Login

Nalini, N.

Emerging Research in Computing, Information, Communication and Applications

Nalini, N. - Emerging Research in Computing, Information, Communication and Applications, ebook

321,35€

Ebook, PDF with Adobe DRM
ISBN: 9789811002878
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Exact Incremental Mining for Frequent Item Set on Large Evolving Database (Correlation of Attributes in Evolving Database)
Avinash A. Powar, A. S. Tamboli

2. Developing QoS Aware DSR for JiST/SWANS Simulator Using Cross-Layer Communication
Sharwari S. Solapure, P. J. Kulkarni

3. Performance Based Comparision of MFCC and LPC Techniques for Gujarati Numbers Detection
Hiral B. Chauhan, B. A. Tanawala

4. Performance Index of the Outage Probability for Two-Relay Decode and Forward Cooperative Communications
Swapna Thouti, K. Sivani, K. Kishan Rao

5. Ant Colony Optimization Meta-heuristic for Solving Real Travelling Salesman Problem
Sourabh Joshi, Sarabjit Kaur

6. Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks
Deepali Virmani, Pranav Gupta

7. Design of Handwritten Signature Verification Using Java–Python Platform
Savita Choudhary, Sridhar Mishra, Siddanth Kaul, J. B. Arun

8. A Technique for Multitier Key Distribution for Securing Group Communication in WSN
H. S. Annapurna, M. Siddappa

9. Near Lossless Image Compression Using Block Division Byte Compression and Block Optimization
Debashis Chakraborty, Shouvik Saha, Tanay Mukherjee

10. Braille Writer cum Translator with Echo—A Novel Approach
M. Jayaprakash, K. Kanmani, P. J. Antony, B. V. Anil

11. Dynamic Monitoring of Website Content and Alerting Defacement Using Trusted Platform Module
N. Viswanathan, Arun Mishra

12. A Hybrid Approach for Improving Web Document Clustering Based on Concept Mining
Rajendra B. Petkar, Sachin S. Patil

13. Compression of a 2D Image Using 3D-DCT
Surekha R. Gondkar, Girish V. Attimarad, B. Chandrasekhar

14. Performance Evaluation of AODV Routing Protocol Using Different Parameters Under Black Hole Attack
Barinderpal Singh, Rahul Hans

15. Image Steganography Using Priority-Based Neural Network and Pyramid
Sreeparna Chakrabarti, Debabrata Samanta

16. Implementation of Recommendation System in a Web Browser with Help of Cloud Mining
U. J. Ujwal, P. J. Antony, K. R. Abhilash

17. Proposed Protocol to Enhance the Performance of AOMDV Routing Protocol Under Flooding Attack in Different Propagation Models
Kulbir Kaur Waraich, Simar Preet Singh

18. Data Storage Security in Cloud Using a Functional Encryption Algorithm
P. Vijaya Bharati, T. Sita Mahalakshmi

19. Test Case Prioritization: An Approach Based on Modified Ant Colony Optimization
Kamna Solanki, Yudhvir Singh, Sandeep Dalal, Praveen Ranjan Srivastava

20. Removal of Baseline Wander from Physiological Signals Using Wavelet Transform
Pranali Choudhari, M. S. Panse, Rajul Chopade, Sarika Phad

21. Architectural Design of 8-Bit Floating-Point Synchronous Adder and Subtractor for RISC ALU
T. Ravi

22. Comparative Evaluation of Radial Basis Function Network Transfer Function for Filtering Speckle Noise in Synthetic Aperture Radar Images
Khwairakpam Amitab, Debdatta Kandar, Arnab K. Maji

23. Improving Accuracy of Answer Checking in Online Question Answer Portal Using Semantic Similarity Measure
Shashank, Sukhbir Kaur, Shailendra Singh

24. Dynamic Deadline Aware Efficient Virtual Machine Scheduling in the Cloud
B. Santhosh, D. H. Manjaiah

25. Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis
Vijaylaxmi Bittal, Soumi Banerjee

26. An Efficient Trust Management Algorithm in Wireless Sensor Network
Monia, Sukhchandan Randhawa, Sushma Jain

27. Robust Design of Data Acquisition System for Geophysical Applications Based on FPGA Technology
Polaiah Bojja

28. MONGODB Versus SQL: A Case Study on Electricity Data
Jatin, Shalini Batra

29. Service Mechanism for Diagnosis of Respiratory Disorder Severity Using Fuzzy Logic for Clinical Decision Support System
Faiyaz Ahamad, Manuj Darbari, Rishi Asthana

30. Optimized Fuzzy Logic-Based Adaptive Cruise Control Vehicle for Urban and Highway Driving Patterns
S. Paul Sathiyan, S. Suresh Kumar, A. Immanuel Selvakumar

31. A Novel Approach for Genome Data Classification Using Hadoop and Spark Framework
Shailesh S. Tayde, Nagamma Patil

32. Automatic Extraction of Lung Regions Using Curve Analysis for the Detection of Lung Cancer in CT Scans
B. Sasidhar, N. Bhaskar Rao, D. R. Ramesh Babu, M. Ravi Shankar

33. Rule-Based Shallow Parsing to Identify Comparative Sentences from Text Documents
S. K. Saritha, R. K. Pateriya

34. Wireless Interconnection Between USB and Projectors (WIBUP)
V. Sanju, G. M. Sangeetha, Anju Thomas

35. Enhancing Cloud Security Using VIJANA Cloud Data Jacket Protocol
M. Janaki, M. Ganaga Durga

36. Effective Queue Management Using Fuzzy Logic for Congestion Control in Delay-Sensitive Applications Over Mobile Ad Hoc Networks
M. Syed Masood, P. Sheik Abdul Khader

37. Iris Recognition Modality with Fuzzy k-Means Clustering Algorithm for Improving Security
S. Pravinthraja, K. Umamaheswari, B. Soumiya, B. Kokila

38. BER Performance Comparison Between HOVA, SOVA, and MAP Turbo Decoders in AWGN Channel
S. V. Viraktamath, D. N. Smithila, Girish V. Attimarad

39. Secure Data Aggregation Protocol Using AES in Wireless Sensor Network
Pooja Parmar, Bintu Kadhiwala

40. Developing an Analytical Model for Predicting Mulberry Yield Using Data Mining Techniques
M. C. Ramya, V. Lokesha, T. N. Manjunath, Ravindra S. Hegadi

41. Implementation of Distance Measurement of an Obstacle Using Ultrasonic Ranging
Shayesta Farheen, Y. G. Praveen Kumar, M. Z. Kurian

42. Morphological Change Detection System for Real-Time Traffic Analysis
S. G. Anuradha, K. Karibasappa, B. Eswar Reddy

43. Antialiased Digital Pixel Plotting for Raster Scan Lines Using Area Evaluation
E. Mamatha, C. S. Reddy, K. R. Prasad

44. Solving Reactive Power Dispatch Problem Using Evolutionary Computational Algorithm
Vivek Kumar Jain, Upendra Prasad, Abhishek Kumar Gupta

45. EBAC Algorithm for Real-Time Traffic Multicasting in Mobile Ad Hoc Networks
Sapna B. Kulkarni, B. N. Yuvaraju

46. OFDM Simulation in Combined WiMAX/DSRC Mechanism for Intelligent Transportation System
D. Kandar, V. Dhilip Kumar, Phida Chyne

47. Relevant Gene Selection and Classification of Leukemia Gene Expression Data
S. Jacophine Susmi, H. Khanna Nehemiah, A. Kannan, Jabez Christopher

48. Phieval: Four-Phase Plagiarism Detection System in Private MOOCs
Greeshma Thomas, Ashwini Kumar, Kamal Bijlani, R. Aswathy

49. Performance Analysis for Nonuniform Illumination in Face-Based Unconstrained Biometrics
Nilesh M. Pawar, D. T. Ingole, M. D. Ingole

50. Monitoring the Performance of Cloud Workload Through JConsole
M. B. Vibha, Raju R. Gondkar

51. Extended Architecture for Agilla Middleware to Reduce the Energy Efficiency for WSN
G. Mahadevan, S. Nirmala, N. Pradeep

52. Case Studies on Intelligent Approaches for Static Malware Analysis
Tulika Mithal, Kshitij Shah, Dushyant Kumar Singh

53. Analysing Security Checkpoints for an Integrated Utility-Based Information System
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal

54. Design and Implementation of Static Hand Gesture Recognition System for Device Control
N. S. Chethana, Divyaprabha, M. Z. Kurian

55. Modality Based Medical Image Classification
Monali Y. Khachane, R. J. Ramteke

56. Multilevel Security Model for Cloud Third-Party Authentication
Sawan Baghel, Deepti Theng

57. Frontotemporal Dementia—A Supervised Learning Approach
N. Sandhya, S. Nagarajan

58. Improvement in Congestion in Wireless Sensor Networks Using Modified Load-Balancing Routing Protocol
Revoli, Amit Gupta

59. An Opinion Dynamics Based Advance SEP in Three Level Heterogeneous WSN
Virpal Kaur, Vikram Dhiman

60. Provisioning and Resource Allocation in Computational Mobile Grid Using Mobile Agent
Dinesh Prasad Sahu, Karan Singh, Shiv Prakash

61. Interleaving Scheme for Medical Image Authentication
Mousami Turuk, Ashwin Dhande

62. Improvising Technique of Privacy Preserving in Outsourced Transaction Database
Jinal Parmar, Vinit Gupta

Keywords: Engineering, Communications Engineering, Networks, Information Systems Applications (incl. Internet), Computer Imaging, Vision, Pattern Recognition and Graphics

Editor
 
 
Publisher
Springer
Publication year
2016
Language
en
Edition
1
Page amount
20 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9789811002878
Printed ISBN
978-981-10-0286-1

Similar titles