ISBN-13: 9788132227502 / Angielski / Miękka / 2016 / 767 str.
ISBN-13: 9788132227502 / Angielski / Miękka / 2016 / 767 str.
Chapter 1. A Short Run Length Descriptor for Image Retrieval.- Chapter 2. A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images.- Chapter 3. Indexing Video by the Content.- Chapter 4. EIDPS: An Efficient Approach to Protect the Network and Intrusion Prevention.- Chapter 5. Slot Utilization and Performance Improvement in Hadoop Cluster.- Chapter 6. An Efficient Educational Data Mining Approach to Support E-Learning.- Chapter 7. A Re-ranking Approach Personalized Web Search Results by Using Privacy Protection.- Chapter 8. An Efficient Virtualization Server Infrastructure for e-Schools of India.- Chapter 9. A Novel Approach for Horizontal Privacy Preserving Data Mining.- Chapter 10. Randomized Cryptosystem Based on Linear Transformation.- Chapter 11. Literature Survey to Improve Image Retrieval Efficiency by Visual Attention Model.- Chapter 12. Substrate Integrated Waveguide Based 4-port Crossover for Beam-forming Applications.- Chapter 13. Computational Model of Pixel Wise Temperature Prediction for Liver Tumor by High Intensity Focused Ultrasound Ablations.- Chapter 14. Implementation of Server Load Balancing in Software Defined Networking.-Chapter 15. Building Stateful Firewall Over Software Defined Networking.- Chapter 16. A Proposed Framework to Adopt Mobile App in ‘e-District’ Projects to Move One Step ahead for Successful Implementation.- Chapter 17. A Semantic Framework to Standardize Cloud Adoption Process.- Chapter 18. Analysis of Efficiency of Classification and Prediction Algorithms (kNN) for Breast Cancer Dataset.- Chapter 19. A Novel Genetic Algorithm and Particle Swarm Optimization for Data Clustering.- Chapter 20. Design Issues of Big Data Parallelisms.- Chapter 21. Revised ECLAT Algorithm for Frequent Itemset Mining.- Chapter 22. User-interface Design Framework for e-learning through Mobile Devices.- Chapter 23. Application of Three Different Artificial Neural Network Architectures for Voice Conversion.- Chapter 24. Foreground Background Segmentation For Video Processing through Dynamic Hand Gestures.- Chapter 25. Load Encroachment Detection Algorithm for Digital Signal Processor Based Numerical Relay.- Chapter 26. K-Nearest Neighbour and Boundary Cutting Algorithm for Intrusion Detection System.- Chapter 27. Analysis of Electromagnetic Radiation from Cellular Networks considering Geographical Distance and Height of the Antenna.- Chapter 28. Revitalizing VANET Communication Using Bluetooth Devices.- Chapter 29. Virtual Manipulation: An On-screen Interactive Visual Design for Science Learning.- Chapter 30. Bundle Block Detection Using Genetic Neural Network.- Chapter 31. Tools for Data Visualization in Business Intelligence: Case Study Using the Tool Qlikview.- Chapter 32. Application of Support Vector Machines for Fast and Accurate Contingency Ranking in Large Power System.- Chapter 33. A Novel Circular Monopole Fractal Antenna for Bluetooth and UWB Applications with Subsequent Increase in Gain Using Frequency Selective Surfaces.- Chapter 34. Application of Clustering for Improving Search Result of a Website.- Chapter 35. Performance Evaluation of Basic Selfish Node Detection Strategy on Delay Tolerant Networking Routing Protocols.- Chapter 36. Dynamic Texture Recognition: A Review.- Chapter 37. Performance Analysis of Fully Depleted Ultrathin-body (FD UTB) SOI MOSFET Based CMOS Inverter Circuit for Low Power Digital Applications.- Chapter 38. Mathematical Vector Quantity Modulated Three Phase Four Leg Inverter.- Chapter 39. 21st C New Technologies: A Pathway to Inclusive and Sustainable Growth.- Chapter 40. Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference Expansion.- Chapter 41. Design of Adaptive Filter Using Vedic Multiplier for Low Power.- Chapter 42. Issues and Approaches to Design of a Range Image Face Database.- Chapter 43. A Secure Homomorphic Routing Technique in Wireless Mesh Network (HRT for WMN).- Chapter 44. Fuzzy Based Fault Location Estimation during Unearthed Open Conductor Faults in Double Circuit Transmission Line.- Chapter 45. Optimization in Round Robin Process Scheduling Algorithm.- Chapter 46. Frequency Dependent Lumped Model of Twin Band MIMO Antenna.- Chapter 47. A Novel Framework for Integrating Data Mining Techniques to Software Development Phases.- Chapter 48. Survey of Improved k-means Clustering Algorithms: Improvements, Shortcomings and Scope for further Enhancement and Scalability.- Chapter 49. Attack Identification Framework for IoT Devices.- Chapter 50. Compact Coalescence Clustering Algorithm (C3A) - A GIS Anchored Approach of Clustering Discrete Points.- Chapter 51. Miniaturized UWB BPF with a Notch Band at 5.8 GHz Using Cascaded Structure of Highpass and Lowpass Filter.- Chapter 52. Dual-Band Microstrip Fed Monopole Patch Antenna for WiMAX and WLAN Applications.- Chapter 53. Script Based Trilingual Handwritten Word Level Multiple Skew Estimation.- Chapter 54. Deep Convolutional Neural Network Classifier for Handwritten Devanagari Character Recognition.- Chapter 55. A Clustering-based Generic Interaction Protocol for Multi-agent Systems.- Chapter 56. An Improved Content Based Medical Image Retrieval System Using Integrated Steerable Texture Components and User Interactive Feedback Method.- Chapter 57. Improvement of Stability by Optimal Location with Tuning STATCOM Using Particle Swarm Optimization Algorithm.- Chapter 58. Identifying Crop Specific Named Entities from Agriculture Domain Using Semantic Vector.- Chapter 59. MED-HYREC: A Recommendation System for Medical Domain.- Chapter 60. Statistical and Linguistic Knowledge Based Speech Recognition System: Language Acquisition Device for Machines.- Chapter 61. Energy Stability in Cloud for Web Page Ranking.- Chapter 62. Web Based System Design Using Session Relevancy.- Chapter 63. Design of IOT Based Architecture Using Real Time Data.- Chapter 64. Performance Evaluation of Classifier Combination Techniques for the Handwritten Devanagari Character Recognition.- Chapter 65. An Improved Kuan Algorithm for Despeckling of SAR Images.- Chapter 66. GSM Based Automated Detection Model for Improvised Explosive Devices.- Chapter 67. Review on Video Watermarking Techniques in Spatial and Transform Domain.- Chapter 68. Musical Noise Reduction Capability of Various Speech Enhancement Algorithms.- Chapter 69. Model with Cause and Effect for MANET (M-CEM).- Chapter 70. Parameters Quantification of Genetic Algorithm.- Chapter 71. Emotion recognition: A Step Ahead of Traditional Approaches.- Chapter 72. Evaluation of Genetic Algorithm’s Selection Methods.- Chapter 73. An Amalgated Strategy for Iris Recognition Employing Neural Network and Hamming Distance.- Chapter 74. A Comparative Investigation of Sample vs. Normal Map for Effective BigData Processing.- Chapter 75. Big Data Management System for Personal Privacy Using SW and SDF.
Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and Life Member of Computer society of India. Currently, he is the National Chairman of Division-V (Education and Research) of Computer Society of India.
Dr. J.K. Mandal has M.Sc. in Physics from Jadavpur University in 1986, M.Tech. in Computer Science from University of Calcutta. He was awarded PhD. in Computer Science & Engineering by Jadavpur University in 2000. Presently, he is working as Professor of Computer Science & Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as lecturer at NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9 volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill, CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various International Journals and Conferences. He has over 355 articles and 5 books published to his credit.
Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by Ph.D in Computer Science (mobile computing and wireless communication). His main research interests are Wireless Communication, Mobile Computing, Wireless Sensor Networks and Intelligent Algorithms. He was a United Nations Fellow and worked in the United Nations University/ International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer LNCS/LNAI and Springer AISC Proceedings.
Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks, soft computing and bio-inspired computing techniques. He has more than 90 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience Publishers. At present he is guest editors for two special issues floated in International Journal of Rough Sets and Data Analysis (IJRSDA) and International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.
The third international conference on INformation Systems Design and Intelligent Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9, 2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano-computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only limited to computer researchers but also include mathematics, chemistry, biology, bio-chemistry, engineering, statistics, and all others in which computer techniques may assist.
1997-2024 DolnySlask.com Agencja Internetowa