Proceedings of the Second International Conference on Computer and Communication Technologies
IC3T 2015, Volume 3
Herausgegeben:Satapathy, Suresh Chandra; Raju, K. Srujan; Mandal, Jyotsna Kumar; Bhateja, Vikrant
Proceedings of the Second International Conference on Computer and Communication Technologies
IC3T 2015, Volume 3
Herausgegeben:Satapathy, Suresh Chandra; Raju, K. Srujan; Mandal, Jyotsna Kumar; Bhateja, Vikrant
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division - V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design,…mehr
- Proceedings of the Second International Conference on Computer and Communication Technologies148,99 €
- Proceedings of the Second International Conference on Computer and Communication Technologies154,99 €
- Information Systems Design and Intelligent Applications148,99 €
- Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2148,99 €
- Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1148,99 €
- International Conference on Information Technology and Communication Systems147,99 €
- Computer Communication, Networking and Internet Security221,99 €
-
-
-
- Produktdetails
- Advances in Intelligent Systems and Computing 381
- Verlag: Springer / Springer India / Springer, Berlin
- Artikelnr. des Verlages: 978-81-322-2525-6
- 1st ed. 2016
- Seitenzahl: 720
- Erscheinungstermin: 22. September 2015
- Englisch
- Abmessung: 235mm x 155mm x 39mm
- Gewicht: 1076g
- ISBN-13: 9788132225256
- ISBN-10: 8132225252
- Artikelnr.: 42962503
- Advances in Intelligent Systems and Computing 381
- Verlag: Springer / Springer India / Springer, Berlin
- Artikelnr. des Verlages: 978-81-322-2525-6
- 1st ed. 2016
- Seitenzahl: 720
- Erscheinungstermin: 22. September 2015
- Englisch
- Abmessung: 235mm x 155mm x 39mm
- Gewicht: 1076g
- ISBN-13: 9788132225256
- ISBN-10: 8132225252
- Artikelnr.: 42962503
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approach for HandlingClass Imbalance Learning.- Chapter 41. A Framework for Discovering Important Patterns through Parallel Mining of Protein-protein Interaction Network.- Chapter 42. Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud.- Chapter 43. An Efficient Motion Detection Method Based on Estimation of Initial Motion Field Using Local Variance.- Chapter 44. A Survey on Texture Image Retrieval.- Chapter 45. Converged OAM.- Chapter 46. Rule Reduction of a Neuro-Fuzzy PI Controller with Real-Time Implementation on a Speed Control Process.- Chapter 47. Construction of Binary and Non-binary LDPC like Codes from Kernel Codes.- Chapter 48. Simulation Level Implementation of Face Recognition under Uncontrolled Environment.- Chapter 49. Analyzing State of the Art Techniques for Fusion of Multimodal Biometrics.- Chapter 50. Genetic Algorithmic Approach to Mitigate Starvation in Wireless Mesh Networks.- Chapter 51. Handwritten Indic Script Identification from Document Images - A Statistical Comparison of Different Attribute Selection Techniques in Multi-classifier Environment.- Chapter 52. An FPGA Based Embedded System for Real time Data Processing.- Chapter 53. Clustering of Noisy Regions (CNR) - A GIS Anchored Technique for Clustering on Raster Map.- Chapter 54. Performance of Brightness Enhancement Technique for Narrow-band and White-band Images.- Chapter 55. Z Transformation Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc).- Chapter 56. Breast Tissue Density Classification Using Wavelet Based Texture Descriptors.- Chapter 57. On New Families Related to Bernoulli and Euler Polynomials.- Chapter 58. Vehicular Ad-hoc Networks: Trimming Pile-Ups in Data Dissemination using HTPVANET Algorithm.- Chapter 59. Information Extraction from Research Papers Based on StatisticalMethods.- Chapter 60. Artificial Neural Network Classifier for Intrusion Detection System in Computer Network.- Chapter 61. Edge Detection on an Image Using Ant Colony Optimization.- Chapter 62. Cryptography Technique for a Novel Text Using Mathematical Functions.- Chapter 63. A New Hybrid Approach for Document Clustering Using Tabu Search And Particle Swarm Optimization TSPSO.- Chapter 64. An Effective and Efficient Clustering Based on k-Means Using MapReduce and TLBO.- Chapter 65. Detection of Sinkhole Attack in Wireless Sensor Network.- Chapter 66. Enhancement of Stream Ciphers Security Using DNA.- Chapter 67. Object Recognition with Discriminately Trained Part Based Model on HOG (Histogram of Oriented Gradients).- Chapter 68. Accuracy Assessment of the Images Classification Using RBF with Multi Swarm Optimization Methodology.- Chapter 69. Microstrip Patch Antenna Array with Metamaterial Ground Plane for Wi-MAX Applications.- Chapter 70. Tracking and Speed Estimation of Moving Vehicle for Traffic Surveillance System.- Chapter 71. Authentication of Audio Signals in Frequency Domain (AASF).
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approach for HandlingClass Imbalance Learning.- Chapter 41. A Framework for Discovering Important Patterns through Parallel Mining of Protein-protein Interaction Network.- Chapter 42. Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud.- Chapter 43. An Efficient Motion Detection Method Based on Estimation of Initial Motion Field Using Local Variance.- Chapter 44. A Survey on Texture Image Retrieval.- Chapter 45. Converged OAM.- Chapter 46. Rule Reduction of a Neuro-Fuzzy PI Controller with Real-Time Implementation on a Speed Control Process.- Chapter 47. Construction of Binary and Non-binary LDPC like Codes from Kernel Codes.- Chapter 48. Simulation Level Implementation of Face Recognition under Uncontrolled Environment.- Chapter 49. Analyzing State of the Art Techniques for Fusion of Multimodal Biometrics.- Chapter 50. Genetic Algorithmic Approach to Mitigate Starvation in Wireless Mesh Networks.- Chapter 51. Handwritten Indic Script Identification from Document Images - A Statistical Comparison of Different Attribute Selection Techniques in Multi-classifier Environment.- Chapter 52. An FPGA Based Embedded System for Real time Data Processing.- Chapter 53. Clustering of Noisy Regions (CNR) - A GIS Anchored Technique for Clustering on Raster Map.- Chapter 54. Performance of Brightness Enhancement Technique for Narrow-band and White-band Images.- Chapter 55. Z Transformation Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc).- Chapter 56. Breast Tissue Density Classification Using Wavelet Based Texture Descriptors.- Chapter 57. On New Families Related to Bernoulli and Euler Polynomials.- Chapter 58. Vehicular Ad-hoc Networks: Trimming Pile-Ups in Data Dissemination using HTPVANET Algorithm.- Chapter 59. Information Extraction from Research Papers Based on StatisticalMethods.- Chapter 60. Artificial Neural Network Classifier for Intrusion Detection System in Computer Network.- Chapter 61. Edge Detection on an Image Using Ant Colony Optimization.- Chapter 62. Cryptography Technique for a Novel Text Using Mathematical Functions.- Chapter 63. A New Hybrid Approach for Document Clustering Using Tabu Search And Particle Swarm Optimization TSPSO.- Chapter 64. An Effective and Efficient Clustering Based on k-Means Using MapReduce and TLBO.- Chapter 65. Detection of Sinkhole Attack in Wireless Sensor Network.- Chapter 66. Enhancement of Stream Ciphers Security Using DNA.- Chapter 67. Object Recognition with Discriminately Trained Part Based Model on HOG (Histogram of Oriented Gradients).- Chapter 68. Accuracy Assessment of the Images Classification Using RBF with Multi Swarm Optimization Methodology.- Chapter 69. Microstrip Patch Antenna Array with Metamaterial Ground Plane for Wi-MAX Applications.- Chapter 70. Tracking and Speed Estimation of Moving Vehicle for Traffic Surveillance System.- Chapter 71. Authentication of Audio Signals in Frequency Domain (AASF).