ICT Analysis and Applications
Overview
Chapter 1. Analysis of Codon-usage-bias in Cya, Lef and Pag genes exists in px01 plasmid of Bacillus anthracis.- Chapter 2. Constructing digital signature algorithm based on a new key scheme.- Chapter 3. Internet of Things (IoT), Three Layer Architecture, Security Issues and Counter Measures.- Chapter 4. Intermittent Leather Defect Detection based on Ensemble algorithms derived from Black Hat Transformation and Hough Transformation.- Chapter 5. Efficient Strategies to Manage Road Traffic using Big Data Analytics.- Chapter 6. Travel Booking and Management Application: TravelBel.- Chapter 7. Security and Privacy Issues in Internet of Things.- Chapter 8. Industry 4.0: An Overview and Further Research Directions.- Chapter 9. A Comprehensive Survey on Trust Management in Fog Computing.- Chapter 10. Personal Identification Using Fuzzy Approach and RSA Algorithm.- Chapter 11. ICT and Administrative Reforms: A literature review.- Chapter 12. Analysis of Fault Tolerance Techniques in Virtual Machine Environment.- Chapter 13. Analysis of Symmetric and Asymmetric Key Algorithms.- Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique.- Chapter 15. A Survey on Human Action Recognition and Detection Techniques.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9789811656545
- ISBN-10: 9811656541
- Publisher: Springer
- Publish Date: January 2022
- Dimensions: 9.21 x 6.14 x 1.95 inches
- Shipping Weight: 3 pounds
- Page Count: 958
Related Categories
