Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2 (Advances in Intelligent Systems and Computing Book 398) 🔍
L Padma Suresh, Bijaya Ketan Panigrahi (eds.) Springer (India) Private Limited, Advances in Intelligent Systems and Computing, Advances in Intelligent Systems and Computing 398, 2, 1, 2016
英语 [en] · PDF · 21.4MB · 2016 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
备用文件名
lgli/K:\springer\10.1007%2F978-81-322-2674-1.pdf
备用文件名
lgrsnf/K:\springer\10.1007%2F978-81-322-2674-1.pdf
备用文件名
nexusstc/Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015/84801fb255c3497bb6ddfbe5d12d6d42.pdf
备用文件名
scihub/10.1007/978-81-322-2674-1.pdf
备用文件名
zlib/Computers/L Padma Suresh, Bijaya Ketan Panigrahi (eds.)/Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2_2679313.pdf
备选作者
International Conference on Soft Computing Systems
备选作者
Suresh, L. Padma; Panigrahi, Bijaya Ketan
备用出版商
Springer London, Limited
备用版本
Advances in Intelligent Systems and Computing, 398, 1st ed. 2016, New Delhi, 2016
备用版本
Advances in intelligent systems and computing, 1st ed. 2016, New Delhi, 2015
备用版本
Advances in intelligent systems and computing, volume 398, New Delhi, 2016
元数据中的注释
sm47856059
元数据中的注释
producers:
Acrobat Distiller 10.0.0 (Windows)
元数据中的注释
{"container_title":"Advances in Intelligent Systems and Computing","edition":"1","isbns":["8132226720","8132226747","9788132226727","9788132226741"],"issns":["2194-5357","2194-5365"],"publisher":"Springer India","series":"Advances in Intelligent Systems and Computing 398","volume":"2"}
备用描述
Front Matter....Pages i-xv
A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors....Pages 1-11
Study of Chunking Algorithm in Data Deduplication....Pages 13-20
Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography....Pages 21-31
Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents....Pages 33-46
Real-Time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity....Pages 47-56
Task Scheduling Using Multi-objective Particle Swarm Optimization with Hamming Inertia Weight....Pages 57-65
Pedagogue: A Model for Improving Core Competency Level in Placement Interviews Through Interactive Android Application....Pages 67-77
Non Functional QoS Criterion Based Web Service Ranking....Pages 79-90
Experimental Study on Chunking Algorithms of Data Deduplication System on Large Scale Data....Pages 91-98
A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities....Pages 99-112
Facial Expression Recognition Using PCA and Texture-Based LDN Descriptor....Pages 113-122
Role-Based Access Control for Encrypted Data Using Vector Decomposition....Pages 123-131
Mobile Controlled Door Locking System with Two-Factor Authentication....Pages 133-139
Integration of UMTS with WLAN Using Intermediate IMS Network....Pages 141-152
Building a Knowledge Vault with Effective Data Processing and Storage....Pages 153-158
Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional....Pages 159-166
A Study on Security Issues in Cloud Computing....Pages 167-175
An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection....Pages 177-185
Search Optimization in Cloud....Pages 187-194
Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping-Based Approach....Pages 195-203
Advanced Cluster-Based Attribute Slicing: A New Approach for Privacy Preservation....Pages 205-213
Advanced Power Demand Controller and Billing System Using GSM....Pages 215-222
A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor....Pages 223-233
FSM-Based VLSI Architecture for the 3 × 3 Window-Based DBUTMPF Algorithm....Pages 235-247
Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene....Pages 249-257
Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT....Pages 259-266
Scalable Casual Data Consistency for Wide Area Storage with Cloud....Pages 267-279
An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications....Pages 281-289
Big Data and Analytics—A Journey Through Basic Concepts to Research Issues....Pages 291-306
Efficient Identification of Bots by K-Means Clustering....Pages 307-318
Message Authentication and Source Privacy in Wi-Fi....Pages 319-329
Timely Prediction of Road Traffic Congestion Using Ontology....Pages 331-344
Optimal Selection of Security Countermeasures for Effective Information Security....Pages 345-353
Stabilization of Load in Content Delivery Networks....Pages 355-364
Eigen-Based Indexing and Retrieval of Similar Videos....Pages 365-376
FoetusCare: An Android App for Pregnancy Care....Pages 377-391
Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD)....Pages 393-403
MIMO-Based Efficient Data Transmission Using USRP....Pages 405-419
Automatic Road Sign Detection and Recognition Based on SIFT Feature Matching Algorithm....Pages 421-431
A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks....Pages 433-443
Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture....Pages 445-455
Bio-sensor Authentication for Medical Applications Using WBAN....Pages 457-467
PSO-Based Multipath Routing in Wireless Sensor Network....Pages 469-477
Information Hiding in H.264, H.265, and MJPEG....Pages 479-487
Intelligent Data Prediction System Using Data Mining and Neural Networks....Pages 489-500
Resource Allocation for Wireless Network Environment....Pages 501-508
Design of PSO-Based PI Controller for Tension Control in Web Transport Systems....Pages 509-516
Distributed Service Level Agreement-Driven Dynamic Cloud Resource Management....Pages 517-527
Efficient Route Discovery in VANET Using Binary Bat Approach....Pages 529-536
Mining Ambiguities Using Pixel-Based Content Extraction....Pages 537-544
Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm....Pages 545-551
Enhancing the Interactivity in Distributed Interactive Applications....Pages 553-560
Comparison and Analysis of Fuzzy Methods—TOPSIS, COPRAS-G, ANP, ELECTRE and AHP Using MATLAB....Pages 561-570
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner....Pages 571-578
Forecasting the Stability of the Data Centre Based on Real-Time Data of Batch Workload Using Times Series Models....Pages 579-589
Active Warden Attack on Steganography Using Prewitt Filter....Pages 591-599
Similarity Scores Evaluation in Social Networking Sites....Pages 601-614
Estimating Random Delays in Modbus Over TCP/IP Network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing....Pages 615-625
Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features....Pages 627-637
Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining....Pages 639-646
NEBULA: Deployment of Cloud Using Open Source....Pages 647-653
An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory....Pages 655-662
A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System....Pages 663-673
Towards Modelling a Trusted and Secured Centralised Reputation System for VANET’s....Pages 675-688
A Survey on Trusted Platform Module for Data Remanence in Cloud....Pages 689-695
Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval....Pages 697-706
A Hybrid Cloud Architecture for Secure Service—Measures Against Poodle Vulnerability....Pages 707-713
An Efficient Authentication System for Data Forwarding Under Cloud Environment....Pages 715-725
Survey on Data Mining Techniques with Data Structures....Pages 727-739
Back Matter....Pages 741-743
开源日期
2016-03-14
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。