home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

satapathy suresh chandra (curatore); raju k. srujan (curatore); mandal jyotsna kumar (curatore); bhateja vikrant (curatore) - proceedings of the second international conference on computer and communication technologies

Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 3

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
216,98 €
NICEPRICE
206,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 09/2015
Edizione: 1st ed. 2016





Trama

The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the technical contents of the topics.




Sommario

Chapter 1. Gesture Controlled Wireless Device for Disabled.- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout.- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification.- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L.- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient.- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic.- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions.- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization.- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language.- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT.- Chapter 11. CRiPT : Cryptography in Penetration Testing.- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment.- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching.- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique.- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval.- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks.- Chapter 17. Audio Songs Classification Based on Music Patterns.- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique.- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms.- Chapter 20. Neural Network Based Automated Priority Assigner.- Chapter 21. Design of IMC Controller for TI

TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approach for Handling Class Imbalance Learning.- Chapter 41. A Framework for Discovering Important Patterns through Parallel Mining of Protein-protein Interaction Network.- Chapter 42. Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud.- Chapter 43. An Efficient Motion Detection Method Based on Estimation of Initial Motion Field Using Local Variance.- Chapter 44. A Survey on Texture Image Retrieval.- Chapter 45. Converged OAM.- Chapter 46. Rule Reduction of a Neuro-Fuzzy PI Controller with Real-Time Implementation on a Speed Control Process.- Chapter 47. Construction of Binary and Non-binary LDPC like Codes from Kernel Codes.- Chapter 48. Simulation Level Implementation of Face Recognition under Uncontrolled Environment.- Chapter 49. Analyzing State of the Art Techniques for Fusion of Multimodal Biometrics.- Chapter 50. Genetic Algorithmic Approach to Mitigate Starvation in Wireless Mesh Networks.- Chapter 51. Handwritten Indic Script Identification from Document Images – A Statistical Comparison of Different Attribute Selection Techniques in Multi-classifier Environment.- Chapter 52. An FPGA Based Embedded System for Real time Data Processing.- Chapter 53. Clustering of Noisy Regions (CNR) – A GIS Anchored Technique for Clustering on Raster Map.- Chapter 54. Performance of Brightness Enhancement Technique for Narrow-band and White-band Images.- Chapter 55. Z Transformation Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc).- Chapter 56. Breast Tissue Density Classification Using Wavelet Based Texture Descriptors.- Chapter 57. On New Families Related to Bernoulli and Euler Polynomials.- Chapter 58. Vehicular Ad-hoc Networks: Trimming Pile-Ups in Data Dissemination using HTPVANET Algorithm.- Chapter 59. Information Extraction from Research Papers Based on Statistical Methods.- Chapter 60. Artificial Neural Network Classifier for Intrusion Detection System in Computer Network.- Chapter 61. Edge Detection on an Image Using Ant Colony Optimization.- Chapter 62. Cryptography Technique for a Novel Text Using Mathematical Functions.- Chapter 63. A New Hybrid Approach for Document Clustering Using Tabu Search And Particle Swarm Optimization TSPSO.- Chapter 64. An Effective and Efficient Clustering Based on k-Means Using MapReduce and TLBO.- Chapter 65. Detection of Sinkhole Attack in Wireless Sensor Network.- Chapter 66. Enhancement of Stream Ciphers Security Using DNA.- Chapter 67. Object Recognition with Discriminately Trained Part Based Model on HOG (Histogram of Oriented Gradients).- Chapter 68. Accuracy Assessment of the Images Classification Using RBF with Multi Swarm Optimization Methodology.- Chapter 69. Microstrip Patch Antenna Array with Metamaterial Ground Plane for Wi-MAX Applications.- Chapter 70. Tracking and Speed Estimation of Moving Vehicle for Traffic Surveillance System.- Chapter 71. Authentication of Audio Signals in Frequency Domain (AASF).





Autore

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India.

Dr. K. Srujan Raju is the Professor and Head, Department of CSE, CMR Technical Campus. Professor Srujan earned his PhD in the field of Network Security and his current research includes computer networks, information security, data mining, image processing, intrusion detection and cognitive radio networks. He has published several papers in referred international conferences and peer reviewed journals and also he was in editorial board of CSI 2014 Springer AISC series 337 and 338 volumes. In addition to this, he has served as reviewer for many indexed journals. Professor Raju is also awarded with Significant Contributor, Active Member Awards by Computer Society of India (CSI) and currently he is the Hon. Secretary of CSI Hyderabad Chapter.

Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Scienc

e & Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit.

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in

international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.











Altre Informazioni

ISBN:

9788132225256

Condizione: Nuovo
Collana: Advances in Intelligent Systems and Computing
Dimensioni: 235 x 155 mm Ø 10701 gr
Formato: Brossura
Illustration Notes:XXIV, 693 p. 303 illus.
Pagine Arabe: 693
Pagine Romane: xxiv


Dicono di noi