語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the International Con...
~
Mishra, Durgesh Kumar.
Proceedings of the International Congress on Information and Communication Technology = ICICT 2015, Volume 2 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of the International Congress on Information and Communication Technology/ edited by Suresh Chandra Satapathy, Yogesh Chandra Bhatt, Amit Joshi, Durgesh Kumar Mishra.
其他題名:
ICICT 2015, Volume 2 /
其他作者:
Satapathy, Suresh Chandra.
面頁冊數:
XIX, 655 p. 291 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Electrical engineering. -
電子資源:
https://doi.org/10.1007/978-981-10-0755-2
ISBN:
9789811007552
Proceedings of the International Congress on Information and Communication Technology = ICICT 2015, Volume 2 /
Proceedings of the International Congress on Information and Communication Technology
ICICT 2015, Volume 2 /[electronic resource] :edited by Suresh Chandra Satapathy, Yogesh Chandra Bhatt, Amit Joshi, Durgesh Kumar Mishra. - 1st ed. 2016. - XIX, 655 p. 291 illus.online resource. - Advances in Intelligent Systems and Computing,4392194-5357 ;. - Advances in Intelligent Systems and Computing,335.
Chapter 1. A Novel Methodology to Detect Bone Cancer Stage Using Mean Intensity of MRI Imagery and Region Growing Algorithm -- Chapter 2. Firefly Algorithm Hybridized with Flower Pollination Algorithm for Multimodal Functions -- Chapter 3. BCI for Comparing Eyes Activities Measured from Temporal and Occipital Lobes -- Chapter 4. An Adaptive Edge-preserving Image Denoising Using Block-based Singular Value Decomposition in Wavelet Domain -- Chapter 5. Performance Analysis of Voltage Controlled Ring Oscillators -- Chapter 6. Modified Design of Integrated Ultra Low Power 8-bit SAR ADC Architecture Proposed for Biomedical Engineering (Pacemaker) -- Chapter 7. A Novel Symmetric Key Cryptography Using Dynamic Matrix Approach -- Chapter 8. Experimenting Large Prime Numbers Generation in MPI Cluster -- Chapter 9. Design and Analysis of High Performance CMOS Temperature Sensor Using VCO -- Chapter 10. High Performance Add Drop Filter Based on PCRR for ITU-T G.694.2 CWDM System -- Chapter 11. Efficient Data Dissemination in Wireless Sensor Network Using Adaptive and Dynamic Mobile Sink Based on Particle Swarm Optimization -- Chapter 12. A New Approach to Intuitionistic Fuzzy Soft Sets and its Application in Decision Making -- Chapter 13. Categorical Data Clustering Based on Cluster Ensemble Process -- Chapter 14. Region Based Clustering Approach for Energy Efficient Wireless Sensor Networks -- Chapter 15. Analyzing Complexity Using a Proposed Approximation Algorithm MDA in Permutation Flow Shop Scheduling Environment -- Chapter 16. Empirical Evaluation of Threshold and Time Constraint Algorithm for Non-replicated Dynamic Data Allocation in Distributed Database Systems -- Chapter 17. Automated Usability Evaluation of Web Applications -- Chapter 18. An Efficient Approach for Frequent Pattern Mining Method Using Fuzzy Set Theory -- Chapter 19. Virtual Machine Migration: A Green Computing Approach in Cloud Data Centers -- Chapter 20. Detecting Myocardial Infarction by Multivariate Multi-scale Covariance Analysis of Multi-lead Electrocardiograms -- Chapter 21. QoS Improvement in MANET Using Particle Swarm Optimization Algorithm -- Chapter 22. Comparing Various Classifier Techniques for Efficient Mining of Data -- Chapter 23. Fingerprint Recognition System by Termination Points Using Cascade Forward Back Propagation Neural Network -- Chapter 24. On the Dynamic Maintenance of Spanning Tree -- Chapter 25. Internet of Things Future Vision -- Chapter 26. Design and Analysis of Energy Efficient Opamp for Rectifier in Micro Scale Energy Harvesting (Solar Energy) -- Chapter 27. Design and Analysis of Various Charge Pump Schemes to Yield Solar Energy under Various Sunlight Intensities -- Chapter 28. Performance Evaluation of Speech Synthesis Techniques for English language -- Chapter 29. Systematization of Reliable Network Topologies Using Graph Operators -- Chapter 30. Network Performance analysis of Start-up Buffering for Live Streaming in P2P VOD Systems for Mesh Based Topology -- Chapter 31. Cryptanalysis of Image Encryption Algorithms Based on Pixels-Shuffling and Bits-Shuffling -- Chapter 32. Circular-Shape Slotted Microstrip Antenna -- Chapter 33. Energy Efficient Data Aggregation Technique Using Load Shifting Policy for Wireless Sensor Network -- Chapter 34. Architectural outline of GIS Based Decision Support System for Crop Selection -- Chapter 35. Retrieving Instructional Video Content from Speech and Text Information -- Chapter 36. Performance improvement of SLM Based MC-CDMA System Using MIMO Technique -- Chapter 37. SNR Improvement for Evoked Potential Estimation Using Wavelet Transform Averaging Technique -- Chapter 38. A GIS and Agent Based Model to Simulate Fire Emergency Response -- Chapter 39. Analyzing Link Stability and Throughput in Ad Hoc Network for Ricean Channel by Varying Pause Time -- Chapter 40. A Review on Pixel Based Binarization of Gray Images -- Chapter 41. Mobility and Energy Conscious Clustering Protocol for Wireless Networks -- Chapter 42. RE2R- Reliable Energy Efficient Routing for UWSNs -- Chapter 43. Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network -- Chapter 44. Investigation for Land Use and Land Cover Change Detection Using GIS -- Chapter 45. Effectiveness of Computer Based Instructional Visualization and Instructional Strategies on E-learning Environment -- Chapter 46. Test Case Reduction Using Decision Table for Requirements Specifications -- Chapter 47. Resource Management Using ANN-PSO Techniques in Cloud Environment -- Chapter 48. Congestion Control in Heterogeneous Wireless Sensor Networks for High Quality Data Transmission -- Chapter 49. Robust Data Model for Enhanced Anomaly Detection -- Chapter 50. Database Retrieval Based Digital Watermarking For Educational Institutions -- Chapter 51. Conceptual Modelling Through Fuzzy Logic for Spatial Database -- Chapter 52. Performance Analysis of Clustering Algorithm in Sensing Micro-blog for Smart Cities -- Chapter 53. Offloading for Application Optimization Using Mobile Cloud Computing -- Chapter 54. Integration of Color and MDLEP as a Feature Vector in Image Indexing and Retrieval System -- Chapter 55. Reversible Data Hiding through Hamming Code Using Dual Image -- Chapter 56. A Hybrid Fault Tolerant Scheduler for Computational Grid Environment -- Chapter 57. Image Transmission in OSTBC MIMO-PLC over Nakagami-m Distributed Background Noise -- Chapter 58. Optimized Relay Node Based Energy Efficient MAC Protocol for a Wireless Sensor Network -- Chapter 59. Reliable & Prioritized Data Transmission Protocol for Wireless Sensor Networks -- Chapter 60. Caching: QoS enabled Metadata Processing Scheme for Data Deduplication -- Chapter 61. Design and Analysis of Grid Connected Wind/PV Hybrid System -- Chapter 62. Requirements Prioritization – Survey and Analysis -- Chapter 63. GPU Acceleration of MoM for Computation of Performance Parameters of Strip Dipole Antenna -- Chapter 64. Energy Saving Model Techniques in Wireless Ad-hoc Network -- Chapter 65. Multi-Region Pre-Routing in Large Scale Mobile Ad-hoc Networks (MRPR) -- Chapter 66. Design Analysis of an n-bit IFSR Based Generic Stream Cipher and its Implementation Discussion on Hardware and Software Platforms -- Chapter 67. An Effective Strategy for Fingerprint Recognition based on pRAM’s Neural Nature with Data Input Mappings -- Chapter 68. Various E-governance Applications, Computing Architecture and Implementation Barriers -- Chapter 69. Fuzzy Logic Based Expert System for Assessment of Bank Loan Applications in Namibia.
This volume contains 69 papers presented at ICICT 2015: International Congress on Information and Communication Technology. The conference was held during 9th and 10th October, 2015, Udaipur, India and organized by CSI Udaipur Chapter, Division IV, SIG-WNS, SIG-e-Agriculture in association with ACM Udaipur Professional Chapter, The Institution of Engineers (India), Udaipur Local Centre and Mining Engineers Association of India, Rajasthan Udaipur Chapter. This volume contains papers mainly focused on ICT for Managerial Applications, E-governance, IOT and e-Mining.
ISBN: 9789811007552
Standard No.: 10.1007/978-981-10-0755-2doiSubjects--Topical Terms:
596380
Electrical engineering.
LC Class. No.: TK1-9971
Dewey Class. No.: 621.382
Proceedings of the International Congress on Information and Communication Technology = ICICT 2015, Volume 2 /
LDR
:08629nam a22003975i 4500
001
977397
003
DE-He213
005
20200704033142.0
007
cr nn 008mamaa
008
201211s2016 si | s |||| 0|eng d
020
$a
9789811007552
$9
978-981-10-0755-2
024
7
$a
10.1007/978-981-10-0755-2
$2
doi
035
$a
978-981-10-0755-2
050
4
$a
TK1-9971
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Proceedings of the International Congress on Information and Communication Technology
$h
[electronic resource] :
$b
ICICT 2015, Volume 2 /
$c
edited by Suresh Chandra Satapathy, Yogesh Chandra Bhatt, Amit Joshi, Durgesh Kumar Mishra.
250
$a
1st ed. 2016.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2016.
300
$a
XIX, 655 p. 291 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
439
505
0
$a
Chapter 1. A Novel Methodology to Detect Bone Cancer Stage Using Mean Intensity of MRI Imagery and Region Growing Algorithm -- Chapter 2. Firefly Algorithm Hybridized with Flower Pollination Algorithm for Multimodal Functions -- Chapter 3. BCI for Comparing Eyes Activities Measured from Temporal and Occipital Lobes -- Chapter 4. An Adaptive Edge-preserving Image Denoising Using Block-based Singular Value Decomposition in Wavelet Domain -- Chapter 5. Performance Analysis of Voltage Controlled Ring Oscillators -- Chapter 6. Modified Design of Integrated Ultra Low Power 8-bit SAR ADC Architecture Proposed for Biomedical Engineering (Pacemaker) -- Chapter 7. A Novel Symmetric Key Cryptography Using Dynamic Matrix Approach -- Chapter 8. Experimenting Large Prime Numbers Generation in MPI Cluster -- Chapter 9. Design and Analysis of High Performance CMOS Temperature Sensor Using VCO -- Chapter 10. High Performance Add Drop Filter Based on PCRR for ITU-T G.694.2 CWDM System -- Chapter 11. Efficient Data Dissemination in Wireless Sensor Network Using Adaptive and Dynamic Mobile Sink Based on Particle Swarm Optimization -- Chapter 12. A New Approach to Intuitionistic Fuzzy Soft Sets and its Application in Decision Making -- Chapter 13. Categorical Data Clustering Based on Cluster Ensemble Process -- Chapter 14. Region Based Clustering Approach for Energy Efficient Wireless Sensor Networks -- Chapter 15. Analyzing Complexity Using a Proposed Approximation Algorithm MDA in Permutation Flow Shop Scheduling Environment -- Chapter 16. Empirical Evaluation of Threshold and Time Constraint Algorithm for Non-replicated Dynamic Data Allocation in Distributed Database Systems -- Chapter 17. Automated Usability Evaluation of Web Applications -- Chapter 18. An Efficient Approach for Frequent Pattern Mining Method Using Fuzzy Set Theory -- Chapter 19. Virtual Machine Migration: A Green Computing Approach in Cloud Data Centers -- Chapter 20. Detecting Myocardial Infarction by Multivariate Multi-scale Covariance Analysis of Multi-lead Electrocardiograms -- Chapter 21. QoS Improvement in MANET Using Particle Swarm Optimization Algorithm -- Chapter 22. Comparing Various Classifier Techniques for Efficient Mining of Data -- Chapter 23. Fingerprint Recognition System by Termination Points Using Cascade Forward Back Propagation Neural Network -- Chapter 24. On the Dynamic Maintenance of Spanning Tree -- Chapter 25. Internet of Things Future Vision -- Chapter 26. Design and Analysis of Energy Efficient Opamp for Rectifier in Micro Scale Energy Harvesting (Solar Energy) -- Chapter 27. Design and Analysis of Various Charge Pump Schemes to Yield Solar Energy under Various Sunlight Intensities -- Chapter 28. Performance Evaluation of Speech Synthesis Techniques for English language -- Chapter 29. Systematization of Reliable Network Topologies Using Graph Operators -- Chapter 30. Network Performance analysis of Start-up Buffering for Live Streaming in P2P VOD Systems for Mesh Based Topology -- Chapter 31. Cryptanalysis of Image Encryption Algorithms Based on Pixels-Shuffling and Bits-Shuffling -- Chapter 32. Circular-Shape Slotted Microstrip Antenna -- Chapter 33. Energy Efficient Data Aggregation Technique Using Load Shifting Policy for Wireless Sensor Network -- Chapter 34. Architectural outline of GIS Based Decision Support System for Crop Selection -- Chapter 35. Retrieving Instructional Video Content from Speech and Text Information -- Chapter 36. Performance improvement of SLM Based MC-CDMA System Using MIMO Technique -- Chapter 37. SNR Improvement for Evoked Potential Estimation Using Wavelet Transform Averaging Technique -- Chapter 38. A GIS and Agent Based Model to Simulate Fire Emergency Response -- Chapter 39. Analyzing Link Stability and Throughput in Ad Hoc Network for Ricean Channel by Varying Pause Time -- Chapter 40. A Review on Pixel Based Binarization of Gray Images -- Chapter 41. Mobility and Energy Conscious Clustering Protocol for Wireless Networks -- Chapter 42. RE2R- Reliable Energy Efficient Routing for UWSNs -- Chapter 43. Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network -- Chapter 44. Investigation for Land Use and Land Cover Change Detection Using GIS -- Chapter 45. Effectiveness of Computer Based Instructional Visualization and Instructional Strategies on E-learning Environment -- Chapter 46. Test Case Reduction Using Decision Table for Requirements Specifications -- Chapter 47. Resource Management Using ANN-PSO Techniques in Cloud Environment -- Chapter 48. Congestion Control in Heterogeneous Wireless Sensor Networks for High Quality Data Transmission -- Chapter 49. Robust Data Model for Enhanced Anomaly Detection -- Chapter 50. Database Retrieval Based Digital Watermarking For Educational Institutions -- Chapter 51. Conceptual Modelling Through Fuzzy Logic for Spatial Database -- Chapter 52. Performance Analysis of Clustering Algorithm in Sensing Micro-blog for Smart Cities -- Chapter 53. Offloading for Application Optimization Using Mobile Cloud Computing -- Chapter 54. Integration of Color and MDLEP as a Feature Vector in Image Indexing and Retrieval System -- Chapter 55. Reversible Data Hiding through Hamming Code Using Dual Image -- Chapter 56. A Hybrid Fault Tolerant Scheduler for Computational Grid Environment -- Chapter 57. Image Transmission in OSTBC MIMO-PLC over Nakagami-m Distributed Background Noise -- Chapter 58. Optimized Relay Node Based Energy Efficient MAC Protocol for a Wireless Sensor Network -- Chapter 59. Reliable & Prioritized Data Transmission Protocol for Wireless Sensor Networks -- Chapter 60. Caching: QoS enabled Metadata Processing Scheme for Data Deduplication -- Chapter 61. Design and Analysis of Grid Connected Wind/PV Hybrid System -- Chapter 62. Requirements Prioritization – Survey and Analysis -- Chapter 63. GPU Acceleration of MoM for Computation of Performance Parameters of Strip Dipole Antenna -- Chapter 64. Energy Saving Model Techniques in Wireless Ad-hoc Network -- Chapter 65. Multi-Region Pre-Routing in Large Scale Mobile Ad-hoc Networks (MRPR) -- Chapter 66. Design Analysis of an n-bit IFSR Based Generic Stream Cipher and its Implementation Discussion on Hardware and Software Platforms -- Chapter 67. An Effective Strategy for Fingerprint Recognition based on pRAM’s Neural Nature with Data Input Mappings -- Chapter 68. Various E-governance Applications, Computing Architecture and Implementation Barriers -- Chapter 69. Fuzzy Logic Based Expert System for Assessment of Bank Loan Applications in Namibia.
520
$a
This volume contains 69 papers presented at ICICT 2015: International Congress on Information and Communication Technology. The conference was held during 9th and 10th October, 2015, Udaipur, India and organized by CSI Udaipur Chapter, Division IV, SIG-WNS, SIG-e-Agriculture in association with ACM Udaipur Professional Chapter, The Institution of Engineers (India), Udaipur Local Centre and Mining Engineers Association of India, Rajasthan Udaipur Chapter. This volume contains papers mainly focused on ICT for Managerial Applications, E-governance, IOT and e-Mining.
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Data mining.
$3
528622
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Satapathy, Suresh Chandra.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
889261
700
1
$a
Bhatt, Yogesh Chandra.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1266608
700
1
$a
Joshi, Amit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1246887
700
1
$a
Mishra, Durgesh Kumar.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1266609
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811007545
776
0 8
$i
Printed edition:
$z
9789811007569
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-981-10-0755-2
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入