Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 3 /
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division -...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New Delhi :
Springer India : Imprint: Springer,
2016.
|
Edición: | 1st ed. 2016. |
Colección: | Advances in Intelligent Systems and Computing,
381 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Chapter 1. Gesture Controlled Wireless Device for Disabled
- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout
- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification
- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L
- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient
- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic
- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions
- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization
- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language
- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT
- Chapter 11. CRiPT : Cryptography in Penetration Testing
- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment
- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching
- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique
- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval
- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks
- Chapter 17. Audio Songs Classification Based on Music Patterns
- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique
- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms
- Chapter 20. Neural Network Based Automated Priority Assigner
- Chapter 21. Design of IMC Controller for TI TO Process with Dynamic Close-loop Time Constant
- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s
- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks
- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II
- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance
- Chapter 26. iOTA: Internet of Things Application
- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method
- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation
- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention
- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition
- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications
- Chapter 32. Random Forest for the Real Forests
- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning
- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI)
- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server
- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network
- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram
- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique
- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
- Chapter 40. Visual K-Means approach for Handling Class Imbalance Learning
- Chapter 41. A Framework for Discovering Important Patterns through Parallel Mining of Protein-protein Interaction Network
- Chapter 42. Implementing DNA Encryption Technique in Web Services to Embed Confidentiality in Cloud
- Chapter 43. An Efficient Motion Detection Method Based on Estimation of Initial Motion Field Using Local Variance
- Chapter 44. A Survey on Texture Image Retrieval
- Chapter 45. Converged OAM
- Chapter 46. Rule Reduction of a Neuro-Fuzzy PI Controller with Real-Time Implementation on a Speed Control Process
- Chapter 47. Construction of Binary and Non-binary LDPC like Codes from Kernel Codes
- Chapter 48. Simulation Level Implementation of Face Recognition under Uncontrolled Environment
- Chapter 49. Analyzing State of the Art Techniques for Fusion of Multimodal Biometrics
- Chapter 50. Genetic Algorithmic Approach to Mitigate Starvation in Wireless Mesh Networks
- Chapter 51. Handwritten Indic Script Identification from Document Images - A Statistical Comparison of Different Attribute Selection Techniques in Multi-classifier Environment
- Chapter 52. An FPGA Based Embedded System for Real time Data Processing
- Chapter 53. Clustering of Noisy Regions (CNR) - A GIS Anchored Technique for Clustering on Raster Map
- Chapter 54. Performance of Brightness Enhancement Technique for Narrow-band and White-band Images
- Chapter 55. Z Transformation Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)
- Chapter 56. Breast Tissue Density Classification Using Wavelet Based Texture Descriptors
- Chapter 57. On New Families Related to Bernoulli and Euler Polynomials
- Chapter 58. Vehicular Ad-hoc Networks: Trimming Pile-Ups in Data Dissemination using HTPVANET Algorithm
- Chapter 59. Information Extraction from Research Papers Based on Statistical Methods
- Chapter 60. Artificial Neural Network Classifier for Intrusion Detection System in Computer Network
- Chapter 61. Edge Detection on an Image Using Ant Colony Optimization
- Chapter 62. Cryptography Technique for a Novel Text Using Mathematical Functions
- Chapter 63. A New Hybrid Approach for Document Clustering Using Tabu Search And Particle Swarm Optimization TSPSO
- Chapter 64. An Effective and Efficient Clustering Based on k-Means Using MapReduce and TLBO
- Chapter 65. Detection of Sinkhole Attack in Wireless Sensor Network
- Chapter 66. Enhancement of Stream Ciphers Security Using DNA
- Chapter 67. Object Recognition with Discriminately Trained Part Based Model on HOG (Histogram of Oriented Gradients)
- Chapter 68. Accuracy Assessment of the Images Classification Using RBF with Multi Swarm Optimization Methodology
- Chapter 69. Microstrip Patch Antenna Array with Metamaterial Ground Plane for Wi-MAX Applications
- Chapter 70. Tracking and Speed Estimation of Moving Vehicle for Traffic Surveillance System
- Chapter 71. Authentication of Audio Signals in Frequency Domain (AASF).