• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Proceedings of the International Conference on Data Engineering and Communication Technology: Icdect 2016, Volume 2

Proceedings of the International Conference on Data Engineering and Communication Technology: Icdect 2016, Volume 2

Paperback

Series: Advances in Intelligent Systems and Computing, Book 469

Technology & EngineeringGeneral ComputersComputer Security

ISBN10: 9811016771
ISBN13: 9789811016776
Publisher: Springer Nature
Published: Aug 25 2016
Pages: 841
Weight: 2.60
Height: 1.70 Width: 6.14 Depth: 9.21
Language: English

Chapter 1. Experimental Analysis on Big Data in IOT based Architecture.- Chapter 2. Morphology Based Approach for Number Plate Extraction.- Chapter 3. NeSeDroid - Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing.- Chapter 4. RiCoBiT - Ring Connected Binary Tree: A Structured and Scalable Architecture for Network on Chip Based Systems: An Exclusive Summary.- Chapter 5. Application of Compressed Sensing (CS) for ECG Signal Compression: A Review.- Chapter 6. Tracking Pointer Based Approach for Iceberg Query Evaluation.- Chapter 7. Performance Evaluation of Shortest Path Routing Algorithms in Real-road Networks.- Chapter 8. An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey.- Chapter 9. Content Search Quaternary Look-up Table Architecture.- Chapter 10. Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA.- Chapter 11. A Graph Based Active Learning Approach Using Forest Classifier for Image Retrieval.- Chapter 12. Comparative Analysis of Android Malware Detection Techniques.- Chapter 13. Developing Secure Cloud Storage System by Using Access Control Models.- Chapter 14. ETLR - Effective DWH Design Paradigm.- Chapter 15. Prediction of Reactor Performance in CATSOL Based Sulphur Recovery Unit by ANN.- Chapter 16. A Multilevel Clustering Using Multi-hop and Multi-head in VANET.- Chapter 17. Patient-speci Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images.- Chapter 18. A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition.- Chapter 19. Methods for Individual and Group Decision Making Using Interval Valued Fuzzy Preference Relations.- Chapter 20. A New Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme.- Chapter 21. Significance of Frequency Band Selection of MFCC for Text-independent Speaker Identification.- Chapter 22. Ensuring Performance of Graphics Processing Units: A Programmer's Perspective.- Chapter 23. Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax.- Chapter 24. Novel All Optical Encoding and Decoding Scheme for Code Preservation.- Chapter 25. XPM BASED Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF.- Chapter 26. Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond.- Chapter 27. Performance Analysis of LPC and MFCC Features in Voice Conversion using Artificial Neural Networks.- Chapter 28. Person Detection & Tracking Using Sparse Matrix Measurement for Visual Surveillance.- Chapter 29. Improvisation in Frequent Pattern Mining Technique.- Chapter 30. Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120nm Technology.- Chapter 31. Detailed Survey on Attacks in Wireless Sensor Network.- Chapter 32. Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network.- Chapter 33. Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment.- Chapter 34. Biologically Inspired Techniques for Cognitive Decision-Making.- Chapter 35. Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods.- Chapter 36. Leveraging Virtualization for Optimal Resource Management in a Cloud Environment.- Chapter 37. Reconfigurable Circular Microstrip Patch Antenna With Polarization Diversity.- Chapter 38. Issues with DCR and NLSR in Named Based Routing Protocol.- Chapter 39. Design and Analysis of Quantum Dot Cellular Automata Technology based Reversible Multifunction Block.- Chapter 40. Text Independent Automatic Accent Identification Syste

1 different editions

Also available

Also in

General Computers