Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division - V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design,…mehr
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division - V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the technical contents of the topics.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India. Dr. K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus. Professor Srujan earned his PhD in the field of Network Security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in referred international conferences and peer reviewed journals and also he was in editorial board of CSI 2014 Springer AISC series 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Professor Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI) and currently he is the Hon. Secretary of CSI Hyderabad Chapter. Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Science& Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit. Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domainin international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.
Inhaltsangabe
Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network.- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS.- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG.- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems.- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network.- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network.- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection.- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO.- Chapter 9. Natural Language Based Self Learning Feedback Analysis System.- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal.- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS.- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures.- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing.- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval.- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm.- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis.- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning.- Chapter 18. Augmenting Women's Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks.- Chapter 19. Analysis of Student Feedback by Ranking the Polarities.- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals.- Chapter 21. Enhancing the Performance of Map Reduce DefaultScheduler by Detecting Prolonged Task Trackers in Heterogeneous Environments.- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback.- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation.- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System.- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method.- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm.- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems.- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units.- Chapter 29. A Enhanced Micro strip Antenna Using Metamaterial at 2.4 GHz.- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks.- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR).- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System.- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness.- Chapter 34. MRI Classification of Parkinson's Disease Using SVM and Texture Features.- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification.- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning.- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern.- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices.- Chapter 39. A New Approach for Single Text Document Summarization.- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image.- Chapter 41.A Novel Fuzzy Min Max Neural Network and Genetic Algorithm Based Intrusion Detection System.- Chapter 42. Real Time Fault Tolerance Task Scheduling Algorithm with Minimum Energy Consumption.- Chapter 43. Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System.- Chapter 44. A Metric for Ranking the Classifiers for Evaluation of Intrusion Detection System.- Chapter 45. Analysis of Different Neural Network Architectures in Face Recognition System.- Chapter 46. A Novel Approach for Diagnosis of Noisy Component in Rolling bearing Using Improved Empirical Mode Decomposition.- Chapter 47. A Novel Solution of Dijkstra's Algorithm for Shortest Path Routing with Polygonal Obstacles In Wireless Networks Using Fuzzy Mathematics.- Chapter 48. Asymmetric Coplanar Waveguide fed Monopole Antenna with SRR in the Ground Plane.- Chapter 49. Image processing of Natural Calamity Images Using Healthy Bacteria Foraging Optimization Algorithm.- Chapter 50. Necessitate Green Environment for Sustainable Computing.- Chapter 51. Determinantal Approach to Hermite-Sheffer Polynomials.- Chapter 52. Intelligent Traffic Monitoring System.- Chapter 53. Analysis of Mining, Visual Analytics Tools and Techniques in Space and Time.- Chapter 54. Dimensionality reduced Recursive Filter features for hyperspectral classification.- Chapter 55. Customized Web User Interface for Hadoop Distributed File System.- Chapter 56. Reinforcing Web Accessibility for Enhanced Browsers and Functionalities according to W3C Guidelines.- Chapter 57. Feature and Search Space Reduction for Label Dependent Multi-label Classification.- Chapter 58. Link Expiration Based Routing in Wireless Ad hoc Networks.- Chapter 59. Analysis of Dual Beam Pentagonal Patch Antenna.- Chapter 60. Combination of CDLEP and Gabor features for CBIR.- Chapter 61.Scheduling Real Time Transactions Using Deferred Pre-emptive Technique.- Chapter 62. An Intelligent Packet Filtering Based on Bi-Layer Particle Swarm Optimization with Reduced Search Space.- Chapter 63. Storage Optimization of Cloud Using Disjunctive Property of p.- Chapter 64. Co-Training with Clustering for the Semi Supervised Classification of Remote Sensing Images.- Chapter 65. An Integrated Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks.- Chapter 66. Logistic Regression Learning Model for Handling Concept Drift with Unbalanced Data in Credit Card Fraud Detection System.- Chapter 67. Music Revolution through Genetic Evolution Theory.- Chapter 68. Low-Cost Supply Chain Management and Value Chain Management with Real-time Advance Inexpensive Network Computing.- Chapter 69. Opinion classification Based on Product Reviews from an Indian e-commerce Website.- Chapter 70. Mitigation of Fog and Rain Effects in Free Space Optical Transmission Using Combined Diversity.- Chapter 71. Technology Involved in Bridging Physical, Cyber and Hyper World.- Chapter 72. Cloud Load Balancing and Resource Allocation.- Chapter 73. A Novel Methodology to Filter out Unwanted Messages from OSN user's Wall Using Trust Value Calculation.- Chapter 74. Resource Prioritization Technique in Computational Grid Environment.- Chapter 75. Fuzzy-Based M-AODV Routing Protocol in MANETs.- Chapter 76. Cuckoo Search in Test Case Generation and Conforming Optimality Using Firefly Algorithm.- Chapter 77. Time Domain Analysis of EEG to Classify Imagined Speech.- Chapter 78. Accurate Frequency Estimation Method Based on Basis Approach and Empirical Wavelet Transform.- Chapter 79. Hybrid Recommender System with Conceptualization and Temporal preferences.- Chapter 80. An Approach to Detect Intruder in Energy Aware Routing for Wireless MeshNetworks.
Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network.- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS.- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG.- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems.- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network.- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network.- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection.- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO.- Chapter 9. Natural Language Based Self Learning Feedback Analysis System.- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal.- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS.- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures.- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing.- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval.- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm.- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis.- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning.- Chapter 18. Augmenting Women's Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks.- Chapter 19. Analysis of Student Feedback by Ranking the Polarities.- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals.- Chapter 21. Enhancing the Performance of Map Reduce DefaultScheduler by Detecting Prolonged Task Trackers in Heterogeneous Environments.- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback.- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation.- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System.- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method.- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm.- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems.- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units.- Chapter 29. A Enhanced Micro strip Antenna Using Metamaterial at 2.4 GHz.- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks.- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR).- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System.- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness.- Chapter 34. MRI Classification of Parkinson's Disease Using SVM and Texture Features.- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification.- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning.- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern.- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices.- Chapter 39. A New Approach for Single Text Document Summarization.- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image.- Chapter 41.A Novel Fuzzy Min Max Neural Network and Genetic Algorithm Based Intrusion Detection System.- Chapter 42. Real Time Fault Tolerance Task Scheduling Algorithm with Minimum Energy Consumption.- Chapter 43. Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System.- Chapter 44. A Metric for Ranking the Classifiers for Evaluation of Intrusion Detection System.- Chapter 45. Analysis of Different Neural Network Architectures in Face Recognition System.- Chapter 46. A Novel Approach for Diagnosis of Noisy Component in Rolling bearing Using Improved Empirical Mode Decomposition.- Chapter 47. A Novel Solution of Dijkstra's Algorithm for Shortest Path Routing with Polygonal Obstacles In Wireless Networks Using Fuzzy Mathematics.- Chapter 48. Asymmetric Coplanar Waveguide fed Monopole Antenna with SRR in the Ground Plane.- Chapter 49. Image processing of Natural Calamity Images Using Healthy Bacteria Foraging Optimization Algorithm.- Chapter 50. Necessitate Green Environment for Sustainable Computing.- Chapter 51. Determinantal Approach to Hermite-Sheffer Polynomials.- Chapter 52. Intelligent Traffic Monitoring System.- Chapter 53. Analysis of Mining, Visual Analytics Tools and Techniques in Space and Time.- Chapter 54. Dimensionality reduced Recursive Filter features for hyperspectral classification.- Chapter 55. Customized Web User Interface for Hadoop Distributed File System.- Chapter 56. Reinforcing Web Accessibility for Enhanced Browsers and Functionalities according to W3C Guidelines.- Chapter 57. Feature and Search Space Reduction for Label Dependent Multi-label Classification.- Chapter 58. Link Expiration Based Routing in Wireless Ad hoc Networks.- Chapter 59. Analysis of Dual Beam Pentagonal Patch Antenna.- Chapter 60. Combination of CDLEP and Gabor features for CBIR.- Chapter 61.Scheduling Real Time Transactions Using Deferred Pre-emptive Technique.- Chapter 62. An Intelligent Packet Filtering Based on Bi-Layer Particle Swarm Optimization with Reduced Search Space.- Chapter 63. Storage Optimization of Cloud Using Disjunctive Property of p.- Chapter 64. Co-Training with Clustering for the Semi Supervised Classification of Remote Sensing Images.- Chapter 65. An Integrated Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks.- Chapter 66. Logistic Regression Learning Model for Handling Concept Drift with Unbalanced Data in Credit Card Fraud Detection System.- Chapter 67. Music Revolution through Genetic Evolution Theory.- Chapter 68. Low-Cost Supply Chain Management and Value Chain Management with Real-time Advance Inexpensive Network Computing.- Chapter 69. Opinion classification Based on Product Reviews from an Indian e-commerce Website.- Chapter 70. Mitigation of Fog and Rain Effects in Free Space Optical Transmission Using Combined Diversity.- Chapter 71. Technology Involved in Bridging Physical, Cyber and Hyper World.- Chapter 72. Cloud Load Balancing and Resource Allocation.- Chapter 73. A Novel Methodology to Filter out Unwanted Messages from OSN user's Wall Using Trust Value Calculation.- Chapter 74. Resource Prioritization Technique in Computational Grid Environment.- Chapter 75. Fuzzy-Based M-AODV Routing Protocol in MANETs.- Chapter 76. Cuckoo Search in Test Case Generation and Conforming Optimality Using Firefly Algorithm.- Chapter 77. Time Domain Analysis of EEG to Classify Imagined Speech.- Chapter 78. Accurate Frequency Estimation Method Based on Basis Approach and Empirical Wavelet Transform.- Chapter 79. Hybrid Recommender System with Conceptualization and Temporal preferences.- Chapter 80. An Approach to Detect Intruder in Energy Aware Routing for Wireless MeshNetworks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826