buchspektrum Internet-Buchhandlung

Neuerscheinungen 2016

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

V. Kamakshi Prasad, K. Srujan Raju, B. Padmaja Rani, Suresh Chandra Satapathy, Siba K. Udgata (Beteiligte)

Proceedings of the First International Conference on Computational Intelligence and Informatics


ICCII 2016
Herausgegeben von Satapathy, Suresh Chandra; Prasad, V. Kamakshi; Rani, B. Padmaja; Udgata, Siba K.; Raju, K. Srujan
1st ed. 2017. 2016. xiv, 724 S. 274 SW-Abb., 181 Farbtabellen. 235 mm
Verlag/Jahr: SPRINGER, BERLIN; SPRINGER SINGAPORE 2016
ISBN: 9811024707 (9811024707)
Neue ISBN: 978-9811024702 (9789811024702)

Preis und Lieferzeit: Bitte klicken


The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India.
´Chapter 1. GUI Based Automated Data Analysis System Using Matlab©.- Chapter 2. A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking Techniques.- Chapter 3. A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks.- Chapter 4. Artificial Neural Networks Model to Improve the Performance Index of the Coil-disc Assembly in Tube Flow.- Chapter 5. Handling Wormhole Attacks in WSNs Using Location Based Approach.- Chapter 6. Video Authentication Using Watermark and Digital Signature - A Study.- Chapter 7. A Comparative Study and Performance Analysis Using IRNSS and Hybrid Satellites.- Chapter 8. Generalized Approach to Enhance the Shared Cache Performance in Multicore Platform.- Chapter 9. A Novel Framework for Road Traffic Data Management for Cloud Based Storage.- Chapter 10. Minimum Description Length (MDL) Based Graph Analytics.- Chapter 11. Implementation of Intrusion Detection System Using Artificial Bee Colony with Correlation Based Feature Selection.- Chapter 12. Virtualization Security Issues and Mitigations in Cloud Computing.- Chapter 13. Secured Three-tier Architecture for Wireless Sensor Networks Using Chaotic Neural Network.- Chapter 14. A Regularized Constrained Least Square De-blurring Method for SPECT Images.- Chapter 15. Effective Video Data Retrieval Using Image Key Frame Selection.- Chapter 16. A Review of Joint Channel Assignment and Routing Protocols for Wireless Mesh Networks.- Chapter 17. Correlated Cluster Based Imputation for Treatment of Missing Values.- Chapter 18. Application of Pseudo 2-D Hidden Markov Model for Hand Gesture Recognition.- Chapter 19. Cleaning and Sentiment Tasks for News Transcript Data.- Chapter 20. Inventory Management System Using IOT.- Chapter 21. A Personalized Recommender System Using Conceptual Dynamics.- Chapter 22. Mitigating Replay Attack in Wireless Sensor Network through Assortment of Packets.- Chapter 23. Progressive Genetic Evolutions Based Join Cost Optimization (PGE-JCO) for Distributed RDF Chain Queries.- Chapter 24. Improved Apriori Algorithm Using Power Set on Hadoop.- Chapter 25. Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad-hoc Networks (CRAHNs).- Chapter 26. Performance Comparison of Intentional Caching Schemes in Disruption Tolerant Networks (DTN).- Chapter 27. A Cascaded Method to Reduce the Computational Burden of Nearest Neighbor Classier.- Chapter 28. An Innovative method to Mitigate DDoS Attacks for Cloud Environment using Bagging and Stacking.- Chapter 29. A Novel Method for QoS Based Spectrum Allocation in Cognitive Radio Systems.- Chapter 30. A Review on fMRI Signal Analysis and Brain Mapping Methodologies.- Chapter 31. Static Program Behavior Tracing for Program Similarity Quantification.- Chapter 32. Ontology Based Automatic Annotation: An Approach for Efficient Retrieval of Semantic Results of Web Documents.- Chapter 33. An Iterative Hadoop Based Ensemble Data Classification Model on Distributed Medical Databases.- Chapter 34. A Framework for Secure Mobile Cloud Computing.- Chapter 35. Intelligent Evaluation of Short Responses for e-Learning Systems.- Chapter 36. Content Based Video Retrieval Using Dominant Color and Shape Feature.- Chapter 37. Intelligent SRTF: A New Approach to Reduce the Number of Context Switches in SRTF.- Chapter 38. Anomaly Detection Using New Tracing Tricks on Program Executions and Analysis of System Data.- Chapter 39. Aesthetics of Bharatanatyam Poses Evaluated through Fractal Analysis.- Chapter 40. Algorithm to Find the Dependent Variable in Large Virtualized Environment.- Chapter 41. Challenges of Modern Query Processing.- Chapter 42. IOT-Based Traffic Signal Control Technique for Helping Emergency Vehicles.- Chapter 43. Wireless Sensor Sequence Data Model for Smart Home and IoT Data Analytics.- Chapter