Описание: Focusing on applications being used in Asia with a serious educational purpose, this volume offers expert analysis of the challenges, and the far-reaching potential, of games and social media in contexts as diverse as applied psychology and computer security.
Chapter 1. Gesture Controlled Wireless Device for Disabled.- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout.- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification.- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L.- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient.- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic.- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions.- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization.- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language.- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT.- Chapter 11. CRiPT: Cryptography in Penetration Testing.- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment.- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching.- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique.- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval.- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks.- Chapter 17. Audio Songs Classification Based on Music Patterns.- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique.- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms.- Chapter 20. Neural Network Based Automated Priority Assigner.- Chapter 21. Design of IMC Controller for TI
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approac
Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network.- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS.- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG.- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems.- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network.- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network.- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection.- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO.- Chapter 9. Natural Language Based Self Learning Feedback Analysis System.- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal.- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS.- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures.- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing.- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval.- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm.- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis.- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning.- Chapter 18. Augmenting Women's Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks.- Chapter 19. Analysis of Student Feedback by Ranking the Polarities.- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals.- Chapter 21. Enhancing the Performance of MapReduce Default Scheduler by Detecting Prolonged TaskTrackers in Heterogeneous Environments.- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback.- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation.- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System.- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method.- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm.- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems.- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units.- Chapter 29. A Enhanced Microstrip Antenna Using Metamaterial at 2.4 GHz.- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks.- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR).- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System.- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness.- Chapter 34. MRI Classification of Parkinson's Disease Using SVM and Texture Features.- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification.- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning.- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern.- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices.- Chapter 39. A New Approach for Single Text Document Summarization.- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image.- Chapter 41.
Chapter 1. Medical Image Fusion in Curvelet Domain Employing PCA and Maximum Selection Rule.- Chapter 2. Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware.- Chapter 3. Hash Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment.- Chapter 4. Privacy Preservation in Distributed Environment Using RSA-CRT.- Chapter 5. Priority Based Classification: An Automated Traffic Approach.- Chapter 6. A Taxonomy of Software's Non-Functional Requirements.- Chapter 7. Segmentation of the Human Corpus Callosum Variability from T1 Weighted MRI of Brain.- Chapter 8. Analysis of Organic Molecular Single Electron Transistor Using C4H6B2 with different Metal Electrodes.- Chapter 9. Analysis of Molecular Single Electron TransistorsUsing Silicene, Graphene And Germanene.- Chapter 10. Identification of the Plants Based on Leaf Shape Descriptors.- Chapter 11. Use of Global Positioning System to Track Movement of Mobile Node in Proxy Mobile Internet Protocol version 6.- Chapter 12. Is Mobile Cloud Computing Efficient for E-Learning?.- Chapter 13. A Comparative analysis of different Social Network Parameters Derived from Facebook Profiles.- Chapter 14. A Fast and Hardware Efficient Visual Cryptography Scheme for Images.- Chapter 15. Energy Efficient Modified Bellman Ford Algorithm for Grid and Random Network Topologies.- Chapter 16. Text Dependent vs. Text Independent Speech Emotion Recognition.- Chapter 17. A Novel Approach for Speaker Recognition by Using Wavelet Analysis and Support Vector Machines.- Chapter 18. Real Time Surveillance for Critical Activity Detection in ICU's.- Chapter 19. High Speed Network Intrusion Detection System Using FPGA.- Chapter 20. Hawk Eye: A Plagiarism Detection System.- Chapter 21. A Novel Action Descriptor to Recognize Actions from
Surveillance Videos.- Chapter 22. Protecting the Augmented Browser Extension from Mutation Cross-site Scripting.- Chapter 23. Large Scale Data Management System Using Data De-duplication System.- Chapter 24. Movement detection Using LabVIEW by Analysis of Real Time Video.- Chapter 25. Connectivity Model for Molecular Communication Based Nano Machines Network in Normal and Sub-diffusive Regimes.- Chapter 26. Application of Locally Weighted Regression for Predicting Faults Using Software Entropy Metrics.- Chapter 27. Effect of Defects on Current-Voltage Characteristics of a Silicene ZNR Based Field Effect Transistor.- Chapter 28. Performance Improvement of Read Operations in Distributed File System through Anticipated Parallel Processing.- Chapter 29. Steerable Texture Descriptor for an Effective Content Based Medical Image Retrieval System Using PCA.- Chapter 30. A Novel Multi-View Similarity for Clustering Spatio-Temporal Data.- Chapter 31. WRSP-Miner Algorithm for Mining Weighted Sequential Patterns from Spatio-Temporal Databases.- Chapter 32. Performance Analysis in Free Space Optical Communication System Using Aperture Averaging.- Chapter 33. Performance Evaluation of Free Space Optical Link Under Various Weather Conditions.- Chapter 34. Evolutionary Improved Swarm Based Hybrid K-means Algorithm for Cluster Analysis.- Chapter 35. Analysis of Energy Efficient, LEACH Based Cooperative Wireless Sensor Network.- Chapter 36. A Monotonic Digitally Controlled Delay Element Based Programmable Trigger Pulse Generator.- Chapter 37. Layered-Encoding Video Multicasting IPTV over Mobile WiMAX Networks.- Chapter 38. Intuitionistic Fuzzy Similarity and Information Measures with Physical Education Teaching Quality Assessment.- Chapter 39. Molecular Level Insight into the Interactions of SoxC and SoxD from Epsilonproteobacteria Sulfurimonas Denitri
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru