دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Suresh Chandra Satapathy, Vikrant Bhateja, Swagatam Das (eds.) سری: Smart Innovation, Systems and Technologies 78 ISBN (شابک) : 9789811055461, 9789811055478 ناشر: Springer Singapore سال نشر: 2018 تعداد صفحات: 646 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 21 مگابایت
کلمات کلیدی مربوط به کتاب محاسبات هوشمند و اطلاعاتی: مقالات اولین کنفرانس بین المللی SCI 2016، جلد 2: مهندسی ارتباطات، شبکه
در صورت تبدیل فایل کتاب Smart Computing and Informatics : Proceedings of the First International Conference on SCI 2016, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات هوشمند و اطلاعاتی: مقالات اولین کنفرانس بین المللی SCI 2016، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این جلد شامل 68 مقاله ارائه شده در SCI 2016: اولین کنفرانس بین المللی محاسبات هوشمند و انفورماتیک است. این کنفرانس در 3 تا 4 مارس 2017، ویساخاپاتنام، هند برگزار شد و به صورت اشتراکی توسط ANITS، Visakhapatnam و با پشتیبانی فنی CSI Division V – Education and Research و PRF، Vizag برگزار شد. این جلد شامل مقالاتی است که عمدتاً بر محاسبات هوشمند برای ذخیره سازی ابری، داده کاوی و تجزیه و تحلیل نرم افزار، و پردازش تصویر متمرکز شده اند.
This volume contains 68 papers presented at SCI 2016: First International Conference on Smart Computing and Informatics. The conference was held during 3-4 March 2017, Visakhapatnam, India and organized communally by ANITS, Visakhapatnam and supported technically by CSI Division V – Education and Research and PRF, Vizag. This volume contains papers mainly focused on smart computing for cloud storage, data mining and software analysis, and image processing.
Front Matter ....Pages i-xviii
High Level Verification of I2C Protocol Using System Verilog and UVM (Lakshmi Manasa Kappaganthu, Avinash Yadlapati, Matta Durga Prakash)....Pages 1-9
Pre-informed Level Set for Flower Image Segmentation (Syed Inthiyaz, P. V. V. Kishore, B. T. P. Madhav)....Pages 11-20
3D Motion Capture for Indian Sign Language Recognition (SLR) (E. Kiran Kumar, P. V. V. Kishore, A. S. C. S. Sastry, D. Anil Kumar)....Pages 21-29
SABE: Efficient and Scalable-Filtered Access Control in Distributed Cloud Data Storage (K. Kamakshaiah, K. Venkateswara Rao, M. Subrahmanyam)....Pages 31-42
Automatic X-ray Image Classification System (C. M. A. K. Zeelan Basha, T. Maruthi Padmaja, G. N. Balaji)....Pages 43-52
TILLAGE DRIP: An Efficient Seed Selection and Conservative Irrigation with Crop Defective Alert by IOT (D. N. V. S. L. S. Indira, Manti Harshita, Dasari Shree Pranav, Jasti Poornima Mani Sai)....Pages 53-62
DVR for Identification and Mitigating of Voltage Sags Using Estimation Technique in Power Distribution Systems (P. Sasikiran, A. Deekshitha, P. V. V. Kishore, B. Sindhu)....Pages 63-73
Multiband Fractal Slot Antenna with Closed Ground Structure (V. Ugendra, Habibulla Khan, B. T. P. Madhav, Ch. Joshna)....Pages 75-83
Frequency-Selective Surface-Based Wideband High-Gain Antenna (Ch. Joshna, T. V. Ramakrishna, B. T. P. Madhav, V. Ugendra)....Pages 85-94
Evaluating the Progressive Performance of Machine Learning Techniques on E-commerce Data (Bindu Madhuri Cheekati, Sai Varun Padala)....Pages 95-107
Analysis of Variant Approaches for Initial Centroid Selection in K-Means Clustering Algorithm (N. Sandhya, M. Raja Sekar)....Pages 109-121
Experimental Investigation on Navigation of Mobile Robot Using Ant Colony Optimization (A. Mallikarjuna Rao, K. Ramji, B. S. K. Sundara Siva Rao)....Pages 123-132
Iterative Sorting-Based Non-dominated Sorting Algorithm for Bi-objective Optimization (Vikas Palakonda, Rammohan Mallipeddi)....Pages 133-141
Harmonic and Contra-Harmonic Mean-Centric JPEG Compression for an Objective Image Quality Enhancement of Noisy Images (G. Srinivas, P. Naga Srinivasu, T. Srinivas Rao, Ch. Ramesh)....Pages 143-152
Design of Narrow-Band Bandpass Filter with Extended Stopband Using Open-Loop Triangular Resonators (Yatindra Gaurav, R. K. Chauhan)....Pages 153-160
Series Fed Patch Antenna Array with CSRR Inspired Ground Plane (Chirag Arora, Shyam S. Pattnaik, R. N. Baral)....Pages 161-167
Design of Dual-Band BPF Using Interdigital Structure Loaded Resonators (Arvind Kumar Pandey, R. K. Chauhan)....Pages 169-174
Characterization and Control Strategies of a Magnetic Levitation System (Maher Alwajih, Shabana Urooj)....Pages 175-182
Power Energy Management for Grid-Connected Hybrid Renewable Energy System in Yemen Using Fuzzy Logic (Adel Rawea, Shabana Urooj)....Pages 183-191
Classification of Mammograms Using Sigmoidal Transformation and SVM (Vikrant Bhateja, Ananya Tiwari, Aman Gautam)....Pages 193-199
An Approach for the Preprocessing of EMG Signals Using Canonical Correlation Analysis (Deeksha Anand, Vikrant Bhateja, Ashita Srivastava, Deepak Kumar Tiwari)....Pages 201-208
Big Data Analytics and Security: A Big Choice and Challenge for the Generation (Gebremichael Girmay, D. Lalitha Bhaskari)....Pages 209-217
A Prototype for Image Tamper Detection with Self-generated Verification Code Using Gödelization (P. Raja Mani, D. Lalitha Bhaskari)....Pages 219-226
Suspicious URLs Filtering Using Optimal RT-PFL: A Novel Feature Selection Based Web URL Detection (Kotoju Rajitha, Doddapaneni Vijayalakshmi)....Pages 227-235
A Decision Tree Approach to Identify the Factors Affecting Reliability for Component-Based System (Rajni Sehgal, Deepti Mehrotra, Manju Bala)....Pages 237-243
A Novel Differential Evolution Test Case Optimisation (DETCO) Technique for Branch Coverage Fault Detection (Vibhor Gupta, Avneet Singh, Kapil Sharma, Himanshu Mittal)....Pages 245-254
Comparative Analysis of Authentication and Access Control Protocols Against Malicious Attacks in Wireless Sensor Networks (Vikas Mittal, Sunil Gupta, Tanupriya Choudhury)....Pages 255-262
Blockchain—Technology to Drive the Future (Shweta Bhardwaj, Manish Kaushik)....Pages 263-271
Unified Payment Interface—A Way Ahead for Demonetization in India (Shweta Bhardwaj, Manish Kaushik)....Pages 273-280
Evolutionary Algorithm Based Faults Optimization of Multi-modular Software (Rana Majumdar, P. K. Kapur, Sunil K. Khatri, A. K. Shrivastava)....Pages 281-291
Chip-Based Key Distribution Technique (K. Naveen Kumar, Manisha J. Nene)....Pages 293-300
An Efficient Way to Find Frequent Patterns Using Graph Mining and Network Analysis Techniques on United States Airports Network (Anant Joshi, Abhay Bansal, A. Sai Sabitha, Tanupriya Choudhury)....Pages 301-316
Terrorist Attacks Analysis Using Clustering Algorithm (Pranjal Gupta, A. Sai Sabitha, Tanupriya Choudhury, Abhay Bansal)....Pages 317-328
A Review on VANET Routing Protocols and Wireless Standards (Gagan Deep Singh, Ravi Tomar, Hanumat G. Sastry, Manish Prateek)....Pages 329-340
Mechanical CAD Parts Recognition for Industrial Automation (Jain Tushar, Meenu, H. K. Sardana)....Pages 341-349
Classifiers for the Detection of Skin Cancer (Ginni Arora, Ashwani Kumar Dubey, Zainul Abdin Jaffery)....Pages 351-360
Comparison and Analysis of Information Retrieval DFR Models (Parul Kalra, Deepti Mehrotra, Abdul Wahid)....Pages 361-367
An Extensive Review on Verbal-Guided Image Parsing (Pankhuri Agrawal, Tanupriya Choudhury, Praveen Kumar, Gaurav Raj)....Pages 369-378
Analysis of External Content Plagiarism Using Character Swarm Optimization (Sudeshna Chakraborty, Vivek Kumar, Tanupriya Choudhury)....Pages 379-386
A Data Flow Pipeline and Logical View for Enterprise Big Data Architecture (Pooja Pant, Praveen Kumar, Seema Rawat)....Pages 387-394
A SIR Epidemic Model with Primary Immunodeficiency (Elizabeth Sebastian, Priyanka Victor)....Pages 395-402
American Sign Language Character Recognition Using Convolution Neural Network (Sarfaraz Masood, Harish Chandra Thuwal, Adhyan Srivastava)....Pages 403-412
Analysis of Classical and Quantum Computing Based on Grover and Shor Algorithm (Gaurav Raj, Dheerendra Singh, Abhishek Madaan)....Pages 413-423
A Mathematical Model on Deforestation Due to Human Population and Its Effect on Farm Fields: Role of Technology in Its Conservation (Elizabeth Sebastian, Preethi Victor)....Pages 425-432
An Approach to Analyze Cyberpsycho Attacks Enabled Using Persuasive Messages (Prashant Gupta, Manisha J. Nene)....Pages 433-440
An Analytical Survey on Smart Electricity Meter Using GSM (Shobhit Mendiratta, Mukul Garg, Jitender Singh Jadon, Neha Arora)....Pages 441-450
Testing of Web Services Using Manual Testing Approach (Japneet Singh, Sanjib Kumar Sahu, Amit Prakash Singh)....Pages 451-459
Analysis and Implementation of Business Intelligence Software for Report Bursting (Sheril Yadav, Aijaz Ul Haq, Seema Rawat, Praveen Kumar)....Pages 461-473
Practical Concepts and Future Implication of IoT: In Perspective of India (Ankita Gupta, Nabeel Zaidi, Himanshu Kaushik, Praveen Kumar)....Pages 475-486
Analysis of Distributed Mutual Exclusion Algorithms (Krishna Rawat, Nabeel Zaidi, Praveen Kumar, Tanupriya Choudhury)....Pages 487-496
Systematic Evaluation of Iaas Including Case Study (Nabeel Zaidi, Himanshu Kaushik, Raghav Bansal, Praveen Kumar)....Pages 497-506
An Observation on Social Media Content to Analyze Cyberpsycho Attack (Prashant Gupta, Manisha J. Nene)....Pages 507-514
FPGA Implementation of Single-Precision Floating Point Multiplication with Karatsuba Algorithm Using Vedic Mathematics (K. V. Gowreesrinivas, P. Samundiswary)....Pages 515-524
On the Reduction of Partial Products Using Wallace Tree Multiplier (Ayyagari Sai Ramya, B. S. S. V. Ramesh Babu, K. S. N. Raju, B. Ravi Chandra, A. Sirisha, E. Srikala)....Pages 525-532
Approaches to Fault Localization in Combinatorial Testing: A Survey (Rekha Jayaram, R. Krishnan)....Pages 533-540
Software Fault Prediction Using Machine-Learning Techniques (Deepak Sharma, Pravin Chandra)....Pages 541-549
Mathematical Study for Reduction of Variables in Karnaugh Map (Molla Ramizur Rahman)....Pages 551-558
E-learning: Mode to Improve the Quality of Educational System (Ananthi Sheshasaayee, M. Nazreen Bee)....Pages 559-566
Exploring Multilateral Cloud Computing Security Architectural Design Debt in Terms of Technical Debt (M. Manoj Kumar, A. N. Nandakumar)....Pages 567-579
Improved Data Hiding Technique Based on Audio and Video Steganography (Suresh Limkar, Aditya Nemade, Amruta Badgujar, Rupali Kate)....Pages 581-588
Multi-owner Architecture System Using Visual Cryptography and Watermarking for Secure Ownership in Cloud Environment (Suresh Limkar, Rajas N. Bhalerao, Priya D. Shinde, Abhishek B. Raut)....Pages 589-597
Movie Recommender Engine Using Collaborative Filtering (Howal Sadanand, Desai Vrushali, Nerlekar Rohan, Mote Avadhut, Vanjari Rushikesh, Rananaware Harshada)....Pages 599-608
Small Effort to Build Pune as a Smart City: Smart Real-Time Road Condition Detection and Efficient Management System (Suresh Limkar, Omkar Rajmane, Aishwarya Bhosale, Vidya Rane)....Pages 609-621
Penetration Testing as a Test Phase in Web Service Testing a Black Box Pen Testing Approach (Shivam Mehta, Gaurav Raj, Dheerendra Singh)....Pages 623-635
Analysis of Software Repositories Using Process Mining (Roohi Arora, Anchal Garg)....Pages 637-643
Predictive Analytics for LAMA and Absconding Behaviour of Patient (Roopal Chaudhary, Anchal Garg, Madhulika Bhadauria)....Pages 645-650
Back Matter ....Pages 651-653