Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.…mehr
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering at Anil Neerukonda Institute of Technology and Sciences (ANITS), Andhra Pradesh, India. He obtained his Ph.D. in Computer Science and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela, Odisha, India. He has 26 years of teaching experience. His research interests are data mining, machine intelligence and swarm intelligence. He has acted as program chair of many international conferences and edited 6 volumes of proceedings from Springer LNCS and AISC series. He is currently guiding 8 scholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE. Mr. Amit Joshi has an experience of around 6 years in academic and industry in prestigious organizations of Rajasthan and Gujarat. Currently, he is working as an Assistant Professor in Department of Information Technology at Sabar Institute in Gujarat. He is an active member ofACM, CSI, AMIE, IEEE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, he is Honorary Secretary of CSI Udaipur Chapter and Honorary Secretary for ACM Udaipur Chapter. He has presented and published more than 40 papers in National and International Journals/Conferences of IEEE, Springer, and ACM. He has also edited three books on diversified subjects including Advances in Open Source Mobile Technologies, ICT for Integrated Rural Development and ICT for Competitive Strategies. He has also organized more than 25 National and International Conferences and Workshops including International Conference ETNCC 2011 at Udaipur through IEEE, International Conference ICTCS 2014 at Udaipur through ACM, International Conference ICT4SD 2015 by Springer. He has also served on Organising and Program Committee of more than 50 Conferences/Seminars/Workshops throughout the World and presented 6 invited talks in various conferences. For his contribution towards thesociety, The Institution of Engineers (India), ULC, has given him Appreciation award on the celebration of Engineers, 2014 and by SIG-WNs Computer Society of India on ACCE , 2012. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Bhateja has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.
Inhaltsangabe
Chapter 1. Experimental Analysis on Big Data in IOT based Architecture.- Chapter 2. Morphology Based Approach for Number Plate Extraction.- Chapter 3. NeSeDroid - Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing.- Chapter 4. RiCoBiT - Ring Connected Binary Tree: A Structured and Scalable Architecture for Network on Chip Based Systems: An Exclusive Summary.- Chapter 5. Application of Compressed Sensing (CS) for ECG Signal Compression: A Review.- Chapter 6. Tracking Pointer Based Approach for Iceberg Query Evaluation.- Chapter 7. Performance Evaluation of Shortest Path Routing Algorithms in Real-road Networks.- Chapter 8. An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey.- Chapter 9. Content Search Quaternary Look-up Table Architecture.- Chapter 10. Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA.- Chapter 11. A Graph BasedActive Learning Approach Using Forest Classifier for Image Retrieval.- Chapter 12. Comparative Analysis of Android Malware Detection Techniques.- Chapter 13. Developing Secure Cloud Storage System by Using Access Control Models.- Chapter 14. ETLR - Effective DWH Design Paradigm.- Chapter 15. Prediction of Reactor Performance in CATSOL Based Sulphur Recovery Unit by ANN.- Chapter 16. A Multilevel Clustering Using Multi-hop and Multi-head in VANET.- Chapter 17. Patient-speci Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images.- Chapter 18. A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition.- Chapter 19. Methods for Individual and Group Decision Making Using Interval Valued Fuzzy Preference Relations.- Chapter 20. A New Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme.- Chapter 21. Significance of Frequency Band Selection of MFCC for Text-independent Speaker Identification.- Chapter 22. Ensuring Performance of Graphics Processing Units: A Programmer's Perspective.- Chapter 23. Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax.- Chapter 24. Novel All Optical Encoding and Decoding Scheme for Code Preservation.- Chapter 25. XPM BASED Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF.- Chapter 26. Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond.- Chapter 27. Performance Analysis of LPC and MFCC Features in Voice Conversion using Artificial Neural Networks.- Chapter 28. Person Detection & Tracking Using Sparse Matrix Measurement for Visual Surveillance.- Chapter 29. Improvisation in Frequent Pattern Mining Technique.- Chapter 30. Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120nm Technology.- Chapter 31. Detailed Survey on Attacks in Wireless Sensor Network.- Chapter 32. Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network.- Chapter 33. Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment.- Chapter 34. Biologically Inspired Techniques for Cognitive Decision-Making.- Chapter 35. Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods.- Chapter 36. Leveraging Virtualization for Optimal Resource Management in a Cloud Environment.- Chapter 37. Reconfigurable Circular Microstrip Patch Antenna With Polarization Diversity.- Chapter 38. Issues with DCR and NLSR in Named Based Routing Protocol.- Chapter 39. Design and Analysis of Quantum Dot Cellular Automata Technology based Reversible Multifunction Block.- Chapter 40. Text Independent Automatic Accent Identification Systemfor Kannada Language.- Chapter 41. Study The Effect of Adaptive Boosting on Performance of Classifiers for Human Activity Recognition.- Chapter 42. Towards Improved performance of emotion detection: Multimodal approach.- Chapter 43. Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks.- Chapter 44. Multi-Objective Evolution based Scheduling of Computational Intensive Applications in Grid Environment.- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless Multimedia Sensor Networks.- Chapter 46. Mining Frequent Quality Factors of Software System using Apriori Algorithm.- Chapter 47. Algorithm for the Enumeration and Identification of Kinematic Chains.- Chapter 48. A New Congestion Avoidance and Mitigation Mechanism based on Traffic Assignment Factor and Transit Routing in MANET.- Chapter 49. MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks.- Chapter 50. Self-coordinating bus route system to avoid bus bunching.- Chapter 51. Review on Data Hiding In Motion Vectors and in Intra prediction modes for video compression.- Chapter 52. Generation of Product Cipher for Secure Encryption and Decryption based on Vedic Encryption Ideology and using Variable and Multiple Keys.- Chapter 53. A Novel Integer Representation Based Approach for Classification of Text Documents.- Chapter 54. Communication Device for Differently-abled people: A Prototype Model.- Chapter 55. Combination of PCA and Contourlets for Multispectral Image Fusion.- Chapter 56. A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and their Hybridizations.- Chapter 57. An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems.- Chapter 58. Enhancement In Connectivity By Distributed Beamforming In WSN.- Chapter 59. Sparse Representation Based Query Classification using LDA Topic Modeling.- Chapter 60. MULTIPLE HOME AUTOMATION ON RASPBERRY PI.- Chapter 61. Sentiment Analysis based on A.I. over Big Data.- Chapter 62. Negotiation and Monitoring of Service Level Agreements in cloud computing Services.- Chapter 63. IMPACT OF PERFORMANCE MANAGEMENT PROCESS ON PRINT ORGANIZATIONAL PERFORMANCE- IN INDIAN CONTEXT.- Chapter 64. Mobility Aware Path Discovery for efficient routing in Wireless Multimedia Sensor Network.- Chapter 65. Emerging Internet of Things in Revolutionizing Healthcare.- Chapter 66. Swarm Intelligent WSN for Smart City.- Chapter 67. Representing natural language Sentences in RDF graphs to derive Knowledge Patterns.- Chapter 68. A Framework to Enhance Security for OTP SMS in E-Banking Environment using Cryptography and Text Steganography.- Chapter 69. Study on the use of Geographic Information System (GIS) for Effective Transport Planning for Transport for London (TfL).- Chapter 70. AN INTEGRATION OF BIG DATA AND CLOUD COMPUTING.- Chapter 71. A New Approach for Fast Transmission to Remote Cooperative Groups with a New Key Paradigm using Voice Authentication.- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture.- Chapter 73. Software Maintenance: From the Perspective of Effort and Cost Requirement.- Chapter 74. FPGA IMPLEMENTATION OF LOW POWER PIPELINED 32-BIT RISC PROCESSOR USING CLOCK GATING.- Chapter 75. Dynamic Software Aging Detection Based Fault Tolerant Software Rejuvenation Model for Virtualized Environment.- Chapter 76. Analysis of Group Performance by Swarm Agents in SACA Architecture.- Chapter 77. Background Modeling and Foreground Object Detection for Indoor Video Sequence.- Chapter 78. Agri-Guide: An Integrated Approach for Plant Disease Precaution, Detection & Treatment.- Chapter 79. Chapter 80. Significance of Independent Component Analysis (ICA) for Epileptic Seizure Detection Using EEG Signals.
Chapter 1. Experimental Analysis on Big Data in IOT based Architecture.- Chapter 2. Morphology Based Approach for Number Plate Extraction.- Chapter 3. NeSeDroid - Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing.- Chapter 4. RiCoBiT - Ring Connected Binary Tree: A Structured and Scalable Architecture for Network on Chip Based Systems: An Exclusive Summary.- Chapter 5. Application of Compressed Sensing (CS) for ECG Signal Compression: A Review.- Chapter 6. Tracking Pointer Based Approach for Iceberg Query Evaluation.- Chapter 7. Performance Evaluation of Shortest Path Routing Algorithms in Real-road Networks.- Chapter 8. An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey.- Chapter 9. Content Search Quaternary Look-up Table Architecture.- Chapter 10. Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA.- Chapter 11. A Graph BasedActive Learning Approach Using Forest Classifier for Image Retrieval.- Chapter 12. Comparative Analysis of Android Malware Detection Techniques.- Chapter 13. Developing Secure Cloud Storage System by Using Access Control Models.- Chapter 14. ETLR - Effective DWH Design Paradigm.- Chapter 15. Prediction of Reactor Performance in CATSOL Based Sulphur Recovery Unit by ANN.- Chapter 16. A Multilevel Clustering Using Multi-hop and Multi-head in VANET.- Chapter 17. Patient-speci Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images.- Chapter 18. A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition.- Chapter 19. Methods for Individual and Group Decision Making Using Interval Valued Fuzzy Preference Relations.- Chapter 20. A New Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme.- Chapter 21. Significance of Frequency Band Selection of MFCC for Text-independent Speaker Identification.- Chapter 22. Ensuring Performance of Graphics Processing Units: A Programmer's Perspective.- Chapter 23. Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax.- Chapter 24. Novel All Optical Encoding and Decoding Scheme for Code Preservation.- Chapter 25. XPM BASED Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF.- Chapter 26. Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond.- Chapter 27. Performance Analysis of LPC and MFCC Features in Voice Conversion using Artificial Neural Networks.- Chapter 28. Person Detection & Tracking Using Sparse Matrix Measurement for Visual Surveillance.- Chapter 29. Improvisation in Frequent Pattern Mining Technique.- Chapter 30. Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120nm Technology.- Chapter 31. Detailed Survey on Attacks in Wireless Sensor Network.- Chapter 32. Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network.- Chapter 33. Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment.- Chapter 34. Biologically Inspired Techniques for Cognitive Decision-Making.- Chapter 35. Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods.- Chapter 36. Leveraging Virtualization for Optimal Resource Management in a Cloud Environment.- Chapter 37. Reconfigurable Circular Microstrip Patch Antenna With Polarization Diversity.- Chapter 38. Issues with DCR and NLSR in Named Based Routing Protocol.- Chapter 39. Design and Analysis of Quantum Dot Cellular Automata Technology based Reversible Multifunction Block.- Chapter 40. Text Independent Automatic Accent Identification Systemfor Kannada Language.- Chapter 41. Study The Effect of Adaptive Boosting on Performance of Classifiers for Human Activity Recognition.- Chapter 42. Towards Improved performance of emotion detection: Multimodal approach.- Chapter 43. Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks.- Chapter 44. Multi-Objective Evolution based Scheduling of Computational Intensive Applications in Grid Environment.- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless Multimedia Sensor Networks.- Chapter 46. Mining Frequent Quality Factors of Software System using Apriori Algorithm.- Chapter 47. Algorithm for the Enumeration and Identification of Kinematic Chains.- Chapter 48. A New Congestion Avoidance and Mitigation Mechanism based on Traffic Assignment Factor and Transit Routing in MANET.- Chapter 49. MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks.- Chapter 50. Self-coordinating bus route system to avoid bus bunching.- Chapter 51. Review on Data Hiding In Motion Vectors and in Intra prediction modes for video compression.- Chapter 52. Generation of Product Cipher for Secure Encryption and Decryption based on Vedic Encryption Ideology and using Variable and Multiple Keys.- Chapter 53. A Novel Integer Representation Based Approach for Classification of Text Documents.- Chapter 54. Communication Device for Differently-abled people: A Prototype Model.- Chapter 55. Combination of PCA and Contourlets for Multispectral Image Fusion.- Chapter 56. A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and their Hybridizations.- Chapter 57. An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems.- Chapter 58. Enhancement In Connectivity By Distributed Beamforming In WSN.- Chapter 59. Sparse Representation Based Query Classification using LDA Topic Modeling.- Chapter 60. MULTIPLE HOME AUTOMATION ON RASPBERRY PI.- Chapter 61. Sentiment Analysis based on A.I. over Big Data.- Chapter 62. Negotiation and Monitoring of Service Level Agreements in cloud computing Services.- Chapter 63. IMPACT OF PERFORMANCE MANAGEMENT PROCESS ON PRINT ORGANIZATIONAL PERFORMANCE- IN INDIAN CONTEXT.- Chapter 64. Mobility Aware Path Discovery for efficient routing in Wireless Multimedia Sensor Network.- Chapter 65. Emerging Internet of Things in Revolutionizing Healthcare.- Chapter 66. Swarm Intelligent WSN for Smart City.- Chapter 67. Representing natural language Sentences in RDF graphs to derive Knowledge Patterns.- Chapter 68. A Framework to Enhance Security for OTP SMS in E-Banking Environment using Cryptography and Text Steganography.- Chapter 69. Study on the use of Geographic Information System (GIS) for Effective Transport Planning for Transport for London (TfL).- Chapter 70. AN INTEGRATION OF BIG DATA AND CLOUD COMPUTING.- Chapter 71. A New Approach for Fast Transmission to Remote Cooperative Groups with a New Key Paradigm using Voice Authentication.- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture.- Chapter 73. Software Maintenance: From the Perspective of Effort and Cost Requirement.- Chapter 74. FPGA IMPLEMENTATION OF LOW POWER PIPELINED 32-BIT RISC PROCESSOR USING CLOCK GATING.- Chapter 75. Dynamic Software Aging Detection Based Fault Tolerant Software Rejuvenation Model for Virtualized Environment.- Chapter 76. Analysis of Group Performance by Swarm Agents in SACA Architecture.- Chapter 77. Background Modeling and Foreground Object Detection for Indoor Video Sequence.- Chapter 78. Agri-Guide: An Integrated Approach for Plant Disease Precaution, Detection & Treatment.- Chapter 79. Chapter 80. Significance of Independent Component Analysis (ICA) for Epileptic Seizure Detection Using EEG Signals.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497