Sisäänkirjautuminen

Aluru, Srinivas

Contemporary Computing

Aluru, Srinivas - Contemporary Computing, e-kirja

97,90€

E-kirja, PDF, Adobe DRM-suojattu
ISBN: 9783642035470
DRM-rajoitukset

TulostusEi sallittu
Kopioi leikepöydälleEi sallittu

Table of contents

1. A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling
Alok Singh, Marc Sevaux, André Rossi

2. PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images
Rajeev Srivastava, J. R. P. Gupta, Harish Parthasarthy, Subodh Srivastava

3. A New Position-Based Fast Radix-2 Algorithm for Computing the DHT
Gautam A. Shah, Tejmal S. Rathore

4. Study of Bit-Parallel Approximate Parameterized String Matching Algorithms
Rajesh Prasad, Suneeta Agarwal

5. Optimization of Finite Difference Method with Multiwavelet Bases
Eratt P. Sumesh, Elizabeth Elias

6. A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks
C. Mala, Mohanraj Loganathan, N. P. Gopalan, B. SivaSelvan

7. A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks
Natarajan Meghanathan, Meena Sugumar

8. An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems
S. Srinivasan, Rajan Vidya, Ramasamy Rajaram

9. Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip
Arshin Rezazadeh, Mahmood Fathy

10. A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching
Deepank Gupta, Bob Morris, Terry Catapano, Guido Sautter

11. Optimized Graph Search Using Multi-Level Graph Clustering
Rahul Kala, Anupam Shukla, Ritu Tiwari

12. An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns
B. Pravin Kumar, V. Divakar, E. Vinoth, Radha SenthilKumar

13. A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization
Musrrat Ali, Millie Pant, Ved Pal Singh

14. Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts
S. V. Rajashekararadhya, P. Vanaja Ranjan

15. Local Subspace Based Outlier Detection
Ankur Agrawal

16. New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions
S. R. Kannan, A. Sathya, S. Ramathilagam, R. Pandiyarajan

17. On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks
Natarajan Meghanathan

18. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature
Saroj Kumar Panigrahy, Debasish Jena, Sathya Babu Korra, Sanjay Kumar Jena

19. Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands
Hunny Mehrotra, Badrinath G. Srinivas, Banshidhar Majhi, Phalguni Gupta

20. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties
Rohit Pathak, Satyadhar Joshi

21. Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame
Chandan Maity, Ashutosh Gupta, Mahua Maity

22. Secure Receipt-Free Sealed-Bid Electronic Auction
Jaydeep Howlader, Anushma Ghosh, Tandra DebRoy Pal

23. An Architecture for Handling Fuzzy Queries in Data Warehouses
Manu Pratap Singh, Rajdev Tiwari, Manish Mahajan, Diksha Dani

24. Palmprint Based Verification System Using SURF Features
Badrinath G. Srinivas, Phalguni Gupta

25. A Personnel Centric Knowledge Management System
Baisakhi Chakraborty, Meghbartma Gautam

26. A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks
Ajay Kr. Gautam, Amit Kr. Gautam

27. Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach
Shelly Bansal, Daya Gupta, V. K. Panchal, Shashi Kumar

28. CDIS: Circle Density Based Iris Segmentation
Anand Gupta, Anita Kumari, Boris Kundu, Isha Agarwal

29. Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines
Anvita Bajpai, Vinod Pathangay

30. Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine
Sweta Thakur, Jamuna K. Sing, Dipak K. Basu, Mita Nasipuri

31. Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing
Sandip Vijay, Subhash C. Sharma

32. Vehicular Traffic Control: A Ubiquitous Computing Approach
Naishadh K. Dave, Vanaraj B. Vaghela

33. Application of Particle Swarm Optimization Algorithm for Better Nano-Devices
Nameirakpam Basanta Singh, Sanjoy Deb, Guru P. Mishra, Samir Kumar Sarkar, Subir Kumar Sarkar

34. Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES
Selwyn Justus, K. Iyakutti

35. Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip
Krishan Kumar Paliwal, Jinesh Shaji George, Navaneeth Rameshan, Vijay Laxmi, M. S. Gaur, Vijay Janyani, R. Narasimhan

36. Color Image Restoration Using Morphological Detectors and Adaptive Filter
Anita Sahoo, Rohal Suchi, Neha Khan, Pooja Pandey, Mudita Srivastava

37. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography
Rohit Pathak, Satyadhar Joshi

38. An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions
Vijay Harishchandra Mankar, Tirtha Sankar Das, Subir Kumar Sarkar

39. Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors
Tarun Kumar, Ankush Mittal, Parikshit Sondhi

40. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
Ankur Gupta, Lalit K. Awasthi

41. Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks
A. S. Poornima, B. B. Amberker

42. Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology
Sanchaita Ukil, Meenakshee Sinha, Lavneesh Varshney, Shipra Agrawal

43. Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide
Rajeshwer Shukla, Sugriva Nath Tiwari

44. IDChase: Mitigating Identifier Migration Trap in Biological Databases
Anupam Bhattacharjee, Aminul Islam, Hasan Jamil, Derek Wildman

45. Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships
Harpreet Singh, Pradeep Chowriappa, Sumeet Dua

46. IITKGP-SESC: Speech Database for Emotion Analysis
Shashidhar G. Koolagudi, Sudhamay Maity, Vuppala Anil Kumar, Saswat Chakrabarti, K. Sreenivasa Rao

47. Detection of Splice Sites Using Support Vector Machine
Pritish Varadwaj, Neetesh Purohit, Bhumika Arora

48. Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides
Satarudra Prakash Singh, Bhartendu Nath Mishra

49. Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach
Appala Raju Kotaru, Ramesh C. Joshi

50. FCM for Gene Expression Bioinformatics Data
Kumar Dhiraj, Santanu Kumar Rath, Korra Sathya Babu

51. Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection
Balakrishnan Sarojini, Narayanasamy Ramaraj, Savarimuthu Nickolas

52. An Electronically Tunable SIMO Biquad Filter Using CCCCTA
Sajai Vir Singh, Sudhanshu Maheshwari, Jitendra Mohan, Durg Singh Chauhan

53. An Architecture for Cross-Cloud System Management
Ravi Teja Dodda, Chris Smith, Aad Moorsel

54. Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models
Georgios Varsamopoulos, Ayan Banerjee, Sandeep K. S. Gupta

55. Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic
Arun Sharma, P. S. Grover, Rajesh Kumar

56. Energy-Constrained Scheduling of DAGs on Multi-core Processors
Ishfaq Ahmad, Roman Arora, Derek White, Vangelis Metsis, Rebecca Ingram

57. Evaluation of Code and Data Spatial Complexity Measures
Jitender Kumar Chhabra, Varun Gupta

58. Pitcherpot: Avoiding Honeypot Detection
Vinod K. Panchal, Pramod K. Bhatnagar, Mitul Bhatnagar

59. Verification of Liveness Properties in Distributed Systems
Divakar Yadav, Michael Butler

60. InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices
Anand Gupta, Deepank Gupta, Nidhi Gupta

61. Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
Rohit Pathak, Satyadhar Joshi

Avainsanat: Computer Science, Algorithm Analysis and Problem Complexity, Computational Biology/Bioinformatics, Computer Applications, Biometrics, Computer Appl. in Administrative Data Processing, Data Structures, Cryptology and Information Theory

Samankaltaisia e-kirjoja