Computer Networks and Inventive Communication Technologies Proceedings of Third ICCNCT 2020

This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data communica...

Full description

Bibliographic Details
Other Authors: Smys, S. (Editor), Palanisamy, Ram (Editor), Rocha, Álvaro (Editor), Beligiannis, Grigorios N. (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2021, 2021
Edition:1st ed. 2021
Series:Lecture Notes on Data Engineering and Communications Technologies
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03889nmm a2200349 u 4500
001 EB001994401
003 EBX01000000000000001157303
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210702 ||| eng
020 |a 9789811596476 
100 1 |a Smys, S.  |e [editor] 
245 0 0 |a Computer Networks and Inventive Communication Technologies  |h Elektronische Ressource  |b Proceedings of Third ICCNCT 2020  |c edited by S. Smys, Ram Palanisamy, Álvaro Rocha, Grigorios N. Beligiannis 
250 |a 1st ed. 2021 
260 |a Singapore  |b Springer Nature Singapore  |c 2021, 2021 
300 |a XX, 1236 p. 658 illus., 480 illus. in color  |b online resource 
505 0 |a Analysis and Design Recommendations for Nepal Tourism Website based on user Perspective -- Packet Priority Scheduling for Data Delivery Based on Multipath Routing in Wireless Sensor Network -- Fall Prevention System for Workers Working on High Towers -- Optimization of Merge Hypothesis for Automatic Image Caption Generation -- Comparative Study of Machine Learning Techniques for Chronic Disease Prognosis -- Real-time Video Surveillance System for Detecting Malicious Actions and Weapons in Public Spaces -- Facial Expression Recognition System Using Different Methods -- Robot Navigation through QR and Text Detection -- Comparative Study of Cooling Solutions of a Drone Based on Raspberry Pi Deducing the Most Efficient Cooling Method -- Mechanism for Saving Base Stations Energy using Binary Particle Swarm Optimization -- Adaptive Frost Filtered Quantile Regressive Artificial Deep Structure Learning Framework for Image Quality Assessment -- Classification of In-House Managed Equipment by Listing its Parts -- Blockchain based Secure and Efficient Crowdsourcing Framework -- Attendance System Using Face Recognition for Academic Education -- A Comparative Study of Conventional Machine Learning and Deep Learning Models to Find Semantic Similarity -- Enhancement of Dehazing Methods using DNN and Filtering -- An Organized Study on Data Divulge Elimination and Discernment -- Study of Simulation Environment of Cloud Broker and Classification of cloud Service Broker -- Contactless Transaction Using Wearable Ring with Biometric Fingerprint Security Feature -- Hybridization of TrellisNet with CNN -- Perlustration on Mobile Forensics Tools 
653 |a Computer Communication Networks 
653 |a Artificial Intelligence 
653 |a Computer networks  
653 |a Artificial intelligence 
653 |a Telecommunication 
653 |a Communications Engineering, Networks 
700 1 |a Palanisamy, Ram  |e [editor] 
700 1 |a Rocha, Álvaro  |e [editor] 
700 1 |a Beligiannis, Grigorios N.  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes on Data Engineering and Communications Technologies 
856 4 0 |u https://doi.org/10.1007/978-981-15-9647-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.382 
520 |a This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area