語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the International Con...
~
(1998 :)
Proceedings of the International Conference on Soft Computing SystemsICSCS 2015.Volume 2 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proceedings of the International Conference on Soft Computing Systemsedited by L Padma Suresh, Bijaya Ketan Panigrahi.
其他題名:
ICSCS 2015.
其他作者:
Suresh, L Padma.
團體作者:
出版者:
New Delhi :Springer India :2016.
面頁冊數:
xv, 743 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
標題:
Soft computingCongresses.
電子資源:
http://dx.doi.org/10.1007/978-81-322-2674-1
ISBN:
9788132226741$q(electronic bk.)
Proceedings of the International Conference on Soft Computing SystemsICSCS 2015.Volume 2 /
Proceedings of the International Conference on Soft Computing Systems
ICSCS 2015.Volume 2 /[electronic resource] :edited by L Padma Suresh, Bijaya Ketan Panigrahi. - New Delhi :Springer India :2016. - xv, 743 p. :ill. (some col.), digital ;24 cm. - Advances in intelligent systems and computing,v.3982194-5357 ;. - Advances in intelligent systems and computing ;176..
Chapter 1. A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors -- Chapter 2. Study of Chunking Algorithm in Data De-Duplication -- Chapter 3. Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography -- Chapter 4. Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents -- Chapter 5. Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity -- Chapter 6. Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight -- Chapter 7. Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application -- Chapter 8. Non-functional QoS Criterion Based Web Service Ranking -- Chapter 9. Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data -- Chapter 10. A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities -- Chapter 11. Facial Expression Recognition Using PCA and Texture Based LDN Descriptor -- Chapter 12. Role Based Access Control for Encrypted Data Using Vector Decomposition -- Chapter 13. Mobile Controlled Door Locking System with Two-factor Authentication -- Chapter 14. Integration of UMTS With WLAN Using Intermediate IMS Network -- Chapte r 15. Building a Knowledge Vault with Effective Data Processing and Storage -- Chapter 16. Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional -- Chapter 17. A Study on Security Issues in Cloud Computing -- Chapter 18. An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection -- Chapter 19. Search Optimisation in Cloud -- Chapter 20. Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach -- Chapter 21. Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation -- Chapter 22. Advanced Power Demand Controller and Billing System Using GSM -- Chapter 23. A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor -- Chapter 24. FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm -- Chapter 25. Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene -- Chapter 26. Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT -- Chapter 27. Scalable Casual Data Consistency for Wide Area Storage with Cloud -- Chapter 28. An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications -- Chapter 29. Big Data and Analytics – A Journey Through Basic Concepts to Research Issues -- Chapter 30. Efficient Identification of Bots by K-Means Clustering -- Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology -- Chapter 33. Optimal Selection of Security Countermeasures for Effective Information Security -- Chapter 34. Stabilization of Load in Content Delivery Networks -- Chapter 35. Eigen Based Indexing and Retrieval of Similar Videos -- Chapter 36. FoetusCare: An Android App for Pregnancy Care -- Chapter 37. Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD) -- Chapter 38. MIMO Based Efficient Data Transmission Using USRP -- Chapter 39. Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm -- Chapter 40. A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks -- Chapter 41. Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture -- Chapter 42. Bio-Sensor Authentication for Medical Applications Using WBAN -- Chapter 43. PSO Based Multipath Routing in Wireless Sensor Network -- Chapter 44. Information Hiding in H.264, H.265 and MJPEG -- Chapter 45. Intelligent Data Prediction System Using Data Mining and Neural Networks -- Chapter 46. Resource Allocation for Wireless Network Environment -- Chapter 47. Design of PSO Based PI controller for Tension Control in Web Transport Systems -- Chapter 48. Distributed Service Level Agreement Driven Dynamic Cloud Resource Management -- Chapter 49. Efficient Route Discovery in VANET Using Binary Bat Approach -- Chapter 50. Mining Ambiguities Using Pixel-based Content Extraction -- Chapter 51. Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm -- Chapter 52. Enhancing the Interactivity in Distributed Interactive Applications -- Chapter 53. Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab -- Chapter 54. Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner -- Chapter 55. Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models -- Chapter 56. Active Warden Attack on Steganography Using Prewitt Filter -- Chapter 57. Similarity Scores Evaluation in Social Networking Sites -- Chapter 58. Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing -- Chapter 59. Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features -- Chapter 60. Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining -- Chapter 61. NEBULA: Deployment of Cloud Using Open source -- Chapter 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory -- Chapter 63. A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System -- Chapter 64. Towards Modelling a Trusted and Secured Centralised Reputation System for VANET's -- Chapter 65. A Survey on Trusted Platform Module For Data Remanence in Cloud -- Chapter 66. Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval -- Chapter 67. A Hybrid Cloud Architecture for Secure Service –Measures Against Poodle Vulnerability -- Chapter 68. An Efficient Authentication System for Data Forwarding Under Cloud Environment -- Chapter 69. Survey on Data Mining Techniques with Data Structures.
The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
ISBN: 9788132226741$q(electronic bk.)
Standard No.: 10.1007/978-81-322-2674-1doiSubjects--Topical Terms:
387156
Soft computing
--Congresses.
LC Class. No.: QA76.9.S63
Dewey Class. No.: 006.3
Proceedings of the International Conference on Soft Computing SystemsICSCS 2015.Volume 2 /
LDR
:07878nmm a2200325 a 4500
001
482420
003
DE-He213
005
20160809113421.0
006
m d
007
cr nn 008maaau
008
161007s2016 ii s 0 eng d
020
$a
9788132226741$q(electronic bk.)
020
$a
9788132226727$q(paper)
024
7
$a
10.1007/978-81-322-2674-1
$2
doi
035
$a
978-81-322-2674-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.S63
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
006.3
$2
23
090
$a
QA76.9.S63
$b
I61 2015
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Proceedings of the International Conference on Soft Computing Systems
$h
[electronic resource] :
$b
ICSCS 2015.
$n
Volume 2 /
$c
edited by L Padma Suresh, Bijaya Ketan Panigrahi.
260
$a
New Delhi :
$b
Springer India :
$b
Imprint: Springer,
$c
2016.
300
$a
xv, 743 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.398
505
0
$a
Chapter 1. A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors -- Chapter 2. Study of Chunking Algorithm in Data De-Duplication -- Chapter 3. Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography -- Chapter 4. Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents -- Chapter 5. Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity -- Chapter 6. Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight -- Chapter 7. Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application -- Chapter 8. Non-functional QoS Criterion Based Web Service Ranking -- Chapter 9. Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data -- Chapter 10. A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities -- Chapter 11. Facial Expression Recognition Using PCA and Texture Based LDN Descriptor -- Chapter 12. Role Based Access Control for Encrypted Data Using Vector Decomposition -- Chapter 13. Mobile Controlled Door Locking System with Two-factor Authentication -- Chapter 14. Integration of UMTS With WLAN Using Intermediate IMS Network -- Chapte r 15. Building a Knowledge Vault with Effective Data Processing and Storage -- Chapter 16. Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional -- Chapter 17. A Study on Security Issues in Cloud Computing -- Chapter 18. An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection -- Chapter 19. Search Optimisation in Cloud -- Chapter 20. Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach -- Chapter 21. Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation -- Chapter 22. Advanced Power Demand Controller and Billing System Using GSM -- Chapter 23. A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor -- Chapter 24. FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm -- Chapter 25. Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene -- Chapter 26. Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT -- Chapter 27. Scalable Casual Data Consistency for Wide Area Storage with Cloud -- Chapter 28. An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications -- Chapter 29. Big Data and Analytics – A Journey Through Basic Concepts to Research Issues -- Chapter 30. Efficient Identification of Bots by K-Means Clustering -- Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology -- Chapter 33. Optimal Selection of Security Countermeasures for Effective Information Security -- Chapter 34. Stabilization of Load in Content Delivery Networks -- Chapter 35. Eigen Based Indexing and Retrieval of Similar Videos -- Chapter 36. FoetusCare: An Android App for Pregnancy Care -- Chapter 37. Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD) -- Chapter 38. MIMO Based Efficient Data Transmission Using USRP -- Chapter 39. Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm -- Chapter 40. A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks -- Chapter 41. Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture -- Chapter 42. Bio-Sensor Authentication for Medical Applications Using WBAN -- Chapter 43. PSO Based Multipath Routing in Wireless Sensor Network -- Chapter 44. Information Hiding in H.264, H.265 and MJPEG -- Chapter 45. Intelligent Data Prediction System Using Data Mining and Neural Networks -- Chapter 46. Resource Allocation for Wireless Network Environment -- Chapter 47. Design of PSO Based PI controller for Tension Control in Web Transport Systems -- Chapter 48. Distributed Service Level Agreement Driven Dynamic Cloud Resource Management -- Chapter 49. Efficient Route Discovery in VANET Using Binary Bat Approach -- Chapter 50. Mining Ambiguities Using Pixel-based Content Extraction -- Chapter 51. Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm -- Chapter 52. Enhancing the Interactivity in Distributed Interactive Applications -- Chapter 53. Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab -- Chapter 54. Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner -- Chapter 55. Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models -- Chapter 56. Active Warden Attack on Steganography Using Prewitt Filter -- Chapter 57. Similarity Scores Evaluation in Social Networking Sites -- Chapter 58. Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing -- Chapter 59. Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features -- Chapter 60. Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining -- Chapter 61. NEBULA: Deployment of Cloud Using Open source -- Chapter 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory -- Chapter 63. A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System -- Chapter 64. Towards Modelling a Trusted and Secured Centralised Reputation System for VANET's -- Chapter 65. A Survey on Trusted Platform Module For Data Remanence in Cloud -- Chapter 66. Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval -- Chapter 67. A Hybrid Cloud Architecture for Secure Service –Measures Against Poodle Vulnerability -- Chapter 68. An Efficient Authentication System for Data Forwarding Under Cloud Environment -- Chapter 69. Survey on Data Mining Techniques with Data Structures.
520
$a
The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
650
0
$a
Soft computing
$v
Congresses.
$3
387156
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Signal, Image and Speech Processing.
$3
273768
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
275288
700
1
$a
Suresh, L Padma.
$3
712146
700
1
$a
Panigrahi, Bijaya Ketan.
$3
492211
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
176.
$3
567349
856
4 0
$u
http://dx.doi.org/10.1007/978-81-322-2674-1
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000122257
電子館藏
1圖書
電子書
EB QA76.9.S63 I61 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-81-322-2674-1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入