You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the technical contents of the topics.
This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
Print Edition is released by District Governor Lion C Balaswamy in August. This digital edition is to save paper and save trees. It also enables portability
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the co...
This book includes original, unpublished contributions presented at the Sixth International Conference on Emerging Applications of Information Technology (EAIT 2020), held at the University of Kalyani, Kalyani, West Bengal, India, on November 2020. The book covers the topics such as image processing, computer vision, pattern recognition, machine learning, data mining, big data and analytics, information security and privacy, wireless and sensor networks, and IoT. It will also include IoT application-related papers in pattern recognition, artificial intelligence, expert systems, natural language understanding, image processing, computer vision, applications in biomedical engineering, artificial neural networks, fuzzy logic, evolutionary optimization, data mining, Web intelligence, intelligent agent technology, virtual reality, and visualization.
Print Edition of the Lions District 324A5 Directory was released by the District Governor MJF Lion Dr Johnny in September. This Digital Edition is replica of the book, for reading in the Mobiles and E Devices.
Lions District 324B1, Printed Directory was released by District Governor PMJF Lion R N Karunanithi, in December 2020. It contains information on Lions Clubs International, Lion Leaders in India, DG Teams, Cabinet Officials, Region & Zone Chairpersons, District Chairpersons, Club Officials and Lion Members. This Digital edition is a replica of the printed edition, to enable portability of information through the Smart Mobile Phones, the Lions Carry.
[Gek. Pb-Ausg. u.d.T. Aging and Generational Relations]