000 03791nam a22005655i 4500
001 978-981-32-9343-4
003 DE-He213
005 20220801220022.0
007 cr nn 008mamaa
008 200103s2020 si | s |||| 0|eng d
020 _a9789813293434
_9978-981-32-9343-4
024 7 _a10.1007/978-981-32-9343-4
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aFourth International Congress on Information and Communication Technology
_h[electronic resource] :
_bICICT 2019, London, Volume 2 /
_cedited by Xin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXIV, 539 p. 233 illus., 142 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v1027
505 0 _aPESOHA: Privacy-preserving Evaluation System for Online Healthcare Applications -- Computer Vision and Hybrid Reality for Construction Safety Risks: a Pilot Study -- Data Reduction Using NMF for Outlier Detection Method in Wireless Sensor Networks -- Measuring Customer Satisfaction on Software Based Products: A Case study of ASAS-ERP Software at the University of Botswana -- To Develop a Water Quality Monitoring System for Aquaculture Areas Based on Agent Model -- Identifying Intrusions in Dynamic Environments using Semantic Trajectories and BIM for Worker Safety -- The ontological Approach in Organic Chemistry Intelligent System Development -- Effective way of Deriving the Context from a Handwritten Image/Object -- E-Voting System Based on Multiple Ballots Casting -- Against Malicious SSL/TLS Encryption: Identify.
520 _aThe second volume of this book includes selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, which was held at Brunel University, London, on February 27–28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers actively working in ICT, the book offers a valuable resource, especially for researchers who are newcomers to the field.
650 0 _aTelecommunication.
_910437
650 0 _aData mining.
_93907
650 0 _aData protection.
_97245
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData Mining and Knowledge Discovery.
_947870
650 2 4 _aData and Information Security.
_931990
700 1 _aYang, Xin-She.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947871
700 1 _aSherratt, Simon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947872
700 1 _aDey, Nilanjan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_916114
700 1 _aJoshi, Amit.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947873
710 2 _aSpringerLink (Online service)
_947874
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813293427
776 0 8 _iPrinted edition:
_z9789813293441
830 0 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v1027
_947875
856 4 0 _uhttps://doi.org/10.1007/978-981-32-9343-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78114
_d78114