Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems -- Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration -- Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem -- Chapter 59. Differential Voltage Controlled Ring Oscillators - A Review -- Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach -- Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization -- Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things -- Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows -- Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person -- Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport -- Chapter 66. Real Time Street Light System Using Low Power Microcontroller -- Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes -- Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks -- Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images -- Chapter 70. LTTC: A Load Testing Tool for Cloud -- Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine -- Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching -- Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection -- Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks -- Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.
520
$a
The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19-20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Association of Computing Machinery (ACM), Ahmedabad Chapter. The book aims to provide a forum to researchers to propose theory and technology on the networks and services, share their experience in IT and telecommunications industries and to discuss future management solutions for communication systems, networks and services. It comprises of original contributions from researchers describing their original, unpublished, research contribution. The papers are mainly from 4 areas - Security, Management and Control, Protocol and Deployment, and Applications. The topics covered in the book are newly emerging algorithms, communication systems, network standards, services, and applications.
650
0
$a
Computer networks
$v
Congresses.
$3
569849
650
0
$a
Internet of things
$v
Congresses.
$3
3135380
650
0
$a
Cloud computing
$v
Congresses.
$3
1085446
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Control.
$3
1006321
650
2 4
$a
Quality Control, Reliability, Safety and Risk.
$3
891027
700
1
$a
Modi, Nilesh.
$3
3236489
700
1
$a
Verma, Pramode.
$3
3236490
700
1
$a
Trivedi, Bhushan.
$3
3236491
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
v.508.
$3
3236492
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-2750-5
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9319650
電子資源
11.線上閱覽_V
電子書
EB TK5105.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入