Coverart for item
The Resource Third International Congress on Information and Communication Technology : ICICT 2018, London

Third International Congress on Information and Communication Technology : ICICT 2018, London

Label
Third International Congress on Information and Communication Technology : ICICT 2018, London
Title
Third International Congress on Information and Communication Technology
Title remainder
ICICT 2018, London
Contributor
Editor
Subject
Genre
Language
eng
Member of
Cataloging source
EBLCP
Dewey number
004.6
Index
no index present
LC call number
TK1-9971QA76.9.D343Q
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Yang, Xin-She
  • Sherratt, Simon
  • Dey, Nilanjan
  • Joshi, Amit
Series statement
Advances in Intelligent Systems and Computing Ser.
Series volume
v. 797
http://library.link/vocab/subjectName
  • Information technology
  • Computer networks
  • Internet of things
Label
Third International Congress on Information and Communication Technology : ICICT 2018, London
Instantiates
Publication
Note
6 Conclusion
Bibliography note
ReferencesInformation Privacy Violations in Ephemeral Communications; 1 Modern Privacy: It Is All About Context; 2 Social Networks Privacy Concerns (Threats-Damage) ; 3 Smile, Snap, Share Once, and Delete! Snapchat: An Overview; 4 Theory of Contextual Integrity; 5 Importance of Privacy by Design; 6 Snapchat: Replay: What Went Wrong?; 7 Walking the Fine Line Between Behavioral Advertisement and Privacy: Third-Party Apps; 8 Click "Agree" to Continue: Disowning One's Online Life; 9 Conclusion; References
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; About the Editors; Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems; 1 Introduction; 2 Standardisation in IoT; 3 Towards a Road map for Secure CPS Integration; 3.1 Results and Discussion; 4 Conclusion; 5 Appendix; References; Cure for Health Care? Using Drone Technology in Hospital Processes-An Explorative Analysis; 1 Introduction; 2 Problem Statement; 3 Research Approach and Study Design; 4 Findings; 5 Conclusion and Final Remarks; References
  • Security-Mediated Certificateless Undeniable Signature Scheme1 Introduction; 2 Preliminaries; 3 Security Model of SMC Undeniable Signatures; 3.1 Definition of SMC Undeniable Signatures; 3.2 Security Models; 4 Proposed SMC Undeniable Signature Scheme; 5 Security Analysis; 6 Conclusion; References; TU Framework in Automatic Formatting a Digital Library; 1 Introduction; 1.1 Related Work; 2 Solution; 2.1 Processing Stages; 2.2 Thinking-Understanding Approach; 2.3 Translation into Lobachevskii DML (Digital Mathematic Library) XML; 2.4 Implementation; 3 Conclusion; References
  • Innovative Synthesizer Model for Acoustic Guitar Notes1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Description of an Algorithm; 4 Cepstral Domain Modeling; 4.1 Impulse Response Modeling; 4.2 Excitation Modeling; 5 Validation Model: Synthesis of Guitar Notes; 6 Discussion and Results; 7 Conclusion; References; Architecture for Cloud-Based Industrial Automation; 1 Introduction; 2 Cloud Computing; 3 Automation Systems; 4 Networked Control Systems; 5 Concept of Cloud Control System; 6 Hierarchy of Industrial Control; 7 Cloud-Based Approach; 8 Cloud-Based Control Model; 9 Conclusion
  • Fine-Grained Integration of Priority Control and Relay Selection for Fast and Reliable Inter-vehicle Communication1 Introduction; 2 Related Work; 2.1 Prioritized Transmission Control [12-19]; 2.2 Relay-Vehicle Selection [2-11]; 2.3 A Brief Summary; 3 Proposed Method; 3.1 Overview; 3.2 Fine-Grained Integration of Relay-Vehicle Selection and Prioritized Transmission Control; 4 Evaluation; 4.1 Comparing Methods; 4.2 Simulation Results; 5 Extension of Proposed Method and Its Evaluation; 5.1 Overview of the Extended Method; 5.2 Process of Packet Aggregation; 5.3 Simulation of the Extended Method
Dimensions
unknown
Extent
1 online resource (968 pages).
Form of item
online
Isbn
9789811311642
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
  • on1056066426
  • (OCoLC)1056066426
Label
Third International Congress on Information and Communication Technology : ICICT 2018, London
Publication
Note
6 Conclusion
Bibliography note
ReferencesInformation Privacy Violations in Ephemeral Communications; 1 Modern Privacy: It Is All About Context; 2 Social Networks Privacy Concerns (Threats-Damage) ; 3 Smile, Snap, Share Once, and Delete! Snapchat: An Overview; 4 Theory of Contextual Integrity; 5 Importance of Privacy by Design; 6 Snapchat: Replay: What Went Wrong?; 7 Walking the Fine Line Between Behavioral Advertisement and Privacy: Third-Party Apps; 8 Click "Agree" to Continue: Disowning One's Online Life; 9 Conclusion; References
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; About the Editors; Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems; 1 Introduction; 2 Standardisation in IoT; 3 Towards a Road map for Secure CPS Integration; 3.1 Results and Discussion; 4 Conclusion; 5 Appendix; References; Cure for Health Care? Using Drone Technology in Hospital Processes-An Explorative Analysis; 1 Introduction; 2 Problem Statement; 3 Research Approach and Study Design; 4 Findings; 5 Conclusion and Final Remarks; References
  • Security-Mediated Certificateless Undeniable Signature Scheme1 Introduction; 2 Preliminaries; 3 Security Model of SMC Undeniable Signatures; 3.1 Definition of SMC Undeniable Signatures; 3.2 Security Models; 4 Proposed SMC Undeniable Signature Scheme; 5 Security Analysis; 6 Conclusion; References; TU Framework in Automatic Formatting a Digital Library; 1 Introduction; 1.1 Related Work; 2 Solution; 2.1 Processing Stages; 2.2 Thinking-Understanding Approach; 2.3 Translation into Lobachevskii DML (Digital Mathematic Library) XML; 2.4 Implementation; 3 Conclusion; References
  • Innovative Synthesizer Model for Acoustic Guitar Notes1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Description of an Algorithm; 4 Cepstral Domain Modeling; 4.1 Impulse Response Modeling; 4.2 Excitation Modeling; 5 Validation Model: Synthesis of Guitar Notes; 6 Discussion and Results; 7 Conclusion; References; Architecture for Cloud-Based Industrial Automation; 1 Introduction; 2 Cloud Computing; 3 Automation Systems; 4 Networked Control Systems; 5 Concept of Cloud Control System; 6 Hierarchy of Industrial Control; 7 Cloud-Based Approach; 8 Cloud-Based Control Model; 9 Conclusion
  • Fine-Grained Integration of Priority Control and Relay Selection for Fast and Reliable Inter-vehicle Communication1 Introduction; 2 Related Work; 2.1 Prioritized Transmission Control [12-19]; 2.2 Relay-Vehicle Selection [2-11]; 2.3 A Brief Summary; 3 Proposed Method; 3.1 Overview; 3.2 Fine-Grained Integration of Relay-Vehicle Selection and Prioritized Transmission Control; 4 Evaluation; 4.1 Comparing Methods; 4.2 Simulation Results; 5 Extension of Proposed Method and Its Evaluation; 5.1 Overview of the Extended Method; 5.2 Process of Packet Aggregation; 5.3 Simulation of the Extended Method
Dimensions
unknown
Extent
1 online resource (968 pages).
Form of item
online
Isbn
9789811311642
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
  • on1056066426
  • (OCoLC)1056066426

Library Locations