Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018.
The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.

Two Stage Histogram Enhancement Schemes to Improve Visual Quality of Fundus Images
1(11)
Farha Fatina Wahid
K. Sugandhi
G. Raju
A Secure and Efficient Computation Outsourcing Scheme for Multi-users
12(13)
V. Sudarsan Rao
N. Satyanarayana
Detecting the Common Biomarkers for Early Stage Parkinson's Disease and Early Stage Alzheimer's Disease Associated with Intrinsically Disordered Protein
25(10)
Sagnik Sen
Ujjwal Maulik
Assamese Named Entity Recognition System Using Naive Bayes Classifier
35(9)
Gitimoni Talukdar
Pranjal Protim Borah
Arup Baruah
Medical Image Multiple Watermarking Scheme Based on Integer Wavelet Transform and Extraction Using ICA
44(10)
R. Nanmaran
G. Thirugnanam
P. Mangaiyarkarasi
Recognizing Real Time ECG Anomalies Using Arduino, AD8232 and Java
54(11)
Pratik Kanani
Mamta Padole
Interpretation of Indian Sign Language Using Optimal HOG Feature Vector
65(9)
Garima Joshi
Anu Gaur
Sheenu
Stable Reduced Link Break Routing Technique in Mobile Ad Hoc Network
74(10)
Bhagyashri R. Hanji
Rajashree Shettar
Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-Examinations
84(11)
Kissan G. Gauns Dessai
Venkatesh V. Kamal
Early Diabetes Prediction Using Voting Based Ensemble Learning
95(9)
Adil Husain
Muneeb H. Khan
A System that Performs Data Distribution and Manages Frequent Itemsets Generation of Incremental Data in a Distributed Environment
104(10)
Vinaya Sawanl
Ketan Shah
Assessing Autonomic Level for Self-managed Systems -- FAHP Based Approach
114(10)
Arun Sharma
Deepika Sharma
Mayank Singh
Bounded Paths for LCR Queries in Labeled Weighted Directed Graphs
124(10)
B. Bhargavi
K. Swarupa Rani
An Efficient Image Fusion Technique Based on DTCWT
134(10)
Sonam
Manoj Kumar
Low-Delay Channel Access Technique for Critical Data Transmission in Wireless Body Area Network
144(10)
M. Ambigavathi
D. Sridharan
Lexicon-Based Approach to Sentiment Analysis of Tweets Using R Language
154(11)
Nitika Nigam
Divakar Yadav
Twitter Based Event Summarization
165(10)
Amrah Maryam
Rashid Ali
Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image Enhancement
175(10)
Rashmi Bisht
Ritu Vijay
Shweta Singh
A Novel Load Balancing Algorithm Based on the Capacity of the Virtual Machines
185(11)
S. B. Kshama
K. R. Shobha
A Hybrid Approach for Privacy-Preserving Data Mining
196(12)
NagaPrasanthi Kundeti
M. V. P. Chandra Sekhara Rao
Naga Raju Devarakonda
Suresh Thommandru
Network Traffic Classification Using Multiclass Classifier
208(10)
Prabhjot Kaur
Prashant Chaudhary
Anchit Bijalwan
Amit Awasthi
An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection
218(10)
Rohini Rajpal
Sanmeet Kaur
Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection
228(11)
Sanmeet Kaur
Ishan Garg
Recognition of Handwritten Digits Using DNN, CNN, and RNN
239(10)
Subhi Jain
Rahul Chauhan
Evaluating Effectiveness of Color Information for Face Image Retrieval and Classification Using SVD Feature
249(11)
Junali Jasmine Jena
G. Girish
Manisha Palro
PDD Algorithm for Balancing Medical Data
260(10)
Karan Kalra
Riya Goyal
Sanmeet Kaur
Parteek Kumar
Digital Mammogram Classification Using Compound Local Binary Pattern Features with Principal Component Analysis Based Feature Reduction Approach
270(9)
Menaxi J. Bagchi
Figlu Mohanty
Suvendu Rup
Bodhisattva Dash
Banshidhar Majhi
Assessing the Performance of CMOS Amplifiers Using High-k Dielectric with Metal Gate on High Mobility Substrate
279(11)
Deepa Anand
M. Swathi
A. Purushothaman
Sundararaman Gopalan
The Impact of Picture Splicing Operation for Picture Forgery Detection
290(12)
Rachna Mehta
Navneet Agrawal
LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images
302(10)
N. Sasikaladevi
N. Mahalakshmi
N. Archana
HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection
312(9)
N. Sasikaladevi
A. Revathi
N. Mahalakshmi
N. Archana
Greedy WOA for Travelling Salesman Problem
321(10)
Rishah Gupta
Nilay Shrivastava
Mohit Jain
Vijander Singh
Asha Rani
Deterministic Task Scheduling Method in Multiprocessor Environment
331(11)
Ranjit Rajak
Performance Comparison of Measurement Matrices in Compressive Sensing
342(10)
Kankanala Srinivas
Nagapuri Srinivas
Puli Kishore Kumar
Gayadhar Pradhan
A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL)
352(10)
Deepak A. Vidhate
Parag Kulkarni
Novel Technique for the Test Case Prioritization in Regression Testing
362(10)
Mampi Kerani
Sharmila
Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems
372(9)
Ashu Bansal
Sanmeet Kaur
Relative Direction: Location Path Providing Method for Allied Intelligent Agent
381(11)
S. Rayhan Kabir
Mirza Mohtashim Alam
Shaikh Muhammad Allayear
Md Tahsir Ahmed Munna
Syeda Sumbul Hossain
Sheikh Shah Mohammad Motiur Rahman
FPGA Implementation for Real-Time Epoch Extraction in Speech Signal
Nagapuri Srinivas
Kankanala Srinivas
Gayadhar Pradhan
Puli Kishore Kumar Privacy
Preserving Random Permutation of Image Pixels Enciphered
392(9)
Model from Cyber Attacks for Covert Operations
401(10)
Amit Kumar Shakya
Ayushman Ramola
Akhilesh Kandwal
Vivek Chamoli
MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO
411(10)
Jitendra Kumar Seth
Satish Chandra
An Improved RDH Model for Medical Images with a Novel EPR Embedding Technique
421(10)
Jayanta Mondal
Debabala Swain
Devee Darshani Panda
Machine Learning Based Adaptive Framework for Logistic Planning in Industry 4.0
431(8)
Krista Chaudhary
Mayank Singh
Sandhya Tarar
D. K. Chauhan
Viranjay M. Srivastava
An Analysis of Key Challenges for Adopting the Cloud Computing in Indian Education Sector
439(10)
Mayank Singh
Viranjay M. Srivastava
Texture Image Retrieval Based on Block Level Directional Local Extrema Patterns Using Tetrolet Transform
449(12)
Ghanshyam Raghuwanshi
Vipin Tyagi
Development of Transformer-Less Inverter System for Photovoltaic Application
461(10)
Shamkumar B. Chavan
Umesh A. Kshirsagar
Mahesh S. Chavan
English Text to Speech Synthesizer Using Concatenation Technique
471(10)
Sai Sawant
Mangesh Deshpande
Text Translation from Hindi to English
481(8)
Ira Natu
Sahasra Iyer
Anagha Kulkarni
Kajol Patil
Pooja Patil
Optical Character Recognition (OCR) of Marathi Printed Documents Using Statistical Approach
489(10)
Pritish Mahendra Vibhute
Mangesh Sudhir Deshpande
Multi View Human Action Recognition Using HODD
499(10)
Siddharth Bhorge
Deepak Bedase
Segmental Analysis of Speech Signal for Robust Speaker Recognition System
509(11)
Rupali V. Pawar
R. M. Jalnekar
J. S. Chitode
Multimicrophone Based Speech Dereverberation
520(10)
Seema Vitthal Arole
Mangesh Sudhir Deshpande
Modeling Nonlinear Dynamic Textures Using Isomap with GPU
530(13)
Premanand Ghadekar
Exploration of Apache Hadoop Techniques: Mapreduce and Hive for Big Data
543(10)
Poonam Rana
Vineet Sharma
P. K. Gupta
Author Index 553