Buch, Englisch, Band 435, 669 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 10292 g
Proceedings of Third International Conference INDIA 2016, Volume 3
Buch, Englisch, Band 435, 669 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 10292 g
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-81-322-2756-4
Verlag: Springer India
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Chapter 1. A New Private Security Policy Approach for DDoS
Attack Defense in NGNs.- Chapter
2. An Effective
Approach for Providing Diverse and Serendipitous Recommendations.- Chapter 3.
Envelope Fluctuation Reduction for WiMAX MIMO-OFDM
Signals Using Adaptive Network Fuzzy Inference Systems.- Chapter 4.
Modeling and Performance Analysis of Free Space
Quantum Key Distribution.- Chapter
5. Design of
a Low-delay-write Model of a TMCAM.- m]Chapter 6. SLA Based E-Learning Service Provisioning in Cloud.-
Chapter 7. Estimating
the Similarities of G7 Countries Using Economic Parameters.- Chapter 8.
Offline Malayalam Character Recognition: A
Comparative Study Using Multiple Classifier Combination Techniques.- Chapter 9.
A Comparative Study on Load Balancing Algorithms
for SIP servers.- Chapter 10. Design of
Wireless Sensor Network Based Embedded Systems for Aquaculture Environment
Monitoring.- Chapter 11. Touch-to-learn:
A Tangible Learning System for Hard-of Hearing Children.- Chapter 12.
Creating Low Cost Multi-gesture Device Control by Using
Depth Sensing.- Chapter 13. Evaluation
of Glomerular Filtration Rate by Single Frame Method applying GATES Formula.- Chapter 14.
Design and Development of Cost Effective Wearable
Glove for Automotive Industry.- Chapter
15. Tampering
Localization in Digital Image Using First Two Digit Probability Features.- Chapter 16.
Classification of Bank Direct Marketing Data Using
Subsets of Training Data.- Chapter
17. Offline
Writer Identification and Verification – A State-of-the-Art.- Chapter 18.
Handwritten Oriya Digit Recognition Using Maximum
Common Sub-graph Based Similarity Measures.- Chapter 19. Design of Non-volatile SRAM Cell Using Memristor.- Chapter 20.
Evolutionary Algorithm Based LFC of Single Area
Thermal Power System with Different Steam Configurations and Nonlinearity.- Chapter 21.
Game Theory and Its Applications in Machine
Learning.- Chapter 22. A Study on
Speech Processing.- Chapter 23. Forest
Type Classification: A Hybrid NN-GA Model Based Approach.- Chapter 24.
Optimizing Technique to Improve the Speed of Data throughput
through Pipeline.- Chapter 25. An
Improved Data Hiding Scheme in Motion Vectors of Video Streams.- Chapter 26.
Hiding Sensitive Items Using Pearson’s Correlation
Coefficient Weighing Mechanism.- Chapter
27. OpenCV Based
Implementation of Zhang-Suen Thinning Algorithm Using Java for Arabic Text
Recognition.- Chapter 28. Numerical
Modeling of Twin Band MIMO Antenna.- Chapter 29. Performance Evaluation of Video-based Face Recognition
Approaches for Online Video Contextual Advertisement User-oriented System.- Chapter 30.
A Survey on Power Gating Techniques in Low Power
VLSI Design.- Chapter 31. Phase
Based Mel Frequency Cepstral Coefficients for Speaker Identification.-
A New Block Least Mean Square Algorithm for
Improved Active Noise Cancellation.- Chapter 33. An Improved Feedback Filtered-X NLMS Algorithm for
Noise Cancellation.- Chapter 34. Application
of Internet of Things (IoT) for Smart Process Manufacturing in Indian Packaging
Industry.- Chapter 35. Function
Optimization Using Robust Simulated Annealing.- Chapter 36. Analysis and Optimization of Feature Extraction
Techniques for Content Based Image Retrieval.- Chapter 37. Parametric Curve Based Human Gait Recognition.- Chapter 38.
An Energy Efficient Proposed Framework for Time
Synchronization Problem of Wireless Sensor Network.- Chapter 39.
Epigenetic and Hybrid Intelligence in Mining Patterns.-
Chapter 40. A
Technical Review on LVRT of DFIG Systems.- Chapter 41. An AIS Based Approach for Extraction of PV Module Parameters.-
Chapter 42. Word Sense
Disambiguation in Bengali: An Auto-updated Learning Set Increases the Accuracy
of the Result.- Chapter 43. Efficient
Methods to Generate Inverted Indexes for IR.- Chapter 44. Intelligent Mail Box.- Chapter 45. Learning
Based No Reference Algorithm for Dropped Frame Identification in Uncompressed
Video.- Chapter 46. Multi-view
Video Summarization.- Chapter 47. Comprehensive
Review of Video Enhancement Algorithms for Low Lighting Conditions.- Chapter 48.
A Detailed Review of Color Image Contrast
Enhancement Techniques for Real Time Applications.- Chapter 49. A Conceptual Model for Acquisition of Morphological
Features of Highly Agglutinative Tamil Language Using Unsupervised Approach.- Chapter 50.
A Fuzzy Approach for the Maintainability Assessment
of Aspect Oriented Systems.- Chapter
51. Split and
Merge Multi-scale Retinex Enhancement of Magnetic Resonance Medical Images.- Chapter 52.
Review on Secured Medical Image Processing.- Chapter 53.
Identification of Stages of Malignant Tumor in MRM
Images using Level Set algorithm and Textural Analysis.- Chapter 54.
Reviews Based Mobile Application Development Model
(RBMAD).- Chapter 55. Three Phase
Security System for Vehicles Using Face Recognition on Distributed Systems.- Chapter 56.
SLA Based Utility Analysis for Improving QoS in
Cloud Computing.- Chapter 57. A
Descriptive Study on Resource Provisioning Approaches in Cloud Computing
Environment.- Chapter 58. Analyzing
the Performance of a Software and IT Growth with Special Reference to India.- Chapter 59.
Stock Price Forecasting Using ANN Method.- Chapter 60.
Recognition of Handwritten English Text Using
Energy Minimisation.- Chapter 61. A Novel
Codification Technique for Tacit Knowledge in Software Industry Using Data Mining
techniques.- Chapter 62. An
Analysis on the Effect of Malicious Nodes on the Performance of LAR Protocol in
MANETs.- Chapter 63. Qualitative
Performance Analysis of Punjabi and Hindi Websites of Academic Domain: A Case
Study.- Chapter 64. A Robust, Privacy
Preserving Secret Data Concealing Embedding Technique into Encrypted Video Stream.-
Chapter 65. Trusted
Execution Environment for Data Protection in Cloud.