Emerging Research in Electronics, Computer Science and Technology Proceedings of International Conference, ICERECT 2012 /

PES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sridhar, V. (Επιμελητής έκδοσης), Sheshadri, Holalu Seenappa (Επιμελητής έκδοσης), Padma, M C. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New Delhi : Springer India : Imprint: Springer, 2014.
Σειρά:Lecture Notes in Electrical Engineering, 248
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Retinal Vessel Segmentation Using Local Entropy Thresholding
  • Implementation of Minutiae Extraction and False Minutiae Elimination for Fingerprint Image on FPGA
  • Resistive Fractal FSS Based Broad Band Radar Absorber for Aircraft Stealth Applications
  • FPGA AND ASIC Implementation of 16-bit Vedic Multiplier Using Urdhva Triyakbhyam Sutra
  • Multi-Algorithm Decision Level Fusion Using Finger Knuckle Print Biometric
  • Encryption of Compressed Video Using Efficient RSA-CRT Algorithm
  • Design of High Speed Reconfigurable Coprocessor for Next Generation Communication Platform
  • Secret Code Authentication Using Enhanced Visual Cryptography
  • A Data Acquisition (DAQ) Architecture for FPGA Implementation
  • Finite Dimensional Realization of Lavrentiev Regularization for Nonlinear Ill-posed Equations
  • Video Signals Demodulator for Satellite Communication
  • Importance of On-Demand Modified Power Aware DSR in MANETs
  • Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation
  • Security in Pervasive Computing - Risk Probability Assessment Model
  • CPU Load Based Countermeasure Technique for Intelligent DoS Attack Targeting Firewalls
  • A Practical Current Measurement Using Rogowski Coil and Haar Wavelet
  • Improved Accuracy of High Order Legendre Polynomial Roots in MATLAB
  • Stability Analysis of Speech Synthesis Filter of CELP Based AMR-WB Codec
  • Performance Analysis of AODV and AOMDV Routing Protocols on Scalability for MANETs
  • Feature Level Image Fusion Using DWT, SWT & DT-CWT
  • Aircraft Recognition System Using Image Analysis
  • Design of Physical Layer Transmitter and Receiver for Proximity-1 Space Link Protocol Using VHDL
  • Semantic Analysis of Precise Detection Rate in Multi-Object Mobility on Natural Scene Using Kalman Filter
  • EEG Seizure Analysis Using Fractal Dimensions during Electroconvulsive Therapy
  • Medical Image Denoising Using Wavelet Based Ridgelet Transform
  • Real-Time Retrieval System for Heritage Images
  • PDMWSN - A Probable Approach to Detect Malicious Node in Wireless Sensor Network
  • Study of Partial Discharge in Pressboards
  • 3DS3: A Framework for 3D Static Scene Streaming
  • An Efficient Approach to Detect Clone Attacks in Wireless Sensor Networks Using Random Walk Protocol
  • Size and Shape Based Ovarian Abnormality Detection of Ultrasound Images
  • Rate Quality Factor Optimization for VP8 Video Codec for Mobile Communication Applications
  • Congestion Control by Heuristics in High Speed Networks Using ANN
  • Low Power Sum of Absolute Difference Architecture for Video Coding
  • An Integrated Method for Classification of Indus and English Document Images
  • Uterine Fibroid Segmentation and Measurement Based on Morphological Functions in Graphical Vision Assistant Tool
  • Efficient Algorithm for Image Compression Using DWT Techniques
  • Identification of Common Indian Leafy Vegetables Based on Statistical Measures on Combined Color and Texture Features
  • Fast Pattern Matching Approach for Intrusion Detection Systems
  • A Comparative Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks
  • Implementation of an Ethernet Bridge Using Avalon Memory Mapped Interface
  • Performance Analysis of EBG Antenna for Base Station Applications
  • Web Images Evaluations Based on Visual Content
  • Robust Speech Recognition Using Wavelet Domain Front End and Hidden Markov Models
  • Combining Ensemble of Classifiers Using Voting Based Rule to Predict Radiological Ratings for Lung Nodule Malignancy
  • A Secured Authentication System Using an Effective Keystroke Dynamics
  • High Speed Low Power VLSI Architecture for SPST Equipped Booth Multiplier Using Modified Carry Look Ahead Adder
  • Energy Efficient ECC Encryption Using ECDH
  • Adaptive Support Weight Based Stereo Correspondence Algorithm for Face Images
  • Adaptive Traffic Load-Sharing for GSM Network
  • Psychoacoustic Model-1 Implementation for MPEG Audio Encoder Using Wavelet Packet Decomposition
  • Recommending Music by Combining Content-Based and Collaborative Filtering with User Preferences
  • Performance of Sphere Decoder for MIMO System Using LLL Algorithm
  • Reduced Bit Rate Using Image Inpainting
  • Biometric Vault Scheme Using Data Hiding and Standard Encryption
  • Voltage Stabilization Through Reactive Power Injection at Secondary Terminals of Distribution Level Feeders – Using Thyristor Switched Capacitor
  • Exposing Digital Forgery in Video By Mean Frame Comparison Techniques
  • Mobile WiMAX Performance Improvement Using MRRC Scheme for Real Time Application
  • Feature Extraction Using Shearlet Cone Representation for Face Recognition
  • Combined SLM and Companding for PAPR Reduction in OFDM
  • Color Image Digital Watermarking
  • Damped Sinusoidal Basis Functions Based Transformation for Image Compression
  • Energy Model for the Configured MSP430F1612 on a TELOSB Mote with the Help of Contiki
  • Design and Implementation of an Advanced Rectifier Stage Topology with Maximum Power Point Tracking for Hybrid Energy Systems
  • Novel Boundary Evolving Algorithm Using Iterative Curve fitting Technique to Trim Down the Image Inpainting Complexity Under Extreme Conditions
  • ICA and PCA Based Face Recognition Systems-A Survey
  • Relationship between View Angle and Distance Between Parallel Edges with Vanishing Point in 2D Images
  • Air Borne Character Recognition System with Image Processing Techniques
  • An Intelligent Clustered Cooperative Transmission Protocol for Wireless Sensor Networks
  • An Embedded Web Server for Industrial Automation
  • High Performance Service Scheduling Strategy for Cloud Environment
  • Embedding Patient Information in Medical Images Augmented with Compression by Rotation Technique
  • Development of Morphological Stemmer, Analyzer and Generator for Kannada Nouns
  • Quadtree Based Feature Extraction Technique for Recognizing Handwritten Kannada Characters
  • Effect of Contribution Links on Choosing Hard Goals in GORE Using AHP and TOPSIS
  • Transformation of Artistic form Text to Linear Form Text for OCR Systems Using Radon Transform
  • Boolean Arithmetic Polynomials and Equivalence Checking
  • Generation of High Frequency Pulses for Transient Studies
  • Toffoli Cascade Synthesis of an Optimized Two-bit Comparator
  • Design and Development of BIO-Signal Conditioning and Processing Electronic System by Employing AD-549 and LabVIEW
  • Design of an Optimal Yaw Damper for 747 Jet Aircraft Model
  • Design, Implementation and Verification of CAN Node Interface to Peripheral Ports in FPGA
  • Mining Information from Model Build without Information Disclosure
  • Quantitative Analysis of the Openness of the Major Temporal Arcade in Retinal Fundus Images of Retinopathy of Prematurity
  • DCT-SVM Based Technique for Off-line Signature Verification
  • Headset Prototype Design for Industrial Noise Reduction Using DSP
  • Optimal Location of Series FACTS Device Using PSO Technique to Reduce the Losses and to Enhance Power Transfer Capability in a Power System
  • Effective Integration of Wind Distributed Generation to Power Grid with STATCOM
  • Novel Shannon Based Low Power Full Adder Architecture for Neural Network Applications
  • Novel Algorithm for Mobile Location Identification
  • Handwritten Kannada Numerals Recognition Using Discrete Cosine Transform Coefficients
  • Development of Randomized Hybrid Cryptosystem Using Public and Private Key
  • Dynamic Coverage by Homogeneous Mobile Sensor Nodes Using Tri-Hexagonal Scheme.