Login

Majhi, Banshidhar

Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

Majhi, Banshidhar - Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, ebook

271,45€

Ebook, PDF with Adobe DRM
ISBN: 9789811033766
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Cloud Computing, Distributed Systems, Social Networks, and Applications

1. Review of Elasticsearch Performance Variating the Indexing Methods
Urvi Thacker, Manjusha Pandey, Siddharth S Rautaray

2. Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment
Bharati S. Ainapure, Deven Shah, A. Ananda Rao

3. A Semantic Approach to Classifying Twitter Users
Rohit John Joseph, Prateek Narendra, Jashan Shetty, Nagamma Patil

4. Timeline-Based Cloud Event Reconstruction Framework for Virtual Machine Artifacts
B. K. S. P. Kumar Raju, G. Geethakumari

5. eCloud: An Efficient Transmission Policy for Mobile Cloud Computing in Emergency Areas
Bibudhendu Pati, Joy Lal Sarkar, Chhabi Rani Panigrahi, Shibendu Debbarma

6. A Multidimensional Approach to Blog Mining
K. S. Sandeep, Nagamma Patil

7. Medicinal Side-Effect Analysis Using Twitter Feed
Priyanka S. Mane, Manasi S. Patwardhan, Ankur V. Divekar

8. A Study of Opinion Mining in Indian Languages
Diana Terezinha Miranda, Maruska Mascarenhas

Part II. Applications of Informatics

9. A Pragmatics-Oriented High Utility Mining for Itemsets of Size Two for Boosting Business Yields
Gaurav Gahlot, Nagamma Patil

10. ILC-PIV Design for Improved Trajectory Tracking of Magnetic Levitation System
Vinodh Kumar Elumalai, Joshua Sunder David Reddipogu, Santosh Kumar Vaddi, Gowtham Pasumarthy

11. Performance Analysis and Optimization of Spark Streaming Applications Through Effective Control Parameters Tuning
Bakshi Rohit Prasad, Sonali Agarwal

12. A Browser-Based Distributed Framework for Content Sharing and Student Collaboration
Shikhar Vashishth, Yash Sinha, K Hari Babu

13. Seed Point Selection Algorithm in Clustering of Image Data
Kuntal Chowdhury, Debasis Chaudhuri, Arup Kumar Pal

14. Comparative Analysis of AHP and Its Integrated Techniques Applied for Stock Index Ranking
H. S. Hota, Vineet Kumar Awasthi, Sanjay Kumar Singhai

15. A Proposed What-Why-How (WWH) Learning Model for Students and Strengthening Learning Skills Through Computational Thinking
Rakesh Mohanty, Sudhansu Bala Das

16. Band Power Tuning of Primary Motor Cortex EEG for Continuous Bimanual Movements
Manikumar Tellamekala, Shaik Mohammad Rafi

Part III. Authentication Methods, Cryptography and Security Analysis

17. Probabilistically Generated Ternary Quasigroup Based Stream Cipher
Deepthi Haridas, K. C. Emmanuel Sanjay Raj, Venkataraman Sarma, Santanu Chowdhury

18. Dynamic Access Control in a Hierarchy with Constant Key Derivation Cost
Nishat Koti, B. R. Purushothama

19. An Efficient LWE-Based Additively Homomorphic Encryption with Shorter Public Keys
Ratnakumari Challa, VijayaKumari Gunta

20. An Enhanced Remote User Authentication Scheme for Multi-server Environment Using Smartcard
Ashish Kumar, Hari Om

21. A Proposed Bucket Based Feature Selection Technique (BBFST) for Phishing e-Mail Classification
H. S. Hota, Akhilesh Kumar Shrivas, Rahul Hota

22. A Novel Security Mechanism in Symmetric Cryptography Using MRGA
Bhoomika Modi, Vinitkumar Gupta

23. Techniques for Enhancing the Security of Fuzzy Vault: A Review
Abhay Panwar, Parveen Singla, Manvjeet Kaur

24. An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication
Archana Tiwari, Manisha Sharma

25. XSS Attack Prevention Using DOM-Based Filter
Asish Kumar Dalai, Shende Dinesh Ankush, Sanjay Kumar Jena

Part IV. Big Data and Recommendation Systems

26. Friendship Recommendation System Using Topological Structure of Social Networks
Praveen Kumar, G. Ram Mohana Reddy

27. Personalized Recommendation Approach for Academic Literature Using High-Utility Itemset Mining Technique
Mahak Dhanda, Vijay Verma

28. An Estimation of User Preferences for Search Engine Results and its Usage Patterns
Nidhi Bajpai, Deepak Arora

29. A Comparative Analysis of Various Spam Classifications
Nasir Fareed Shah, Pramod Kumar

30. Review Spam Detection Using Opinion Mining
Rohit Narayan, Jitendra Kumar Rout, Sanjay Kumar Jena

31. Review Spam Detection Using Semi-supervised Technique
Rohit Narayan, Jitendra Kumar Rout, Sanjay Kumar Jena

Part V. Emerging Techniques in Computing

32. Dimensionality Reduction Using Decision-Based Framework for Classification: Sky and Ground
Ramesh Ashok Tabib, Ujwala Patil, T. Naganandita, Vinita Gathani, Uma Mudenagudi

33. A Decision Tree-Based Middle Ware Platform for Deploying Fog Computing Services
Mahesh Sunkari, Raghu Kisore Neelisetti

34. Development of 3D FULL HD Endoscope Capable of Scaling View of the Selected Region
Dhiraj, Priyanka Soni, Jagdish Lal Raheja

35. An



Neethu Mohan, S. Sachin Kumar, K. P. Soman

36. Exploration of Many-Objective Feature Selection for Recognition of Motor Imagery Tasks
Monalisa Pal, Sanghamitra Bandyopadhyay

37. Euler-Time Diagrams: A Set Visualisation Technique Analysed Over Time
Mithileysh Sathiyanarayanan, Mohammad Alsaffar

38. A Framework for Goal Compliance of Business Process Model
Dipankar Deb, Nabendu Chaki

39. Comparative Analysis of Adaptive Beamforming Techniques
Smita Banerjee, Ved Vyas Dwivedi

Part VI. Internet, Web Technology, Web Security, and IoT

40. Securing an External Drive Using Internet with IOT Concept
Rajneesh Tanwar, K. Krishnakanth Gupta, Purushottam Sharma

41. An Intelligent Algorithm for Automatic Candidate Selection for Web Service Composition
Ashish Kedia, Ajith Pandel, Adarsh Mohata, S. Sowmya Kamath

42. A Quality-Centric Scheme for Web Service Ranking Using Fuzzified QoS Parameters
Mandar Shaha, S. Sowmya Kamath

43. Enhancing Web Service Discovery Using Meta-heuristic CSO and PCA Based Clustering
Sunaina Kotekar, S. Sowmya Kamath

44. Advancement in Personalized Web Search Engine with Customized Privacy Protection
Jeena Mariam Saji, Kalyani Bhongle, Sharayu Mahajan, Soumya Shrivastava, Ashwini Jarali

Part VII. Research on Optical Networks, Wireless Sensor Networks, VANETs, and MANETs

45. Traffic Classification Analysis Using OMNeT++
Deeraj Achunala, Mithileysh Sathiyanarayanan, Babangida Abubakar

46. Irregular-Shaped Event Boundary Estimation in Wireless Sensor Networks
Srabani Kundu, Nabanita Das, Sasanka Roy, Dibakar Saha

47. A New Two-Dimensional Mesh Topology with Optical Interlinks
Amritanjali

48. Enhanced TCP NCE: A Modified Non-Congestion Events Detection, Differentiation and Reaction to Improve the End-to-End Performance Over MANET
J. Govindarajan, N. Vibhurani, G. Kousalya

49. Intelligent Building Control Solution Using Wireless Sensor—Actuator Networking Framework
Anindita Mondal, Sagar Bose, Iti Saha Misra

50. Security Framework for Opportunistic Networks
Prashant Kumar, Naveen Chauhan, Narottam Chand

51. Replica-Based Efficient Data Accessibility Technique for Vehicular Ad Hoc Networks
Brij Bihari Dubey, Rajeev Kumar, Naveen Chauhan, Narottam Chand

52. Reinforcement Based Optimal Routing Algorithm for Multiple Sink Based Wireless Sensor Networks
Suraj Sharma, Azad Kumar Patel, Ratijit Mitra, Reeti Jauhari

53. Study and Impact of Relay Selection Schemes on Performance of an IEEE 802.16j Mobile Multihop Relay (MMR) WiMAX Network
Chaudhuri Manoj Kumar Swain, Susmita Das

54. Predicting Link Failure in Vehicular Communication System Using Link Existence Diagram (LED)
Sourav Kumar Bhoi, Munesh Singh, Pabitra Mohan Khilar

Part VIII. Communication Systems, Antenna Research, and Cognitive Radio

55. An M-Shaped Microstrip Antenna Array for WLAN, WiMAX and Radar Applications
Aastha Gupta, Vipin Choudhary, Malay Ranjan Tripathy

56. Gain Enhancement of Microstrip Patch Antenna Using H-Shaped Defected Ground Structure
Asmita Rajawat, P. K. Singhal, Sindhu Hak Gupta, Chavi Jain, Praneet Tomar, Kartik Kapur

57. Robust Acoustic Echo Suppression in Modulation Domain
P. V. Muhammed Shifas, E. P. Jayakumar, P. S. Sathidevi

58. FPGA-Based Equalizer Design Using a Novel Adaptive Reward-Punishment VSSLMS Algorithm for Rayleigh Fading Channel
Sudipta Bose, Iti Saha Misra

59. Phase Reversal and Suppressed Carrier Characteristics of Neo-Cortical Electroencephalography Signals
Manikumar Tellamekala, Shaik Mohammad Rafi

60. Short-Range Frequency-Modulated Continuous Wave (FMCW) Radar Using Universal Software-Defined Radio Peripheral (USRP)
Munesh Singh, Sourav Kumar Bhoi, Pabitra Mohan Khilar

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics), Communications Engineering, Networks

Editor
 
 
 
 
Publisher
Springer
Publication year
2018
Language
en
Edition
1
Series
Advances in Intelligent Systems and Computing
Page amount
20 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9789811033766
Printed ISBN
978-981-10-3375-9

Similar titles