000 06942nam a22006375i 4500
001 978-981-99-9486-1
003 DE-He213
005 20250516160024.0
007 cr nn 008mamaa
008 240417s2024 si | s |||| 0|eng d
020 _a9789819994861
_9978-981-99-9486-1
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aICT: Innovation and Computing
_h[electronic resource] :
_bProceedings of ICTCS 2023, Volume 5 /
_cedited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel, S. Karthik.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXIX, 493 p. 256 illus., 195 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v879
505 0 _aChapter 1: Deep Convolutional Encoder-Decoder Models for Road Extraction from Aerial Imagery -- Chapter 2 :Methods, Approaches, and Techniques for Privacy-Preserving Data Mining -- Chapter 3 :Penetration Testing for the Cloud-Based Web Application -- Chapter 4 :Recurrent Neural Network based Energy Management system in Electric vehicle application with Hybrid energy sources -- Chapter 5 :Pre-Eclampsia Risk Prediction Using Machine Learning Algorithms -- Chapter 6 :Path Planning of Autonomous Vehicle For Real World Scenario using CARLA -- Chapter 7 : Analyzing the Impact of Carbon Emission in Training Neural Machine Translation Models: A Case Study -- Chapter 8 :WOMEN'S SAFETY WEARABLES DESIGN USING AN IOT-BASED FRAMEWORK TECHNOLOGY -- Chapter 9 : Improving Traffic Surveillance with Deep Learning Powered Vehicle Detection, Identification, and Recognition -- Chapter 10 : A Case Study in Requirements Analysis - Sakhee, Software Portfolio Manager -- Chapter 11 :Panorama: A Multi-Language Software Information Prospecting Facility -- Chapter 12 :UNVEILING DRIVER BEHAVIOR THROUGH CNNLSTM- BILSTM ANALYSIS OF OPERATIONAL TIME SERIES DATA -- Chapter 13 : A Systematic Review of Pomegranate Fruit Disease Detection and Classification Using Machine Learning and Deep Learning Techniques -- Chapter 14 :SURVEILLANCE WITH SMART SPHERICAL ROBOT -- Chapter 15 :Face recognition for attendance system in online classes -- Chapter 16 : An Electricity Theft Cyber-Attacks Detection System for Future IoT-based Smart Electric Meters in Renewable Distributed Generation -- Chapter 17: Exploring Research Trends through Topic Modeling of Scopus Data -- Chapter 18 : Microarray Data Classification and Gene selection using Convolutional Neural Network -- Chapter 19 :Physical Activity Detection and Tracking - Review -- Chapter 20 : Brain Inspired Traffic Incident Detection for Effective Communication -- Chapter 21 :Diminishing Unclear Consequences of Missing Values in Data Mining -- Chapter 22 :Social Media Networking Analytics and Growth Perspectives -- Chapter 23 : An Efficient Method for Evaluating the Two-terminal Reliability with A Parallel Algorithm on the Multicore Processor Architecture -- Chapter 24 :4-Port MIMO Dual Band Antenna System for 5G Sub-6 GHz and WLAN Communications -- Chapter 25 :A Secure Health Monitoring Model for Prediction of Heart Disease Detection using Machine Learning -- Chapter 26 :IoT Enabled Solar Powered Water Trash Collector with Conveyor Belt -- Chapter 27 :ECC-Based Hybrid Approach for Data Security for MANET -- Chapter 28 :5G RAN Anomaly Prediction using AI and ML -- Chapter 29 : An Intelligent Traffic Control System Incorporating Deep Learning and Computer Vision with Prioritized and Dynamic Timing -- Chapter 30 :Industrial Worker Safety Device with Proactive Gas Leak and Fire Protection System -- Chapter 31 : Exploring VANETs and their applications with Blockchain -- Chapter 32 :Exploring ICT as a Catalyst for Technological Adoption: Insights from Action Research -- Chapter 33 : "TRICHOASSIST" Trichogram Hair and Scalp Feature Extraction and Analysis using Image Processing -- Chapter 34 :Performance Analysis for Trichoscopy and Trichogram using Deep Learning and Image Processing- A Survey -- Chapter 35 :Conversation Graph Construction Approach of Cyberbully Detection using Bully Scores -- Chapter 36 :Artificial Intelligence based L&E-Refiner for Blind Learners -- Chapter 37 :Security and Journalism: A Systematic Review -- Chapter 38 :Perspective Transform Based Lane Detection for Lane Keep Assistance -- Chapter 39 :Classification of Pneumonia from chest X-Ray Image Using Convolutional Neural Network -- Chapter 40 :Enhancing Network Security with Machine Learning-Based IDSs and IPSs: An Evaluation Using UNSW-NB15 Dataset.
520 _aThis book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 - 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security. The work is presented in five volumes.
541 _fUABC ;
_cPerpetuidad
650 0 _aTelecommunication.
650 0 _aTechnology
_xSociological aspects.
650 0 _aInformation technology.
650 0 _aData protection.
650 0 _aComputational intelligence.
650 0 _aArtificial intelligence.
650 1 4 _aCommunications Engineering, Networks.
650 2 4 _aInformation and Communication Technologies (ICT).
650 2 4 _aData and Information Security.
650 2 4 _aComputational Intelligence.
650 2 4 _aArtificial Intelligence.
700 1 _aJoshi, Amit.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMahmud, Mufti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRagel, Roshan G.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKarthik, S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819994854
776 0 8 _iPrinted edition:
_z9789819994878
830 0 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v879
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-9486-1
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c274797
_d274796