The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc.
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Visakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC, LNEE, SIST and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and life member of Computer Society of India. Currently, he is the National Chairman ofDivision-V (Education and Research) of Computer Society of India. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His areas of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition. He has published 100 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014, INDIA 2015, ICICT 2015 and ICTIS 2015 under Springer-ASIC Series and INDIACom 2015, ICACCI 2015 under IEEE. He is associate editor in International Journal of Synthetic Emotions (IJSE) and International Journal of Ambient Computing and Intelligence (IJACI) under IGI Global. He is also serving in the editorial board of International Journal of Image Mining (IJIM) and International Journal of Convergence Computing (IJConvC) under Inderscience Publishers. He has been editor of three published volumes with Springer and another two are in press. Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by PhD in Computer Science (mobile computing and wireless communication). His main research interests are wireless communication, mobile computing, wireless sensor networks and intelligent algorithms. He was a United Nations Fellow and worked in the United Nations University/International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He has edited many volumes in Springer LNCS/LNAI and Springer AISC Proceedings. Dr. Prasant Kumar Pattnaik, PhD (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT University, Bhubaneswar. He has more than a decade of teaching and research experience. Dr. Pattnaik has published numbers of research papers in peer-reviewed International Journals and conferences. His areas of specialization are mobile computing, cloud computing, brain computer interface and privacy preservation.p>
Inhaltsangabe
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals' Utilization ProblemsUsing Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier.- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews.- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data.- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews.- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis.- Chapter 43. Approach for Emotion Extraction from Text.- Chapter 44. Bio-inspired Algorithms for Mobile Location Management - A New Paradigm.- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations - A Novel Approach.- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image.- Chapter 47. Analysis of Logs by Using Logstash.- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining.- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design.- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System.- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM.- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks.- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process.- Chapter 54. Confidentiality and Storage of Data in Cloud Environment.- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing.- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method.- Chapter 57. Series Smart Wire - Managing Load and Congestion in Transmission Line.- Chapter 58. Recognizing Human Faces with Tilt.- Chapter 59. Word-Level Script Identification from Scene Images.- Chapter 60. Writer Specific Parameters for Online Signature Verification.- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network.- Chapter 62. TKAR: Efficient Mining of Top - k Association Rules on Real - Life Datasets.- Chapter 63. Predicting Defect of Software System.- Chapter 64. Fusion of Medical Image Using STSVD.- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid.- Chapter 66. A Method for the Selection of Agile Methods Using AHP.- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network.- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs.- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals’ Utilization ProblemsUsing Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier.- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews.- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data.- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews.- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis.- Chapter 43. Approach for Emotion Extraction from Text.- Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm.- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach.- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image.- Chapter 47. Analysis of Logs by Using Logstash.- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining.- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design.- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System.- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM.- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks.- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process.- Chapter 54. Confidentiality and Storage of Data in Cloud Environment.- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing.- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method.- Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line.- Chapter 58. Recognizing Human Faces with Tilt.- Chapter 59. Word-Level Script Identification from Scene Images.- Chapter 60. Writer Specific Parameters for Online Signature Verification.- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network.- Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets.- Chapter 63. Predicting Defect of Software System.- Chapter 64. Fusion of Medical Image Using STSVD.- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid.- Chapter 66. A Method for the Selection of Agile Methods Using AHP.- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network.- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs.- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals' Utilization ProblemsUsing Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier.- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews.- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data.- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews.- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis.- Chapter 43. Approach for Emotion Extraction from Text.- Chapter 44. Bio-inspired Algorithms for Mobile Location Management - A New Paradigm.- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations - A Novel Approach.- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image.- Chapter 47. Analysis of Logs by Using Logstash.- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining.- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design.- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System.- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM.- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks.- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process.- Chapter 54. Confidentiality and Storage of Data in Cloud Environment.- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing.- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method.- Chapter 57. Series Smart Wire - Managing Load and Congestion in Transmission Line.- Chapter 58. Recognizing Human Faces with Tilt.- Chapter 59. Word-Level Script Identification from Scene Images.- Chapter 60. Writer Specific Parameters for Online Signature Verification.- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network.- Chapter 62. TKAR: Efficient Mining of Top - k Association Rules on Real - Life Datasets.- Chapter 63. Predicting Defect of Software System.- Chapter 64. Fusion of Medical Image Using STSVD.- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid.- Chapter 66. A Method for the Selection of Agile Methods Using AHP.- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network.- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs.- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals’ Utilization ProblemsUsing Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier.- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews.- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data.- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews.- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis.- Chapter 43. Approach for Emotion Extraction from Text.- Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm.- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach.- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image.- Chapter 47. Analysis of Logs by Using Logstash.- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining.- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design.- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System.- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM.- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks.- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process.- Chapter 54. Confidentiality and Storage of Data in Cloud Environment.- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing.- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method.- Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line.- Chapter 58. Recognizing Human Faces with Tilt.- Chapter 59. Word-Level Script Identification from Scene Images.- Chapter 60. Writer Specific Parameters for Online Signature Verification.- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network.- Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets.- Chapter 63. Predicting Defect of Software System.- Chapter 64. Fusion of Medical Image Using STSVD.- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid.- Chapter 66. A Method for the Selection of Agile Methods Using AHP.- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network.- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs.- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497