Details

Proceedings of International Conference on ICT for Sustainable Development


Proceedings of International Conference on ICT for Sustainable Development

ICT4SD 2015 Volume 1
Advances in Intelligent Systems and Computing, Band 408

von: Suresh Chandra Satapathy, Amit Joshi, Nilesh Modi, Nisarg Pathak

213,99 €

Verlag: Springer
Format: PDF
Veröffentl.: 10.02.2016
ISBN/EAN: 9789811001291
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<p>The two volumes of this book
collect high-quality peer-reviewed research papers presented in the
International Conference on ICT for Sustainable Development (ICT4SD 2015) held
at Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Information
and Communication Technologies and its applications in field for engineering
and management. The main&nbsp;focus of the volumes are on applications of ICT
for Infrastructure, e-Governance, and
contemporary&nbsp;technologies&nbsp;advancements&nbsp;on Data Mining, Security,
Computer&nbsp;Graphics, etc.&nbsp; The objective of&nbsp;this International Conference
is to provide an opportunity for the researchers, academicians, industry
persons and students to interact and exchange ideas, experience and expertise
in the current trend and strategies for Information and Communication
Technologies.</p>
<p><b>Chapter 1.</b> A Compact Triple and Quadruple Band
Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- <b>Chapter 2.</b>
DDA: An Approach to Handle DDoS (Ping Flood) Attack.-
<b>Chapter 3.</b> Approach
to Accurate Circle Detection: Multithreaded Implementation of Modified Circular
Hough Transform.- <b>Chapter 4.</b><b> </b>Apache Hadoop Yarn MapReduce Job Classification Based
on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous
Environment.- <b>Chapter 5.</b> Faster
Load Flow Analysis.- <b>Chapter 6.</b> Fuzzy Link
Based Analysis for Mining Informational Systems.- <b>Chapter 7.</b><b> </b>Teaching-Learning-Based
Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic
Constraints.- <b>Chapter 8.</b> Enforcing
Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree
Algorithm.- <b>Chapter 9.</b> An
Improvement in Performance of Optical Communication System using Linearly
Chirped Apodized Fiber Bragg Grating.- <b>Chapter 10.</b> Enhancement of Minimum Spanning Tree.- <b>Chapter 11.</b>
Feasibility Study of Proposed Architecture for
Automatic Assessment of Use Case Diagram.- <b>Chapter 12.</b> Extraction of Web Content Based on Content Type.- <b>Chapter 13.</b><b> </b>User Based
Collaborative Filtering Using Bloom Filter with MapReduce.- <b>Chapter 14.</b><b> </b>ICT Based
Facilities Management Tools for Buildings.- <b>Chapter 15.</b><b> </b>Study the
Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node
in MANET.- <b>Chapter 16.</b> UDP
Flooding Attack Detection Using Information Metric Measure.- <b>Chapter 17.</b>
Generalized MCDM Based Decision Support System for
Personnel Prioritization.- <b>Chapter
18.</b><b>
</b>A Proactive Dynamic Rate Control Scheme
for AIMD based Reactive TCP Variants.- <b>Chapter 19.</b> Investigating Varying Time Black Hole attack on QoS
over MANET.- <b>Chapter 20.</b> Hybrid
Approach to Reduce Time Complexity of String Matching Algorithm usingHashing
with Chaining.- <b>Chapter 21.</b><b> </b>INDTime: Temporal Tagger- First Step Towards
Temporal Information Retrieval.- <b>Chapter
22.</b> A Secure
Text Communication Scheme Based on Combination of Compression, Cryptography and
Steganography.- <b>Chapter 23.</b> A
Comparative Analysis of Feature Selection Methods and Associated Machine
Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- <b>Chapter 24.</b>
ACE (Advanced Compression Encryption)&nbsp; Scheme for Image Authentication.- Chapter
25. An
Efficient and Interactive Approach for Association Rules Generation by
Integrating Ontology and Filtering Technique.- <b>Chapter 26.</b> Detection of Wormhole Attack in Wireless Sensor
Networks.- <b>Chapter 27.</b><b> </b>Comparative Analysis of MCML Compressor with and
without Concept of Sleep Transistor.- <b>Chapter 28.</b><b> </b>Design
&amp; Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D
Photonic Crystal.- <b>Chapter 29.</b> Designing
and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- <b>Chapter 30.</b>
Classifying Nodes in Social Media Space.- <b>Chapter 31.</b>
A Novel Hexagonal Shaped Based Band Stop Frequency
Selective Surface with Multi-Band Applications.- <b>Chapter 32.</b> AXSM : An Automated Tool for XML Schema Matching.- <b>Chapter 33.</b>
Development of Web Map Service For Open Street Maps
(OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS and
Directional Antenna Integrating With RFID and Wireless Technology.- <b>Chapter 35.</b>
Secured Cloud Data Storage – Prototype Trust Model
for Public Cloud Storage.- <b>Chapter
36.</b><b>
</b>A Semi Circular Monopole Antenna for
Ultra Wide Band Applications.- <b>Chapter
37.</b> Security Analysis
of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with
Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.-
<b>Chapter 38.</b><i> </i>Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- <b>Chapter 39.</b>
Support Vector Machine Based Model for Host
Overload Detection in Clouds.- <b>Chapter
40.</b> A Hybrid
Face Recognition Scheme Using Contour and Gabor Wavelet.- <b>Chapter 41.</b><b> </b>Data
Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hoc
Networks.- <b>Chapter 42.</b> Data
Acquisition with FPGA using Xilinx and LabVIEW.- <b>Chapter 43.</b> SRR and R-CSRR Loaded Reconfigurable Antenna with
Multiband Notch Characteristics.- <b>C</b><b>hapter 44.</b>
Wireless Resonant Power Transmission.- <b>Chapter 45.</b>
Fuzzy Clustering based Efficient Classification
Model for large TCPdump data set using Hadoop framework.- <b>Chapter 46.</b>
System-related Characteristic Based Leader Election
Protocol for Cognitive Radio Networks.- <b>Chapter 47.</b> Passive Image Manipulation Detection using Wavelet
Transform and Support Vector Machine Classifier.- <b>Chapter 48.</b> Intrusion Detection System with Snort in Cloud
Computing.- <b>Chapter 49.</b> Rural
E-Health Care Model.- <b>Chapter 50.</b><b> </b>An Implementation Model for Privacy Aware Access
Control in Web Services Environment.- <b>Chapter 51.</b> Comprehensive Review on Eye Close and Eye Open Activities
Using EEG in Brain Computer Interface.- <b>Chapter 52.</b> Design of High Data Rate and Multipath Efficient
Underwater Acoustic Communication System Using OFDM-DQPSK.- <b>Chapter 53.</b>
A Hybrid Approach for Big Data Analysis of Cricket
Fan Sentiments in Twitter.- <b>Chapter
54.</b> Performance
Analysis of Medical Image Compression Techniques.- <b>Chapter 55.</b> Integrated Framework Using Frequent Pattern for
Clustering Numeric and Nominal Data Sets.- <b>Chapter 56.</b> Image Encryption by Using Block Based Symmetric
Transformation Algorithm (International Data Encryption Algorithm).- <b>Chapter 57.</b>
Content Based Watermarking Using MCA.- <b>Chapter 58.</b>
Image Enhancement Based on Log-Gabor Filter for
Noisy Fingerprint Image.- <b>Chapter
59.</b> Computational
Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales
Person Problem.- <b>C</b><b>hapter 60.</b>
Evaluating Performance of Reactive and Hybrid
Routing Protocol in Mobile Ad-Hoc Network.- <b>Chapter 61.</b> Sentiment Based Data Mining Approach for
Classification and Analysis.- <b>Chapter
62.</b> Offline
Handwritten Sanskrit Simple and Compound Character Recognition Using Neural
Network.- <b>Chapter 63.</b> Need of
ICT for Sustainable Development of Power Sector.- <b>Chapter 64.</b> Development of Optical Impairment Minimization
Technique for Radio Over Fiber Link.- <b>Chapter 65.</b> Mobile Waste Management for Smart Cities: Monitoring
Sanitation through Living Labs.- <b>Chapter
66.</b> Optimized
Implementation of Location Aware and Network Based Services for Power Efficient
Android Applications.- <b>Chapter
67.</b> Power
Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor
Network.- <b>Chapter 68.</b> Comparison
of Different SimilarityFunctions on Hindi QA System.- <b>Chapter 69.</b>
Preventing Faults: Fault Monitoring and Proactive
Fault tolerance in Cloud Computing.- <b>Chapter 70.</b> Evolving the Reliability for Cloud System Using
Priority Metric.- <b>Chapter 71.</b> Multilevel
Priority Based Task Scheduling Algorithm for Workflows in Cloud Computing
Environment.- <b>Chapter 72.</b> Efficient
DNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in
MANETs.- <chapter 73. Sentiment
Classification of Context Dependent Words.- <b>Chapter 74.</b> Opinion Mining Classification Based on Extension of
Opinion Mining Phrases.- <b>Chapter
75.</b> Facial
Expression Recognition Using variants of LBP and Classifier Fusion.- <b>Chapter 76.</b>
FLSU Based Energy Efficient Protocol Design for WSN
with Mobile Sink.- <b>Chapter 77.</b> Goal based
Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.</p>
<p>Dr. Suresh Chandra Satapathy is currently working
as Professor and Head, Dept. of CSE at Anil Neerukonda Institute of Technology
and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph. D. in Computer
Science and Engineering from JNTU Hyderabad and M. Tech in CSE from NIT,
Rourkela, Odisha, India. He has 26 years of teaching experience. His research
interests are data mining, machine intelligence and swarm intelligence. He has
acted as program chair of many international conferences and edited 6 volumes
of proceedings from Springer LNCS and AISC series. He is currently guiding 8
scholars for Ph. Ds. Dr. Satapathy is also a Sr. Member IEEE.<br></p><p></p>



<p>Mr. Amit Joshi<b>&nbsp;</b>has an experience of around 6
years in academic and industry in prestigious organizations of Rajasthan and
Gujarat. Currently, he is working as an Assistant Professor in Department of
Information Technology at Sabar Institute in Gujarat. He is an active member of
ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other
professional societies. Currently, he is Honorary Secretary of CSI Udaipur
Chapter and Honorary&nbsp;Secretary for ACM Udaipur Chapter. He has presented
and published more than 40 papers in National and International
Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books
on diversified subjects including Advances in Open Source Mobile Technologies,
ICT for Integrated Rural Development and ICT for Competitive Strategies. He has
also organized more than 25 National and International Conferences and
Workshops including International Conference ETNCC 2011 at Udaipur through
IEEE, International Conference ICTCS – 2014 at Udaipur through ACM,
International Conference ICT4SD 2015 – by Springer recently. He has also served
on Organising and Program Committee of more than 50
Conferences/Seminars/Workshops throughout the World and presented 6 invited
talks in various conferences. For his contribution towards the society, The
Institution of Engineers (India), ULC, has given him Appreciation award on the
celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE
, 2012.</p><p></p>

<p>Dr. Nilesh Modi is having rich
experience of around 13 years in academics and IT industry. He is holding
Doctorate in e-Security (Computer Science and Application).&nbsp; Continuing
his research on cyber security, presently he is pursuing post-doctoral research
on Wireless Communication and Security and certification as an Ethical
Hacking.&nbsp;He has very good number of research under his name and presented
more than 75 research papers in International and National Journals and
Conferences. He has delivered number of expert talk on e-Security and hacking
in National and International Conferences. Dr. Modi, a person with vibrancy
having his active involvement as a life member of CSI, ACM IEEE, IACSIT, IACSI,
IAEng apart from his academic and industrial career. As a consultant, he is
contributing for differentsystem development projects with IT industry and
carried out different Government Projects.&nbsp;<br></p><p></p>

<p>Dr. Nisrag Pathak&nbsp;has been an astute and result
oriented professional with 10 years of experience in teaching and carving
state, national and international events like workshops, seminars and
conferences. Being a mathematics scholar and computer science professional, he
is actively involved in research of data mining and big data analytic. He has
strong list of national and international publication in his name. Dr. Pathak
is currently Associate Professor of Computer Science and Application at
Narsinhbhai Institute of Computer Studies and Management affiliated to Kadi
Sarva Vishvavidyalaya. He received his Ph.D. from Hemchandracharya North
Gujarat University in Computer Science and his Master's in Mathematics from the
same university. His other tenures include research fellow at Indian
Statistical Institute, Kolkata and Indian Institute of Science, Bengaluru.</p><p></p>
The two volumes of this book collect high-quality peer-reviewed research papers presented in the International Conference on ICT for Sustainable Development (ICT4SD 2015) held at Ahmedabad, India during 3 – 4 July 2015. The book discusses all areas of Information and Communication Technologies and its applications in field for engineering and management. The main&nbsp;focus of the volumes are on applications of ICT for Infrastructure, e-Governance, and contemporary&nbsp;technologies&nbsp;advancements&nbsp;on Data Mining, Security, Computer&nbsp;Graphics, etc.&nbsp; The objective of&nbsp;this International Conference is to provide an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend and strategies for Information and Communication Technologies.
Discusses all areas of Information and Communication Technologies (ICT) and its applications in field for engineering and management Focusses on the applications of ICT for Infrastructure, e-Governance, and contemporary technologies advancements on Data Mining, Security, Computer Graphics, etc. Provides an opportunity for the researchers, academicians, industry persons and students to interact and exchange ideas, experience and expertise in the current trend Includes supplementary material: sn.pub/extras

Diese Produkte könnten Sie auch interessieren:

Machining Dynamics
Machining Dynamics
von: Tony L. Schmitz, K. Scott Smith
PDF ebook
139,09 €
Singular Perturbation Theory
Singular Perturbation Theory
von: R.S. Johnson
PDF ebook
149,79 €
Inverse Problems
Inverse Problems
von: Alexander G. Ramm
PDF ebook
149,79 €