Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 2 /

The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division –...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Satapathy, Suresh Chandra (Επιμελητής έκδοσης), Raju, K. Srujan (Επιμελητής έκδοσης), Mandal, Jyotsna Kumar (Επιμελητής έκδοσης), Bhateja, Vikrant (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New Delhi : Springer India : Imprint: Springer, 2016.
Έκδοση:1st ed. 2016.
Σειρά:Advances in Intelligent Systems and Computing, 380
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network
  • Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS
  • Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG
  • Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems
  • Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network
  • Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network
  • Chapter 7. Honey Pot: A Major Technique for Intrusion Detection
  • Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO
  • Chapter 9. Natural Language Based Self Learning Feedback Analysis System
  • Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal
  • Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS
  • Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures
  • Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing
  • Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval
  • Chapter 15. A Data Driven Approach for the Option Pricing Algorithm
  • Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis
  • Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning
  • Chapter 18. Augmenting Women’s Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks
  • Chapter 19. Analysis of Student Feedback by Ranking the Polarities
  • Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals
  • Chapter 21. Enhancing the Performance of Map Reduce Default Scheduler by Detecting Prolonged Task Trackers in Heterogeneous Environments
  • Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback
  • Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation
  • Chapter 24. Wireless Personal Area Network and PSO Based Home Security System
  • Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method
  • Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm
  • Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems
  • Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units
  • Chapter 29. A Enhanced Micro strip Antenna Using Metamaterial at 2.4 GHz
  • Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks
  • Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR)
  • Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System
  • Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness
  • Chapter 34. MRI Classification of Parkinson’s Disease Using SVM and Texture Features
  • Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification
  • Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning
  • Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern
  • Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices
  • Chapter 39. A New Approach for Single Text Document Summarization
  • Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image
  • Chapter 41. A Novel Fuzzy Min Max Neural Network and Genetic Algorithm Based Intrusion Detection System
  • Chapter 42. Real Time Fault Tolerance Task Scheduling Algorithm with Minimum Energy Consumption
  • Chapter 43. Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System
  • Chapter 44. A Metric for Ranking the Classifiers for Evaluation of Intrusion Detection System
  • Chapter 45. Analysis of Different Neural Network Architectures in Face Recognition System
  • Chapter 46. A Novel Approach for Diagnosis of Noisy Component in Rolling bearing Using Improved Empirical Mode Decomposition
  • Chapter 47. A Novel Solution of Dijkstra’s Algorithm for Shortest Path Routing with Polygonal Obstacles In Wireless Networks Using Fuzzy Mathematics
  • Chapter 48. Asymmetric Coplanar Waveguide fed Monopole Antenna with SRR in the Ground Plane
  • Chapter 49. Image processing of Natural Calamity Images Using Healthy Bacteria Foraging Optimization Algorithm
  • Chapter 50. Necessitate Green Environment for Sustainable Computing
  • Chapter 51. Determinantal Approach to Hermite-Sheffer Polynomials
  • Chapter 52. Intelligent Traffic Monitoring System
  • Chapter 53. Analysis of Mining, Visual Analytics Tools and Techniques in Space and Time
  • Chapter 54. Dimensionality reduced Recursive Filter features for hyperspectral classification
  • Chapter 55. Customized Web User Interface for Hadoop Distributed File System
  • Chapter 56. Reinforcing Web Accessibility for Enhanced Browsers and Functionalities according to W3C Guidelines
  • Chapter 57. Feature and Search Space Reduction for Label Dependent Multi-label Classification
  • Chapter 58. Link Expiration Based Routing in Wireless Ad hoc Networks
  • Chapter 59. Analysis of Dual Beam Pentagonal Patch Antenna
  • Chapter 60. Combination of CDLEP and Gabor features for CBIR
  • Chapter 61. Scheduling Real Time Transactions Using Deferred Pre-emptive Technique
  • Chapter 62. An Intelligent Packet Filtering Based on Bi-Layer Particle Swarm Optimization with Reduced Search Space
  • Chapter 63. Storage Optimization of Cloud Using Disjunctive Property of p
  • Chapter 64. Co-Training with Clustering for the Semi Supervised Classification of Remote Sensing Images
  • Chapter 65. An Integrated Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks
  • Chapter 66. Logistic Regression Learning Model for Handling Concept Drift with Unbalanced Data in Credit Card Fraud Detection System
  • Chapter 67. Music Revolution through Genetic Evolution Theory
  • Chapter 68. Low-Cost Supply Chain Management and Value Chain Management with Real-time Advance Inexpensive Network Computing
  • Chapter 69. Opinion classification Based on Product Reviews from an Indian e-commerce Website
  • Chapter 70. Mitigation of Fog and Rain Effects in Free Space Optical Transmission Using Combined Diversity
  • Chapter 71. Technology Involved in Bridging Physical, Cyber and Hyper World
  • Chapter 72. Cloud Load Balancing and Resource Allocation
  • Chapter 73. A Novel Methodology to Filter out Unwanted Messages from OSN user’s Wall Using Trust Value Calculation
  • Chapter 74. Resource Prioritization Technique in Computational Grid Environment
  • Chapter 75. Fuzzy-Based M-AODV Routing Protocol in MANETs
  • Chapter 76. Cuckoo Search in Test Case Generation and Conforming Optimality Using Firefly Algorithm
  • Chapter 77. Time Domain Analysis of EEG to Classify Imagined Speech
  • Chapter 78. Accurate Frequency Estimation Method Based on Basis Approach and Empirical Wavelet Transform
  • Chapter 79. Hybrid Recommender System with Conceptualization and Temporal preferences
  • Chapter 80. An Approach to Detect Intruder in Energy Aware Routing for Wireless Mesh Networks.