You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the International Conference on Advances in Information Technology and Mobile Communication, AIM 2011, held at Nagpur, India, in April 2011. The 31 revised full papers presented together with 27 short papers and 34 poster papers were carefully reviewed and selected from 313 submissions. The papers cover all current issues in theory, practices, and applications of Information Technology, Computer and Mobile Communication Technology and related topics.
This two-volume set (CCIS 1393 and CCIS 1394) constitutes selected and revised papers of the 4th International Conference on Advanced Informatics for Computing Research, ICAICR 2020, held in Gurugram, India, in December 2020. The 34 revised full papers and 51 short papers presented were carefully reviewed and selected from 306 submissions. The papers are organized in topical sections on computing methodologies; hardware; networks; security and privacy.
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
This book presents the select proceedings of the International Conference on Automation, Signal Processing, Instrumentation and Control (i-CASIC) 2020. The book mainly focuses on emerging technologies in electrical systems, IoT-based instrumentation, advanced industrial automation, and advanced image and signal processing. It also includes studies on the analysis, design and implementation of instrumentation systems, and high-accuracy and energy-efficient controllers. The contents of this book will be useful for beginners, researchers as well as professionals interested in instrumentation and control, and other allied fields.
This book constitutes the proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2013, held in Tamil Nadu, India on December 2013. The 82 papers presented were carefully reviewed and selected from 334 submissions. The papers cover the topics such as feature selection, classification, clustering, image processing, network security, speech processing, machine learning, information retrieval, recommender systems, natural language processing, language, cognition and computation and other certain problems in dynamical systems.
This book highlights a collection of high-quality peer-reviewed research papers presented at the 7th International Conference on Information System Design and Intelligent Applications (INDIA 2022), held at BVRIT Hyderabad College of Engineering for Women, Hyderabad, Telangana, India, from February 25–26, 2022. It covers a wide range of topics in computer science and information technology, from wireless networks, social networks, wireless sensor networks, information and network security, to web security, Internet of Things, bioinformatics, geoinformatics, and computer networks.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 70 revised full papers presented in this volume were carefullyreviewed and selected from numerous submissions and address all major fields ofthe Computer Science and Information Technology in theoretical, methodological,and practical or applicative aspects. The papers feature cutting-edge developmentand current research in computer science and engineering.
This book presents the proceedings of the 7th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2018), held at Duy Tan University, Da Nang, Vietnam. The event brought together researchers, scientists, engineers, and practitioners to exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines. These proceedings are divided into two volumes. Covering broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols and architectures, this volume is a valuable resource for postgraduate students in various engineering disciplines.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.