Skip to content
Scan a barcode
Scan
Paperback Proceedings of International Conference on ICT for Sustainable Development: Ict4sd 2015 Volume 2 Book

ISBN: 9811001332

ISBN13: 9789811001338

Proceedings of International Conference on ICT for Sustainable Development: Ict4sd 2015 Volume 2

Chapter 1. Implementing the Logical Security Framework for E-commerce Based on Service Oriented Architecture.- Chapter 2. Indian Sign Language Translator Using Kinect.- Chapter 3. Formal Transformation of UML Diagram: Use Case, Class, Sequence Diagram with Z Notation for Representing the Static & Dynamic Perspectives of System.- Chapter 4. A Survey of Android Malware Detection Strategy and Techniques.- Chapter 5. A Review on Dynamic View Selection.- Chapter 6. Software Project Estimation Using Fuzzy Inference System.- Chapter 7. Linear and Non Linear Modeling of Protein Kinase B/AkT.- Chapter 8. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks.- Chapter 9. Analysis of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation.- Chapter 10. Network Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN.- Chapter 11. Scheduling in Big Data Heterogeneous Distributed System Using Hadoop.- Chapter 12. A New Differential Scan-Based Side-Channel Attacks against RSA Cryptosystem.- Chapter 13. Grey Wolf Optimizer (GWO) algorithm for minimum weight planer frame design subjected to AISC-LRFD.- Chapter 14. Child Growth Mentor - A Proposed Model for Effective Use of Mobile Application for Better Growth of Child.- Chapter 15. Design & Development of a Rule Based Urdu Lemmatizer.- Chapter 16. Enhanced Microstrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless System Applications.- Chapter 17. An Enhanced Strategy to Minimize Makespan in Cloud Environment to Accelerate the Performance.- Chapter 18. Prefix Length Based Disjoint Set Tries For IPv6 Lookup.- Chapter 19. Implementation of FAST Clustering-based Feature Subset Selection Algorithm for High-Dimensional Data.- Chapter 20. Performance Comparison of 2D and 3D Zigbee Wireless Sensor Networks.- Chapter 21. Enhancement of Data Security by PMK Technique.- Chapter 22. Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining.- Chapter 23. Extended Bellman Ford Algorithm with Optimized Time of Computation.- Chapter 24. Supervised Link Prediction using Forecasting Models on Weighted Online Social Network.- Chapter 25. Dual Band Rectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN and WiMax Application.- Chapter 26. A Framework to Rank Nodes in Social Media Graph Based on Sentiment Related Parameters.- Chapter 27. Development of Analytical method to determine the deflection of tapered cantilever beam with inclined loading condition using software simulation.- Chapter 28. Bio-Inspired Ultra Low Power Design of comparator with Noise Compensation using Hysteresis technique designed for Biomedical Engineering (Pacemaker).- Chapter 29. Comparative Analysis of Different Architectures of MCML Square Root Carry Select Adders for Low Power Applications.- Chapter 30. Improvement in Quality of Extractive Text Summaries using Modified Reciprocal Ranking.- Chapter 31. A Novel Compact Monopole Multiband Antenna for WiMAX/Satellite/Military Applications.- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens.- Chapter 33. Information Communication Technologies for Research and Academic Development.- Chapter 34. An Insider Cyber Threat Prediction Mechanism based on Behavioral Analysis.- Chapter 35. Enhancing Amplifier characteristics using Quantum dots.- Chapter 36. An Approach to Secure Internet of Things against DDoS.- Chapter 37. Issues in Quantitative Association Rule Mining: A Big Data Perspective.- Chapter 38. A Framework for temporal information search and exploration.- Chapter 39. Item Amalgamation Approach for Serendipity

Recommended

Format: Paperback

Condition: New

$219.99
Ships within 2-3 days
Save to List

Customer Reviews

0 rating
Copyright © 2026 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured