E-Book, Englisch, Band 433, 753 Seiten, eBook
Satapathy / Mandal / Udgata Information Systems Design and Intelligent Applications
1. Auflage 2016
ISBN: 978-81-322-2755-7
Verlag: Springer India
Format: PDF
Kopierschutz: 1 - PDF Watermark
Proceedings of Third International Conference INDIA 2016, Volume 1
E-Book, Englisch, Band 433, 753 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-81-322-2755-7
Verlag: Springer India
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. Study and Analysis of Subthreshold Leakage Current
in Sub-65 nm NMOSFET.- Chapter 2. Implementations
of Secure Reconfigurable Cryptoprocessor: A Survey.- Chapter 3.
Mitigating & Patching System Vulnerabilities Using
Ansible: A Comparative Study of Various Configuration Management Tools for IAAS
Cloud.- Chapter 4. Adaptive
Fractal Image Compression Based on Adaptive Thresholding in DCT Domain.- Chapter 5.
Improved Resource Exploitation by Combining Hadoop
Map Reduce Framework with VirtualBox.- Chapter 6. Density Based Outlier Detection Technique.- Chapter 7.
Systematic Evaluation of Seed Germination Models: A
Comparative Analysis.- Chapter 8. Business
Modeling Using Agile.- Chapter 9.
An efficient Hybrid Encryption Technique Based on
DES and RSA for Textual Data.- Chapter
10. Application
of Machine Learning on Process Metrics for Defect Prediction in Mobile
Application.- Chapter 11. Automatic
Insurance and Pollution Challan Generator System in India.- Chapter 12.
Effectively Implementation of KNN-Search on
Multidimensional Data Using Quadtree.- Chapter 13. Edge Detectors Based Telegraph Total Variational Model
for Image Filtering.- Chapter 14.
Cloud Based K-means Clustering Running as a
MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout.- Chapter 15.
Symbolic Decision Tree for Interval Data - An Approach
towards Predictive Streaming and Rendering of 3D Models.- Chapter 16.
Predictive 3D Content Streaming Based on Decision
Tree Classifier Approach.- Chapter
17. Quantitative
Characterization of Radiographic Weld Defect Based on the Ground Truth
Radiographs made on a Stainless Steel Plates.- Chapter 18. Research and Topology of Shunt Active Filters for
Quality of Power.- Chapter 19. Development
Of 3d High Definition Endoscope System.- Chapter 20. Excel Solver for Deterministic Inventory Model:
INSOLVER.- Chapter 21. DSL
Approach for Development of Gaming Applications.- Chapter 22. Digital Forensic Architecture for Cloud Computing
Systems: Methods of Evidence Identification, Segregation, Collection and
Partial Analysis.- Chapter 23. Brushing -
An Algorithm for Data Deduplication.- Chapter 24. A New Approach for Integrating Social Data into
Groups of Interest.- Chapter 25. Estimation
of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles.- Chapter 26.
Network Security in Big Data: Tools and Techniques.-
Chapter 27. Design of
Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular
Automata.- Chapter 28. Advanced Congestion Control Techniques for MANET.- Chapter 29.
A Method of Baseline Correction for Offline
Handwritten Telugu Text Lines.- Chapter
30. A
Technique for Prevention of Derailing and Collision of Trains in India.-
Temporal Scintimetric Characterization of Skeletal
Hotspots in Bone Scan by Dr. V. Siva’s Retention Ratio.- Chapter 32.
Executing Hive Queries on 3-NODE Cluster and AWS
Cluster- Comparative Analysis.- Chapter
33. Performance
of Speaker Independent Language Identification System under Various Noise
Environments.- Chapter 34. Multi-level
Fusion of Palmprint and Dorsal hand Vein.- Chapter 35. A Comparative Study on Multi-view Discriminant
Analysis and Source Domain Dictionary Based Face Recognition.- Chapter 36.
Mining Maximal Efficient Closed Item Sets without
any Redundancy.- Chapter 37. An
Interactive freehand ROI Tool for Thyroid Uptake studies Using Gamma Camera.- Chapter 38.
Literature Survey on Intrusion Detection Systems in
MANETs.- Chapter 39. Apply of
Sum of Difference Method to Predict Placement of Students’ Using Educational
Data Mining.- Chapter 40. Robust Color
Image Multi-thresholding Using Between-class variance and Cuckoo Search
Algorithm.- Chapter 41. Social
Media: A Review.- Chapter 42. Bayesian-Fuzzy
GIS Overlay to Construe Congestion Dynamics.- Chapter 43. A Hybrid Clustering Technique to
Improve Big Data Accessibility Based on Machine Learning Approaches.- Chapter 44.
Efficient Iceberg Query Evaluation Using Compressed
Bitmap Index Technique in Distributed Databases.- Chapter 45. Unique Identifier System Using Aneka Platform.- Chapter 46.
A Novel Graphical Password Authentication Mechanism
for Cloud Services.- Chapter 47. A
Conceptual Framework for Big Data Implementation to Handle Large Volume of Complex
Data.- Chapter 48. Path
Reliability in Automated Test Case Generation Process.- Chapter 49.
A Study on Wii Remote Application as Tangible User
Interface in Elementary Classroom Teaching.- Chapter 50. Enhanced Understanding of Education Content Using
3D Depth Vision.- Chapter 51. AHP-based
Ranking of Cloud-Service Providers.- Chapter 52. Hardware Prototyping for Enhanced Resilient On-board
Navigation Unit.- Chapter 53. Web Data
Analysis Using Negative Association Rule Mining.- Chapter 54. Cloud Based Thermal Management System Design and Its
Analysis.- Chapter 55. ICC
Cricket World Cup Prediction Model.- Chapter 56. Towards distributed Solution to the State Explosion
Problem.- Chapter 57. Real Time
Bus Monitoring System.- Chapter
58. High
Performance DFT Architectures Using Winograd Fast Fourier Transform Algorithm.-
Chapter 59. Dynamic
Voltage Restorer Based on Neural Network and Particle Swarm Optimization for
Voltage Mitigation.- Chapter 60. Analysis
of Norms in Adaptive Algorithm on Application of System Identification.- Chapter 61.
SKT: A New Approach for Secure Key Transmission Using
MGPISXFS.- Chapter 62. A Comparative
Study of Different Approaches for the Speaker Recognition.- Chapter 63.
A Time Efficient Leaf Rust Disease Detection
Technique of Wheat Leaf Images Using Pearson Correlation Coefficient and Rough
Fuzzy C-Means.- Chapter 64. Task Scheduling
Algorithms with Multiple Factor in Cloud Computing Environment.- Chapter 65.
The State of the Art in Software Reliability Prediction:
Software Metrics and Fuzzy Logic Perspective.- Chapter 66. An Indexed Approach for Multiple Data Storage in
Cloud.- Chapter 67. Design New
Bi-orthogonal Wavelet Filter for Extraction of Blood Vessels and Calculate the
Statistical Features.- Chapter
68. Demand
Side Management Using Bacterial Foraging Optimization Algorithm.- Chapter 69.
An Optimized Cluster Based Routing Technique in
VANET for Next Generation Network.- Chapter
70. AgroKanti:
Location-aware Decision Support System for Forecasting of Pests and Diseases in
Grapes.- Chapter 71. A Unified
Modeling Language Model for Occurrence and Resolving of Cyber Crime.- Chapter 72.
Cross Lingual Information Retrieval (CLIR): Review
of Tools, Challenges and Translation Approaches.- Chapter 73. Minimizing the Cost of Losses Due to Cyber Attack
through B. B. (Branch and Bound) Technique.- Chapter 74. Denoising Knee Joint Vibration Signals Using
Variational Mode Decomposition.- Chapter
75. Data Size
Reduction and Maximization of the Network Lifetime over Wireless Sensor Network.