دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Suresh Chandra Satapathy, Amit Joshi, Nilesh Modi, Nisarg Pathak (eds.) سری: Advances in Intelligent Systems and Computing 408 ISBN (شابک) : 9789811001277, 9789811001291 ناشر: Springer Singapore سال نشر: 2016 تعداد صفحات: 739 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 29 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
کلمات کلیدی مربوط به کتاب مجموعه مقالات کنفرانس بین المللی ICT برای توسعه پایدار: ICT4SD 2015 جلد 1: هوش محاسباتی، داده کاوی و کشف دانش، مهندسی به کمک کامپیوتر (CAD، CAE) و طراحی، مهندسی ارتباطات، شبکه ها، مدیریت نوآوری/فناوری
در صورت تبدیل فایل کتاب Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی ICT برای توسعه پایدار: ICT4SD 2015 جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Front Matter....Pages i-xx
A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications....Pages 1-10
DDA: An Approach to Handle DDoS (Ping Flood) Attack....Pages 11-23
Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform....Pages 25-34
Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi-cluster Heterogeneous Environment....Pages 35-44
Faster Load Flow Analysis....Pages 45-54
Fuzzy Link Based Analysis for Mining Informational Systems....Pages 55-62
Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints....Pages 63-71
Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm....Pages 73-80
An Improvement in Performance of Optical Communication System Using Linearly Chirped Apodized Fiber Bragg Grating....Pages 81-88
Enhancement of Minimum Spanning Tree....Pages 89-95
Feasibility Study of Proposed Architecture for Automatic Assessment of Use-Case Diagram....Pages 97-104
Extraction of Web Content Based on Content Type....Pages 105-113
User Based Collaborative Filtering Using Bloom Filter with MapReduce....Pages 115-123
ICT-Based Facilities Management Tools for Buildings....Pages 125-133
Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET....Pages 135-142
UDP Flooding Attack Detection Using Information Metric Measure....Pages 143-153
Generalized MCDM-Based Decision Support System for Personnel Prioritization....Pages 155-168
A Proactive Dynamic Rate Control Scheme for AIMD-Based Reactive TCP Variants....Pages 169-176
Investigating Varying Time Black Hole Attack on QoS over MANET....Pages 177-183
Hybrid Approach to Reduce Time Complexity of String Matching Algorithm Using Hashing with Chaining....Pages 185-193
INDTime: Temporal Tagger––First Step Toward Temporal Information Retrieval....Pages 195-203
A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography....Pages 205-214
A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD)....Pages 215-224
ACE (Advanced Compression Encryption) Scheme for Image Authentication....Pages 225-232
An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique....Pages 233-241
Detection of Wormhole Attack in Wireless Sensor Networks....Pages 243-250
Comparative Analysis of MCML Compressor with and Without Concept of Sleep Transistor....Pages 251-260
Design and Analysis of Ultracompact Four-Band Wavelength Demultiplexer Based on 2D Photonic Crystal....Pages 261-268
Designing and Optimization of Nano-ring Resonator-Based Photonic Pressure Sensor....Pages 269-278
Classifying Nodes in Social Media Space....Pages 279-287
A Novel Hexagonal Shape-Based Band-Stop Frequency-Selective Surface with Multiband Applications....Pages 289-297
AXSM: An Automated Tool for XML Schema Matching....Pages 299-308
Development of Web Map Service for OpenStreetMaps (OSM) Data....Pages 309-318
Improved Indoor Positioning Using RSS and Directional Antenna Integrating with RFID and Wireless Technology....Pages 319-328
Secured Cloud Data Storage––Prototype Trust Model for Public Cloud Storage....Pages 329-337
A Semicircular Monopole Antenna for Ultra-wideband Applications....Pages 339-345
Security Analyses of Different LFSR-Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR-Based Attacks....Pages 347-359
Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25 GHz) Application....Pages 361-367
Support Vector Machine-Based Model for Host Overload Detection in Clouds....Pages 369-376
A Hybrid Face Recognition Scheme Using Contour and Gabor Wavelet....Pages 377-385
Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad Hoc Networks....Pages 387-396
Data Acquisition with FPGA Using Xilinx and LabVIEW....Pages 397-405
SRR and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics....Pages 407-415
Wireless Resonant Power Transmission....Pages 417-425
Fuzzy Clustering-Based Efficient Classification Model for Large TCP Dump Dataset Using Hadoop Framework....Pages 427-437
System-Related Characteristic-Based Leader Election Protocol for Cognitive Radio Networks....Pages 439-446
Passive Image Manipulation Detection Using Wavelet Transform and Support Vector Machine Classifier....Pages 447-455
Intrusion Detection System with Snort in Cloud Computing: Advanced IDS....Pages 457-465
Rural E-Health Care Model....Pages 467-474
An Implementation Model for Privacy Aware Access Control in Web Services Environment....Pages 475-484
Comprehensive Review on Eye Close and Eye Open Activities Using EEG in Brain–Computer Interface....Pages 485-492
Design of High Data Rate and Multipath Efficient Underwater Acoustic Communication System Using OFDM–DQPSK....Pages 493-502
A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter....Pages 503-512
Performance Analysis of Medical Image Compression Techniques....Pages 513-521
Integrated Framework Using Frequent Pattern for Clustering Numeric and Nominal Data Sets....Pages 523-530
Image Encryption by Using Block-Based Symmetric Transformation Algorithm (International Data Encryption Algorithm)....Pages 531-539
Content-Based Watermarking Using MCA....Pages 541-551
Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image....Pages 553-559
Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem....Pages 561-569
Evaluating Performance of Reactive and Hybrid Routing Protocol in Mobile Ad Hoc Network....Pages 571-580
Sentiment-Based Data Mining Approach for Classification and Analysis....Pages 581-595
Offline Handwritten Sanskrit Simple and Compound Character Recognition Using Neural Network....Pages 597-605
Need of ICT for Sustainable Development of Power Sector....Pages 607-614
Development of Optical Impairment Minimization Technique for Radio Over Fiber Link....Pages 615-624
Mobile Waste Management for Smart Cities: Monitoring Sanitation Through Living Labs....Pages 625-633
Optimized Implementation of Location-Aware and Network-Based Services for Power-Efficient Android Applications....Pages 635-646
Power Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor Network....Pages 647-655
Comparison of Different Similarity Functions on Hindi QA System....Pages 657-663
Preventing Faults: Fault Monitoring and Proactive Fault Tolerance in Cloud Computing....Pages 665-673
Evolving the Reliability for Cloud System Using Priority Metric....Pages 675-684
Multilevel Priority-Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment....Pages 685-693
Efficient DNA-Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs....Pages 695-706
Sentiment Classification of Context Dependent Words....Pages 707-715
Opinion Mining Classification Based on Extension of Opinion Mining Phrases....Pages 717-724
Facial Expression Recognition Using Variants of LBP and Classifier Fusion....Pages 725-732
FLSU-Based Energy Efficient Protocol Design for WSN with Mobile Sink....Pages 733-744
Goal-Based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques....Pages 745-754
Back Matter....Pages 755-757