Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network.- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS.- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG.- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems.- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network.- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network.- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection.- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO.- Chapter 9. Natural Language Based Self Learning Feedback Analysis System.- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal.- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS.- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures.- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing.- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval.- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm.- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis.- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning.- Chapter 18. Augmenting Women's Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks.- Chapter 19. Analysis of Student Feedback by Ranking the Polarities.- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals.- Chapter 21. Enhancing the Performance of MapReduce Default Scheduler by Detecting Prolonged TaskTrackers in Heterogeneous Environments.- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback.- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation.- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System.- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method.- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm.- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems.- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units.- Chapter 29. A Enhanced Microstrip Antenna Using Metamaterial at 2.4 GHz.- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks.- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR).- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System.- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness.- Chapter 34. MRI Classification of Parkinson's Disease Using SVM and Texture Features.- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification.- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning.- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern.- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices.- Chapter 39. A New Approach for Single Text Document Summarization.- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image.- Chapter 41.
Chapter 1. Medical Image Fusion in Curvelet Domain Employing PCA and Maximum Selection Rule.- Chapter 2. Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware.- Chapter 3. Hash Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment.- Chapter 4. Privacy Preservation in Distributed Environment Using RSA-CRT.- Chapter 5. Priority Based Classification: An Automated Traffic Approach.- Chapter 6. A Taxonomy of Software's Non-Functional Requirements.- Chapter 7. Segmentation of the Human Corpus Callosum Variability from T1 Weighted MRI of Brain.- Chapter 8. Analysis of Organic Molecular Single Electron Transistor Using C4H6B2 with different Metal Electrodes.- Chapter 9. Analysis of Molecular Single Electron TransistorsUsing Silicene, Graphene And Germanene.- Chapter 10. Identification of the Plants Based on Leaf Shape Descriptors.- Chapter 11. Use of Global Positioning System to Track Movement of Mobile Node in Proxy Mobile Internet Protocol version 6.- Chapter 12. Is Mobile Cloud Computing Efficient for E-Learning?.- Chapter 13. A Comparative analysis of different Social Network Parameters Derived from Facebook Profiles.- Chapter 14. A Fast and Hardware Efficient Visual Cryptography Scheme for Images.- Chapter 15. Energy Efficient Modified Bellman Ford Algorithm for Grid and Random Network Topologies.- Chapter 16. Text Dependent vs. Text Independent Speech Emotion Recognition.- Chapter 17. A Novel Approach for Speaker Recognition by Using Wavelet Analysis and Support Vector Machines.- Chapter 18. Real Time Surveillance for Critical Activity Detection in ICU's.- Chapter 19. High Speed Network Intrusion Detection System Using FPGA.- Chapter 20. Hawk Eye: A Plagiarism Detection System.- Chapter 21. A Novel Action Descriptor to Recognize Actions from
Surveillance Videos.- Chapter 22. Protecting the Augmented Browser Extension from Mutation Cross-site Scripting.- Chapter 23. Large Scale Data Management System Using Data De-duplication System.- Chapter 24. Movement detection Using LabVIEW by Analysis of Real Time Video.- Chapter 25. Connectivity Model for Molecular Communication Based Nano Machines Network in Normal and Sub-diffusive Regimes.- Chapter 26. Application of Locally Weighted Regression for Predicting Faults Using Software Entropy Metrics.- Chapter 27. Effect of Defects on Current-Voltage Characteristics of a Silicene ZNR Based Field Effect Transistor.- Chapter 28. Performance Improvement of Read Operations in Distributed File System through Anticipated Parallel Processing.- Chapter 29. Steerable Texture Descriptor for an Effective Content Based Medical Image Retrieval System Using PCA.- Chapter 30. A Novel Multi-View Similarity for Clustering Spatio-Temporal Data.- Chapter 31. WRSP-Miner Algorithm for Mining Weighted Sequential Patterns from Spatio-Temporal Databases.- Chapter 32. Performance Analysis in Free Space Optical Communication System Using Aperture Averaging.- Chapter 33. Performance Evaluation of Free Space Optical Link Under Various Weather Conditions.- Chapter 34. Evolutionary Improved Swarm Based Hybrid K-means Algorithm for Cluster Analysis.- Chapter 35. Analysis of Energy Efficient, LEACH Based Cooperative Wireless Sensor Network.- Chapter 36. A Monotonic Digitally Controlled Delay Element Based Programmable Trigger Pulse Generator.- Chapter 37. Layered-Encoding Video Multicasting IPTV over Mobile WiMAX Networks.- Chapter 38. Intuitionistic Fuzzy Similarity and Information Measures with Physical Education Teaching Quality Assessment.- Chapter 39. Molecular Level Insight into the Interactions of SoxC and SoxD from Epsilonproteobacteria Sulfurimonas Denitri
Автор: Qijun Gu; Wanyu Zang; Meng Yu Название: Security in Emerging Wireless Communication and Networking Systems ISBN: 364211525X ISBN-13(EAN): 9783642115257 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009. The Workshop Chairs were Qijun Gu from Texas State University- San Marcos, USA, and Wanyu Zang from Western Illinois University, USA.
DDoS 3.0 - How terrorists bring down the Internet.- SGsim: Co-Simulation Framework for ICT-Enabled Power Distribution Grids.- Improving Cross-Traffic Bounds in Feed-Forward Networks -- There is a Job for Everyone.- Stochastic analysis of energy consumption in pool depletion systems.- Moving queue on a network.- A Multi-commodity Simulation Tool Based on TRIANA.- Performance and Precision of Web Caching Simulations for Zipf Request Pattern.- PSTeC: A Location-time Driven Modelling Formalism for Probabilistic Real-time Systems.- Analysis of Hierarchical Semi-Markov Processes with Parallel Regions.- Combining Mobility Models with Arrival Processes.- Product Line Fault Tree Analysis by Means of Multi-valued Decision Diagrams.- Resolving Contention for Networks-on-Chips: Combining Time-triggered Application Scheduling with Dynamic Budgeting of Memory Bus Use.- The Weak Convergence of TCP Bandwidth Sharing.- Analysis of Mitigation Measures for Timing Attacks in Mobile Offloading Systems.- Capabilities of Raspberry Pi 2 for Big Data and Video Streaming Applications in Data Centres.- Ensemble-Based Uncertainty Quantification for Smart Grid Co-Simulation.
Автор: Stefan Kopp; Ipke Wachsmuth Название: Gesture in Embodied Communication and Human Computer Interaction ISBN: 3642125522 ISBN-13(EAN): 9783642125522 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on Gesture in Embodied Communication and Human-Computer Interaction, GW 2009, that was held in Bielefeld, Germany, February 2009.
Chapter 1. Gesture Controlled Wireless Device for Disabled.- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout.- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification.- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L.- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient.- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic.- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions.- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization.- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language.- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT.- Chapter 11. CRiPT: Cryptography in Penetration Testing.- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment.- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching.- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique.- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval.- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks.- Chapter 17. Audio Songs Classification Based on Music Patterns.- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique.- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms.- Chapter 20. Neural Network Based Automated Priority Assigner.- Chapter 21. Design of IMC Controller for TI
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approac
Автор: Hamzah Asyrani Sulaiman; Mohd Azlishah Othman; Moh Название: Advanced Computer and Communication Engineering Technology ISBN: 3319076736 ISBN-13(EAN): 9783319076737 Издательство: Springer Рейтинг: Цена: 39182.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology.
Автор: Suresh Chandra Satapathy; Vikrant Bhateja; K. Sruj Название: Computer Communication, Networking and Internet Security ISBN: 9811032254 ISBN-13(EAN): 9789811032257 Издательство: Springer Рейтинг: Цена: 46118.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016).
Автор: Hamzah Asyrani Sulaiman; Mohd Azlishah Othman; Moh Название: Advanced Computer and Communication Engineering Technology ISBN: 3319384163 ISBN-13(EAN): 9783319384160 Издательство: Springer Рейтинг: Цена: 32651.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology.
Автор: Harry Bunt; Robbert-Jan Beun; Tijn Borghuis Название: Multimodal Human-Computer Communication ISBN: 354064380X ISBN-13(EAN): 9783540643807 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Taken from the First International Conference on Cooperative Multimodal Communication held in Eindhoven, the Netherlands, in 1995, this text addresses such issues as intelligent multimedia retrieval, cooperative conversation, agent system communication and multimodal maps.
Автор: Tai-hoon Kim; Dae-sik Ko; Thanos Vasilakos; Adrian Название: Computer Applications for Communication, Networking, and Digital Contents ISBN: 3642355935 ISBN-13(EAN): 9783642355936 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru