TEST - Catálogo BURRF
   

Proceedings of the second international conference on computer and communication technologies :

Proceedings of the second international conference on computer and communication technologies : ic3t 2015, volume 2 / edited by Suresh Chandra Satapathy, K. Srujan Raju, Jyotsna Kumar Mandal, Vikrant Bhateja. - 1st ed. 2016. - xxiv, 833 páginas : 335 ilustraciones - Advances in Intelligent Systems and Computing, 380 2194-5357 ; .

Springer eBooks

Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network -- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS -- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG -- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems -- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network -- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network -- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection -- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO -- Chapter 9. Natural Language Based Self Learning Feedback Analysis System -- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal -- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS -- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures -- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing -- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval -- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm -- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis -- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning -- Chapter 18. Augmenting Women’s Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks -- Chapter 19. Analysis of Student Feedback by Ranking the Polarities -- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals -- Chapter 21. Enhancing the Performance of Map Reduce Default Scheduler by Detecting Prolonged Task Trackers in Heterogeneous Environments -- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback -- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation -- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System -- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method -- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm -- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems -- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units -- Chapter 29. A Enhanced Micro strip Antenna Using Metamaterial at 2.4 GHz -- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks -- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR) -- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System -- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness -- Chapter 34. MRI Classification of Parkinson’s Disease Using SVM and Texture Features -- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification -- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning -- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern -- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices -- Chapter 39. A New Approach for Single Text Document Summarization -- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image -- Chapter 41. A Novel Fuzzy Min Max Neural Network and Genetic Algorithm Based Intrusion Detection System -- Chapter 42. Real Time Fault Tolerance Task Scheduling Algorithm with Minimum Energy Consumption -- Chapter 43. Completely Separable Reversible Data Hiding with Increased Embedding Capacity Using Residue Number System -- Chapter 44. A Metric for Ranking the Classifiers for Evaluation of Intrusion Detection System -- Chapter 45. Analysis of Different Neural Network Architectures in Face Recognition System -- Chapter 46. A Novel Approach for Diagnosis of Noisy Component in Rolling bearing Using Improved Empirical Mode Decomposition -- Chapter 47. A Novel Solution of Dijkstra’s Algorithm for Shortest Path Routing with Polygonal Obstacles In Wireless Networks Using Fuzzy Mathematics -- Chapter 48. Asymmetric Coplanar Waveguide fed Monopole Antenna with SRR in the Ground Plane -- Chapter 49. Image processing of Natural Calamity Images Using Healthy Bacteria Foraging Optimization Algorithm -- Chapter 50. Necessitate Green Environment for Sustainable Computing -- Chapter 51. Determinantal Approach to Hermite-Sheffer Polynomials -- Chapter 52. Intelligent Traffic Monitoring System -- Chapter 53. Analysis of Mining, Visual Analytics Tools and Techniques in Space and Time -- Chapter 54. Dimensionality reduced Recursive Filter features for hyperspectral classification -- Chapter 55. Customized Web User Interface for Hadoop Distributed File System -- Chapter 56. Reinforcing Web Accessibility for Enhanced Browsers and Functionalities according to W3C Guidelines -- Chapter 57. Feature and Search Space Reduction for Label Dependent Multi-label Classification -- Chapter 58. Link Expiration Based Routing in Wireless Ad hoc Networks -- Chapter 59. Analysis of Dual Beam Pentagonal Patch Antenna -- Chapter 60. Combination of CDLEP and Gabor features for CBIR -- Chapter 61. Scheduling Real Time Transactions Using Deferred Pre-emptive Technique -- Chapter 62. An Intelligent Packet Filtering Based on Bi-Layer Particle Swarm Optimization with Reduced Search Space -- Chapter 63. Storage Optimization of Cloud Using Disjunctive Property of p -- Chapter 64. Co-Training with Clustering for the Semi Supervised Classification of Remote Sensing Images -- Chapter 65. An Integrated Secure Architecture for IPv4/IPv6 Address Translation between IPv4 and IPv6 Networks -- Chapter 66. Logistic Regression Learning Model for Handling Concept Drift with Unbalanced Data in Credit Card Fraud Detection System -- Chapter 67. Music Revolution through Genetic Evolution Theory -- Chapter 68. Low-Cost Supply Chain Management and Value Chain Management with Real-time Advance Inexpensive Network Computing -- Chapter 69. Opinion classification Based on Product Reviews from an Indian e-commerce Website -- Chapter 70. Mitigation of Fog and Rain Effects in Free Space Optical Transmission Using Combined Diversity -- Chapter 71. Technology Involved in Bridging Physical, Cyber and Hyper World -- Chapter 72. Cloud Load Balancing and Resource Allocation -- Chapter 73. A Novel Methodology to Filter out Unwanted Messages from OSN user’s Wall Using Trust Value Calculation -- Chapter 74. Resource Prioritization Technique in Computational Grid Environment -- Chapter 75. Fuzzy-Based M-AODV Routing Protocol in MANETs -- Chapter 76. Cuckoo Search in Test Case Generation and Conforming Optimality Using Firefly Algorithm -- Chapter 77. Time Domain Analysis of EEG to Classify Imagined Speech -- Chapter 78. Accurate Frequency Estimation Method Based on Basis Approach and Empirical Wavelet Transform -- Chapter 79. Hybrid Recommender System with Conceptualization and Temporal preferences -- Chapter 80. An Approach to Detect Intruder in Energy Aware Routing for Wireless Mesh Networks.

9788132225232

TK1-9971
Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha