Login

Satapathy, Suresh Chandra

ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II

Satapathy, Suresh Chandra - ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II, ebook

334,00€

Ebook, PDF with Adobe DRM
ISBN: 9783319030951
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Content Based Retrieval of Malaria Positive Images from a Clinical Database VIA Recognition in RGB Colour Space
Somen Ghosh, Ajay Ghosh

2. Modified Clustered Approach for Performance Escalation of Distributed Real-Time System
Urmani Kaushal, Avanish Kumar

3. Indian Stock Market Predictor System
C. H Vanipriya, K. Thammi Reddy

4. Text Clustering Using Reference Centered Similarity Measure
Ch. S. Narayana, P. Ramesh Babu, M. Nagabushana Rao, Ch. Pramod Chaithanya

5. A Comparative Analysis of New Approach with an Existing Algorithm to Detect Cycles in a Directed Graph
Shubham Rungta, Samiksha Srivastava, Uday Shankar Yadav, Rohit Rastogi

6. Super Resolution of Quality Images through Sparse Representation
A. Bhaskara Rao, J. Vasudeva Rao

7. An Interactive Rule Based Approach to Generate Strength Assessment Report: Graduate Student Perspective
P. Ajith, K. Rajasekhara Rao, M. S. S. Sai

8. Analysis of Stutter Signals with Subsequent Filtering and Smoothening
Mithila Harish, M. Monica Subashini

9. Fingerprint Reconstruction: From Minutiae
B. Amminaidu, V. Sreerama Murithy

10. Performance Analysis of Asynchronous Periodic Pattern Mining Algorithms
G. N. V. G. Sirisha, Shashi Mogalla, G. V. Padma Raju

11. A Comparative Study of the Classification Algorithms Based on Feature Selection
A. Sravani, D. N. D. Harini, D. Lalitha Bhaskari

12. Analysis and Classification of Plant MicroRNAs Using Decision Tree Based Approach
A. K Mishra, H. Chandrasekharan

13. Features Selection Method for Automatic Text Categorization: A Comparative Study with WEKA and RapidMiner Tools
Suneetha Manne, Supriya Muddana, Aamir Sohail, Sameen Fatima

14. Outliers Detection in Regression Analysis Using Partial Least Square Approach
Nagaraju Devarakonda, Shaik Subhani, Shaik Althaf Hussain Basha

15. Cluster Analysis on Different Data Sets Using K-Modes and K-Prototype Algorithms
R. Madhuri, M. Ramakrishna Murty, J. V. R. Murthy, P. V. G. D. Prasad Reddy, Suresh C. Satapathy

16. Content Based Image Retrieval Using Radon Projections Approach
Nilam N. Ghuge, Bhushan D. Patil

17. A Novel Approach for Facial Feature Extraction in Face Recognition
A. Srinivasan, V. Balamurugan

18. Video Shot Boundary Detection Using Finite Ridgelet Transform Method
Parul S. Arora Bhalotra, Bhushan D. Patil

19. Enhanced Algorithms for VMTL, EMTL and TML on Cycles and Wheels
Nissankara Lakshmi Prasanna, Nagalla Sudhakar

20. Improved Iris Recognition Using Eigen Values for Feature Extraction for Off Gaze Images
Asim Sayed, M. Sardeshmukh, Suresh Limkar

21. Database Model for Step-Geometric Data – An Object Oriented Approach
A. Balakrishna, Chinta Someswararao, M. S. V. S. Bhadri Raju

22. A Proposal for Color Segmentation in PET/CT-Guided Liver Images
Neha Bangar, Akashdeep Sharma

23. Audio Segmentation for Speech Recognition Using Segment Features
Gayatri M. Bhandari, Rameshwar S. Kawitkar, Madhuri P. Borawake

24. A Modified Speckle Suppression Algorithm for Breast Ultrasound Images Using Directional Filters
Vikrant Bhateja, Atul Srivastava, Gopal Singh, Jay Singh

25. An Efficient Secret Image Sharing Scheme Using an Effectual Position Exchange Technique
Amit Dutta, Dipak Kumar Kole

26. Image Fusion Technique for Remote Sensing Image Enhancement
B. Saichandana, S. Ramesh, K. Srinivas, R. Kirankumar

27. Variant Nearest Neighbor Classification Algorithm for Text Document
M. S. V. S. Bhadri Raju, B. Vishnu Vardhan, V. Sowmya

28. Naive Bayes for URL Classification Using Kid’s Computer Data
Anand Neetu

29. Semantic Framework to Text Clustering with Neighbors
Y. Sri Lalitha, A. Govardhan

30. Multi-Agent System for Spatio Temporal Data Mining
I. L. Narasimha Rao, A. Govardhan, K. Venkateswara Rao

31. Cropping and Rotation Invariant Watermarking Scheme in the Spatial Domain
Tauheed Ahmed, Ratnakirti Roy, Suvamoy Changder

32. Satellite Image Fusion Using Window Based PCA
Amit Kumar Sen, Subhadip Mukherjee, Amlan Chakrabarti

33. Rough Set Approach for Novel Decision Making in Medical Data for Rule Generation and Cost Sensitiveness
P. K. Srimani, Manjula Sanjay Koti

34. Position Paper: Defect Prediction Approaches for Software Projects Using Genetic Fuzzy Data Mining
V. Ramaswamy, T. P. Pushphavathi, V. Suma

35. A Fast Algorithm for Salt-and-Pepper Noise Removal with Edge Preservation Using Cardinal Spline Interpolation for Intrinsic Finger Print Forensic Images
P. Syamala Jaya Sree, Pradeep Kumar

36. An Approach to Predict Software Project Success Based on Random Forest Classifier
V. Suma, T. P. Pushphavathi, V. Ramaswamy

37. An Efficient Approach to Improve Retrieval Rate in Content Based Image Retrieval Using MPEG-7 Features
K. Srujan Raju, K. Sreelatha, Shriya Kumari

38. Performance Evaluation of Multiple Image Binarization Algorithms Using Multiple Metrics on Standard Image Databases
Sudipta Roy, Sangeet Saha, Ayan Dey, Soharab Hossain Shaikh, Nabendu Chaki

39. A Signal Processing Approach for Eucaryotic Gene Identification
Mihir Narayan Mohanty

40. Addressing Analyzability in Terms of Object Oriented Design Complexity
Suhel Ahmad Khan, Raees Ahmad Khan

41. An Approach for Automated Detection and Classification of Thyroid Cancer Cells
R. Jagdeeshkannan, G. Aarthi, L. Akshaya, Kavya Ravy, Subramanian

42. Quality Validation of Software Design before Change Implementation
Aprna Tripathi, Dharmender Singh Kushwaha, Arun Kumar Misra

43. Testing Approach for Dynamic Web Applications Based on Automated Test Strategies
Chittineni Aruna, R. Siva Ram Prasad

44. Study on Agile Process Methodology and Emergence of Unsupervised Learning to Identify Patterns from Object Oriented System
Mulugu Narendhar, K. Anuradha

45. Data Collection, Statistical Analysis and Clustering Studies of Cancer Dataset from Viziayanagaram District, AP, India
T. Panduranga Vital, G. S. V. Prasada Raju, D. S. V. G. K. Kaladhar, Tarigoppula V. S. Sriram, Krishna Apparao Rayavarapu, P. V. Nageswara Rao, S. T. P. R. C. Pavan Kumar, S. Appala Raju

46. Classification on DNA Sequences of Hepatitis B Virus
H. Swapna Rekha, P. Vijaya Lakshmi

47. An Effective Automated Method for the Detection of Grids in DNA Microarray
P. K. Srimani, Shanthi Mahesh

48. Software Safety Analysis to Identify Critical Software Faults in Software-Controlled Safety-Critical Systems
Ben Swarup Medikonda, P. Seetha Ramaiah

49. Mutual Dependency of Function Points and Scope Creep towards the Success of Software Projects: An Investigation
K. Lakshmi Madhuri, V. Suma

50. Prediction of Human Performance Capability during Software Development Using Classification
Sangita Gupta, V. Suma

51. Defect Detection Efficiency of the Combined Approach
N. Rashmi, V. Suma

52. Risk Measurement with CTP2 Parameters in Software Development Process
Raghavi K. Bhujang, V. Suma

53. A Cryptographic Privacy Preserving Approach over Classification
G. Nageswara Rao, M. Sweta Harini, Ch. Ravi Kishore

54. An Advanced Authentication System Using Rotational Cryptographic Algorithm
Sk. Shabbeer Hussain, Ch. Rupa, P. S. Avadhani, E. Srinivasa Reddy

55. Privacy Preserving Data Mining
D. Aruna Kumari, K. Rajasekhara Rao, M. Suman

56. Enhanced Trusted Third Party for Cyber Security in Multi Cloud Storage
Naresh Sammeta, R. Jagadeesh Kannan, Latha Parthiban

57. Performance Analysis of Multi-class Steganographic Methods Based on Multi-Level Re-stegnography
Rajesh Duvvuru, P. Jagdeeswar Rao, Sunil Kumar Singh, Rajiv R. Suman, Shiva Nand Singh, Pradeep Mahato

58. A Stylometric Investigation Tool for Authorship Attribution in E-Mail Forensics
Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani

59. Privacy Preserving in Association Rule Mining by Data Distortion Using PSO
Janakiramaiah Bonam, A. Ramamohan Reddy, G. Kalyani

60. Inline Block Level Data De-duplication Technique for EXT4 File System
Rahul Shinde, Vinay Patil, Akshay Bhargava, Atul Phatak, Amar More

61. Unique Key Based Authentication of Song Signal through DCT Transform (UKASDT)
Uttam Kr. Mondal, J. K. Mandal

62. DCT-PCA Based Method for Copy-Move Forgery Detection
Kumar Sunil, Desai Jagan, Mukherjee Shaktidev

63. Online Hybrid Model for Fraud Prevention (OHM-P): Implementation and Performance Evaluation
Ankit Mundra, Nitin Rakesh

64. Cyber Crime Investigations in India: Rendering Knowledge from the Past to Address the Future
V. K. Agarwal, Sharvan Kumar Garg, Manoj Kapil, Deepak Sinha

65. A Novel SVD and GEP Based Image Watermarking
Swanirbhar Majumder, Monjul Saikia, Souvik Sarkar, Subir Kumar Sarkar

66. Complete Binary Tree Architecture Based Triple Layer Perceptron Synchronized Group Session Key Exchange and Authentication in Wireless Communication (CBTLP)
Arindam Sarkar, J. K. Mandal

67. Color Image Authentication through Visible Patterns (CAV)
Madhumita Sengupta, J. K. Mandal

68. Smart Infrastructure at Home Using Internet of Things
D. Christy Sujatha, A. Satheesh, D. Kumar, S. Manjula

69. A Novel Approach for Ipv6 Address
S. Deepthi, G. Prashanti, K. Sandhya Rani

70. Secured Internet Voting System Based on Combined DSA and Multiple DES Algorithms
K. Sujatha, A. Arjuna Rao, L. V. Rajesh, V. Vivek Raja, P. V. Nageswara Rao

71. Defending Approach against Forceful Browsing in Web Applications
K. Padmaja, K. Nageswara Rao, J. V. R. Murthy

72. Effect of Indexing on High-Dimensional Databases Using Query Workloads
S. Rajesh, Karthik Jilla, K. Rajiv, T. V. K. P. Prasad

73. A Novel Architecture for Dynamic Invocation of Web Services
Venkataramani Korupala, Amarendra Kothalanka, Satyanarayana Gandi

74. Development of Web-Based Application for Generating and Publishing Groundwater Quality Maps Using RS/GIS Technology and P. Mapper in Sattenapalle, Mandal, Guntur District, Andhra Pradesh
Aswini Kumar Das, Prathapani Prakash, C. V. S. Sandilya, Shaik Subhani

75. A Reactive E-Service Framework for Dynamic Adaptation and Management of Web Services
T. Hemalatha, G. Athisha, C. Sathya

76. Enabling Time Sensitive Information Retrieval on the Web through Real Time Search Engines Using Streams
S. Tarun, Ch. Sreenu Babu

77. New Architecture for Flip Flops Using Quantum-Dot Cellular Automata
Paramartha Dutta, Debarka Mukhopadhyay

78. Emerging ICT Tools for Virtual Supply Chain Management: Evidences from Progressive Companies
Prashant R. Nair

79. ICT to Renovate the Present Life Line Systems from Fossil Fuels to Green Energy
Yashodhara Manduva, K. Rajasekhara Rao

80. A Secure and Reliable Mobile Banking Framework
Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata, Madhusoodhnan Nair

81. Challenges towards Implementation of e-Government Project in West Bengal, India: A Fishbone Analysis in Order to Find Out the Root Causes of Challenges
Manas Kumar Sanyal, Sudhangsu Das, Sajal Bhadra

82. Tackling Supply Chain through Cloud Computing: Management: Opportunities, Challenges and Successful Deployments
Prashant R. Nair

83. e-Health and ICT in Insurance Solutions
Josephina Paul

84. Modified Real-Time Advanced Inexpensive Networks for Critical Infrastructure Security and Resilience
K. Rajasekhar, Neeraj Upadhyaya

85. Regression Model for Edu-data in Technical Education System: A Linear Approach
P. K. Srimani, Malini M. Patil

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)

Author(s)
 
 
 
Publisher
Springer
Publication year
2014
Language
en
Edition
2013
Series
Advances in Intelligent Systems and Computing
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783319030951

Similar titles