Applications of Computing and Communication Technologies First International Conference, ICACCT 2018, Delhi, India, March 9, 2018, Revised Selected Papers
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are...
Saved in:
Main Authors | , , , |
---|---|
Format | eBook |
Language | English |
Published |
Netherlands
Springer Nature
2018
Springer |
Edition | 1 |
Series | Communications in computer and information science |
Subjects | |
Online Access | Get full text |
ISBN | 9811320357 9789811320354 9811320349 9789811320347 |
Cover
Loading…
Abstract | This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services. |
---|---|
AbstractList | This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services. |
Author | Rathee, Priyanka Kaiwartya, Omprakash Vashisth, Pooja Deka, Ganesh Chandra |
Author_xml | – sequence: 1 fullname: Deka, Ganesh Chandra – sequence: 2 fullname: Kaiwartya, Omprakash – sequence: 3 fullname: Vashisth, Pooja – sequence: 4 fullname: Rathee, Priyanka |
BookMark | eNpNz19LwzAUBfCIf9DNfYfii_gwSHqTJnmcZVNh4Mt8LrfdbVeXJXXp9Otb3RCfLofz48AdsQsfPJ2xkTVCQMpB6fP_4YqNBFdCGKuFumaTGN855yk3NuPyhplZ17m2wr4NPiahTvKw6w5965sE_fon7Q7-1CcrqjY-uNC0FG_ZZY0u0uR0x-xtMV_lz9Pl69NLPltOUWSpllNrQApbgjCQAoJEsrWUGk1JmsDoqq6VUFKVBGTRGNQ1lbqyaxQceQZj9nDcxbilr7gJro_Fp6MyhG0srDZ_r8rB3h9ttw8fB4p98csq8v0eXTF_zDPgwK0a5N1RVhjRtb4tdsGHZo_dJhZqmDIZwDe2mWM1 |
ContentType | eBook |
DBID | I4C |
DEWEY | 005 |
DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9811320357 9789811320354 |
Edition | 1 1st Edition 2018 |
Editor | Rathee, Priyanka Kaiwartya, Omprakash Vashisth, Pooja Deka, Ganesh Chandra |
Editor_xml | – sequence: 1 fullname: Deka, Ganesh Chandra – sequence: 2 fullname: Kaiwartya, Omprakash – sequence: 3 fullname: Rathee, Priyanka – sequence: 4 fullname: Vashisth, Pooja |
ExternalDocumentID | 9789811320354 EBC6303095 5543863 |
GroupedDBID | 0D6 0DA 38. 9-X AABBV ACOUV AEJLV AEKFX AEZAY ALMA_UNASSIGNED_HOLDINGS ANXHU BBABE BICGV BJAWL BUBNW CVGDX CZZ FOYMO I4C IEZ NQNQZ OEBZI SBO SNUHX TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 Z82 |
ID | FETCH-LOGICAL-a16274-983419b318323a34ae9f447a8be7e387cff51545be3e9a88a7feb7c9da10a063 |
ISBN | 9811320357 9789811320354 9811320349 9789811320347 |
IngestDate | Fri Nov 08 04:01:14 EST 2024 Fri May 30 21:35:30 EDT 2025 Wed Apr 23 04:09:07 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | Q |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a16274-983419b318323a34ae9f447a8be7e387cff51545be3e9a88a7feb7c9da10a063 |
OCLC | 1051189715 |
PQID | EBC6303095 |
PageCount | 372 |
ParticipantIDs | askewsholts_vlebooks_9789811320354 proquest_ebookcentral_EBC6303095 casalini_monographs_5543863 |
PublicationCentury | 2000 |
PublicationDate | 2018 2018-08-29 |
PublicationDateYYYYMMDD | 2018-01-01 2018-08-29 |
PublicationDate_xml | – year: 2018 text: 2018 |
PublicationDecade | 2010 |
PublicationPlace | Netherlands |
PublicationPlace_xml | – name: Netherlands – name: Singapore |
PublicationSeriesTitle | Communications in computer and information science |
PublicationYear | 2018 |
Publisher | Springer Nature Springer |
Publisher_xml | – name: Springer Nature – name: Springer |
SSID | ssj0002089604 |
Score | 2.0751169 |
Snippet | This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies,... |
SourceID | askewsholts proquest casalini |
SourceType | Aggregation Database Publisher |
SubjectTerms | Computer programming, programs, data Computer science-Congresses |
Subtitle | First International Conference, ICACCT 2018, Delhi, India, March 9, 2018, Revised Selected Papers |
TableOfContents | 4.1 Pre-launch Features 3.1 Route Availability Period -- 3.2 Residual Route Load Capacity -- 3.3 Joint Metric -- 3.4 Optimal Route Selection -- 3.5 BADF Broadcasting Optimization Scheme -- 4 Experimental Results and Discussion -- 4.1 Simulation Environment -- 4.2 Experimental Results (with Same Weight Factors) -- 4.3 Experimental Results (with Different Weight Factors) -- 5 Conclusion and Future Work -- References -- An Efficient Best Fit Channel Switching (BFCS) Scheme for Cognitive Radio Networks -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Assumptions -- 3.2 Proposed Best Fit Channel Switching (BFCS) -- 3.3 Algorithm -- 3.4 Flow Chart -- 4 Results and Analysis -- 4.1 List of Parameters -- 4.2 Results -- 5 Comparative Study of BFCS, SCS and RCS -- 6 Conclusion -- References -- Coarse-Grain Localization in Underwater Acoustic Wireless Sensor Networks -- 1 Introduction -- 2 Releted Work -- 3 Proposed Scheme -- 3.1 Location Estimation -- 4 Performance Evaluation -- 5 Conclusion -- References -- Content Credibility Check on Twitter -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Survey Results and Employed Concepts -- 3.1 Survey -- 3.2 Concepts Employed -- 3.2.1 Knowledge Graphs -- 3.2.2 String Matching -- 3.2.3 Streaming API -- 4 Features Used by the Credibility Model -- 5 Proposed Model (CCC) -- 5.1 First Dimension -- 5.2 Second Dimension -- 5.3 Third Dimension -- 6 Limitations of Proposed Model and Future Scope -- 7 Conclusion -- References -- Transmission Line Sag Calculation with Ampacities of Different Conductors -- Abstract -- 1 Introduction -- 2 Case Studies and Problem Formulation -- 2.1 Case 1: Sag Calculation Without Any Load for Supports at the Different Level at Given Span -- 2.2 Case 2: Sag Calculation Under the Ice and Wind Load, with the Given Wind Pressure -- 3 Results Comparison Between Different Conductors 3.2 SPCRP Architecture -- 3.2.1 System Setup -- 3.2.2 Phases in Encounters -- 4 Experimental Results and Discussion -- 5 Conclusions -- Acknowledgement -- References -- Energy Efficient Transmission in the Presence of Interference for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Energy Efficient Interference Reduction -- 3.1 Network Model -- 3.2 Energy Model -- 3.3 Interference Reduction Algorithm -- 4 Results and Discussion -- 4.1 Simulation Environment Setting -- 4.2 Results and Analysis -- 5 Conclusion -- References -- Capturing User Preferences Through Interactive Visualization to Improve Recommendations -- Abstract -- 1 Introduction -- 2 Related Work in Interactive Visual Interfaces in Recommender Systems -- 3 Personalized V & -- I Interface for Recommender Systems -- 4 User Evaluation and Feedback: Experimental Results -- 5 Conclusion -- References -- Item-Based Collaborative Filtering Using Sentiment Analysis of User Reviews -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Sentiment Analysis -- 3.1.1 Data Collection -- 3.1.2 Pre-processing -- 3.1.3 Bag of Words -- 3.1.4 Frequency Measurement -- 3.1.5 Training and Prediction -- 3.2 Sentiment Database -- 3.3 Recommender System -- 4 Result -- 5 Conclusion -- References -- Emotion Analysis of Twitter Data Using Hashtag Emotions -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Tweets Extraction for Emotion Analysis -- 3.2 Extracting Emotion Lexicons Using Hashtaged Tweets -- 3.3 Emotion Analysis from Sentiment Analysis -- 4 Result Representation -- 4.1 Line Graph Representation of Emotion Analysis -- 4.2 Algorithm and Code for Emotion Analysis -- 4.3 Comparison Cloud Representation -- 5 Conclusion -- References -- Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud -- Abstract -- 1 Introduction 3.1 Comparison Between ACCR and ACSR -- 3.2 Comparison Between ACSS and ACSR -- 3.3 Comparison Between ACSS and ACCR -- 3.4 Comparison Between ACSR and Other Conductors -- 4 Conclusions -- References -- Fuzzy-Kohonen Self-organizing Clustering Algorithm in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 System and Energy Model -- 4 Fuzzy Kohonen Self-organizing Clustering Protocol (FKSOCP) -- 4.1 Cluster Formation Phase -- 4.2 Learning Algorithm -- 4.3 Cluster Binding and Transmission Phase -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Scope -- References -- IEEE 802.11 Based Heterogeneous Networking: An Experimental Study -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Design of Experiment -- 4 Results -- 4.1 Averages -- 4.2 Efficiency of Protocols -- 4.2.1 TCP and UDP Efficiency -- 5 Conclusion -- References -- A Load-Aware Matching Game for Node Association in Wireless Ad-Hoc Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 Proposed Solution: Node Association as a Matching Game -- 4.1 Context-Based Preferences -- 4.2 Stability -- 4.3 Incentive -- 5 Results and Discussion -- 5.1 Analytical Results -- 5.2 Simulation -- 6 Conclusion -- References -- Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 System Model and the Terminologies Used -- 5 Proposed Algorithm -- 5.1 Overview of BBO -- 5.2 Implementation of BBO -- 5.3 Calculation of HSI -- 5.4 Migration -- 5.4.1 MPX Crossover -- 5.5 Mutation -- 6 Results -- 7 Conclusion -- References -- Application and Services -- Investigation of Parameters Influencing the Success of Crowdfunded Campaigns -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Analysis Intro -- Preface -- Organization -- Contents -- Communication and System Technologies -- Trending Pattern Analysis of Twitter Using Spark Streaming -- Abstract -- 1 Introduction -- 2 Problem Definition -- 3 Proposed System -- 3.1 Twitter Streaming APIs -- 4 Methodology Adopted -- 4.1 Creating a Spark Streaming Context Object -- 4.2 Creating a DStream -- 4.3 Filtering the Hashtags -- 4.4 Computing Popular Hashtags Using Window Interval -- 4.5 Simulation Performed -- 4.6 Pattern or Trend Recognition on Twitter -- 4.7 Results -- 5 Conclusion -- Acknowledgments -- References -- NPCCPM: An Improved Approach Towards Community Detection in Online Social Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Results -- 6 Conclusion and Future Work -- References -- Financial Time Series Forecasting Using Deep Learning Network -- 1 Introduction -- 2 Brief Theories About ELM and Auto-Encoder -- 2.1 Extreme Learning Machine -- 2.2 Auto-Encoder -- 3 Proposed Methodology -- 4 Experimental Design -- 4.1 Datasets Description -- 4.2 Data Pre-Processing -- 4.3 Performance Measures Used -- 5 Results and Discussion -- 5.1 Gold Price(USD) -- 5.2 Crude-Oil Price(USD) -- 6 Conclusion -- References -- MapReduce Based Analysis of Sample Applications Using Hadoop -- Abstract -- 1 Introduction -- 2 Problems Overcome by Hadoop -- 3 Contribution -- 4 Implementation Details and Results -- 4.1 First Objective -- 4.1.1 Setup -- 4.1.2 Applications -- 4.1.3 Results -- 4.2 Second Objective -- 4.2.1 Setup -- 4.2.2 Results -- 5 Comparative Study of Single Node and Multi-node Cluster -- 5.1 String Matching -- 5.2 Word Frequency Count -- 6 Conclusion -- Acknowledgement -- References -- End-to-End Security in Delay Tolerant Mobile Social Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 SPCRP -- 3.1 Mathematical Background 2 Related Work -- 3 Core Design -- 3.1 Data Leakage Detection -- 3.1.1 Leakage of the Active Bundle -- 3.1.2 Leakage of Plaintext Data -- 3.1.3 Proposed Work -- 3.2 Data Leakage Damage Evaluation -- 4 Evaluation -- 5 Conclusion -- Acknowledgments -- References -- Computing and Network Technologies -- Call Admission Control Scheme for Cellular Wireless Network Using Queueing Model -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Assumption and Mathematical Description of Model -- 4 Proposed Algorithm -- 5 Sensitivity Analysis -- 6 Conclusion -- References -- On Scalability of Interconnection Network Topologies -- Abstract -- 1 Introduction -- 2 Comparison of Topological Properties of the Various Networks -- 3 Comparison of Isoefficiency for the Proposed Networks -- 4 Results -- 5 Conclusions -- References -- Minimizing Route Coupling Effect in Multipath Video Streaming Over Vehicular Network -- Abstract -- 1 Introduction -- 2 The Related Work -- 2.1 Multipath Video Streaming Solution -- 2.2 Geographic Routing for Vehicular Network -- 3 The Proposed Work -- 3.1 Angle of Multipath -- 3.2 Probabilistic Analysis of One or More Vehicles Nodes in a Circular Transmission Coverage Forming ... -- 3.3 Impact of Shadowing on the Probabilistic Analysis of the Presence of One or More Vehicles in an ... -- 4 Analytical Results -- 5 Conclusion -- Acknowledgements -- References -- Wireless EEG Signal Transmission Using Visible Light Optical Camera Communication -- Abstract -- 1 Introduction -- 2 Visible Light Optical Camera Communication (VL-OCC) System -- 3 Experiments and Results Analysis -- 3.1 Experimental Setup and Hardware -- 3.2 Result and Discussion -- 4 Conclusion -- References -- Aeronautical Assisted IoT Implementation: Route Lifetime and Load Capacity Perspective -- Abstract -- 1 Introduction -- 2 Related Literatures -- 3 Proposed QSRP |
Title | Applications of Computing and Communication Technologies |
URI | http://digital.casalini.it/9789811320354 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6303095 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9789811320354 |
Volume | 899 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwEB5BuSwXHruI8lK04ppVE9uJc-RRQLCw0goQt2jc2gIKLWoKCH49Y-fZ7kqr5WIllpPDfNb489jfDMCuCsNAh7rvcy7Q57QG-ok02udGYGACicLFO84vopMrfnojbur0Ak5dMlE_eu9_1ZV8BlXqI1ytSvY_kK1-Sh30TPhSSwhTO0N-q9fianHj2NldqHC1GUq94ZToow6eN64LHuqBI43HSJ7u1kkM-uPKQZ_h3SvNqDc35Nfj0xgHmFVh42tbfikrwjGj0X312W9LJnPN2PjuDYcDbIYUAjkTUihDilNbzUTamvQdlufHLH2nzKsbzaSs7u4fRMye3Yh5mI9j2YKFve7pz-sq-BV2pE0KkydAqv9Mu-bqhSj_ImYD8vS0CkwySxswQ6sW_WPVdFTgchkWtNWHrMCcHq7CUlkVwyuc5CosNlI8fgXZhMobGa-CyiObe1NQeU2ovsHVUffy4MQvqlX4GNgCRjTHbW485ZwkQ8ZRJ4bzGKXSsWYy7hkjLGFVmukEpcTYaBX3kj4GHSSmuAat4Wio18Ej2s2klLRTVZorxhKypQlFP4rJ3_Yi0YbvDdOkLw_uYD1LG8YUvA2bpcVSmvd5AvQsJfrIZMTa4JVGTN3XxV3gtMZu499DNuFLPX-2oDUZP-ttImkTtVNA_gGhdD7Z |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Applications+of+Computing+and+Communication+Technologies&rft.au=Deka%2C+Ganesh+Chandra&rft.au=Kaiwartya%2C+Omprakash&rft.au=Vashisth%2C+Pooja&rft.au=Rathee%2C+Priyanka&rft.date=2018-01-01&rft.pub=Springer&rft.isbn=9789811320347&rft.volume=899&rft.externalDocID=EBC6303095 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97898113%2F9789811320354.jpg |