Information, communication and computing technology : third International Conference, ICICCT 2018, New Delhi, India, May 12, 2018, Revised selected papers /

Saved in:
Bibliographic Details
Meeting name:International Conference on Information, Communication and Computing Technology (3rd : 2018 : New Delhi, India)
Imprint:Singapore : Springer, 2019.
Description:1 online resource (xii, 223 pages) : illustrations (some color)
Language:English
Series:Communications in computer and information science, 1865-0929 ; 835
Communications in computer and information science ; 835.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11781304
Hidden Bibliographic Details
Varying Form of Title:ICICCT 2018
Other authors / contributors:Minz, S. (Sonajharia), editor.
Karmakar, Sushanta, editor.
Kharb, Latika, editor.
ISBN:9789811359927
981135992X
9789811359910
9811359911
Digital file characteristics:text file PDF
Notes:Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed January 29, 2019).
Summary:This book constitutes the refereed proceedings of the Third International Conference on Information, Communication and Computing Technology, ICICCT 2018, held in New Delhi, India, in May 2018. The 18 revised full papers presented in this volume were carefully reviewed and selected from 295 submissions. The papers are organized in topical sections on communication and network systems and emerging computing technologies.
Other form:Printed edition: 9789811359910
Printed edition: 9789811359934
Standard no.:10.1007/978-981-13-5992-7
Table of Contents:
  • Intro; Preface; Organization; Contents; Communication and Network Systems; C-Void: Communication Void Avoidance Protocol for Wireless Sensor Networks; Abstract; 1 Introduction; 2 Literature Survey; 3 Background; 4 Problem Statement; 5 Mathematical Model; 5.1 Neighbours Candidate Set Selection; 5.2 Forwarder Set Construction; 6 Proposed Algorithm: C-Void Avoidance Algorithm; 7 Performance Analysis; 8 Conclusions; Acknowledgments; References; Traffic Management and Security in Wired Network; Abstract; 1 Introduction; 2 Practices to Secure a Corporate Network; 2.1 Security via Private VLAN's
  • 2.2 Implementation of ACL's2.3 Secure Shell (SSH) Protection; 2.4 Port-Security; 3 Result Analysis; 4 Conclusion; References; An Improved Driver Assistance System for Detection of Lane Departure Under Urban and Highway Driving Conditions; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Method; 3.1 Image Pre-processing; 3.2 Edge Detection; 3.3 Strong Edges Selection; 3.4 Hough Transform; 3.5 Lane Departure Warning System (LDWS); 4 Experimental Results; 5 Conclusion; References; Quality of Service in Dynamic Resource Provisioning: Literature Review; Abstract; 1 Introduction
  • 2 Dynamic Provisioning Framework3 Soft Computing Based Resource Provisioning; 4 Discussion; References; Using a Concept Map Network Based Constructivist Learning Environment to Design a Learning System; Abstract; 1 Introduction; 1.1 Problem-Based Learning (PBL); 1.2 Constructivist Learning Environments; 1.3 Concept Maps; 2 Designing a Concept Map Based CLE; 2.1 Pedagogical Considerations; 2.2 Social Considerations; 2.3 Principles of Constructivism; 3 The Tool; 3.1 Designing Learning Component; 3.2 Designing Assessment Component; 4 Implementation and Evaluation; 5 Limitations; 6 Conclusion
  • 3 Model Formulation4 Results and Discussions; 5 Conclusion; 6 Future Work; References; Optimized Power Allocation in Selective Decode and Forward Cooperative Wireless Relay Communication with MIMO Nodes; Abstract; 1 Introduction; 2 System Model; 2.1 Selective DF Transmission; 2.2 SER Analysis; 2.3 Optimal Power Allocation; 3 Results and Discussion; 4 Conclusion; References; Emerging Computing Technologies; Exudate Detection in Fundus Images: Multispace Clustering Approach; Abstract; 1 Introduction; 2 Database Description; 3 Literature Review; 4 Materials and Methods