ICT Analysis and Applications [E-Book] / edited by Simon Fong, Nilanjan Dey, Amit Joshi.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 6th International Conference on ICT for Sustainable Development (ICT4SD 2021), held in Goa, India, on 5-6 August 2021. The book covers the topics su...
Saved in:
Full text |
|
Personal Name(s): | Dey, Nilanjan, editor |
Fong, Simon, editor / Joshi, Amit, editor | |
Edition: |
1st edition 2022. |
Imprint: |
Singapore :
Springer,
2022
|
Physical Description: |
XXX, 958 pages 404 illustrations, 292 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789811656552 |
DOI: |
10.1007/978-981-16-5655-2 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Networks and Systems ;
314 |
Subject (LOC): |
- Chapter 1. Analysis of Codon-usage-bias in Cya, Lef and Pag genes exists in px01 plasmid of Bacillus anthracis
- Chapter 2. Constructing digital signature algorithm based on a new key scheme
- Chapter 3. Internet of Things (IoT), Three Layer Architecture, Security Issues and Counter Measures
- Chapter 4. Intermittent Leather Defect Detection based on Ensemble algorithms derived from Black Hat Transformation and Hough Transformation
- Chapter 5. Efficient Strategies to Manage Road Traffic using Big Data Analytics
- Chapter 6. Travel Booking and Management Application: TravelBel
- Chapter 7. Security and Privacy Issues in Internet of Things
- Chapter 8. Industry 4.0: An Overview and Further Research Directions
- Chapter 9. A Comprehensive Survey on Trust Management in Fog Computing
- Chapter 10. Personal Identification Using Fuzzy Approach and RSA Algorithm
- Chapter 11. ICT and Administrative Reforms: A literature review
- Chapter 12. Analysis of Fault Tolerance Techniques in Virtual Machine Environment
- Chapter 13. Analysis of Symmetric and Asymmetric Key Algorithms
- Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique
- Chapter 15. A Survey on Human Action Recognition and Detection Techniques.