E-Book, Englisch, Band 398, 721 Seiten, eBook
Suresh / Panigrahi Proceedings of the International Conference on Soft Computing Systems
1. Auflage 2016
ISBN: 978-81-322-2674-1
Verlag: Springer India
Format: PDF
Kopierschutz: 1 - PDF Watermark
ICSCS 2015, Volume 2
E-Book, Englisch, Band 398, 721 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-81-322-2674-1
Verlag: Springer India
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1.
A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors.-
Chapter 2.
Study of Chunking Algorithm in Data De-Duplication.-
Chapter 3.
Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography.-
Chapter 4.
Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents.-
Chapter 5.
Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity.-
Chapter 6.
Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight.-
Chapter 7.
Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application.-
Chapter 8.
Non-functional QoS Criterion Based Web Service Ranking.-
Chapter 9.
Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data.-
Chapter 10.
A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities.-
Chapter 11.
Facial Expression Recognition Using PCA and Texture Based LDN Descriptor.-
Chapter 12.
Role Based Access Control for Encrypted Data Using Vector Decomposition.-
Chapter 13.
Mobile Controlled Door Locking System with Two-factor Authentication.-
Chapter 14.
Integration of UMTS With WLAN Using Intermediate IMS Network.-
Chapte
r 15. Building a Knowledge Vault with Effective Data Processing and Storage.-
Chapter 16.
Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional.-
Chapter 17.
A Study on Security Issues in Cloud Computing.-
Chapter 18.
An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection.-
Chapter 19.
Search Optimisation in Cloud.-
Chapter 20.
Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach.-
Chapter 21.
Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation.-
Chapter 22.
Advanced Power Demand Controller and Billing System Using GSM.-
Chapter 23.
A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor.-
Chapter 24.
FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm.-
Chapter 25.
Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene.-
Chapter 26.
Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT.-
Chapter 27.
Scalable Casual Data Consistency for Wide Area Storage with Cloud.-
Chapter 28.
An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications.-
Chapter 29.
Big Data and Analytics – A Journey Through Basic Concepts to Research Issues.-
Chapter 30.
Efficient Identification of Bots by K-Means Clustering.- Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology.-
Chapter 33.
Optimal Selection of Security Countermeasures for Effective Information Security.-
Chapter 34.
Stabilization of Load in Content Delivery Networks.-
Chapter 35.
Eigen Based Indexing and Retrieval of Similar Videos.-
Chapter 36.
FoetusCare: An Android App for Pregnancy Care.-
Chapter 37.
Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD).-
Chapter 38.
MIMO Based Efficient Data Transmission Using USRP.-
Chapter 39.
Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm.-
Chapter 40.
A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks.-
Chapter 41.
Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture.-
Chapter 42.
Bio-Sensor Authentication for Medical Applications Using WBAN.-
Chapter 43.
PSO Based Multipath Routing in Wireless Sensor Network.-
Chapter 44.
Information Hiding in H.264, H.265 and MJPEG.-
Chapter 45.
Intelligent Data Prediction System Using Data Mining and Neural Networks.-
Chapter 46.
Resource Allocation for Wireless Network Environment.-
Chapter 47.
Design of PSO Based PI controller for Tension Control in Web Transport Systems.-
Chapter 48.
Distributed Service Level Agreement Driven Dynamic Cloud Resource Management.-
Chapter 49.
Efficient Route Discovery in VANET Using Binary Bat Approach.-
Chapter 50.
Mining Ambiguities Using Pixel-based Content Extraction.-
Chapter 51.
Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm.-
Chapter 52.
Enhancing the Interactivity in Distributed Interactive Applications.-
Chapter 53.
Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab.-
Chapter 54.
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner.-
Chapter 55.
Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models.-
Chapter 56.
Active Warden Attack on Steganography Using Prewitt Filter.-
Chapter 57.
Similarity Scores Evaluation in Social Networking Sites.-
Chapter 58.
Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing.-
Chapter 59.
Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features.-
Chapter 60.
Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining.-
Chapter 61.
NEBULA: Deployment of Cloud Using Open source.-
Chapt
er 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory.-
Chapter 63.
A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System.-
Chapter 64.
Towards Modelling a Trusted and Secured Centralised Reputation System for VANET’s.-
Chapter 65.
A Surveyon Trusted Platform Module For Data Remanence in Cloud.-
Chapter 66.
Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval.-
Chapter 67.
A Hybrid Cloud Architecture for Secure Service –Measures Against Poodle Vulnerability.-
Chapter 68.
An Efficient Authentication System for Data Forwarding Under Cloud Environment.-
Chapter 69.
Survey on Data Mining Techniques with Data Structures.