دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: N. R. Shetty, L. M. Patnaik, N. H. Prasad, N. Nalini (eds.) سری: ISBN (شابک) : 9789811047404, 9789811047411 ناشر: Springer Singapore سال نشر: 2018 تعداد صفحات: 744 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 26 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
کلمات کلیدی مربوط به کتاب تحقیقات نوظهور در محاسبات، اطلاعات، ارتباطات و کاربردها: ERCICA 2016: مهندسی ارتباطات، شبکه
در صورت تبدیل فایل کتاب Emerging Research in Computing, Information, Communication and Applications: ERCICA 2016 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تحقیقات نوظهور در محاسبات، اطلاعات، ارتباطات و کاربردها: ERCICA 2016 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات کنفرانس بینالمللی تحقیقات نوظهور در محاسبات، اطلاعات، ارتباطات و کاربردها، ERCICA 2016 را ارائه میکند. ERCICA یک انجمن بین رشتهای را برای محققان، مهندسان و دانشمندان حرفهای، مربیان و فنشناسان برای بحث، بحث و مناظره فراهم میکند. و ترویج تحقیق و فناوری در زمینه های آتی محاسبات، اطلاعات، ارتباطات و کاربردهای آنها. این کتاب این حوزههای تحقیقاتی نوظهور را مورد بحث قرار میدهد و منبع ارزشمندی برای محققان و مهندسان شاغل فراهم میکند.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2016. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
Front Matter ....Pages i-xx
Front Matter ....Pages 1-1
Development of Accurate Face Recognition Process Flow for Authentication (Tripty Singh, C. Josna Mary)....Pages 3-16
Simulation and Performance Evaluation of WSN-Based Architecture for Animal Health Monitoring Using NS2 (Ankit Bhavsar, Harshal Arolkar)....Pages 17-26
Random Route Adoption Algorithm to Provide Source Location Privacy in Wireless Sensor Network (N. Abhilash, S. Kuzhalvaimozhi)....Pages 27-35
Improving Energy Efficiency and Reliability of Wireless Sensor Networks with MC-AODV Routing Protocol (K. Imrana Banu, K. Rabiya Bashrin, K. Ummay Kulsum, Mohammed Ummar)....Pages 37-45
Aspect Based Sentiment Analysis Using R Programming (K. V. Akhil Kumar, G. V. Manikanth Sai, Nisha P. Shetty, Chetana Pujari, Aiswarya Bhat)....Pages 47-56
Frequency Domain Technique to Remove Herringbone Artifact from Magnetic Resonance Images of Brain and Morphological Segmentation for Detection of Tumor (T. D. Vishnumurthy, Vaibhav A. Meshram, H. S. Mohana, Pramod Kammar)....Pages 57-66
Face Recognition Through Symbolic Data Modeling of Local Directional Gradient (Shanmukhappa Angadi, Vishwanath Kagawade)....Pages 67-79
Multidimensional Image Indexing Using SR-Tree Algorithm for Content-Based Image Retrieval System (Janakiraman Vanitha, Muthukrishnan Senthilmurugan)....Pages 81-88
A Novel Approach to Mapping for KBQA System Using Ontology (R. Mervin, A. Jaya)....Pages 89-97
An Adaptive Grouping Scheme for Avoiding Hidden Node Collision in IEEE 802.15.4 LR-WPAN (Mohammad Irfan Khan, Rakesh Rathi)....Pages 99-107
An Approach to Classify Engineering Materials Using Machine Learning Algorithm (P. J. Antony, Prajna Manujesh, N. A. Jnanesh)....Pages 109-120
Performance Analysis and Assessment of Safety Critical Systems Using Ann (K. Sruthi, R. Krishnaprasad, Manju Nanda, J. Jayanthi)....Pages 121-131
Functional Mode Analysis of Safety Critical Systems Using Causal Bayesian Networks (CBNs) (Susmitha Thiyyanoor, R. Krishnaprasad, Manju Nanda, J. Jayanthi)....Pages 133-147
Concept-Based Extractive Text Summarization Using Graph Modelling and Weighted Iterative Ranking (S. Chitrakala, N. Moratanch, B. Ramya, C. G. Revanth Raaj, B. Divya)....Pages 149-160
Kannada Speech Recognition Using Decision Tree Based Clustering (Sharada C. Sajjan, C. Vijaya)....Pages 161-169
Automatic Hand Raise Detection by Analyzing the Edge Structures (J. Jesna, Athi S. Narayanan, Kamal Bijlani)....Pages 171-180
Performance Evaluation and Improvement of R-CTP for Enhanced Packet Transmission and Latency (Jackson Preetham Machado, Pranesh V. Kallapur)....Pages 181-195
Signal Processing of Motor Imagery EEG Waves Using Empirical Mode Decomposition (Ajithkumar Sreekumar, M. Uttara Kumari, Krishna Chaithanya Vastare, Suraj Madenur Sreenivasa, N. Apoorva)....Pages 197-209
Mining Infrequent Itemsets from Text by Applying Recursive Learning and Fuzzy Logic (Prajakta V. Koti, G. A. Patil)....Pages 211-218
Mitigating Spam Emails Menace Using Hybrid Spam Filtering Approach (Stanlee Nagaroor, G. A. Patil)....Pages 219-227
Novel HBM Spacing Policy for Fuzzy Based Forward Collision Avoidance System in Vehicle (S. Paul Sathiyan, S. Suresh Kumar, A. Immanuel Selvakumar)....Pages 229-238
Comparative Analysis of New Hybrid Approach for Overlay Construction in P2P Live Streaming (Kunwar Pal, M. C. Govil, Mushtaq Ahmed)....Pages 239-250
Ant-AODV-VANET: A Bio-Inspired Routing Protocol for VANET (Atreyee Datta, Chandreyee Chowdhury, Sarmistha Neogy)....Pages 251-261
Time Dispersion Parameters for Double Bounce Geometrical Channel Including Rain Fading Effect (M. C. Anand, Divya Rani, B. K. Sujatha)....Pages 263-272
Assistive Text on Hand Held Objects for Blind People (Samruddhi Deshpande, Revati Shriram)....Pages 273-282
Intra Frame Coding in H.264 to Obtain Consistent PSNR and Reduce Bit Rate for Diagonal Down Right Mode Using Gaussian Pulse (N. Manjanaik, Manjunath Ramachandra)....Pages 283-292
iKan—A Kannada Transliteration Tool for Assisted Linguistic Learning (Prakash Anusha, Ashok Meghana, R Swathi, C Sahana, S Sowmya Kamath)....Pages 293-302
An Exploitation of Postulating Privacy in Utilization of Cloud Services with Crowdsourcing by Implementing Item Response Theory (C J Kavithapriya, S Ancy)....Pages 303-316
Music Information Retrieval: A Window into the Needs and Challenges (Dave Jayati, Pandya Dhara, Fruitwala Pranav, Tarjni Vyas)....Pages 317-325
Cuckoo Search-Based View Selection (T. V. Vijay Kumar, Amit Kumar, Biri Arun)....Pages 327-337
A Regression Model for Estimating the Cooling Time of Material Using Digital Microstructure Image Analysis (P. S. Hiremath, Anita Sadashivappa, Prakash Pattan)....Pages 339-348
Front Matter ....Pages 349-349
SDaaS: Framework of Sensor Data as a Service for Leveraging Services in Internet of Things (B. C. Manujakshi, K. B. Ramesh)....Pages 351-363
An Approach for Efficient Capacity Management in a Cloud (T. Roseline Philomine, Clarence J. M. Tauro, Melisa Miranda)....Pages 365-375
Automated Negotiation of QOS Parameters Using Fuzzy Logic Based Concession Strategy for Cloud Computing Environments (B. Sunil Kamath, Rio D’Souza)....Pages 377-392
Intrusion Detection System Based on BCS-GA in Cloud Environment (Partha Ghosh, Supriya Jha, Rahul Dutta, Santanu Phadikar)....Pages 393-403
Unsupervised Document-Level Sentiment Analysis of Reviews Using Macaronic Parser (Sukhnandan Kaur, Rajni Mohana)....Pages 405-414
Efficient Speech Compression Using Waveform Coding in Time Domain (Subham Paul, Debashis Chakraborty)....Pages 415-430
Model Based Algorithm Validation Approach for Safety Critical Applications (R. Krishnaprasad, Manju Nanda, J. Jayanthi, Shyam Sundhar Dhage)....Pages 431-443
Impact of Different Ground Plane Structures on Sierpinski Monopole Antenna (D. M. K. Chaitanya, N. V. Koteswara Rao)....Pages 445-456
Smart Authentication Using Graphical Password for Android Devices (Aaroh Gala, Somdev Mehta)....Pages 457-467
New Security Architecture for Big Data Hadoop (Madhvaraj M. Shetty, D. H. Manjaiah)....Pages 469-480
An Overview of Bio-Inspired Computing (K. Lakshmaiah, S. Murali Krishna, B. Eswara Reddy)....Pages 481-492
Providing Cloud Services to an Autonomous Robotic Car in Real-Time Traffic Environment (Prachi Sablani, Saurabh Kumar Prasad, Ashish Kumar Pandey, Rajesh Doriya)....Pages 493-504
Front Matter ....Pages 505-505
Evaluation Energy Parameter Using Jumper Firefly Algorithm in Wireless Sensor Networks (Sandeep Bidakar, H. H. Kenchannavar, Umakant P. Kulkarni)....Pages 507-519
Developing a Context-Aware Secure Model for Sensor Network Environment (Pooja Mohan, Manpreet Singh)....Pages 521-534
Inter Cluster Balanced LEACH Algorithm for Energy Efficient Wireless Sensor Network (Sahul Goyal, Bindiya Jain)....Pages 535-546
EPCA: Energy Preservation using Clustering Approximation in Sensor Network (A P Jyothi, Sakthivel Usha)....Pages 547-557
Federating Disjoint Segments in Wireless Sensor Networks Using Jumping Particle Swarm Optimization (Ramya Sharma, Virender Ranga)....Pages 559-568
Front Matter ....Pages 569-569
Enhancing Security of Stature System by Using Sybil Detection (Neha Chauhan, Ankita Thadani, Jalpa Baria)....Pages 571-581
Word Sense Disambiguation for Indian Languages (Mitul Sheth, Shivang Popat, Tarjni Vyas)....Pages 583-593
Discovery of Fuzzy Hierarchical Classification Rules (FHCRs): A Genetic Algorithm Approach (Renu Bala, Saroj Ratnoo)....Pages 595-604
Classification of Fashionwear Using Deep Learning (Akshayvarun Subramanya, Prajwal Srinivas, V M Pramod, S S Shylaja)....Pages 605-611
An Efficient Algorithm for Frequent Trajectory Itemset (P. Geetha, E. Ramaraj)....Pages 613-628
Intelligent Transparent Email Security as Security-as-a-Service from Cloud (Deepak H. Sharma, C. A. Dhote, Manish M. Potey)....Pages 629-637
A Novel Hardware Selection Algorithm for Aerial Vehicles with Multi-rotors (K. R. Narahari, B. S. Aruna Prabha, M. S. Goutham, V. Rohit, Damodhar S. Kamath, P. Vaishak)....Pages 639-650
Efficient Binarization Technique for Handwritten Archive of South Dravidian Tulu Script (P. J. Antony, C. K. Savitha, U. J. Ujwal)....Pages 651-666
Application of Image Processing for Detection and Recognition of Objects in Traffic Video (B Ashwini, B N Yuvaraju, B Deepashree, P S Venugopala)....Pages 667-677
Neuro-Genetic Hybrid Approach to Predict siRNA Efficacy in Plant Viruses (Ranjan Sarmah, Shahin Ara Begum, Mahendra K. Modi)....Pages 679-694
Discovering Latent Social Networks Through Detection of Explicit and Implicit Taste from Online Reviews (Bhaskarjyoti Das, V R Prathima)....Pages 695-704
Digitally Integrated Store Commerce System (Aritra Roy, Sauvik Bal, Sagarika Ghosh)....Pages 705-711
Load Balancing Routing Mechanisms for Wireless Mesh Networks: A Survey (D. S. Keerthi, T. G. Basavaraju)....Pages 713-729
A Novel Encryption Scheme for Small Enterprises (Mohit Wadhwani, Ankita Thadani, S. P. Medhane)....Pages 731-740
Performance Analysis of Efficient Position-Based Opportunistic Routing for MANET (N. S. Kavitha, P. Malathi, Jim Mathew Philip, S Pravinth Raja)....Pages 741-751
Back Matter ....Pages 753-761