Information and Communication Technology for Competitive Strategies (ICTCS 2020) ICT: Applications and Social Interfaces

This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India, during 11–12 December 2020. The book covers state-of-the-art as we...

Full description

Bibliographic Details
Other Authors: Joshi, Amit (Editor), Mahmud, Mufti (Editor), Ragel, Roshan G. (Editor), Thakur, Nileshsingh V. (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2022, 2022
Edition:1st ed. 2022
Series:Lecture Notes in Networks and Systems
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03608nmm a2200421 u 4500
001 EB002007696
003 EBX01000000000000001170596
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220104 ||| eng
020 |a 9789811607394 
100 1 |a Joshi, Amit  |e [editor] 
245 0 0 |a Information and Communication Technology for Competitive Strategies (ICTCS 2020)  |h Elektronische Ressource  |b ICT: Applications and Social Interfaces  |c edited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel, Nileshsingh V. Thakur 
250 |a 1st ed. 2022 
260 |a Singapore  |b Springer Nature Singapore  |c 2022, 2022 
300 |a XXXIV, 1156 p. 596 illus., 440 illus. in color  |b online resource 
505 0 |a Chapter 1. A Bio-inspired Based Degree Constrained MST Algorithm for Cognitive Radio Networks -- Chapter 2. Faceless, Cashless & Paperless Scheme for Farmer?- Implementation of Mukhya Mantri Krishi Ashirvard Yojana (MMKAY) in the State of Jharkhand through ICT: A Case Study -- Chapter 3. Extraction of Clean Speech Along with 2 Emphasis on Essential Noise -- Chapter 4. A model-based System for Intrusion Detection using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network -- Chapter 5. Analysis of academic performance based on hierarchical clusters: First notes -- Chapter 6. Application of hierarchical clusters to obtain legal reference structures -- Chapter 7. COVID-19 Cases - Deaths: First approach to the Ecuadorian Instance -- Chapter 8. Traffic Rules Violation Detection System -- Chapter 9. Effectiveness of Online Shopping Advantages of Healthy Food Products on Consumer Buying Behaviour -- Chapter 10. Robots and Artificial Intelligence: An aid to dependent people -- Chapter 11. Predicting Performance of Students Considering Individual Feedback at Online Learning using Logistic Regression Model -- Chapter 12. Survey of NLP Resources in Low Resource Languages Nepali, Sindhi and Konkani -- Chapter 13. Cyber-Physical System – An Architectural Review -- Chapter 14. ICT Based Intelligent Control of a Bio-gas Plant -- Chapter 15. Machine Learning Techniques for Music Genre Classification 
653 |a Information and Communication Technologies (ICT) 
653 |a Computational intelligence 
653 |a Artificial Intelligence 
653 |a Application software 
653 |a Computational Intelligence 
653 |a Telecommunication 
653 |a Artificial intelligence 
653 |a Communications Engineering, Networks 
653 |a Computer and Information Systems Applications 
653 |a Technology / Sociological aspects 
653 |a Information technology 
700 1 |a Mahmud, Mufti  |e [editor] 
700 1 |a Ragel, Roshan G.  |e [editor] 
700 1 |a Thakur, Nileshsingh V.  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Networks and Systems 
028 5 0 |a 10.1007/978-981-16-0739-4 
856 4 0 |u https://doi.org/10.1007/978-981-16-0739-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India, during 11–12 December 2020. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics, and IT security.