Information Systems Design and Intelligent Applications
Proceedings of Third International Conference INDIA 2016, Volume 1 Herausgegeben:Satapathy, Suresh Chandra; Mandal, Jyotsna Kumar; Udgata, Siba K.; Bhateja, Vikrant
Information Systems Design and Intelligent Applications
Proceedings of Third International Conference INDIA 2016, Volume 1 Herausgegeben:Satapathy, Suresh Chandra; Mandal, Jyotsna Kumar; Udgata, Siba K.; Bhateja, Vikrant
Thethird international conference on INformation Systems Design and IntelligentApplications (INDIA - 2016) held in Visakhapatnam, India during January 8-9,2016. The book covers all aspects of information system design, computerscience and technology, general sciences, and educational research. Upon adouble blind review process, a number of high quality papers are selected andcollected in the book, which is composed of three different volumes, and coversa variety of topics, including natural language processing, artificialintelligence, security and privacy, communications, wireless and…mehr
Thethird international conference on INformation Systems Design and IntelligentApplications (INDIA - 2016) held in Visakhapatnam, India during January 8-9,2016. The book covers all aspects of information system design, computerscience and technology, general sciences, and educational research. Upon adouble blind review process, a number of high quality papers are selected andcollected in the book, which is composed of three different volumes, and coversa variety of topics, including natural language processing, artificialintelligence, security and privacy, communications, wireless and sensornetworks, microelectronics, circuit and systems, machine learning, softcomputing, mobile computing and applications, cloud computing, software engineering,graphics and image processing, rural engineering, e-commerce, e-governance,business computing, molecular computing, nano-computing, chemical computing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Visakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V(Education and Research) of Computer Society of India. Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Science & Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit. Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by Ph.D in Computer Science (mobile computing and wireless communication). His main research interests are Wireless Communication, Mobile Computing, Wireless Sensor Networks and Intelligent Algorithms. He was a United Nations Fellow and worked in the United Nations University/ International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and videoprocessing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.
Inhaltsangabe
Chapter 1. Study and Analysis of Subthreshold Leakage Currentin Sub-65 nm NMOSFET.- Chapter 2. Implementationsof Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3.Mitigating & Patching System Vulnerabilities UsingAnsible: A Comparative Study of Various Configuration Management Tools for IAASCloud.- Chapter 4. AdaptiveFractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5.Improved Resource Exploitation by Combining HadoopMap Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7.Systematic Evaluation of Seed Germination Models: AComparative Analysis.- Chapter 8. BusinessModeling Using Agile.- Chapter 9.An efficient Hybrid Encryption Technique Based onDES and RSA for Textual Data.- Chapter10. Applicationof Machine Learning on Process Metrics for Defect Prediction in MobileApplication.- Chapter 11. AutomaticInsurance and Pollution Challan Generator System in India.- Chapter 12.Effectively Implementation of KNN-Search onMultidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Modelfor Image Filtering.- Chapter 14.Cloud Based K-means Clustering Running as aMapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15.Symbolic Decision Tree for Interval Data - An Approachtowards Predictive Streaming and Rendering of 3D Models.- Chapter 16.Predictive 3D Content Streaming Based on DecisionTree Classifier Approach.- Chapter17. QuantitativeCharacterization of Radiographic Weld Defect Based on the Ground TruthRadiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters forQuality of Power.- Chapter 19. DevelopmentOf 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model:INSOLVER.- Chapter 21. DSLApproach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud ComputingSystems: Methods of Evidence Identification, Segregation, Collection andPartial Analysis.- Chapter 23. Brushing -An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data intoGroups of Interest.- Chapter 25. Estimationof Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26.Network Security in Big Data: Tools and Techniques.-Chapter 27. Design ofRipple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot CellularAutomata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29.A Method of Baseline Correction for OfflineHandwritten Telugu Text Lines.- Chapter30. ATechnique for Prevention of Derailing and Collision of Trains in India.- Temporal Scintimetric Characterization of SkeletalHotspots in Bone Scan by Dr. V. Siva's Retention Ratio.- Chapter 32.Executing Hive Queries on 3-NODE Cluster and AWSCluster- Comparative Analysis.- Chapter33. Performanceof Speaker Independent Language Identification System under Various NoiseEnvironments.- Chapter 34. Multi-levelFusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view DiscriminantAnalysis and Source Domain Dictionary Based Face Recognition.- Chapter 36.Mining Maximal Efficient Closed Item Sets withoutany Redundancy.- Chapter 37. AnInteractive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38.Literature Survey on Intrusion Detection Systems inMANETs.- Chapter 39. Apply ofSum of Difference Method to Predict Placement of Students' Using EducationalData Mining.- Chapter 40. Robust ColorImage Multi-thresholding Using Between-class variance and Cuckoo SearchAlgorithm.- Chapter 41. SocialMedia: A Review.- Chapter 42. Bayesian-FuzzyGIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique toImprove Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44.Efficient Iceberg Query Evaluation Using CompressedBitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46.A Novel Graphical Password Authentication Mechanismfor Cloud Services.- Chapter 47. AConceptual Framework for Big Data Implementation to Handle Large Volume of ComplexData.- Chapter 48. PathReliability in Automated Test Case Generation Process.- Chapter 49.A Study on Wii Remote Application as Tangible UserInterface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using3D Depth Vision.- Chapter 51. AHP-basedRanking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-boardNavigation Unit.- Chapter 53. Web DataAnalysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and ItsAnalysis.- Chapter 55. ICCCricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State ExplosionProblem.- Chapter 57. Real TimeBus Monitoring System.- Chapter58. HighPerformance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.-Chapter 59. DynamicVoltage Restorer Based on Neural Network and Particle Swarm Optimization forVoltage Mitigation.- Chapter 60. Analysisof Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61.SKT: A New Approach for Secure Key Transmission UsingMGPISXFS.- Chapter 62. A ComparativeStudy of Different Approaches for the Speaker Recognition.- Chapter 63.A Time Efficient Leaf Rust Disease DetectionTechnique of Wheat Leaf Images Using Pearson Correlation Coefficient and RoughFuzzy C-Means.- Chapter 64. Task SchedulingAlgorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65.The State of the Art in Software Reliability Prediction:Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage inCloud.- Chapter 67. Design NewBi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate theStatistical Features.- Chapter68. DemandSide Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69.An Optimized Cluster Based Routing Technique inVANET for Next Generation Network.- Chapter70. AgroKanti:Location-aware Decision Support System for Forecasting of Pests and Diseases inGrapes.- Chapter 71. A UnifiedModeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72.Cross Lingual Information Retrieval (CLIR): Reviewof Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attackthrough B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals UsingVariational Mode Decomposition.- Chapter75. Data SizeReduction and Maximization of the Network Lifetime over Wireless Sensor Network.
Chapter 1. Study and Analysis of Subthreshold Leakage Current in Sub-65 nm NMOSFET.- Chapter 2. Implementations of Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3. Mitigating & Patching System Vulnerabilities Using Ansible: A Comparative Study of Various Configuration Management Tools for IAAS Cloud.- Chapter 4. Adaptive Fractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5. Improved Resource Exploitation by Combining Hadoop Map Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7. Systematic Evaluation of Seed Germination Models: A Comparative Analysis.- Chapter 8. Business Modeling Using Agile.- Chapter 9. An efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data.- Chapter 10. Application of Machine Learning on Process Metrics for Defect Prediction in Mobile Application.- Chapter 11. Automatic Insurance and Pollution Challan Generator System in India.- Chapter 12. Effectively Implementation of KNN-Search on Multidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Model for Image Filtering.- Chapter 14. Cloud Based K-means Clustering Running as a MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15. Symbolic Decision Tree for Interval Data - An Approach towards Predictive Streaming and Rendering of 3D Models.- Chapter 16. Predictive 3D Content Streaming Based on Decision Tree Classifier Approach.- Chapter 17. Quantitative Characterization of Radiographic Weld Defect Based on the Ground Truth Radiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters for Quality of Power.- Chapter 19. Development Of 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model: INSOLVER.- Chapter 21. DSL Approach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis.- Chapter 23. Brushing - An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data into Groups of Interest.- Chapter 25. Estimation of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26. Network Security in Big Data: Tools and Techniques.- Chapter 27. Design of Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular Automata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29. A Method of Baseline Correction for Offline Handwritten Telugu Text Lines.- Chapter 30. A Technique for Prevention of Derailing and Collision of Trains in India.- Temporal Scintimetric Characterization of Skeletal Hotspots in Bone Scan by Dr. V. Siva’s Retention Ratio.- Chapter 32. Executing Hive Queries on 3-NODE Cluster and AWS Cluster- Comparative Analysis.- Chapter 33. Performance of Speaker Independent Language Identification System under Various Noise Environments.- Chapter 34. Multi-level Fusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view Discriminant Analysis and Source Domain Dictionary Based Face Recognition.- Chapter 36. Mining Maximal Efficient Closed Item Sets without any Redundancy.- Chapter 37. An Interactive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38. Literature Survey on Intrusion Detection Systems in MANETs.- Chapter 39. Apply of Sum of Difference Method to Predict Placement of Students’ Using Educational Data Mining.- Chapter 40. Robust Color Image Multi-thresholding Using Between-class variance and Cuckoo Search Algorithm.- Chapter 41. Social Media: A Review.- Chapter 42. Bayesian-Fuzzy GIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique to Improve Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44. Efficient Iceberg Query Evaluation Using Compressed Bitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46. A Novel Graphical Password Authentication Mechanism for Cloud Services.- Chapter 47. A Conceptual Framework for Big Data Implementation to Handle Large Volume of Complex Data.- Chapter 48. Path Reliability in Automated Test Case Generation Process.- Chapter 49. A Study on Wii Remote Application as Tangible User Interface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using 3D Depth Vision.- Chapter 51. AHP-based Ranking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-board Navigation Unit.- Chapter 53. Web Data Analysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and Its Analysis.- Chapter 55. ICC Cricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State Explosion Problem.- Chapter 57. Real Time Bus Monitoring System.- Chapter 58. High Performance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.- Chapter 59. Dynamic Voltage Restorer Based on Neural Network and Particle Swarm Optimization for Voltage Mitigation.- Chapter 60. Analysis of Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61. SKT: A New Approach for Secure Key Transmission Using MGPISXFS.- Chapter 62. A Comparative Study of Different Approaches for the Speaker Recognition.- Chapter 63. A Time Efficient Leaf Rust Disease Detection Technique of Wheat Leaf Images Using Pearson Correlation Coefficient and Rough Fuzzy C-Means.- Chapter 64. Task Scheduling Algorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65. The State of the Art in Software Reliability Prediction: Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage in Cloud.- Chapter 67. Design New Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the Statistical Features.- Chapter 68. Demand Side Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69. An Optimized Cluster Based Routing Technique in VANET for Next Generation Network.- Chapter 70. AgroKanti: Location-aware Decision Support System for Forecasting of Pests and Diseases in Grapes.- Chapter 71. A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72. Cross Lingual Information Retrieval (CLIR): Review of Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attack through B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals Using Variational Mode Decomposition.- Chapter 75. Data Size Reduction and Maximization of the Network Lifetime over Wireless Sensor Network.
Chapter 1. Study and Analysis of Subthreshold Leakage Currentin Sub-65 nm NMOSFET.- Chapter 2. Implementationsof Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3.Mitigating & Patching System Vulnerabilities UsingAnsible: A Comparative Study of Various Configuration Management Tools for IAASCloud.- Chapter 4. AdaptiveFractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5.Improved Resource Exploitation by Combining HadoopMap Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7.Systematic Evaluation of Seed Germination Models: AComparative Analysis.- Chapter 8. BusinessModeling Using Agile.- Chapter 9.An efficient Hybrid Encryption Technique Based onDES and RSA for Textual Data.- Chapter10. Applicationof Machine Learning on Process Metrics for Defect Prediction in MobileApplication.- Chapter 11. AutomaticInsurance and Pollution Challan Generator System in India.- Chapter 12.Effectively Implementation of KNN-Search onMultidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Modelfor Image Filtering.- Chapter 14.Cloud Based K-means Clustering Running as aMapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15.Symbolic Decision Tree for Interval Data - An Approachtowards Predictive Streaming and Rendering of 3D Models.- Chapter 16.Predictive 3D Content Streaming Based on DecisionTree Classifier Approach.- Chapter17. QuantitativeCharacterization of Radiographic Weld Defect Based on the Ground TruthRadiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters forQuality of Power.- Chapter 19. DevelopmentOf 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model:INSOLVER.- Chapter 21. DSLApproach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud ComputingSystems: Methods of Evidence Identification, Segregation, Collection andPartial Analysis.- Chapter 23. Brushing -An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data intoGroups of Interest.- Chapter 25. Estimationof Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26.Network Security in Big Data: Tools and Techniques.-Chapter 27. Design ofRipple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot CellularAutomata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29.A Method of Baseline Correction for OfflineHandwritten Telugu Text Lines.- Chapter30. ATechnique for Prevention of Derailing and Collision of Trains in India.- Temporal Scintimetric Characterization of SkeletalHotspots in Bone Scan by Dr. V. Siva's Retention Ratio.- Chapter 32.Executing Hive Queries on 3-NODE Cluster and AWSCluster- Comparative Analysis.- Chapter33. Performanceof Speaker Independent Language Identification System under Various NoiseEnvironments.- Chapter 34. Multi-levelFusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view DiscriminantAnalysis and Source Domain Dictionary Based Face Recognition.- Chapter 36.Mining Maximal Efficient Closed Item Sets withoutany Redundancy.- Chapter 37. AnInteractive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38.Literature Survey on Intrusion Detection Systems inMANETs.- Chapter 39. Apply ofSum of Difference Method to Predict Placement of Students' Using EducationalData Mining.- Chapter 40. Robust ColorImage Multi-thresholding Using Between-class variance and Cuckoo SearchAlgorithm.- Chapter 41. SocialMedia: A Review.- Chapter 42. Bayesian-FuzzyGIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique toImprove Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44.Efficient Iceberg Query Evaluation Using CompressedBitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46.A Novel Graphical Password Authentication Mechanismfor Cloud Services.- Chapter 47. AConceptual Framework for Big Data Implementation to Handle Large Volume of ComplexData.- Chapter 48. PathReliability in Automated Test Case Generation Process.- Chapter 49.A Study on Wii Remote Application as Tangible UserInterface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using3D Depth Vision.- Chapter 51. AHP-basedRanking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-boardNavigation Unit.- Chapter 53. Web DataAnalysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and ItsAnalysis.- Chapter 55. ICCCricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State ExplosionProblem.- Chapter 57. Real TimeBus Monitoring System.- Chapter58. HighPerformance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.-Chapter 59. DynamicVoltage Restorer Based on Neural Network and Particle Swarm Optimization forVoltage Mitigation.- Chapter 60. Analysisof Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61.SKT: A New Approach for Secure Key Transmission UsingMGPISXFS.- Chapter 62. A ComparativeStudy of Different Approaches for the Speaker Recognition.- Chapter 63.A Time Efficient Leaf Rust Disease DetectionTechnique of Wheat Leaf Images Using Pearson Correlation Coefficient and RoughFuzzy C-Means.- Chapter 64. Task SchedulingAlgorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65.The State of the Art in Software Reliability Prediction:Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage inCloud.- Chapter 67. Design NewBi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate theStatistical Features.- Chapter68. DemandSide Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69.An Optimized Cluster Based Routing Technique inVANET for Next Generation Network.- Chapter70. AgroKanti:Location-aware Decision Support System for Forecasting of Pests and Diseases inGrapes.- Chapter 71. A UnifiedModeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72.Cross Lingual Information Retrieval (CLIR): Reviewof Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attackthrough B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals UsingVariational Mode Decomposition.- Chapter75. Data SizeReduction and Maximization of the Network Lifetime over Wireless Sensor Network.
Chapter 1. Study and Analysis of Subthreshold Leakage Current in Sub-65 nm NMOSFET.- Chapter 2. Implementations of Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3. Mitigating & Patching System Vulnerabilities Using Ansible: A Comparative Study of Various Configuration Management Tools for IAAS Cloud.- Chapter 4. Adaptive Fractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5. Improved Resource Exploitation by Combining Hadoop Map Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7. Systematic Evaluation of Seed Germination Models: A Comparative Analysis.- Chapter 8. Business Modeling Using Agile.- Chapter 9. An efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data.- Chapter 10. Application of Machine Learning on Process Metrics for Defect Prediction in Mobile Application.- Chapter 11. Automatic Insurance and Pollution Challan Generator System in India.- Chapter 12. Effectively Implementation of KNN-Search on Multidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Model for Image Filtering.- Chapter 14. Cloud Based K-means Clustering Running as a MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15. Symbolic Decision Tree for Interval Data - An Approach towards Predictive Streaming and Rendering of 3D Models.- Chapter 16. Predictive 3D Content Streaming Based on Decision Tree Classifier Approach.- Chapter 17. Quantitative Characterization of Radiographic Weld Defect Based on the Ground Truth Radiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters for Quality of Power.- Chapter 19. Development Of 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model: INSOLVER.- Chapter 21. DSL Approach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis.- Chapter 23. Brushing - An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data into Groups of Interest.- Chapter 25. Estimation of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26. Network Security in Big Data: Tools and Techniques.- Chapter 27. Design of Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular Automata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29. A Method of Baseline Correction for Offline Handwritten Telugu Text Lines.- Chapter 30. A Technique for Prevention of Derailing and Collision of Trains in India.- Temporal Scintimetric Characterization of Skeletal Hotspots in Bone Scan by Dr. V. Siva’s Retention Ratio.- Chapter 32. Executing Hive Queries on 3-NODE Cluster and AWS Cluster- Comparative Analysis.- Chapter 33. Performance of Speaker Independent Language Identification System under Various Noise Environments.- Chapter 34. Multi-level Fusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view Discriminant Analysis and Source Domain Dictionary Based Face Recognition.- Chapter 36. Mining Maximal Efficient Closed Item Sets without any Redundancy.- Chapter 37. An Interactive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38. Literature Survey on Intrusion Detection Systems in MANETs.- Chapter 39. Apply of Sum of Difference Method to Predict Placement of Students’ Using Educational Data Mining.- Chapter 40. Robust Color Image Multi-thresholding Using Between-class variance and Cuckoo Search Algorithm.- Chapter 41. Social Media: A Review.- Chapter 42. Bayesian-Fuzzy GIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique to Improve Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44. Efficient Iceberg Query Evaluation Using Compressed Bitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46. A Novel Graphical Password Authentication Mechanism for Cloud Services.- Chapter 47. A Conceptual Framework for Big Data Implementation to Handle Large Volume of Complex Data.- Chapter 48. Path Reliability in Automated Test Case Generation Process.- Chapter 49. A Study on Wii Remote Application as Tangible User Interface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using 3D Depth Vision.- Chapter 51. AHP-based Ranking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-board Navigation Unit.- Chapter 53. Web Data Analysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and Its Analysis.- Chapter 55. ICC Cricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State Explosion Problem.- Chapter 57. Real Time Bus Monitoring System.- Chapter 58. High Performance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.- Chapter 59. Dynamic Voltage Restorer Based on Neural Network and Particle Swarm Optimization for Voltage Mitigation.- Chapter 60. Analysis of Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61. SKT: A New Approach for Secure Key Transmission Using MGPISXFS.- Chapter 62. A Comparative Study of Different Approaches for the Speaker Recognition.- Chapter 63. A Time Efficient Leaf Rust Disease Detection Technique of Wheat Leaf Images Using Pearson Correlation Coefficient and Rough Fuzzy C-Means.- Chapter 64. Task Scheduling Algorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65. The State of the Art in Software Reliability Prediction: Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage in Cloud.- Chapter 67. Design New Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the Statistical Features.- Chapter 68. Demand Side Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69. An Optimized Cluster Based Routing Technique in VANET for Next Generation Network.- Chapter 70. AgroKanti: Location-aware Decision Support System for Forecasting of Pests and Diseases in Grapes.- Chapter 71. A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72. Cross Lingual Information Retrieval (CLIR): Review of Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attack through B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals Using Variational Mode Decomposition.- Chapter 75. Data Size Reduction and Maximization of the Network Lifetime over Wireless Sensor Network.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497