|
|
|
|
LEADER |
03701nam a22004935i 4500 |
001 |
978-981-10-2630-0 |
003 |
DE-He213 |
005 |
20170119081708.0 |
007 |
cr nn 008mamaa |
008 |
170119s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811026300
|9 978-981-10-2630-0
|
024 |
7 |
|
|a 10.1007/978-981-10-2630-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UT
|2 bicssc
|
072 |
|
7 |
|a COM069000
|2 bisacsh
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Advances in Computing Applications
|h [electronic resource] /
|c edited by Amlan Chakrabarti, Neha Sharma, Valentina Emilia Balas.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 285 p. 124 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1. Wait Event Tuning in Database Engine -- 2. Machine Learning using k-Nearest Neighbor for Library Resources Classification in Agent based Library Recommender System -- 3. An Efficient Dynamic Scheduling of Tasks for Multi-Core Real Time Systems -- 4. Model based approach for Shadow Detection of Static Images -- 5. Light Fidelity (Li-Fi): In Mobile Communication and Ubiquitous Computing Applications -- 6. Performance Analysis of De Noising Filters MR Images -- 7. A Detailed View on SecureString 3.0 -- 8. Performance Comparison for EMD based Classification of Unstructured Acoustic Environments using GMM and K-NN Classifiers -- 9. Performance of Multimodal Biometric System Based on Level and Method of Fusion -- 10. A DSK based Authentication Technique for Secure Smart Grid Wireless Communication -- 11. A Smart Security Framework for High Risk Locations Using Wireless Authentication by Smart Phone -- 12. High Performance Computation Analysis for Medical Images using High Computational Methods -- 13. Terrorist Scanner Radar and Multiple Object Detection System -- 14. Inexact Implementation of Wavelet Transform and its Performance Evaluation through Bit Width Reduction -- 15. A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency Based Systems -- 16. Performance of Statistical and Neural Network Method for Prediction of Survival of Oral Cancer Patients.
|
520 |
|
|
|a This edited volume presents latest high-quality technical contributions and research results in the areas of computing, informatics, and information management. The book deals with state-of-the-art topics, discussing challenges and possible solutions, and explores future research directions. The main goal of this volume is not only to summarize new research findings but also place these in the context of past work. This volume is designed for a professional audience, composed of researchers, practitioners, scientists and engineers in both academia and the industry.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer graphics.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Chakrabarti, Amlan.
|e editor.
|
700 |
1 |
|
|a Sharma, Neha.
|e editor.
|
700 |
1 |
|
|a Balas, Valentina Emilia.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811026294
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-981-10-2630-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|