توضیحاتی در مورد کتاب Emerging Research in Computing, Information, Communication and Applications: ERCICA 2015, Volume 1
نام کتاب : Emerging Research in Computing, Information, Communication and Applications: ERCICA 2015, Volume 1
ویرایش : 1
عنوان ترجمه شده به فارسی : تحقیقات نوظهور در محاسبات، اطلاعات، ارتباطات و کاربردها: ERCICA 2015، جلد 1
سری :
نویسندگان : N. R. Shetty, N.H. Prasad, N. Nalini (eds.)
ناشر : Springer India
سال نشر : 2015
تعداد صفحات : 569
ISBN (شابک) : 9788132225492 , 9788132225508
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 17 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
توضیحاتی در مورد کتاب :
این جلد مجموعه مقالات ERCICA 2015 را پوشش می دهد. ERCICA یک انجمن بین رشته ای را برای محققان، مهندسین و دانشمندان حرفه ای، مربیان و فناوران فراهم می کند تا به بحث، مناظره و ترویج تحقیق و فناوری در زمینه های آینده محاسبات، اطلاعات بپردازند. ، ارتباطات و کاربردهای آنها. مطالب این کتاب حوزههای تحقیقاتی نوظهور در زمینههای محاسبات، اطلاعات، ارتباطات و کاربردها را پوشش میدهد. این هم برای محققان و هم برای مهندسان شاغل مفید خواهد بود.
فهرست مطالب :
Front Matter....Pages i-xx
Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion....Pages 1-10
Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm....Pages 11-19
A Rotation Based Encryption Technique Using Symmetric Key Method....Pages 21-28
An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing....Pages 29-40
Noval Asynchronous Addition Architectures for Portable Applications....Pages 41-52
Reliability Analysis of Exponential Models Based on Skewness and Kurtosis....Pages 53-59
Missing Value Imputation with Unsupervised Kohonen Self Organizing Map....Pages 61-76
An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy....Pages 77-86
Energy and Current Consumption Analysis for Classic Bluetooth and Bluetooth Low Energy (BLE)....Pages 87-95
Design and Evaluation of BER for Ultra-Wide-Band System for Different Modulation Schemes....Pages 97-108
Image Denoising Using Multiresolution Analysis with Local Pixel Grouping and Principal Component Analysis....Pages 109-117
Path Planning and Controlling of Autonomous Robot....Pages 119-125
A New Approach of Compression of Large Community Graph Using Graph Mining Techniques....Pages 127-136
Application of Linear Search Algorithm in Control of TRMS....Pages 137-152
Discrete Cosine Transform Features in Automated Classification of Cardiac Arrhythmia Beats....Pages 153-162
Trust Based Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks....Pages 163-173
Enhancing Security of Banking Locker System Using Secret Sharing Scheme Based on Random Grids....Pages 175-181
Double Auction Mechanism for Spectrum Trading in Combinatorial Domain....Pages 183-202
ORPT: Probabilistic Modelling of Optimal Routing in Peak Traffic in Optical Network....Pages 203-211
Linear Congruential Sequences: Feedback and Recurrent Neural Networks....Pages 213-222
SABR: Secure Authentication-Based Routing in Large Scale Wireless Sensor Network....Pages 223-229
Novel Key-Management to Resist Illegitimate Intrusion from Rogue Access Points in WLAN....Pages 231-237
Performance Investigation of Energy Aware Routing Protocol for Heterogeneous WSNs....Pages 239-251
Use of NoSQL Database for Handling Semi Structured Data: An Empirical Study of News RSS Feeds....Pages 253-263
MLO: Multi-level Optimization to Enhance the Network Lifetime in Large Scale WSN....Pages 265-271
A Technique for Multi-tier Key Distribution for Securing Group Communication in WSN....Pages 273-279
Real-Time Energy Dissipation Model for Mobile Devices....Pages 281-288
Network Intrusion Detection in Cloud Computing....Pages 289-296
An Optimized & On-Demand Time Synchronization in Large Scale Wireless Sensor Network: OOD-TS....Pages 297-304
Lossless Compression of Medical Image to Overcome Network Congestion Constraints....Pages 305-311
Natural Language Compiler for English and Dravidian Languages....Pages 313-323
An Efficient Session Initiation Protocol for Secure Communication in Vehicular Ad Hoc Networks....Pages 325-334
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks....Pages 335-343
CALS: Collaborative Architecture of Learning System for Sentiment Analysis....Pages 345-353
An Integrated Xbee Arduino and Flower Pollen Algorithm Approach for Localization in Wireless Sensor Networks....Pages 355-361
Spectral Estimation Using Improved Recursive Least Square (RLS) Algorithm: An Investigational Study....Pages 363-376
RAICB: Robust Authentication Immunity Cloud Bucket for Secure Cloud Storage System....Pages 377-394
An Intelligent Road Navigator for Visually Impaired Persons Using MSER....Pages 395-405
Microbenchmark Based Performance Evaluation of GPU Rendering....Pages 407-415
High Capacity Wet Pixel Based Steganography with Improved Security....Pages 417-427
An Approach of DDOS Attack Detection Using Classifiers....Pages 429-437
Enhancing Privacy Preservation of Stature System Through Homomorphic System....Pages 439-449
Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks....Pages 451-462
A Novel Graph-Based Technique to Enhance Video Compression Algorithm....Pages 463-468
Leakage Reduction by Integrating IVC and ALS Technique in 65 nm CMOS One Bit Adder Circuit....Pages 469-476
Lifetime Enhancement of Wireless Sensor Networks Using Fermat Point and Data Aggregation Mechanism....Pages 477-484
Monitoring OpenStack Services Using Nagios....Pages 485-495
Centralized Control Signature-Based Firewall and Statistical-Based Network Intrusion Detection System (NIDS) in Software Defined Networks (SDN)....Pages 497-506
Discovering and Summarizing Online Movie Reviews Through Opinion Mining....Pages 507-518
Topic Sensitive Web Page Ranking Through Graph Database....Pages 519-527
Identifying Inattentive Audience by Finding Approximate Head Orientations in Non-intrusive Monocular Environment....Pages 529-539
IFUZZY: Intelligent Fuzzy Controller-Based Broadcast Protocol for Vehicular Ad Hoc Networks....Pages 541-550
Discovering Learning Models in MOOCs Using Empirical Data....Pages 551-567
Smart Structure for Automated Rangoli....Pages 569-578
Back Matter....Pages 579-580
توضیحاتی در مورد کتاب به زبان اصلی :
This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.