The two volumes of this bookcollect high-quality peer-reviewed research papers presented in theInternational Conference on ICT for Sustainable Development (ICT4SD 2015) heldat Ahmedabad, India during 3 - 4 July 2015. The book discusses all areas of Informationand Communication Technologies and its applications in field for engineeringand management. The main focus of the volumes are on applications of ICTfor Infrastructure, e-Governance, andcontemporary technologies advancements on Data Mining, Security,Computer Graphics, etc. The objective of this International Conferenceis to provide an…mehr
The two volumes of this bookcollect high-quality peer-reviewed research papers presented in theInternational Conference on ICT for Sustainable Development (ICT4SD 2015) heldat Ahmedabad, India during 3 - 4 July 2015. The book discusses all areas of Informationand Communication Technologies and its applications in field for engineeringand management. The main focus of the volumes are on applications of ICTfor Infrastructure, e-Governance, andcontemporary technologies advancements on Data Mining, Security,Computer Graphics, etc. The objective of this International Conferenceis to provide an opportunity for the researchers, academicians, industrypersons and students to interact and exchange ideas, experience and expertisein the current trend and strategies for Information and CommunicationTechnologies.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Dept. of CSE at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph. D. in Computer Science and Engineering from JNTU Hyderabad and M. Tech in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph. Ds. Dr. Satapathy is also a Sr. Member IEEE. Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member of ACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS - 2014 at Udaipur through ACM, International Conference ICT4SD 2015 - by Springer recently. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards the society, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012. Dr. Nilesh Modi is having rich experience of around 13 years in academics and IT industry. He is holding Doctorate in e-Security (Computer Science and Application). Continuing his research on cyber security, presently he is pursuing post-doctoral research on Wireless Communication and Security and certification as an Ethical Hacking. He has very good number of research under his name and presented more than 75 research papers in International and National Journals and Conferences. He has delivered number of expert talk on e-Security and hacking in National and International Conferences. Dr. Modi, a person with vibrancy having his active involvement as a life member of CSI, ACM IEEE, IACSIT, IACSI, IAEng apart from his academic and industrial career. As a consultant, he is contributing for differentsystem development projects with IT industry and carried out different Government Projects. Dr. Nisrag Pathak has been an astute and result oriented professional with 10 years of experience in teaching and carving state, national and international events like workshops, seminars and conferences. Being a mathematics scholar and computer science professional, he is actively involved in research of data mining and big data analytic. He has strong list of national and international publication in his name. Dr. Pathak is currently Associate Professor of Computer Science and Application at Narsinhbhai Institute of Computer Studies and Management affiliated to Kadi Sarva Vishvavidyalaya. He received his Ph.D. from Hemchandracharya North Gujarat University in Computer Science and his Master's in Mathematics from the same university. His other tenures include research fellow at Indian Statistical Institute, Kolkata and Indian Institute of Science, Bengaluru.
Inhaltsangabe
Chapter 1. A Compact Triple and Quadruple BandAntenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2.DDA: An Approach to Handle DDoS (Ping Flood) Attack.-Chapter 3. Approachto Accurate Circle Detection: Multithreaded Implementation of Modified CircularHough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Basedon CPU Utilization and Performance Evaluation on Multi Cluster HeterogeneousEnvironment.- Chapter 5. FasterLoad Flow Analysis.- Chapter 6. Fuzzy LinkBased Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-BasedOptimization (TLBO) Approach to Truss Structure Subjected to Static and DynamicConstraints.- Chapter 8. EnforcingIndexing Techniques in Berkeley DB Using Implementation of Hilbert TreeAlgorithm.- Chapter 9. AnImprovement in Performance of Optical Communication System using LinearlyChirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11.Feasibility Study of Proposed Architecture forAutomatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User BasedCollaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT BasedFacilities Management Tools for Buildings.- Chapter 15. Study theEffect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Nodein MANET.- Chapter 16. UDPFlooding Attack Detection Using Information Metric Measure.- Chapter 17.Generalized MCDM Based Decision Support System forPersonnel Prioritization.- Chapter18.A Proactive Dynamic Rate Control Schemefor AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoSover MANET.- Chapter 20. HybridApproach to Reduce Time Complexity of String Matching Algorithm usingHashingwith Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step TowardsTemporal Information Retrieval.- Chapter22. A SecureText Communication Scheme Based on Combination of Compression, Cryptography andSteganography.- Chapter 23. AComparative Analysis of Feature Selection Methods and Associated MachineLearning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24.ACE (Advanced Compression Encryption) Scheme for Image Authentication.- Chapter25. AnEfficient and Interactive Approach for Association Rules Generation byIntegrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless SensorNetworks.- Chapter 27. Comparative Analysis of MCML Compressor with andwithout Concept of Sleep Transistor.- Chapter 28. Design& Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2DPhotonic Crystal.- Chapter 29. Designingand Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30.Classifying Nodes in Social Media Space.- Chapter 31.A Novel Hexagonal Shaped Based Band Stop FrequencySelective Surface with Multi-Band Applications.- Chapter 32. AXSM : An Automated Tool for XML Schema Matching.- Chapter 33.Development of Web Map Service For Open Street Maps(OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS andDirectional Antenna Integrating With RFID and Wireless Technology.- Chapter 35.Secured Cloud Data Storage - Prototype Trust Modelfor Public Cloud Storage.- Chapter36.A Semi Circular Monopole Antenna forUltra Wide Band Applications.- Chapter37. Security Analysisof Different LFSR Based Ciphers to Propose a Novel Approach Compatible withParallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.-Chapter 38.Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- Chapter 39.Support Vector Machine Based Model for HostOverload Detection in Clouds.- Chapter40. A HybridFace Recognition Scheme Using Contour and Gabor Wavelet.- Chapter 41. DataDissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hocNetworks.- Chapter 42. DataAcquisition with FPGA using Xilinx and LabVIEW.- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna withMultiband Notch Characteristics.- Chapter 44.Wireless Resonant Power Transmission.- Chapter 45.Fuzzy Clustering based Efficient ClassificationModel for large TCPdump data set using Hadoop framework.- Chapter 46.System-related Characteristic Based Leader ElectionProtocol for Cognitive Radio Networks.- Chapter 47. Passive Image Manipulation Detection using WaveletTransform and Support Vector Machine Classifier.- Chapter 48. Intrusion Detection System with Snort in CloudComputing.- Chapter 49. RuralE-Health Care Model.- Chapter 50. An Implementation Model for Privacy Aware AccessControl in Web Services Environment.- Chapter 51. Comprehensive Review on Eye Close and Eye Open ActivitiesUsing EEG in Brain Computer Interface.- Chapter 52. Design of High Data Rate and Multipath EfficientUnderwater Acoustic Communication System Using OFDM-DQPSK.- Chapter 53.A Hybrid Approach for Big Data Analysis of CricketFan Sentiments in Twitter.- Chapter54. PerformanceAnalysis of Medical Image Compression Techniques.- Chapter 55. Integrated Framework Using Frequent Pattern forClustering Numeric and Nominal Data Sets.- Chapter 56. Image Encryption by Using Block Based SymmetricTransformation Algorithm (International Data Encryption Algorithm).- Chapter 57.Content Based Watermarking Using MCA.- Chapter 58.Image Enhancement Based on Log-Gabor Filter forNoisy Fingerprint Image.- Chapter59. ComputationalPerformance Analysis of Ant Colony Optimization Algorithms for Travelling SalesPerson Problem.- Chapter 60.Evaluating Performance of Reactive and HybridRouting Protocol in Mobile Ad-Hoc Network.- Chapter 61. Sentiment Based Data Mining Approach forClassification and Analysis.- Chapter62. OfflineHandwritten Sanskrit Simple and Compound Character Recognition Using NeuralNetwork.- Chapter 63. Need ofICT for Sustainable Development of Power Sector.- Chapter 64. Development of Optical Impairment MinimizationTechnique for Radio Over Fiber Link.- Chapter 65. Mobile Waste Management for Smart Cities: MonitoringSanitation through Living Labs.- Chapter66. OptimizedImplementation of Location Aware and Network Based Services for Power EfficientAndroid Applications.- Chapter67. PowerConsumption and Congestion Control of Rendezvous Node for Wireless BiosensorNetwork.- Chapter 68. Comparisonof Different SimilarityFunctions on Hindi QA System.- Chapter 69.Preventing Faults: Fault Monitoring and ProactiveFault tolerance in Cloud Computing.- Chapter 70. Evolving the Reliability for Cloud System UsingPriority Metric.- Chapter 71. MultilevelPriority Based Task Scheduling Algorithm for Workflows in Cloud ComputingEnvironment.- Chapter 72. EfficientDNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack inMANETs.- Chapter 74. Opinion Mining Classification Based on Extension ofOpinion Mining Phrases.- Chapter75. FacialExpression Recognition Using variants of LBP and Classifier Fusion.- Chapter 76.FLSU Based Energy Efficient Protocol Design for WSNwith Mobile Sink.- Chapter 77. Goal basedConstraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.
Chapter 1. A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2. DDA: An Approach to Handle DDoS (Ping Flood) Attack.- Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous Environment.- Chapter 5. Faster Load Flow Analysis.- Chapter 6. Fuzzy Link Based Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints.- Chapter 8. Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm.- Chapter 9. An Improvement in Performance of Optical Communication System using Linearly Chirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11. Feasibility Study of Proposed Architecture for Automatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User Based Collaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT Based Facilities Management Tools for Buildings.- Chapter 15. Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET.- Chapter 16. UDP Flooding Attack Detection Using Information Metric Measure.- Chapter 17. Generalized MCDM Based Decision Support System for Personnel Prioritization.- Chapter 18. A Proactive Dynamic Rate Control Scheme for AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoS over MANET.- Chapter 20. Hybrid Approach to Reduce Time Complexity of String Matching Algorithm usingHashing with Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step Towards Temporal Information Retrieval.- Chapter 22. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography and Steganography.- Chapter 23. A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24. ACE (Advanced Compression Encryption) Scheme for Image Authentication.- Chapter 25. An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless Sensor Networks.- Chapter 27. Comparative Analysis of MCML Compressor with and without Concept of Sleep Transistor.- Chapter 28. Design & Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D Photonic Crystal.- Chapter 29. Designing and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30. Classifying Nodes in Social Media Space.- Chapter 31. A Novel Hexagonal Shaped Based Band Stop Frequency Selective Surface with Multi-Band Applications.- Chapter 32. AXSM : An Automated Tool for XML Schema Matching.- Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS and Directional Antenna Integrating With RFID and Wireless Technology.- Chapter 35. Secured Cloud Data Storage – Prototype Trust Model for Public Cloud Storage.- Chapter 36. A Semi Circular Monopole Antenna for Ultra Wide Band Applications.- Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.- Chapter 38.Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- Chapter 39. Support Vector Machine Based Model for Host Overload Detection in Clouds.- Chapter 40. A Hybrid Face Recognition Scheme Using Contour and Gabor Wavelet.- Chapter 41. Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hoc Networks.- Chapter 42. Data Acquisition with FPGA using Xilinx and LabVIEW.- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics.- Chapter 44. Wireless Resonant Power Transmission.- Chapter 45. Fuzzy Clustering based Efficient Classification Model for large TCPdump data set using Hadoop framework.- Chapter 46. System-related Characteristic Based Leader Election Protocol for Cognitive Radio Networks.- Chapter 47. Passive Image Manipulation Detection using Wavelet Transform and Support Vector Machine Classifier.- Chapter 48. Intrusion Detection System with Snort in Cloud Computing.- Chapter 49. Rural E-Health Care Model.- Chapter 50. An Implementation Model for Privacy Aware Access Control in Web Services Environment.- Chapter 51. Comprehensive Review on Eye Close and Eye Open Activities Using EEG in Brain Computer Interface.- Chapter 52. Design of High Data Rate and Multipath Efficient Underwater Acoustic Communication System Using OFDM-DQPSK.- Chapter 53. A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter.- Chapter 54. Performance Analysis of Medical Image Compression Techniques.- Chapter 55. Integrated Framework Using Frequent Pattern for Clustering Numeric and Nominal Data Sets.- Chapter 56. Image Encryption by Using Block Based Symmetric Transformation Algorithm (International Data Encryption Algorithm).- Chapter 57. Content Based Watermarking Using MCA.- Chapter 58. Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image.- Chapter 59. Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem.- Chapter 60. Evaluating Performance of Reactive and Hybrid Routing Protocol in Mobile Ad-Hoc Network.- Chapter 61. Sentiment Based Data Mining Approach for Classification and Analysis.- Chapter 62. Offline Handwritten Sanskrit Simple and Compound Character Recognition Using Neural Network.- Chapter 63. Need of ICT for Sustainable Development of Power Sector.- Chapter 64. Development of Optical Impairment Minimization Technique for Radio Over Fiber Link.- Chapter 65. Mobile Waste Management for Smart Cities: Monitoring Sanitation through Living Labs.- Chapter 66. Optimized Implementation of Location Aware and Network Based Services for Power Efficient Android Applications.- Chapter 67. Power Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor Network.- Chapter 68. Comparison of Different SimilarityFunctions on Hindi QA System.- Chapter 69. Preventing Faults: Fault Monitoring and Proactive Fault tolerance in Cloud Computing.- Chapter 70. Evolving the Reliability for Cloud System Using Priority Metric.- Chapter 71. Multilevel Priority Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment.- Chapter 72. Efficient DNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs.- Chapter 74. Opinion Mining Classification Based on Extension of Opinion Mining Phrases.- Chapter 75. Facial Expression Recognition Using variants of LBP and Classifier Fusion.- Chapter 76. FLSU Based Energy Efficient Protocol Design for WSN with Mobile Sink.- Chapter 77. Goal based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.
Chapter 1. A Compact Triple and Quadruple BandAntenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2.DDA: An Approach to Handle DDoS (Ping Flood) Attack.-Chapter 3. Approachto Accurate Circle Detection: Multithreaded Implementation of Modified CircularHough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Basedon CPU Utilization and Performance Evaluation on Multi Cluster HeterogeneousEnvironment.- Chapter 5. FasterLoad Flow Analysis.- Chapter 6. Fuzzy LinkBased Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-BasedOptimization (TLBO) Approach to Truss Structure Subjected to Static and DynamicConstraints.- Chapter 8. EnforcingIndexing Techniques in Berkeley DB Using Implementation of Hilbert TreeAlgorithm.- Chapter 9. AnImprovement in Performance of Optical Communication System using LinearlyChirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11.Feasibility Study of Proposed Architecture forAutomatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User BasedCollaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT BasedFacilities Management Tools for Buildings.- Chapter 15. Study theEffect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Nodein MANET.- Chapter 16. UDPFlooding Attack Detection Using Information Metric Measure.- Chapter 17.Generalized MCDM Based Decision Support System forPersonnel Prioritization.- Chapter18.A Proactive Dynamic Rate Control Schemefor AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoSover MANET.- Chapter 20. HybridApproach to Reduce Time Complexity of String Matching Algorithm usingHashingwith Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step TowardsTemporal Information Retrieval.- Chapter22. A SecureText Communication Scheme Based on Combination of Compression, Cryptography andSteganography.- Chapter 23. AComparative Analysis of Feature Selection Methods and Associated MachineLearning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24.ACE (Advanced Compression Encryption) Scheme for Image Authentication.- Chapter25. AnEfficient and Interactive Approach for Association Rules Generation byIntegrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless SensorNetworks.- Chapter 27. Comparative Analysis of MCML Compressor with andwithout Concept of Sleep Transistor.- Chapter 28. Design& Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2DPhotonic Crystal.- Chapter 29. Designingand Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30.Classifying Nodes in Social Media Space.- Chapter 31.A Novel Hexagonal Shaped Based Band Stop FrequencySelective Surface with Multi-Band Applications.- Chapter 32. AXSM : An Automated Tool for XML Schema Matching.- Chapter 33.Development of Web Map Service For Open Street Maps(OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS andDirectional Antenna Integrating With RFID and Wireless Technology.- Chapter 35.Secured Cloud Data Storage - Prototype Trust Modelfor Public Cloud Storage.- Chapter36.A Semi Circular Monopole Antenna forUltra Wide Band Applications.- Chapter37. Security Analysisof Different LFSR Based Ciphers to Propose a Novel Approach Compatible withParallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.-Chapter 38.Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- Chapter 39.Support Vector Machine Based Model for HostOverload Detection in Clouds.- Chapter40. A HybridFace Recognition Scheme Using Contour and Gabor Wavelet.- Chapter 41. DataDissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hocNetworks.- Chapter 42. DataAcquisition with FPGA using Xilinx and LabVIEW.- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna withMultiband Notch Characteristics.- Chapter 44.Wireless Resonant Power Transmission.- Chapter 45.Fuzzy Clustering based Efficient ClassificationModel for large TCPdump data set using Hadoop framework.- Chapter 46.System-related Characteristic Based Leader ElectionProtocol for Cognitive Radio Networks.- Chapter 47. Passive Image Manipulation Detection using WaveletTransform and Support Vector Machine Classifier.- Chapter 48. Intrusion Detection System with Snort in CloudComputing.- Chapter 49. RuralE-Health Care Model.- Chapter 50. An Implementation Model for Privacy Aware AccessControl in Web Services Environment.- Chapter 51. Comprehensive Review on Eye Close and Eye Open ActivitiesUsing EEG in Brain Computer Interface.- Chapter 52. Design of High Data Rate and Multipath EfficientUnderwater Acoustic Communication System Using OFDM-DQPSK.- Chapter 53.A Hybrid Approach for Big Data Analysis of CricketFan Sentiments in Twitter.- Chapter54. PerformanceAnalysis of Medical Image Compression Techniques.- Chapter 55. Integrated Framework Using Frequent Pattern forClustering Numeric and Nominal Data Sets.- Chapter 56. Image Encryption by Using Block Based SymmetricTransformation Algorithm (International Data Encryption Algorithm).- Chapter 57.Content Based Watermarking Using MCA.- Chapter 58.Image Enhancement Based on Log-Gabor Filter forNoisy Fingerprint Image.- Chapter59. ComputationalPerformance Analysis of Ant Colony Optimization Algorithms for Travelling SalesPerson Problem.- Chapter 60.Evaluating Performance of Reactive and HybridRouting Protocol in Mobile Ad-Hoc Network.- Chapter 61. Sentiment Based Data Mining Approach forClassification and Analysis.- Chapter62. OfflineHandwritten Sanskrit Simple and Compound Character Recognition Using NeuralNetwork.- Chapter 63. Need ofICT for Sustainable Development of Power Sector.- Chapter 64. Development of Optical Impairment MinimizationTechnique for Radio Over Fiber Link.- Chapter 65. Mobile Waste Management for Smart Cities: MonitoringSanitation through Living Labs.- Chapter66. OptimizedImplementation of Location Aware and Network Based Services for Power EfficientAndroid Applications.- Chapter67. PowerConsumption and Congestion Control of Rendezvous Node for Wireless BiosensorNetwork.- Chapter 68. Comparisonof Different SimilarityFunctions on Hindi QA System.- Chapter 69.Preventing Faults: Fault Monitoring and ProactiveFault tolerance in Cloud Computing.- Chapter 70. Evolving the Reliability for Cloud System UsingPriority Metric.- Chapter 71. MultilevelPriority Based Task Scheduling Algorithm for Workflows in Cloud ComputingEnvironment.- Chapter 72. EfficientDNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack inMANETs.- Chapter 74. Opinion Mining Classification Based on Extension ofOpinion Mining Phrases.- Chapter75. FacialExpression Recognition Using variants of LBP and Classifier Fusion.- Chapter 76.FLSU Based Energy Efficient Protocol Design for WSNwith Mobile Sink.- Chapter 77. Goal basedConstraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.
Chapter 1. A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2. DDA: An Approach to Handle DDoS (Ping Flood) Attack.- Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous Environment.- Chapter 5. Faster Load Flow Analysis.- Chapter 6. Fuzzy Link Based Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints.- Chapter 8. Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm.- Chapter 9. An Improvement in Performance of Optical Communication System using Linearly Chirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11. Feasibility Study of Proposed Architecture for Automatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User Based Collaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT Based Facilities Management Tools for Buildings.- Chapter 15. Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET.- Chapter 16. UDP Flooding Attack Detection Using Information Metric Measure.- Chapter 17. Generalized MCDM Based Decision Support System for Personnel Prioritization.- Chapter 18. A Proactive Dynamic Rate Control Scheme for AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoS over MANET.- Chapter 20. Hybrid Approach to Reduce Time Complexity of String Matching Algorithm usingHashing with Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step Towards Temporal Information Retrieval.- Chapter 22. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography and Steganography.- Chapter 23. A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24. ACE (Advanced Compression Encryption) Scheme for Image Authentication.- Chapter 25. An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless Sensor Networks.- Chapter 27. Comparative Analysis of MCML Compressor with and without Concept of Sleep Transistor.- Chapter 28. Design & Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D Photonic Crystal.- Chapter 29. Designing and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30. Classifying Nodes in Social Media Space.- Chapter 31. A Novel Hexagonal Shaped Based Band Stop Frequency Selective Surface with Multi-Band Applications.- Chapter 32. AXSM : An Automated Tool for XML Schema Matching.- Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS and Directional Antenna Integrating With RFID and Wireless Technology.- Chapter 35. Secured Cloud Data Storage – Prototype Trust Model for Public Cloud Storage.- Chapter 36. A Semi Circular Monopole Antenna for Ultra Wide Band Applications.- Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.- Chapter 38.Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application.- Chapter 39. Support Vector Machine Based Model for Host Overload Detection in Clouds.- Chapter 40. A Hybrid Face Recognition Scheme Using Contour and Gabor Wavelet.- Chapter 41. Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hoc Networks.- Chapter 42. Data Acquisition with FPGA using Xilinx and LabVIEW.- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics.- Chapter 44. Wireless Resonant Power Transmission.- Chapter 45. Fuzzy Clustering based Efficient Classification Model for large TCPdump data set using Hadoop framework.- Chapter 46. System-related Characteristic Based Leader Election Protocol for Cognitive Radio Networks.- Chapter 47. Passive Image Manipulation Detection using Wavelet Transform and Support Vector Machine Classifier.- Chapter 48. Intrusion Detection System with Snort in Cloud Computing.- Chapter 49. Rural E-Health Care Model.- Chapter 50. An Implementation Model for Privacy Aware Access Control in Web Services Environment.- Chapter 51. Comprehensive Review on Eye Close and Eye Open Activities Using EEG in Brain Computer Interface.- Chapter 52. Design of High Data Rate and Multipath Efficient Underwater Acoustic Communication System Using OFDM-DQPSK.- Chapter 53. A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter.- Chapter 54. Performance Analysis of Medical Image Compression Techniques.- Chapter 55. Integrated Framework Using Frequent Pattern for Clustering Numeric and Nominal Data Sets.- Chapter 56. Image Encryption by Using Block Based Symmetric Transformation Algorithm (International Data Encryption Algorithm).- Chapter 57. Content Based Watermarking Using MCA.- Chapter 58. Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image.- Chapter 59. Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem.- Chapter 60. Evaluating Performance of Reactive and Hybrid Routing Protocol in Mobile Ad-Hoc Network.- Chapter 61. Sentiment Based Data Mining Approach for Classification and Analysis.- Chapter 62. Offline Handwritten Sanskrit Simple and Compound Character Recognition Using Neural Network.- Chapter 63. Need of ICT for Sustainable Development of Power Sector.- Chapter 64. Development of Optical Impairment Minimization Technique for Radio Over Fiber Link.- Chapter 65. Mobile Waste Management for Smart Cities: Monitoring Sanitation through Living Labs.- Chapter 66. Optimized Implementation of Location Aware and Network Based Services for Power Efficient Android Applications.- Chapter 67. Power Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor Network.- Chapter 68. Comparison of Different SimilarityFunctions on Hindi QA System.- Chapter 69. Preventing Faults: Fault Monitoring and Proactive Fault tolerance in Cloud Computing.- Chapter 70. Evolving the Reliability for Cloud System Using Priority Metric.- Chapter 71. Multilevel Priority Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment.- Chapter 72. Efficient DNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs.- Chapter 74. Opinion Mining Classification Based on Extension of Opinion Mining Phrases.- Chapter 75. Facial Expression Recognition Using variants of LBP and Classifier Fusion.- Chapter 76. FLSU Based Energy Efficient Protocol Design for WSN with Mobile Sink.- Chapter 77. Goal based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497