ICT: Innovation and Computing : Proceedings of ICTCS 2023, Volume 5 (Lecture Notes in Networks and Systems)

個数:
  • ポイントキャンペーン

ICT: Innovation and Computing : Proceedings of ICTCS 2023, Volume 5 (Lecture Notes in Networks and Systems)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9789819994854

Full Description

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 - 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security. The work is presented in five volumes.

Contents

Chapter 1: Deep Convolutional Encoder-Decoder Models for Road Extraction from Aerial Imagery .- Chapter 2 :Methods, Approaches, and Techniques for Privacy-Preserving Data Mining .- Chapter 3 :Penetration Testing for the Cloud-Based Web Application .- Chapter 4 :Recurrent Neural Network based Energy Management system in Electric vehicle application with Hybrid energy sources .- Chapter 5 :Pre-Eclampsia Risk Prediction Using Machine Learning Algorithms .- Chapter 6 :Path Planning of Autonomous Vehicle For Real World Scenario using CARLA .- Chapter 7 : Analyzing the Impact of Carbon Emission in Training Neural Machine Translation Models: A Case Study .- Chapter 8 :WOMEN'S SAFETY WEARABLES DESIGN USING AN IOT-BASED FRAMEWORK TECHNOLOGY .- Chapter 9 : Improving Traffic Surveillance with Deep Learning Powered Vehicle Detection, Identification, and Recognition .- Chapter 10 : A Case Study in Requirements Analysis - Sakhee, Software Portfolio Manager .- Chapter 11 :Panorama: A Multi-Language Software Information Prospecting Facility .- Chapter 12 :UNVEILING DRIVER BEHAVIOR THROUGH CNNLSTM- BILSTM ANALYSIS OF OPERATIONAL TIME SERIES DATA .- Chapter 13 : A Systematic Review  of Pomegranate Fruit Disease Detection and Classification Using Machine Learning and Deep Learning Techniques .- Chapter 14 :SURVEILLANCE WITH SMART SPHERICAL ROBOT .- Chapter 15 :Face recognition for attendance system in online classes .- Chapter 16 : An Electricity Theft Cyber-Attacks Detection System for Future IoT-based Smart Electric Meters in Renewable Distributed Generation .- Chapter 17: Exploring Research Trends through Topic Modeling of Scopus Data .- Chapter 18 : Microarray Data Classification and Gene selection using Convolutional Neural Network .- Chapter 19 :Physical Activity Detection and Tracking - Review .- Chapter 20 : Brain Inspired Traffic Incident Detection for Effective Communication .- Chapter 21 :Diminishing Unclear Consequences of Missing Values in Data Mining .- Chapter 22 :Social Media Networking Analytics and Growth Perspectives .- Chapter 23 : An Efficient Method for Evaluating the Two-terminal Reliability with A Parallel Algorithm on the Multicore Processor Architecture .- Chapter 24 :4-Port MIMO Dual Band Antenna System for 5G Sub-6 GHz and WLAN Communications .- Chapter 25 :A Secure Health Monitoring Model for Prediction of Heart Disease Detection using Machine Learning .- Chapter 26 :IoT Enabled Solar Powered Water Trash Collector with Conveyor Belt .- Chapter 27 :ECC-Based Hybrid Approach for Data Security for MANET .- Chapter 28 :5G RAN Anomaly Prediction using AI and ML .- Chapter 29 : An Intelligent Traffic Control System Incorporating Deep Learning and Computer Vision with Prioritized and Dynamic Timing .- Chapter 30 :Industrial Worker Safety Device with Proactive Gas Leak and Fire Protection System .- Chapter 31 : Exploring VANETs and their applications with Blockchain  .- Chapter 32 :Exploring ICT as a Catalyst for Technological Adoption: Insights from Action Research .- Chapter 33 : "TRICHOASSIST" Trichogram Hair and Scalp Feature Extraction and Analysis using Image Processing .- Chapter 34 :Performance Analysis for Trichoscopy and Trichogram using Deep Learning and Image Processing- A Survey .- Chapter 35 :Conversation Graph Construction Approach of Cyberbully Detection using Bully Scores .- Chapter 36 :Artificial Intelligence based L&E-Refiner for Blind Learners .- Chapter 37 :Security and Journalism: A Systematic Review .- Chapter 38 :Perspective Transform Based Lane Detection for Lane Keep Assistance .- Chapter 39 :Classification of Pneumonia from chest X-Ray Image Using Convolutional Neural Network .- Chapter 40 :Enhancing Network Security with Machine Learning-Based IDSs and IPSs: An Evaluation Using UNSW-NB15 Dataset