1 - 20
Next
- Satapathy, Suresh Chandra, 1964-
- Cham : Springer, 2020.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Chapter 1: Selection of Significant Metrics for Improving the Performance of Change-Proneness Modules.-
- Chapter 2: Effort Estimation of Web based Applications using ERD, use Case Point Method and Machine Learning.-
- Chapter 3: Usage of Machine Learning in Software Testing.-
- Chapter 4: Test Scenarios Generation using Combined Object-Oriented Models.-
- Chapter 5: A Novel Approach of Software Fault Prediction using Deep Learning Technique.-
- Chapter 6: Feature-Based Semi-Supervised Learning to Detect Malware from Android.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Frontiers of Intelligent Computing: Theory and Applications (7th : 2018 : Đà Nẵng, Vietnam)
- Cham : Springer, [2020]
- Description
- Book — 1 online resource
- Summary
-
- Digital Signature Algorithms based on Hidden Discrete Logarithm Problem
- A Research for Reconstructing 3D Object by Using an RGB-D Camera
- Robot Path Planning Using Modified Artificial Bee Colony Algorithm
- FinRep: A Blockchain Approach for Financial Reputation
- Vietnamese tourism linked open data
- New Modes of Using Block Ciphers: Error Correction and Pseudo-probabilistic Encryption.
- International Conference on Information and Communication Technology for Intelligent Systems (1st : 2015 : Ahmadābād, India)
- Switzerland : Springer, 2016.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Intelligent Information Retrieval And Business Intelligence.- Intelligent Web Mining And Knowledge Discovery Systems.- Applications for Intelligent Systems.- Applications of ICT in Rural and Urban Areas.- ICT for Information Sciences.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Information and Communication Technology for Intelligent Systems (1st : 2015 : Ahmadābād, India)
- Switzerland : Springer, 2016.
- Description
- Book — 1 online resource (xvi, 617 pages) : illustrations
- Summary
-
- ICT based Security and Privacy Applications
- Intelligent Systems for Health and IT Applications
- Intelligent Managerial Applications for ICT
- Content Based and Applications.
- Singapore : Springer, 2020.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Use of Artificial Neural Network for Abnormality Detection in Medical Images.- Deep Learning Techniques for Crime Hotspot Detection.- Optimization Techniques for Machine Learning.- A Package Including Pre-Processing, Feature Extraction, Feature Reduction, and Classification for MRI Classification.- Predictive Analysis of Lake Water Quality Using an Evolutionary Algorithm.- A Survey on the Latest Development of Machine Learning in Genetic Algorithm and Particle Swam Optimization.- A Hybridized Data Clustering for Breast Cancer Prognosis and Risk Exposure using Fuzzy C-Means and Cohort Intelligence.- Development of Algorithm for Spatial Modelling of Climate Data for Agriculture Management for the Semi-Arid Area of Maharashtra in India.- A Survey on Human Group Activity Recognition by Analyzing Person Action from Video Sequences using Machine Learning Techniques.- Artificial Intelligence in Journalism: A Boon or Bane?.- A Perspective of Artificial Intelligence in Public Relations: The Way Forward.- Roulette Wheel Selection Based Computational Intelligence Technique to Design an Efficient Transmission Policy for Energy Harvesting Sensors.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Embedded Systems and Artifical Intelligence (1st : 2019 : Fez, Morocco)
- Singapore : Springer, 2020.
- Description
- Book — 1 online resource (879 pages)
- Summary
-
- Real time Implementation of Articial Neural Network in FPGA Platform.- Design of a 0,18um CMOS Inductor - based Bandpass Microwave Active Filter.- Improvement of the Authentication on in-Vehicle Controller Area Networks.- Comparative Evaluation of Speech Recognition systems Based on Different Toolkits.- Stability Analysis and H Performance for Nonlinear Fuzzy Networked Control Systems with Time-Varying Delay.- Driver Behavior assistance in Road Intersections.- Performance of CE-OFDM System over AWGN and Frequency-Selective Channels.- Towards a Dynamical Adaptive Finite Volume Core for Urban Flow Simulations.- An Efficiency Study of Adaptive Median Filtering for Image Denoising, Based on A Hardware Implementation.- Processing Time and Computing Resources Optimization in a Mobile Edge Computing Node.- Viscous Dissipation and Heat Source/Sink Effects on Convection Heat Transfer in a Saturated Porous Medium.- Fast and Efficient Decoding Algorithm Developed From Concatenation between A Symbol-By-Symbol Decoder and A Decoder Based On Syndrome Computing and Hash Techniques.- SWIMAC: An Ultra-Low Power Consumption MAC Protocol for IR-UWB based WSN.- An Optimal Design of a Short-Channel RF Low Noise Amplifier Using a Swarm Intelligence Techniques.
- (source: Nielsen Book Data)
- 4 Conclusion
- References
- Design of a 0.18 μm CMOS Inductor-Based Bandpass Microwave Active Filter
- 1 Introduction
- 2 Synthesis of a Grounded CMOS Active Inductor
- 3 Procedure of Designing Chebyshev Microwave Bandpass Filters
- 4 Example of a Third-Order Chebyshev Bandpass Filter
- 5 Conclusion
- References
- Improvement of the Authentication on In-Vehicle Controller Area Networks
- 1 Introduction
- 2 Development of an Authentication Method
- 2.1 Principles
- 2.2 Current Technique
- 2.3 Proposed Improvements
- 3 Hash Algorithm
- 4 Conclusion
- References
(source: Nielsen Book Data)
7. Proceedings of International Conference on ICT for Sustainable Development : ICT4SD 2015. Volume 1 [2016]
- International Conference on ICT on Sustainable Development (2015 : Ahmadābād, India)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource (xx, 757 pages) : color illustrations Digital: text file.PDF.
- Summary
-
- Chapter 1. A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications
- Chapter 2. DDA: An Approach to Handle DDoS (Ping Flood) Attack
- Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform
- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous Environment
- Chapter 5. Faster Load Flow Analysis
- Chapter 6. Fuzzy Link Based Analysis for Mining Informational Systems
- Chapter 7. Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints
- Chapter 8. Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm
- Chapter 9. An Improvement in Performance of Optical Communication System using Linearly Chirped Apodized Fiber Bragg Grating
- Chapter 10. Enhancement of Minimum Spanning Tree
- Chapter 11. Feasibility Study of Proposed Architecture for Automatic Assessment of Use Case Diagram
- Chapter 12. Extraction of Web Content Based on Content Type
- Chapter 13. User Based Collaborative Filtering Using Bloom Filter with MapReduce
- Chapter 14. ICT Based Facilities Management Tools for Buildings
- Chapter 15. Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET
- Chapter 16. UDP Flooding Attack Detection Using Information Metric Measure
- Chapter 17. Generalized MCDM Based Decision Support System for Personnel Prioritization
- Chapter 18. A Proactive Dynamic Rate Control Scheme for AIMD based Reactive TCP Variants
- Chapter 19. Investigating Varying Time Black Hole attack on QoS over MANET
- Chapter 20. Hybrid Approach to Reduce Time Complexity of String Matching Algorithm using Hashing with Chaining
- Chapter 21. INDTime: Temporal Tagger- First Step Towards Temporal Information Retrieval
- Chapter 22. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography and Steganography
- Chapter 23. A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD)
- Chapter 24. ACE (Advanced Compression Encryption) Scheme for Image Authentication
- Chapter 25. An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique
- Chapter 26. Detection of Wormhole Attack in Wireless Sensor Networks
- Chapter 27. Comparative Analysis of MCML Compressor with and without Concept of Sleep Transistor
- Chapter 28. Design & Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D Photonic Crystal
- Chapter 29. Designing and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor
- Chapter 30. Classifying Nodes in Social Media Space
- Chapter 31. A Novel Hexagonal Shaped Based Band Stop Frequency Selective Surface with Multi-Band Applications
- Chapter 32. AXSM : An Automated Tool for XML Schema Matching
- Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data
- Chapter 34. Improved Indoor Positioning using RSS and Directional Antenna Integrating With RFID and Wireless Technology
- Chapter 35. Secured Cloud Data Storage
- Prototype Trust Model for Public Cloud Storage
- Chapter 36. A Semi Circular Monopole Antenna for Ultra Wide Band Applications
- Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks
- Chapter 38. Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Application
- Chapter 39. Support Vector Machine Based Model for Host Overload Detection in Clouds
- Chapter 40. A Hybrid Face Recognition Scheme Using Contour and Gabor Wavelet
- Chapter 41. Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Ad-hoc Networks
- Chapter 42. Data Acquisition with FPGA using Xilinx and LabVIEW
- Chapter 43. SRR and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics
- Chapter 44. Wireless Resonant Power Transmission
- Chapter 45. Fuzzy Clustering based Efficient Classification Model for large TCPdump data set using Hadoop framework
- Chapter 46. System-related Characteristic Based Leader Election Protocol for Cognitive Radio Networks
- Chapter 47. Passive Image Manipulation Detection using Wavelet Transform and Support Vector Machine Classifier
- Chapter 48. Intrusion Detection System with Snort in Cloud Computing
- Chapter 49. Rural E-Health Care Model
- Chapter 50. An Implementation Model for Privacy Aware Access Control in Web Services Environment
- Chapter 51. Comprehensive Review on Eye Close and Eye Open Activities Using EEG in Brain Computer Interface
- Chapter 52. Design of High Data Rate and Multipath Efficient Underwater Acoustic Communication System Using OFDM-DQPSK
- Chapter 53. A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter
- Chapter 54. Performance Analysis of Medical Image Compression Techniques
- Chapter 55. Integrated Framework Using Frequent Pattern for Clustering Numeric and Nominal Data Sets
- Chapter 56. Image Encryption by Using Block Based Symmetric Transformation Algorithm (International Data Encryption Algorithm)
- Chapter 57. Content Based Watermarking Using MCA
- Chapter 58. Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image
- Chapter 59. Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem
- Chapter 60. Evaluating Performance of Reactive and Hybrid Routing Protocol in Mobile Ad-Hoc Network
- Chapter 61. Sentiment Based Data Mining Approach for Classification and Analysis
- Chapter 62. Offline Handwritten Sanskrit Simple and Compound Character Recognition Using Neural Network
- Chapter 63. Need of ICT for Sustainable Development of Power Sector
- Chapter 64. Development of Optical Impairment Minimization Technique for Radio Over Fiber Link
- Chapter 65. Mobile Waste Management for Smart Cities: Monitoring Sanitation through Living Labs
- Chapter 66. Optimized Implementation of Location Aware and Network Based Services for Power Efficient Android Applications
- Chapter 67. Power Consumption and Congestion Control of Rendezvous Node for Wireless Biosensor Network
- Chapter 68. Comparison of Different Similarity Functions on Hindi QA System
- Chapter 69. Preventing Faults: Fault Monitoring and Proactive Fault tolerance in Cloud Computing
- Chapter 70. Evolving the Reliability for Cloud System Using Priority Metric
- Chapter 71. Multilevel Priority Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment
- Chapter 72. Efficient DNA Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs
- Chapter 74. Opinion Mining Classification Based on Extension of Opinion Mining Phrases
- Chapter 75. Facial Expression Recognition Using variants of LBP and Classifier Fusion
- Chapter 76. FLSU Based Energy Efficient Protocol Design for WSN with Mobile Sink
- Chapter 77. Goal based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques.
8. Proceedings of International Conference on ICT for Sustainable Development : ICT4SD 2015. Volume 2 [2016]
- International Conference on ICT on Sustainable Development (2015 : Ahmadābād, India)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource (xx, 819 pages) : color illustrations Digital: text file.PDF.
- Summary
-
- Chapter 1. Implementing the Logical Security Framework for E-commerce Based on Service Oriented Architecture
- Chapter 2. Indian Sign Language Translator Using Kinect
- Chapter 3. Formal Transformation of UML Diagram: Use Case, Class, Sequence Diagram with Z Notation for Representing the Static & Dynamic Perspectives of System
- Chapter 4. A Survey of Android Malware Detection Strategy and Techniques
- Chapter 5. A Review on Dynamic View Selection
- Chapter 6. Software Project Estimation Using Fuzzy Inference System
- Chapter 7. Linear and Non Linear Modeling of Protein Kinase B/AkT
- Chapter 8. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks
- Chapter 9. Analysis of Authentication Techniques Adopted by End Users in Real Life Cloud Implementation
- Chapter 10. Network Analysis of ICMP Ping Flood DoS Attack in Wi-Max and Wireless LAN
- Chapter 11. Scheduling in Big Data Heterogeneous Distributed System Using Hadoop
- Chapter 12. A New Differential Scan-Based Side-Channel Attacks against RSA Cryptosystem
- Chapter 13. Grey Wolf Optimizer (GWO) algorithm for minimum weight planer frame design subjected to AISC-LRFD
- Chapter 14. Child Growth Mentor
- A Proposed Model for Effective Use of Mobile Application for Better Growth of Child
- Chapter 15. Design & Development of a Rule Based Urdu Lemmatizer
- Chapter 16. Enhanced Microstrip Patch Antenna Using Metamaterial for DECT and Aircraft Wireless System Applications
- Chapter 17. An Enhanced Strategy to Minimize Makespan in Cloud Environment to Accelerate the Performance
- Chapter 18. Prefix Length Based Disjoint Set Tries For IPv6 Lookup
- Chapter 19. Implementation of FAST Clustering-based Feature Subset Selection Algorithm for High-Dimensional Data
- Chapter 20. Performance Comparison of 2D and 3D Zigbee Wireless Sensor Networks
- Chapter 21. Enhancement of Data Security by PMK Technique
- Chapter 22. Privacy-Leveled Perturbation Model for Privacy Preserving Collaborative Data Mining
- Chapter 23. Extended Bellman Ford Algorithm with Optimized Time of Computation
- Chapter 24. Supervised Link Prediction using Forecasting Models on Weighted Online Social Network
- Chapter 25. Dual Band Rectangular Shape Antenna With Sideway Extension at Top and Bottom for WLAN and WiMax Application
- Chapter 26. A Framework to Rank Nodes in Social Media Graph Based on Sentiment Related Parameters
- Chapter 27. Development of Analytical method to determine the deflection of tapered cantilever beam with inclined loading condition using software simulation
- Chapter 28. Bio-Inspired Ultra Low Power Design of comparator with Noise Compensation using Hysteresis technique designed for Biomedical Engineering (Pacemaker)
- Chapter 29. Comparative Analysis of Different Architectures of MCML Square Root Carry Select Adders for Low Power Applications
- Chapter 30. Improvement in Quality of Extractive Text Summaries using Modified Reciprocal Ranking
- Chapter 31. A Novel Compact Monopole Multiband Antenna for WiMAX/Satellite/Military Applications
- Chapter 32. Critical Study and Analysis of Cyber Law Awareness amongst the Netizens
- Chapter 33. Information Communication Technologies for Research and Academic Development
- Chapter 34. An Insider Cyber Threat Prediction Mechanism based on Behavioral Analysis
- Chapter 35. Enhancing Amplifier characteristics using Quantum dots
- Chapter 36. An Approach to Secure Internet of Things against DDoS
- Chapter 37. Issues in Quantitative Association Rule Mining: A Big Data Perspective
- Chapter 38. A Framework for temporal information search and exploration
- Chapter 39. Item Amalgamation Approach for Serendipity Oriented Recommender System
- Chapter 40. A Two Stage Integrated Approach of DNA Cryptography
- Chapter 41. ADVANCED IRRIGATION SYSTEMS IMPACTING SUSTAINABILITY AND REDUCING WATER NEEDS
- ROLE OF ICT IN IRRIGATION
- Chapter 42. Parallelization of Load Flow Analysis
- Chapter 43. Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
- Chapter 44. Hybrid Miner Tracking System at 2.4GHz for Underground Mines
- Chapter 46. A Study On Working Of Ad Auctioning by Google AdWords
- Chapter 47. A Novel Approach for Polarity Determination Using Emoticons: Emoticon-Graph
- Chapter 48. Scheduling for Distributed Applications in Mobile Cloud Computing
- Chapter 49. High Availability of Databases for Cloud
- Chapter 50. Customized Parameter Configuration Framework for Performance Tuning in Apache Hadoop
- Chapter 51. Hand Skin Classification from Other Skin Objects Using Multi-Direction 3D Color-Texture Feature & Cascaded Neural Network Classifier
- Chapter 52. Texture Features for the Detection of Acute Lymphoblastic Leukemia
- Chapter 53. Design and Implementation of Non Touch Enable Password System
- Chapter 54. Intelligent Web Security Testing with Threat Assessment and Client Server Penetration Using Burp Suite
- Chapter 55. QoS-aware Autonomic Cloud Computing for ICT
- Chapter 56. Emerging Green ICT: Heart Disease Prediction Model in Cloud Environment
- Chapter 57. Energy Conscious Allocation and Scheduling of Tasks in ICT Cloud Paradigm
- Chapter 58. Controlling of FPGA Based Optical Polarimeter Using LabVIEW
- Chapter 59. Automatic Intelligent Traffic Controlling for Emergency Vehicle Rescuing
- Chapter 60. A Capacity Constraint Distributed Data Dissemination Protocol for Ad-hoc Cognitive Radio Networks
- Chapter 61. Enhancing Performance of Security Log Analysis Using Correlation-Prediction Technique
- Chapter 62. Differential Weight Based Hybrid Approach to Detect Software Plagiarism
- Chapter 63. Selecting Favorable Reference Nodes to aid Localization in Wireless Sensor Networks
- Chapter 64. A Scientometric Analysis of Smart Grid Implementation at Distribution Feeder
- Chapter 65. Enhancing Web Search Results Using Aggregated Search
- Chapter 66. Managing Heterogeneity by Synthesizing Composite Data
- Chapter 67. A Novel Approach to Filter Topic Related Important Terms within Document
- Chapter 68. Domain Driven Density Based Clustering Algorithm
- Chapter 69. Adoptive Approach of AODV and DSDV Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET
- Chapter 70. Re-Clustering Approach Using WCA in AODV and DSDV Routing Protocols in MANET
- Chapter 71. Issues and Challenges of Heterogeneous Datasets in Map Reduce framework of Big Data Environment
- Chapter 72. Strong Virtual Password Scheme Using Reference Switching on Coded User Parameters and Phishing Attack
- Chapter 73. Need Of ICT For Sustainable Development In Petroleum Industry
- Chapter 74. Hybrid K-mean and Refinement Based on Ant for Color Image Clustering
- Chapter 75. A Framework for Secure Data Storage in Mobile Cloud Computing
- Chapter 76. Hindi Word Sense Disambiguation Using Cosine Similarity
- Chapter 77. A Multi-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic.
- International Conference on Frontiers in Intelligent Computing (8th : 2020 : Karnataka, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (xxiii, 758 pages) Digital: text file.PDF.
- Summary
-
- Classification of Dry/Wet Snow Using Sentinel-2 High Spatial Resolution Optical Data
- Potential of Robust Face Recognition from Real-Time CCTV Video Stream for Biometric Attendance Using Convolutional Neural Network
- ATM Theft Investigation Using Convolutional Neural Network
- Classification and Prediction of Rice Crop Diseases Using CNN and PNN
- SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection
- Comparison of KNN and SVM Algorithms to Detect Clinical Mastitis in Cows Using Internet of Animal Health Things
- Two-Way Face Scrutinizing System for Elimination of Proxy Attendances Using Deep Learning
- Ontology-Driven Sentiment Analysis in Indian Healthcare Sector
- Segmentation of Nuclei in Microscopy Images Across Varied Experimental Systems
- (plus 63 other papers).
(source: Nielsen Book Data)
- International Conference on Information System Design and Intelligent Applications (6th : 2019 : Visakhapatnam, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Acceptance of technology in the classroom: A qualitative analysis of Mathematics teachers' perceptions
- Smart Agriculture using IOT
- CSII-TSBCC:Comparative Study of IdentifyingIssues of TaskSchedulingof Bigdata in Cloud Computing
- De-Centralized Cloud Data Storage for Privacy Preserving of Data Using Fog
- MULTI LAYER PERCEPTRON BACKPROPAGATION ALGORITHM FOR PREDICTING BREAST CANCER
- IOT based Borewell Water Level Detection and Auto-Control of Submersible Pumps
- Institute Examcell Automation with Mobile Applica-tion Interface
- Plasmonic Square Ring Resonator Based Band-Stop Filter Using MIM Waveguide
- Interactive and Assistive Gloves for Post-Stroke Hand Rehabilitation
- (Plus 75 papers).
(source: Nielsen Book Data)
- International Conference on Smart Computing and Informatics (4th : 2020 : Hyderabad, India)
- Singapore : Springer, 2021.
- Description
- Book — 1 online resource (851 pages) Digital: text file.PDF.
- Summary
-
- Pad Vending Machine with Cashless Payment.- Design of Wrung order layout using advanced optimization techniques with integrated Variable batch scheduling.- Adaptive beamforming using Radial Basis Function.- A Cloud based centralized smart electricity billing and payment management system.- Real Time Driver Distraction Detection Using Opencv And Machine Learning Alorgithms.- Data Driven Prediction Model for Crime Patterns.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Smart Computing and Informatics (4th : 2020 : Hyderabad, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (801 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Chapter 1. An Intelligent Tracking Application for Post Pandemic.-
- Chapter 2. Investigation on the influence of English Expertise on non-native English-speaking StudentsaEURO (TM) Scholastic Performance using Data Mining.-
- Chapter 3. Machine Learning Algorithms for Modelling Agroclimatic indices: A Review.-
- Chapter 4. Metal Insulator Metal based Stepped Impedance Square Ring Resonator Dual-Band Band Pass Filter.-
- Chapter 5. Covid-19 Spread Analysis.-
- Chapter 6. Social Media Anatomy of Text and Emoji in Expressions.-
- Chapter 7. Development of Machine Learning Model Using Least Square-Support Vector Machine, Differential Evolution and Back Propagation Neural Network to Detect Breast Cancer.-
- Chapter 8. Distributed and Decentralized Attribute based Access Control for Smart Health Care Data.-
- Chapter 9. Dynamic Node Identification Management in Hadoop Cluster using DNA.-
- Chapter 10. A Scientometric Inspection of Research Based on WordNet Lexical During 1995-2019.-
- Chapter 11. Sentiment Analysis of an Online Sentiment with text and slang using Lexicon approach.-
- Chapter 12. Fuzzy Logic Technique for Evaluation of Performance of Load Balancing Algorithms in MCC.-
- Chapter 13. Impact of Bio-Inspired Algorithms to Predict Heart Diseases.-
- Chapter 14. Structured Data Extraction using Machine Learning from Image of Unstructured Bills/Invoices.-
- Chapter 15. Parallel Enhanced Chaotic Model Based Integrity to Improve Security and Privacy on HDFS.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Frontiers in Intelligent Computing (9th : 2021 : Mizoram, India)
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource (1 volume) : illustrations (black and white, and color).
- Summary
-
- A Comprehensive Study of Page-rank algorithm.- Live Emotion Verifier for Chat Applications using Emotional Intelligence.- Text to Speech conversion of Handwritten Kannada Words using various Machine Learning Models.- An Improved approach for automated essay scoring with LSTM and Word Embedding.- RoMaPla: Using t-test for Evaluating Robustness of Marathi Plagiarism Checker (MaPla).- To Analyse the impact of water scarcity in developing countries using Machine Learning.- Deep Learning Algorithms for Object Detection- A Study.- A Novel Multiblock Region Based Arnold Transformation for Image Watermarking combined with DWT-PSO Technique.- Automated Evaluation of SQL Queries: Eval_SQL.- Unsupervised Feature Selection Approaches for Medical Dataset using Soft Computing Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- ICMEET (Conference) (6th : 2021 : Bhubaneswar, India).
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource : illustrations (chiefly color).
- Summary
-
- Analysis of Throughput & Spectral Efficiency of the CR Users with Channel Allocation.- On Performance Improvement of Wireless Push Systems Via Smart Antennas.- Hybridization of RF Switch and Related Aspects.- Estimation of Gender using Convolutional Neural Network.- Human Abnormal Activity Detection in the ATM Surveillance Video.- Moving object Detection using Optical Flow and HSV.- Propagation of Data Using Free Space Under Different Weather Conditions.- BEP Analysis of Filter Bank Multicarrier UnderIQ Imbalance.- Optical Character Recognition for Roman-Text
- Visual Words based Static Indian Sign Language Alphabet Recognition using KAZE Descriptors.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Frontiers in Intelligent Computing: Theory and Applications (9th : 2021 : Mizoram, India)
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource (xviii, 567 pages) : illustrations (some color).
- Summary
-
- Automated Flower Species Identification by using Deep convolution neural network
- Information Retrieval for Cloud Forensics
- Machine Translation System Combination with Enhanced Alignments using Word Embeddings
- Geometry Based Machining Feature Retrieval with Inductive Transfer Learning
- Grapheme to phoneme conversion for Malayalam Speech Using encoder-decoder Architecture
- Usage of Block Chain Technology in e-Voting System using Private Block Chain
- Bengali Visual Genome: A Multimodal Dataset for Machine Translation and Image Captioning
- Deep Learning based Mosquito Species detection using Wingbeats frequencies
- Developments in Capsule Network Architecture: A Review
- Computer aided segmentation of polyps using Mask R-CNN and approach to reduce false positives
- Image GPT with Super Resolution.
- International Conference on Smart Computing and Informatics (5th : 2021 : Hyderabad, India)
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource
- Summary
-
- An Analytical Study of Covid-19 Dataset using Graph-Based Clustering Algorithms.- Development of Different Word Vectors and Testing using Text Classification Algorithms for Telugu.- Online Malayalam Script Assortment And Pre-Processing For Building Recommender Systems.- Design and synthesis of random number generator using LFSR.- A Flexible Accession on Brain Tumour Detection and Classification using VGG16 model.- Advertisement Click Fraud Detection Using Machine Learning Algorithms.- Artificial Intelligence for on-site detection of invasive Rugose Spiralling Whitefly in Coconut Plantation.- Analysis of different methodologies for Sentiment in Hindi Language.- A dynamic model and algorithm for real time traffic management.- A Selection-Based Framework for Building and Validating Regression Model for Covid-19 Information Management.- Fingerprint Liveliness Detectionto Mitigate Spoofing Attacks Using Generative Networks in Biometric System.- Pulmonary Nodule Detection using Laplacian of Gaussian and Deep Convolutional Neural Network.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Smart Computing and Informatics (3rd : 2018 : Bhubaneswar, India)
- Singapore : Springer, 2020.
- Description
- Book — 1 online resource (xx, 793 pages) : illustrations (some color)
- Summary
-
- Chapter 1. Varying k-nearest Neighbours: An Attempt to Improve a Widely used Classification Model
- Chapter 2. Enhancing Restore Speed of In-line Deduplication Cloud Based Backup Systems by Minimizing Fragmentation
- Chapter 3. Mango Leaves Recognition Using Deep Belief Network with Moth-Flame Optimization and Multi-Feature Fusion
- Chapter 4. Comparison of Different Task Scheduling Algorithms in Cloud Computing Environment using Cloud Reports
- Chapter 5. Randomness Generation Based Quantum Key Agreement for Secured Routing in Mobile Ad-hoc Network
- Chapter 6. Security Architecture for IOT Based Home Automation
- Chapter 7. An Analysis of Total Risk Management in Performances of Public Sector Banks in India
- Chapter 8. An Empirical Analysis on FDI and ICT in India
- Chapter 9. Overview on Security Concerns Associated in Cloud Computing
- Chapter 10. Review on Mobile Web Services Architectures and Challenges
- Chapter 11. A Novel Image Steganography Model using LSB with Extended ASCII Codes
- Chapter 12. Ensemble of Deep Learning Approaches for ATC Classification
- Chapter 13. Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage
- Chapter 14. Evaluating the Impact of Sampling based Nonlinear Manifold Detection Model on Software Defect Prediction Problem
- Chapter 15. Monitoring Fluid Level in Fluid Bags of Patient through Wireless Sensors in Hospital.
- International Conference on Smart Computing and Informatics (3rd : 2018 : Bhubaneswar, India)
- Singapore : Springer, 2020.
- Description
- Book — 1 online resource (xviii, 719 pages) : illustrations (some color)
- Summary
-
This book presents high-quality papers from the Third International Conference on Smart Computing and Informatics (SCI 2018−19), organized by the School of Computer Engineering and School of Computer Application, Kalinga Institute of Industrial Technology Deemed to be University, Bhubaneswar, from 21 to 22 December 2018. It includes advanced and multi-disciplinary research on the design of smart computing and informatics, focusing on innovation paradigms in system knowledge, intelligence and sustainability that have the potential to provide realistic solutions to various problems in society, the environment and industry. The papers featured provide a valuable contribution to the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in varied disciplines of science, technology and health care.
- International Conference on Information and Communication Technology (2015 : Udaipur, India)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource (xix, 671 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Chapter 1. Resource Management Using Virtual Machine Migrations.-
- Chapter 2. Framework of Compressive Sampling with its Applications to One and Two Dimensional Signals.-
- Chapter 3. Carbon Footprints Estimation of a Novel Environment-aware Cloud Architecture.-
- Chapter 4. Examining Usability of Classes in Collaboration with SPL Feature Model.-
- Chapter 5. Do Bad Smells follow some Pattern?.-
- Chapter 6. Ultra-Wideband Antenna with Triple Band Notched Characteristics.-
- Chapter 7. Utilizing NL Text for generating UML Diagrams.-
- Chapter 8. 2-D Photonic Crystal Based Solar Cell.-
- Chapter 9. Parallel Implantation of Frequent Itemset Mining Using Inverted Matrix Based on OpenCL.-
- Chapter 10. Extended Visual Secret Sharing with Cover Images Using Half Toning.-
- Chapter 11. Resonant Cavity Based Optical Wavelength De-multiplexer Using SOI Photonic Crystals.-
- Chapter 12. A Frequency Reconfigurable Antenna with Six Switchable Modes for Wireless Application.-
- Chapter 13. Comparative Analysis of Digital Watermarking Techniques.-
- Chapter 14. Design and Analysis of 1x6 Power Splitter Based on the Ring Resonator.-
- Chapter 15. Performance Evaluation of Vehicular Ad-hoc Network Using SUMO and NS2.-
- Chapter 16. An Intrusion Detection System for detecting Denial of Service Attack in Cloud by Using Artificial Bee Colony.-
- Chapter 17. Multi-Cavity Photonic Crystal Waveguide Based Ultra-Compact Pressure Sensor.-
- Chapter 18. Role Based Access Mechanism/Policy for Enterprise Data in Cloud.-
- Chapter 19. Big Data in Precision Agriculture through ICT: Rainfall Prediction Using Neural Network Approach.-
- Chapter 20. Evaluating Interactivity with respect to Distance and Orientation Variables of GDE Model.-
- Chapter 21. Comparative Evaluation of SVD-TR Model for Eye-Gaze Based Systems.-
- Chapter 22. Identity Based Key Management.-
- Chapter 23. Firefly Algorithm Hybridized with Flower Pollination Algorithm for Multimodal Functions.-
- Chapter 24. Uniqueness in User Behavior while Using the Web.-
- Chapter 25. Prediction of ERP Outcome Measurement and User Satisfaction by using Adaptive Neuro Fuzzy Inference System and SVM Classifiers Approach.-
- Chapter 26. UWB Antenna with Band Rejection for WLAN/WIMAX Band.-
- Chapter 27. Consequence of PAPR Reduction in OFDM System on Spectrum & Energy Efficiencies Using Modified PTS Algorithm.-
- Chapter 28. Energy Efficient Resource Provisioning Through Power Stability Algorithm in Cloud Computing.-
- Chapter 29. Comparative Analysis of Scalability and Energy Efficiency of Ordered Walk Learning Routing Protocol.-
- Chapter 30. A Novel Technique for Voltage Flicker Mitigation Using Dynamic Voltage Restorer.-
- Chapter 31. Gaussian Membership Function Based Speaker Identification Using Score Level Fusion of MFCC and GFCC.-
- Chapter 32. Efficient Local and Global Color Histogram Feature for Color Content Based Image Retrieval System.-
- Chapter 33. Energy Efficient Pollution Monitoring System Using Deterministic Wireless Sensor Networks.-
- Chapter 34. Development of Electronic Control System to Automatically Adjust Spray Output.-
- Chapter 35. Social Impact Theory Based Node Placement Strategy for Wireless Sensor Networks.-
- Chapter 36. Bang of Social Engineering in Social Networking Sites.-
- Chapter 37. Internet of Things (IoT): In a Way of Smart World.-
- Chapter 38. A Study of Routing Protocols for MANETs.-
- Chapter 39. Modelling Social Aspects of E-agriculture in India for Semantic Web.-
- Chapter 40. An Efficient Adaptive Data Hiding Scheme for Image Steganography.-
- Chapter 41. A Five-Layer Framework for Organizational Knowledge Management.-
- Chapter 42. A Survey on Big Data Architectures and Standard Bodies.-
- Chapter 43. Generating Data for Testing Community Detection Algorithms.-
- Chapter 44. Metamorphic Malware Detection using LLVM IR and Hidden Markov Model.-
- Chapter 45. Object Based Graphical User Authentication Scheme.-
- Chapter 46. Efficient Density Based Clustering Using Automatic Parameter Detection.-
- Chapter 47. Implementation of GIS Based Decision Support System for Crop Selection: A Case for Autumn (Kharif) Crops.-
- Chapter 48. WT Based Distributed Generation Location Minimizing Transmission Loss Using Mixed Integer Non-Linear Programming in Deregulated Electricity Market.-
- Chapter 49. Use Case Based Software Change Analysis and Reducing Regression Test Effort.-
- Chapter 50. Tackling Supply Chain Management through RFID: Opportunities and Challenges.-
- Chapter 51. Quality Improvement of Fingerprint Recognition System.-
- Chapter 52. A Composite Approach to Digital Video Watermarking.-
- Chapter 53. Effective Congestion less Dynamic Source Routing for Data Transmission in MANETs.-
- Chapter 54. Implementation & Integration of Cellular/GPS Based Vehicle Tracking System with Google Maps Using a Web Portal.-
- Chapter 55. Image Segmentation Using Two Dimensional Renyi Entropy.-
- Chapter 56. Supervised Learning Paradigm Based on Least Square Support Vector Machine for Contingency Ranking in a Large Power System.-
- Chapter 57. Process flow for Information Visualization in Biological Data.-
- Chapter 58. A Performance Analysis of High Level MapReduce Query Languages in Big Data.-
- Chapter 59. Variance Based Clustering for Balanced Clusters in Growing Datasets.-
- Chapter 60. Conceptual Framework for Knowledge Management in Agriculture Domain.-
- Chapter 61. Modularity-Based Community Detection in Fuzzy Granular Social Networks.-
- Chapter 62. Auto Characterization of Learning Materials: An Adaptive Approach to Personalized Learning Material Recommendation.-
- Chapter 63. Hadoop with Intuitionistic Fuzzy C-Means for Clustering in Big Data.-
- Chapter 64. A Framework for Group Decision Support System using Cloud Database for Broadcasting Earthquake Occurrences.-
- Chapter 65. Advanced Persistent Threat Model for Testing Industrial Control System Security Mechanisms.-
- Chapter 66. E-Reader Deployment in Namibia: Fantasy or Reality?.-
- Chapter 67. Multi-Region Pre-Routing in Large Scale Mobile Ad-hoc Networks (MRPR).-
- Chapter 68. Challenges Faced in Deployment of e-Learning Models in India.-
- Chapter 69. A Novel Cross-Layer Mechanism for Improving H.264/AVC Video Transmissions over IEEE 802.11n WLANs.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Information and Communication Technology (2015 : Udaipur, India)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Chapter 1. A Novel Methodology to Detect Bone Cancer Stage Using Mean Intensity of MRI Imagery and Region Growing Algorithm
- Chapter 2. Firefly Algorithm Hybridized with Flower Pollination Algorithm for Multimodal Functions
- Chapter 3. BCI for Comparing Eyes Activities Measured from Temporal and Occipital Lobes
- Chapter 4. An Adaptive Edge-preserving Image Denoising Using Block-based Singular Value Decomposition in Wavelet Domain
- Chapter 5. Performance Analysis of Voltage Controlled Ring Oscillators
- Chapter 6. Modified Design of Integrated Ultra Low Power 8-bit SAR ADC Architecture Proposed for Biomedical Engineering (Pacemaker)
- Chapter 7. A Novel Symmetric Key Cryptography Using Dynamic Matrix Approach
- Chapter 8. Experimenting Large Prime Numbers Generation in MPI Cluster
- Chapter 9. Design and Analysis of High Performance CMOS Temperature Sensor Using VCO
- Chapter 10. High Performance Add Drop Filter Based on PCRR for ITU-T G.694.2 CWDM System
- Chapter 11. Efficient Data Dissemination in Wireless Sensor Network Using Adaptive and Dynamic Mobile Sink Based on Particle Swarm Optimization
- Chapter 12. A New Approach to Intuitionistic Fuzzy Soft Sets and its Application in Decision Making
- Chapter 13. Categorical Data Clustering Based on Cluster Ensemble Process
- Chapter 14. Region Based Clustering Approach for Energy Efficient Wireless Sensor Networks
- Chapter 15. Analyzing Complexity Using a Proposed Approximation Algorithm MDA in Permutation Flow Shop Scheduling Environment
- Chapter 16. Empirical Evaluation of Threshold and Time Constraint Algorithm for Non-replicated Dynamic Data Allocation in Distributed Database Systems
- Chapter 17. Automated Usability Evaluation of Web Applications
- Chapter 18. An Efficient Approach for Frequent Pattern Mining Method Using Fuzzy Set Theory
- Chapter 19. Virtual Machine Migration: A Green Computing Approach in Cloud Data Centers
- Chapter 20. Detecting Myocardial Infarction by Multivariate Multi-scale Covariance Analysis of Multi-lead Electrocardiograms
- Chapter 21. QoS Improvement in MANET Using Particle Swarm Optimization Algorithm
- Chapter 22. Comparing Various Classifier Techniques for Efficient Mining of Data
- Chapter 23. Fingerprint Recognition System by Termination Points Using Cascade Forward Back Propagation Neural Network
- Chapter 24. On the Dynamic Maintenance of Spanning Tree
- Chapter 25. Internet of Things Future Vision
- Chapter 26. Design and Analysis of Energy Efficient Opamp for Rectifier in Micro Scale Energy Harvesting (Solar Energy)
- Chapter 27. Design and Analysis of Various Charge Pump Schemes to Yield Solar Energy under Various Sunlight Intensities
- Chapter 28. Performance Evaluation of Speech Synthesis Techniques for English language
- Chapter 29. Systematization of Reliable Network Topologies Using Graph Operators
- Chapter 30. Network Performance analysis of Start-up Buffering for Live Streaming in P2P VOD Systems for Mesh Based Topology
- Chapter 31. Cryptanalysis of Image Encryption Algorithms Based on Pixels-Shuffling and Bits-Shuffling
- Chapter 32. Circular-Shape Slotted Microstrip Antenna
- Chapter 33. Energy Efficient Data Aggregation Technique Using Load Shifting Policy for Wireless Sensor Network
- Chapter 34. Architectural outline of GIS Based Decision Support System for Crop Selection
- Chapter 35. Retrieving Instructional Video Content from Speech and Text Information
- Chapter 36. Performance improvement of SLM Based MC-CDMA System Using MIMO Technique
- Chapter 37. SNR Improvement for Evoked Potential Estimation Using Wavelet Transform Averaging Technique
- Chapter 38. A GIS and Agent Based Model to Simulate Fire Emergency Response
- Chapter 39. Analyzing Link Stability and Throughput in Ad Hoc Network for Ricean Channel by Varying Pause Time
- Chapter 40. A Review on Pixel Based Binarization of Gray Images
- Chapter 41. Mobility and Energy Conscious Clustering Protocol for Wireless Networks
- Chapter 42. RE2R- Reliable Energy Efficient Routing for UWSNs
- Chapter 43. Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network
- Chapter 44. Investigation for Land Use and Land Cover Change Detection Using GIS
- Chapter 45. Effectiveness of Computer Based Instructional Visualization and Instructional Strategies on E-learning Environment
- Chapter 46. Test Case Reduction Using Decision Table for Requirements Specifications
- Chapter 47. Resource Management Using ANN-PSO Techniques in Cloud Environment
- Chapter 48. Congestion Control in Heterogeneous Wireless Sensor Networks for High Quality Data Transmission
- Chapter 49. Robust Data Model for Enhanced Anomaly Detection
- Chapter 50. Database Retrieval Based Digital Watermarking For Educational Institutions
- Chapter 51. Conceptual Modelling Through Fuzzy Logic for Spatial Database
- Chapter 52. Performance Analysis of Clustering Algorithm in Sensing Micro-blog for Smart Cities
- Chapter 53. Offloading for Application Optimization Using Mobile Cloud Computing
- Chapter 54. Integration of Color and MDLEP as a Feature Vector in Image Indexing and Retrieval System
- Chapter 55. Reversible Data Hiding through Hamming Code Using Dual Image
- Chapter 56. A Hybrid Fault Tolerant Scheduler for Computational Grid Environment
- Chapter 57. Image Transmission in OSTBC MIMO-PLC over Nakagami-m Distributed Background Noise
- Chapter 58. Optimized Relay Node Based Energy Efficient MAC Protocol for a Wireless Sensor Network
- Chapter 59. Reliable & Prioritized Data Transmission Protocol for Wireless Sensor Networks
- Chapter 60. Caching: QoS enabled Metadata Processing Scheme for Data Deduplication
- Chapter 61. Design and Analysis of Grid Connected Wind/PV Hybrid System
- Chapter 62. Requirements Prioritization
- Survey and Analysis
- Chapter 63. GPU Acceleration of MoM for Computation of Performance Parameters of Strip Dipole Antenna
- Chapter 64. Energy Saving Model Techniques in Wireless Ad-hoc Network
- Chapter 65. Multi-Region Pre-Routing in Large Scale Mobile Ad-hoc Networks (MRPR)
- Chapter 66. Design Analysis of an n-bit IFSR Based Generic Stream Cipher and its Implementation Discussion on Hardware and Software Platforms
- Chapter 67. An Effective Strategy for Fingerprint Recognition based on pRAM's Neural Nature with Data Input Mappings
- Chapter 68. Various E-governance Applications, Computing Architecture and Implementation Barriers
- Chapter 69. Fuzzy Logic Based Expert System for Assessment of Bank Loan Applications in Namibia.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.