BESTEBOOKDOWNLOAD

 

Proceedings of the First International Conference on Computational Intelligence and Informatics : IC

Proceedings of the First International Conference on Computational Intelligence and Informatics : IC

Edition:1

Author(s) :Suresh Chandra Satapathy, V. Kamakshi Prasad, B. Padmaja Rani, Siba K. Udgata, K. Srujan Raju (eds.)

Year :2017

ISBN :9789811024702, 9789811024719

Pages :XIV, 724[7

Language :English

Extension :pdf

Size :26 Mb (26973718)

Summary :

The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. Table of contents : Front Matter....Pages i-xiv GUI-Based Automated Data Analysis System Using Matlab®....Pages 1-6 A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking Techniques....Pages 7-16 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks....Pages 17-26 Artificial Neural Networks Model to Improve the Performance Index of the Coil-Disc Assembly in Tube Flow....Pages 27-41 Handling Wormhole Attacks in WSNs Using Location Based Approach....Pages 43-51 Video Authentication Using Watermark and Digital Signature—A Study....Pages 53-64 A Comparative Study and Performance Analysis Using IRNSS and Hybrid Satellites....Pages 65-74 Generalized Approach to Enhance the Shared Cache Performance in Multicore Platform....Pages 75-83 A Novel Framework for Road Traffic Data Management for Cloud-Based Storage....Pages 85-97 Minimum Description Length (MDL) Based Graph Analytics....Pages 99-106 Implementation of Intrusion Detection System Using Artificial Bee Colony with Correlation-Based Feature Selection....Pages 107-115 Virtualization Security Issues and Mitigations in Cloud Computing....Pages 117-128 Secured Three-Tier Architecture for Wireless Sensor Networks Using Chaotic Neural Network....Pages 129-136 A Regularized Constrained Least-Squares De-blurring Method for SPECT Images....Pages 137-144 Effective Video Data Retrieval Using Image Key Frame Selection....Pages 145-155 A Review of Joint Channel Assignment and Routing Protocols for Wireless Mesh Networks....Pages 157-170 Correlated Cluster-Based Imputation for Treatment of Missing Values....Pages 171-178 Application of Pseudo 2-D Hidden Markov Model for Hand Gesture Recognition....Pages 179-188 Cleaning and Sentiment Tasks for News Transcript Data....Pages 189-200 Inventory Management System Using IOT....Pages 201-210 A Personalized Recommender System Using Conceptual Dynamics....Pages 211-219 Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets....Pages 221-230 Progressive Genetic Evolutions-Based Join Cost Optimization (PGE-JCO) for Distributed RDF Chain Queries....Pages 231-244 Improved Apriori Algorithm Using Power Set on Hadoop....Pages 245-254 Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad hoc Networks (CRAHNs)....Pages 255-263 Performance Comparison of Intentional Caching Schemes in Disruption-Tolerant Networks (DTN)....Pages 265-273 A Cascaded Method to Reduce the Computational Burden of Nearest Neighbor Classifier....Pages 275-288 An Innovative Method to Mitigate DDoS Attacks for Cloud Environment Using Bagging and Stacking....Pages 289-299 A Novel Method for QoS-Based Spectrum Allocation in Cognitive Radio Systems....Pages 301-308 A Review on fMRI Signal Analysis and Brain Mapping Methodologies....Pages 309-320 Static Program Behavior Tracing for Program Similarity Quantification....Pages 321-330 Ontology-Based Automatic Annotation: An Approach for Efficient Retrieval of Semantic Results of Web Documents....Pages 331-339 An Iterative Hadoop-Based Ensemble Data Classification Model on Distributed Medical Databases....Pages 341-351 A Framework for Secure Mobile Cloud Computing....Pages 353-363 Intelligent Evaluation of Short Responses for e-Learning Systems....Pages 365-372 Content-Based Video Retrieval Using Dominant Color and Shape Feature....Pages 373-380 Intelligent SRTF: A New Approach to Reduce the Number of Context Switches in SRTF....Pages 381-388 Anomaly Detection Using New Tracing Tricks on Program Executions and Analysis of System Data....Pages 389-399 Aesthetics of BharataNatyam Poses Evaluated Through Fractal Analysis....Pages 401-409 Algorithm to Find the Dependent Variable in Large Virtualized Environment....Pages 411-422 Challenges of Modern Query Processing....Pages 423-432 IOT-Based Traffic Signal Control Technique for Helping Emergency Vehicles....Pages 433-440 Wireless Sensor Sequence Data Model for Smart Home and IoT Data Analytics....Pages 441-447 Automatic Detection of Violent Scenes in Tollywood Movies—A Rough Set Approach....Pages 449-456 Prism Tree Shape Rep
Open

About book:

Book category:2017

Book views:1041

Eidt day:2017-04-11




Relation book:

Contexts for young child flourishing: evolution, family, and society

Attention deficit hyperactivity disorder: adult outcome and its predictors

Denying to the grave: why we ignore the facts that will save us

Excellence in managing worldwide customer relationships

Complex survey data analysis with SAS

Democracy in the woods: environmental conservation and social justice in India, Tanzania, and Me...


Comments Listing:
Comments Form:
超便宜kindle版电子书