The third international conference on INformation Systems Design and Intelligent Applications (INDIA - 2016) held in Visakhapatnam, India during January 8-9, 2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano-computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only limited to computer researchers but also include mathematics, chemistry, biology, bio-chemistry, engineering, statistics, and all others in which computer techniques may assist.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Verlag: Springer India
- Seitenzahl: 669
- Erscheinungstermin: 3. Februar 2016
- Englisch
- ISBN-13: 9788132227571
- Artikelnr.: 44615972
- Verlag: Springer India
- Seitenzahl: 669
- Erscheinungstermin: 3. Februar 2016
- Englisch
- ISBN-13: 9788132227571
- Artikelnr.: 44615972
Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India. Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Science & Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Philand 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit. Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by Ph.D in Computer Science (mobile computing and wireless communication). His main research interests are Wireless Communication, Mobile Computing, Wireless Sensor Networks and Intelligent Algorithms. He was a United Nations Fellow and worked in the United Nations University/ International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image andvideo processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.
Chapter 1. A New Private Security Policy Approach for DDoSAttack Defense in NGNs.- Chapter2. An EffectiveApproach for Providing Diverse and Serendipitous Recommendations.- Chapter 3.Envelope Fluctuation Reduction for WiMAX MIMO-OFDMSignals Using Adaptive Network Fuzzy Inference Systems.- Chapter 4.Modeling and Performance Analysis of Free SpaceQuantum Key Distribution.- Chapter5. Design ofa Low-delay-write Model of a TMCAM.- m]Chapter 6. SLA Based E-Learning Service Provisioning in Cloud.-Chapter 7. Estimatingthe Similarities of G7 Countries Using Economic Parameters.- Chapter 8.Offline Malayalam Character Recognition: AComparative Study Using Multiple Classifier Combination Techniques.- Chapter 9.A Comparative Study on Load Balancing Algorithmsfor SIP servers.- Chapter 10. Design ofWireless Sensor Network Based Embedded Systems for Aquaculture EnvironmentMonitoring.- Chapter 11. Touch-to-learn:A Tangible Learning System for Hard-of Hearing Children.- Chapter 12.Creating Low Cost Multi-gesture Device Control by UsingDepth Sensing.- Chapter 13. Evaluationof Glomerular Filtration Rate by Single Frame Method applying GATES Formula.- Chapter 14.Design and Development of Cost Effective WearableGlove for Automotive Industry.- Chapter15. TamperingLocalization in Digital Image Using First Two Digit Probability Features.- Chapter 16.Classification of Bank Direct Marketing Data UsingSubsets of Training Data.- Chapter17. OfflineWriter Identification and Verification - A State-of-the-Art.- Chapter 18.Handwritten Oriya Digit Recognition Using MaximumCommon Sub-graph Based Similarity Measures.- Chapter 19. Design of Non-volatile SRAM Cell Using Memristor.- Chapter 20.Evolutionary Algorithm Based LFC of Single AreaThermal Power System with Different Steam Configurations and Nonlinearity.- Chapter 21.Game Theory and Its Applications in MachineLearning.- Chapter 22. A Study onSpeech Processing.- Chapter 23. ForestType Classification: A Hybrid NN-GA Model Based Approach.- Chapter 24.Optimizing Technique to Improve the Speed of Data throughputthrough Pipeline.- Chapter 25. AnImproved Data Hiding Scheme in Motion Vectors of Video Streams.- Chapter 26.Hiding Sensitive Items Using Pearson's CorrelationCoefficient Weighing Mechanism.- Chapter27. OpenCV BasedImplementation of Zhang-Suen Thinning Algorithm Using Java for Arabic TextRecognition.- Chapter 28. NumericalModeling of Twin Band MIMO Antenna.- Chapter 29. Performance Evaluation of Video-based Face RecognitionApproaches for Online Video Contextual Advertisement User-oriented System.- Chapter 30.A Survey on Power Gating Techniques in Low PowerVLSI Design.- Chapter 31. PhaseBased Mel Frequency Cepstral Coefficients for Speaker Identification.- A New Block Least Mean Square Algorithm forImproved Active Noise Cancellation.- Chapter 33. An Improved Feedback Filtered-X NLMS Algorithm forNoise Cancellation.- Chapter 34. Applicationof Internet of Things (IoT) for Smart Process Manufacturing in Indian PackagingIndustry.- Chapter 35. FunctionOptimization Using Robust Simulated Annealing.- Chapter 36. Analysis and Optimization of Feature ExtractionTechniques for Content Based Image Retrieval.- Chapter 37. Parametric Curve Based Human Gait Recognition.- Chapter 38.An Energy Efficient Proposed Framework for TimeSynchronization Problem of Wireless Sensor Network.- Chapter 39.Epigenetic and Hybrid Intelligence in Mining Patterns.-Chapter 40. ATechnical Review on LVRT of DFIG Systems.- Chapter 41. An AIS Based Approach for Extraction of PV Module Parameters.-Chapter 42. Word SenseDisambiguation in Bengali: An Auto-updated Learning Set Increases the Accuracyof the Result.- Chapter 43. EfficientMethods to Generate Inverted Indexes for IR.- Chapter 44. Intelligent Mail Box.- Chapter 45. LearningBased No Reference Algorithm for Dropped Frame Identification in UncompressedVideo.- Chapter 46. Multi-viewVideo Summarization.- Chapter 47. ComprehensiveReview of Video Enhancement Algorithms for Low Lighting Conditions.- Chapter 48.A Detailed Review of Color Image ContrastEnhancement Techniques for Real Time Applications.- Chapter 49. A Conceptual Model for Acquisition of MorphologicalFeatures of Highly Agglutinative Tamil Language Using Unsupervised Approach.- Chapter 50.A Fuzzy Approach for the Maintainability Assessmentof Aspect Oriented Systems.- Chapter51. Split andMerge Multi-scale Retinex Enhancement of Magnetic Resonance Medical Images.- Chapter 52.Review on Secured Medical Image Processing.- Chapter 53.Identification of Stages of Malignant Tumor in MRMImages using Level Set algorithm and Textural Analysis.- Chapter 54.Reviews Based Mobile Application Development Model(RBMAD).- Chapter 55. Three PhaseSecurity System for Vehicles Using Face Recognition on Distributed Systems.- Chapter 56.SLA Based Utility Analysis for Improving QoS inCloud Computing.- Chapter 57. ADescriptive Study on Resource Provisioning Approaches in Cloud ComputingEnvironment.- Chapter 58. Analyzingthe Performance of a Software and IT Growth with Special Reference to India.- Chapter 59.Stock Price Forecasting Using ANN Method.- Chapter 60.Recognition of Handwritten English Text UsingEnergy Minimisation.- Chapter 61. A NovelCodification Technique for Tacit Knowledge in Software Industry Using Data Miningtechniques.- Chapter 62. AnAnalysis on the Effect of Malicious Nodes on the Performance of LAR Protocol inMANETs.- Chapter 63. QualitativePerformance Analysis of Punjabi and Hindi Websites of Academic Domain: A CaseStudy.- Chapter 64. A Robust, PrivacyPreserving Secret Data Concealing Embedding Technique into Encrypted Video Stream.-Chapter 65. TrustedExecution Environment for Data Protection in Cloud.