menu
{ "item_title" : "ICT Analysis and Applications", "item_author" : [" Simon Fong", "Nilanjan Dey", "Amit Joshi "], "item_description" : "Chapter 1. Analysis of Codon-usage-bias in Cya, Lef and Pag genes exists in px01 plasmid of Bacillus anthracis.- Chapter 2. Constructing digital signature algorithm based on a new key scheme.- Chapter 3. Internet of Things (IoT), Three Layer Architecture, Security Issues and Counter Measures.- Chapter 4. Intermittent Leather Defect Detection based on Ensemble algorithms derived from Black Hat Transformation and Hough Transformation.- Chapter 5. Efficient Strategies to Manage Road Traffic using Big Data Analytics.- Chapter 6. Travel Booking and Management Application: TravelBel.- Chapter 7. Security and Privacy Issues in Internet of Things.- Chapter 8. Industry 4.0: An Overview and Further Research Directions.- Chapter 9. A Comprehensive Survey on Trust Management in Fog Computing.- Chapter 10. Personal Identification Using Fuzzy Approach and RSA Algorithm.- Chapter 11. ICT and Administrative Reforms: A literature review.- Chapter 12. Analysis of Fault Tolerance Techniques in Virtual Machine Environment.- Chapter 13. Analysis of Symmetric and Asymmetric Key Algorithms.- Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique.- Chapter 15. A Survey on Human Action Recognition and Detection Techniques.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/9/81/165/654/9811656541_b.jpg", "price_data" : { "retail_price" : "169.99", "online_price" : "169.99", "our_price" : "169.99", "club_price" : "169.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
ICT Analysis and Applications|Simon Fong

ICT Analysis and Applications

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Chapter 1. Analysis of Codon-usage-bias in Cya, Lef and Pag genes exists in px01 plasmid of Bacillus anthracis.- Chapter 2. Constructing digital signature algorithm based on a new key scheme.- Chapter 3. Internet of Things (IoT), Three Layer Architecture, Security Issues and Counter Measures.- Chapter 4. Intermittent Leather Defect Detection based on Ensemble algorithms derived from Black Hat Transformation and Hough Transformation.- Chapter 5. Efficient Strategies to Manage Road Traffic using Big Data Analytics.- Chapter 6. Travel Booking and Management Application: TravelBel.- Chapter 7. Security and Privacy Issues in Internet of Things.- Chapter 8. Industry 4.0: An Overview and Further Research Directions.- Chapter 9. A Comprehensive Survey on Trust Management in Fog Computing.- Chapter 10. Personal Identification Using Fuzzy Approach and RSA Algorithm.- Chapter 11. ICT and Administrative Reforms: A literature review.- Chapter 12. Analysis of Fault Tolerance Techniques in Virtual Machine Environment.- Chapter 13. Analysis of Symmetric and Asymmetric Key Algorithms.- Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique.- Chapter 15. A Survey on Human Action Recognition and Detection Techniques.

This item is Non-Returnable

Details

  • ISBN-13: 9789811656545
  • ISBN-10: 9811656541
  • Publisher: Springer
  • Publish Date: January 2022
  • Dimensions: 9.21 x 6.14 x 1.95 inches
  • Shipping Weight: 3 pounds
  • Page Count: 958

Related Categories

You May Also Like...

    1

BAM Customer Reviews