000776931 000__ 05243cam\a2200529Ii\4500 000776931 001__ 776931 000776931 005__ 20230306142550.0 000776931 006__ m\\\\\o\\d\\\\\\\\ 000776931 007__ cr\nn\nnnunnun 000776931 008__ 160705s2016\\\\sz\\\\\\o\\\\\100\0\eng\d 000776931 019__ $$a949883610 000776931 020__ $$a9783319309330$$q(electronic book) 000776931 020__ $$a3319309331$$q(electronic book) 000776931 020__ $$z9783319309323 000776931 035__ $$aSP(OCoLC)ocn953030001 000776931 035__ $$aSP(OCoLC)953030001$$z(OCoLC)949883610 000776931 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dIDEBK$$dOCLCO$$dEBLCP$$dOCLCO$$dN$T$$dOCLCO$$dYDXCP$$dOCLCF$$dOCLCO$$dUAB$$dIOG 000776931 049__ $$aISEA 000776931 050_4 $$aTK5105.5 000776931 08204 $$a004.6$$223 000776931 1112_ $$aInternational Conference on Information and Communication Technology for Intelligent Systems$$n(1st :$$d2015 :$$cAhmadābād, India) 000776931 24510 $$aProceedings of first International Conference on Information and Communication Technology for Intelligent Systems.$$nVolume 1 /$$cSuresh Chandra Satapathy, Swagatam Das, editors. 000776931 264_1 $$aSwitzerland :$$bSpringer,$$c2016. 000776931 300__ $$a1 online resource. 000776931 336__ $$atext$$btxt$$2rdacontent 000776931 337__ $$acomputer$$bc$$2rdamedia 000776931 338__ $$aonline resource$$bcr$$2rdacarrier 000776931 4901_ $$aSmart innovation, systems and technologies ;$$vvolume 50 000776931 500__ $$aInternational conference proceedings. 000776931 5050_ $$aPreface; Conference Committee; Patrons; General Chairs; Advisory Committee; Organising Committee; Members; Technical Program Committee; Members; CSI Apex Committee; Conference Track Managers; Contents; Part I Intelligent Information Retrieval and Business Intelligence; 1 RC6 Based Data Security and Attack Detection; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Methodology; 4 Results; 5 Conclusions; References; 2 Application Mapping Methodology for Reconfigurable Architecture; Abstract; 1 Introduction; 2 Methodology; 3 Simulation Result and Conclusion; References 000776931 5058_ $$a3 Circular Quad-Octagon Bits: Stepwise Image Cubic Spread Authentication AnalysisAbstract; 1 Introduction; 2 Texture Classification; 3 Quad-Octagon Bits Selection; 4 The Effect of Image Cubic Spread; 5 Image Authentication Analysis; 5.1 Embedding Algorithm; 5.2 Watermark Detection; 6 Experimental Results and Discussions; 7 Conclusions; References; 4 Towards the Next Generation of Web of Things: A Survey on Semantic Web of Things' Framework; Abstract; 1 Introduction; 2 Issues and Challenges in Internet of Things (IoT); 2.1 Heterogeneity and Scalability [5]; 2.2 Security and Privacy [5] 000776931 5058_ $$a2.3 Search and Discovery [5]3 SWoT Framework Based on Ubiquitous Knowledge Base; 4 A CoAP Based Framework for Resource Annotation, Dissemination and Discovery; 4.1 Semantic Enhanced CoAP and CoRE Link Format; 4.2 Sensory Data Annotation; 4.3 Resource Discovery via Concept Covering; 5 The Semantic Smart Gateway Framework; 5.1 IoT Ontology; 5.2 On the Fly Ontology Learning; 5.3 On the Fly Ontology Alignment; 6 Conclusion; References; 5 Performance Analysis of Dynamic Addressing Scheme with DSR, DSDV and ZRP Routing Protocols in Wireless Ad Hoc Networks; Abstract; 1 Introduction; 2 Related Work 000776931 5058_ $$a3 Description of Protocols3.1 Tree Based Variable Length Addressing Scheme; 3.2 Destination Sequenced Distance Vector Routing Protocol (DSDV) [11]; 3.3 Dynamic Source Routing Protocol (DSR) [12]; 3.4 Zone Routing Protocol (ZRP) [13]; 4 Simulation; 4.1 Addressing Performance; 4.1.1 Cost; 4.1.2 Latency; 4.2 Merging Performance; 4.2.1 Cost; 4.2.2 Latency; 5 Conclusion; References; 6 EncryptPost: A Framework for User Privacy on Social Networking Sites; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Proposed Algorithm; 4 Experimental Result and Analysis; 4.1 Case 1; 4.2 Case 2 000776931 5058_ $$a4.3 Case 34.4 Case 4; 5 Conclusion; References; 7 Green Routing Algorithm for Wireless Networks; Abstract; 1 Introduction; 2 Related Work; 3 Green Routing Algorithm; 3.1 Parameters of the Algorithm; 3.2 GR Algorithm; 3.3 Example; 3.4 Analysis of the GR Algorithm; 4 Conclusion; References; 8 Decision Theoretic Rough Intuitionistic Fuzzy C-Means Algorithm; Abstract; 1 Introduction; 2 Definitions and Notations; 2.1 The Uncertainty Based Models; 2.2 Decision Theoretic Rough Sets (DTRS); 3 Algorithms; 3.1 DTRIFCM; 4 Experimental Results; 4.1 Quantitative Measures; 4.2 Performance Comparison 000776931 506__ $$aAccess limited to authorized users. 000776931 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 7, 2016). 000776931 650_0 $$aComputer networks$$vCongresses. 000776931 650_0 $$aInformation technology$$vCongresses. 000776931 650_0 $$aArtificial intelligence$$vCongresses. 000776931 7001_ $$aSatapathy, Suresh Chandra,$$d1964-$$eeditor. 000776931 7001_ $$aDas, Swagatam,$$eeditor. 000776931 77608 $$iPrint version:$$aSatapathy, Suresh Chandra$$tProceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1$$dCham : Springer International Publishing,c2016$$z9783319309323 000776931 830_0 $$aSmart innovation, systems, and technologies ;$$vv. 50. 000776931 852__ $$bebk 000776931 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-30933-0$$zOnline Access$$91397441.1 000776931 909CO $$ooai:library.usi.edu:776931$$pGLOBAL_SET 000776931 980__ $$aEBOOK 000776931 980__ $$aBIB 000776931 982__ $$aEbook 000776931 983__ $$aOnline 000776931 994__ $$a92$$bISE