home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

satapathy suresh chandra (curatore); mandal jyotsna kumar (curatore); udgata siba k. (curatore); bhateja vikrant (curatore) - information systems design and intelligent applications

Information Systems Design and Intelligent Applications Proceedings of Third International Conference INDIA 2016, Volume 1

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
216,98 €
NICEPRICE
206,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 02/2016
Edizione: 1st ed. 2016





Trama

The third international conference on INformation Systems Design and Intelligent Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9, 2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano-computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only limited to computer researchers but also include mathematics, chemistry, biology, bio-chemistry, engineering, statistics, and all others in which computer techniques may assist.





Sommario

Chapter 1. Study and Analysis of Subthreshold Leakage Current in Sub-65 nm NMOSFET.- Chapter 2. Implementations of Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3. Mitigating & Patching System Vulnerabilities Using Ansible: A Comparative Study of Various Configuration Management Tools for IAAS Cloud.- Chapter 4. Adaptive Fractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5. Improved Resource Exploitation by Combining Hadoop Map Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7. Systematic Evaluation of Seed Germination Models: A Comparative Analysis.- Chapter 8. Business Modeling Using Agile.- Chapter 9. An efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data.- Chapter 10. Application of Machine Learning on Process Metrics for Defect Prediction in Mobile Application.- Chapter 11. Automatic Insurance and Pollution Challan Generator System in India.- Chapter 12. Effectively Implementation of KNN-Search on Multidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Model for Image Filtering.- Chapter 14. Cloud Based K-means Clustering Running as a MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15. Symbolic Decision Tree for Interval Data - An Approach towards Predictive Streaming and Rendering of 3D Models.- Chapter 16. Predictive 3D Content Streaming Based on Decision Tree Classifier Approach.- Chapter 17. Quantitative Characterization of Radiographic Weld Defect Based on the Ground Truth Radiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters for Quality of Power.- Chapter 19. Development Of 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model: INSOLVER.- Chapter 21. DSL Approach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis.- Chapter 23. Brushing - An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data into Groups of Interest.- Chapter 25. Estimation of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26. Network Security in Big Data: Tools and Techniques.- Chapter 27. Design of Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular Automata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29. A Method of Baseline Correction for Offline Handwritten Telugu Text Lines.- Chapter 30. A Technique for Prevention of Derailing and Collision of Trains in India.- Temporal Scintimetric Characterization of Skeletal Hotspots in Bone Scan by Dr. V. Siva’s Retention Ratio.- Chapter 32. Executing Hive Queries on 3-NODE Cluster and AWS Cluster- Comparative Analysis.- Chapter 33. Performance of Speaker Independent Language Identification System under Various Noise Environments.- Chapter 34. Multi-level Fusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view Discriminant Analysis and Source Domain Dictionary Based Face Recognition.- Chapter 36. Mining Maximal Efficient Closed Item Sets without any Redundancy.- Chapter 37. An Interactive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38. Literature Survey on Intrusion Detection Systems in MANETs.- Chapter 39. Apply of Sum of Difference Method to Predict Placement of Students’ Using Educational Data Mining.- Chapter 40. Robust Color Image Multi-thresholding Using Between-class variance and Cuckoo Search Algorithm.- Chapter 41. Social Media: A Review.- Chapter 42. Bayesian-Fuzzy GIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique to Improve Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44. Efficient Iceberg Query Evaluation Using Compressed Bitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46. A Novel Graphical Password Authentication Mechanism for Cloud Services.- Chapter 47. A Conceptual Framework for Big Data Implementation to Handle Large Volume of Complex Data.- Chapter 48. Path Reliability in Automated Test Case Generation Process.- Chapter 49. A Study on Wii Remote Application as Tangible User Interface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using 3D Depth Vision.- Chapter 51. AHP-based Ranking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-board Navigation Unit.- Chapter 53. Web Data Analysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and Its Analysis.- Chapter 55. ICC Cricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State Explosion Problem.- Chapter 57. Real Time Bus Monitoring System.- Chapter 58. High Performance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.- Chapter 59. Dynamic Voltage Restorer Based on Neural Network and Particle Swarm Optimization for Voltage Mitigation.- Chapter 60. Analysis of Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61. SKT: A New Approach for Secure Key Transmission Using MGPISXFS.- Chapter 62. A Comparative Study of Different Approaches for the Speaker Recognition.- Chapter 63. A Time Efficient Leaf Rust Disease Detection Technique of Wheat Leaf Images Using Pearson Correlation Coefficient and Rough Fuzzy C-Means.- Chapter 64. Task Scheduling Algorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65. The State of the Art in Software Reliability Prediction: Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage in Cloud.- Chapter 67. Design New Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the Statistical Features.- Chapter 68. Demand Side Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69. An Optimized Cluster Based Routing Technique in VANET for Next Generation Network.- Chapter 70. AgroKanti: Location-aware Decision Support System for Forecasting of Pests and Diseases in Grapes.- Chapter 71. A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72. Cross Lingual Information Retrieval (CLIR): Review of Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attack through B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals Using Variational Mode Decomposition.- Chapter 75. Data Size Reduction and Maximization of the Network Lifetime over Wireless Sensor Network.





Autore

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Visakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India.

Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Science & Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit.

Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by Ph.D in Computer Science (mobile computing and wireless communication). His main research interests are Wireless Communication, Mobile Computing, Wireless Sensor Networks and Intelligent Algorithms. He was a United Nations Fellow and worked in the United Nations University/ International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings. 

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Application











Altre Informazioni

ISBN:

9788132227533

Condizione: Nuovo
Collana: Advances in Intelligent Systems and Computing
Dimensioni: 235 x 155 mm Ø 11518 gr
Formato: Brossura
Illustration Notes:XX, 753 p. 314 illus.
Pagine Arabe: 753
Pagine Romane: xx


Dicono di noi