Pub Date : 2021-07-27DOI: 10.1007/978-981-16-0739-4_39
Prashant G. Patil, S. More
{"title":"Analysis of Encrypted ECG Signal in Steganography Using Wavelet Transforms","authors":"Prashant G. Patil, S. More","doi":"10.1007/978-981-16-0739-4_39","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_39","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114970942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-27DOI: 10.1007/978-981-16-0739-4_96
Sheeba Uruj Ahmad, Sunidhi Kashyap, S. Shetty, Neeru Sood
{"title":"Cybersecurity During COVID-19","authors":"Sheeba Uruj Ahmad, Sunidhi Kashyap, S. Shetty, Neeru Sood","doi":"10.1007/978-981-16-0739-4_96","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_96","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-27DOI: 10.1007/978-981-16-0739-4_47
Mohit Sewak, S. Sahay, Hemant Rathore
{"title":"Policy-Approximation Based Deep Reinforcement Learning Techniques: An Overview","authors":"Mohit Sewak, S. Sahay, Hemant Rathore","doi":"10.1007/978-981-16-0739-4_47","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_47","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-27DOI: 10.1007/978-981-16-0739-4_62
G. Sreenivasulu, N. Chitra, B. Sujatha, K. V. Madhav
{"title":"Text Summarization Using Natural Language Processing","authors":"G. Sreenivasulu, N. Chitra, B. Sujatha, K. V. Madhav","doi":"10.1007/978-981-16-0739-4_62","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_62","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0739-4_29
Oluwaseyi Olorunshola, F. Ogwueleka
{"title":"Assessing the Impact of Information and Communication Technology (ICT) on Work Efficiency of Graduates","authors":"Oluwaseyi Olorunshola, F. Ogwueleka","doi":"10.1007/978-981-16-0739-4_29","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_29","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0882-7_93
R. Shahabade
{"title":"A Review on the Contribution of IoT in Various Domains of Supply Chain Industry","authors":"R. Shahabade","doi":"10.1007/978-981-16-0882-7_93","DOIUrl":"https://doi.org/10.1007/978-981-16-0882-7_93","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115363935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0739-4_37
N. L. Lokhande, T. Jaware
{"title":"Lung CT Image Segmentation: A Convolutional Neural Network Approach","authors":"N. L. Lokhande, T. Jaware","doi":"10.1007/978-981-16-0739-4_37","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_37","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0882-7_7
Madhuri Pallod, M. Vaidya
{"title":"Classification of Brain Tumor by Convolution Neural Networks","authors":"Madhuri Pallod, M. Vaidya","doi":"10.1007/978-981-16-0882-7_7","DOIUrl":"https://doi.org/10.1007/978-981-16-0882-7_7","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0882-7_101
Preeti Chawaj, S. R. Khot
{"title":"Human Voice Sentiment Identification Using Support Vector Machine","authors":"Preeti Chawaj, S. R. Khot","doi":"10.1007/978-981-16-0882-7_101","DOIUrl":"https://doi.org/10.1007/978-981-16-0882-7_101","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-0739-4_95
V. Hirlekar, Arun Kumar
{"title":"An Empirical Analysis of Fake Tweet Detection Using Statistical and Deep Learning Approaches","authors":"V. Hirlekar, Arun Kumar","doi":"10.1007/978-981-16-0739-4_95","DOIUrl":"https://doi.org/10.1007/978-981-16-0739-4_95","url":null,"abstract":"","PeriodicalId":404279,"journal":{"name":"Information and Communication Technology for Competitive Strategies (ICTCS 2020)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}