Proceedings of Second International Conference on Advances in Computer Engineering and Communication Systems: Icacecs 2021, Reddy A. Brahmananda, Kiranmayee B. V., Mukkamala Raghava Rao
Описание: Chapter 1.Smart Dustbin: A Reward Provider.- Chapter 2.Cyclic Exploration-based Whale Optimization to Linear Discriminant Regression Classification for Face Recognition.- Chapter 3.Auction System in Food Supply Chain Management using Blockchain.- Chapter 4.The Mechanism of Generating the Automated Java Unit Test Cases by achieving Maximum Code Coverage.- Chapter 5.Line Stability Index Based Voltage Stability Assessment Placing Series Compensation of TCSC.- Chapter 6.Preventing Crime Using Advanced Artificial Intelligence Techniques.- Chapter 7.Issue Resolution Process: Salesforce.- Chapter 8.Automated Member Enrollment: Health Insurance Agency.- Chapter 9.Comprehensive Analysis of State of the Art Techniques for VQA.- Chapter 10.Study of State of Arts Methods for Event Extraction.- Chapter 11.A Survey on Identification of Illegal Wildlife Trade.- Chapter 12.An approach for optimizing algorithms which find k1-most demanding products.- Chapter 13.Homomorphic Analysis of Privacy-Preserving Psychological Medical Records.- Chapter 14.Prediction of Rice Plant Diseases based on Soil and Weather conditions.- Chapter 15.An improved web information system through identification of faculty browsing patterns in affiliated engineering institutions.
Описание: Chapter 1.Smart Dustbin: A Reward Provider.- Chapter 2.Cyclic Exploration-based Whale Optimization to Linear Discriminant Regression Classification for Face Recognition.- Chapter 3.Auction System in Food Supply Chain Management using Blockchain.- Chapter 4.The Mechanism of Generating the Automated Java Unit Test Cases by achieving Maximum Code Coverage.- Chapter 5.Line Stability Index Based Voltage Stability Assessment Placing Series Compensation of TCSC.- Chapter 6.Preventing Crime Using Advanced Artificial Intelligence Techniques.- Chapter 7.Issue Resolution Process: Salesforce.- Chapter 8.Automated Member Enrollment: Health Insurance Agency.- Chapter 9.Comprehensive Analysis of State of the Art Techniques for VQA.- Chapter 10.Study of State of Arts Methods for Event Extraction.- Chapter 11.A Survey on Identification of Illegal Wildlife Trade.- Chapter 12.An approach for optimizing algorithms which find k1-most demanding products.- Chapter 13.Homomorphic Analysis of Privacy-Preserving Psychological Medical Records.- Chapter 14.Prediction of Rice Plant Diseases based on Soil and Weather conditions.- Chapter 15.An improved web information system through identification of faculty browsing patterns in affiliated engineering institutions.
Chapter 1. Gesture Controlled Wireless Device for Disabled.- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout.- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification.- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L.- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient.- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic.- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions.- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization.- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language.- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT.- Chapter 11. CRiPT: Cryptography in Penetration Testing.- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment.- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching.- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique.- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval.- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks.- Chapter 17. Audio Songs Classification Based on Music Patterns.- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique.- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms.- Chapter 20. Neural Network Based Automated Priority Assigner.- Chapter 21. Design of IMC Controller for TI
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approac
Chapter 1. Medical Image Fusion in Curvelet Domain Employing PCA and Maximum Selection Rule.- Chapter 2. Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware.- Chapter 3. Hash Based Rule Mining Algorithm in Data-Intensive Homogeneous Cloud Environment.- Chapter 4. Privacy Preservation in Distributed Environment Using RSA-CRT.- Chapter 5. Priority Based Classification: An Automated Traffic Approach.- Chapter 6. A Taxonomy of Software's Non-Functional Requirements.- Chapter 7. Segmentation of the Human Corpus Callosum Variability from T1 Weighted MRI of Brain.- Chapter 8. Analysis of Organic Molecular Single Electron Transistor Using C4H6B2 with different Metal Electrodes.- Chapter 9. Analysis of Molecular Single Electron TransistorsUsing Silicene, Graphene And Germanene.- Chapter 10. Identification of the Plants Based on Leaf Shape Descriptors.- Chapter 11. Use of Global Positioning System to Track Movement of Mobile Node in Proxy Mobile Internet Protocol version 6.- Chapter 12. Is Mobile Cloud Computing Efficient for E-Learning?.- Chapter 13. A Comparative analysis of different Social Network Parameters Derived from Facebook Profiles.- Chapter 14. A Fast and Hardware Efficient Visual Cryptography Scheme for Images.- Chapter 15. Energy Efficient Modified Bellman Ford Algorithm for Grid and Random Network Topologies.- Chapter 16. Text Dependent vs. Text Independent Speech Emotion Recognition.- Chapter 17. A Novel Approach for Speaker Recognition by Using Wavelet Analysis and Support Vector Machines.- Chapter 18. Real Time Surveillance for Critical Activity Detection in ICU's.- Chapter 19. High Speed Network Intrusion Detection System Using FPGA.- Chapter 20. Hawk Eye: A Plagiarism Detection System.- Chapter 21. A Novel Action Descriptor to Recognize Actions from
Surveillance Videos.- Chapter 22. Protecting the Augmented Browser Extension from Mutation Cross-site Scripting.- Chapter 23. Large Scale Data Management System Using Data De-duplication System.- Chapter 24. Movement detection Using LabVIEW by Analysis of Real Time Video.- Chapter 25. Connectivity Model for Molecular Communication Based Nano Machines Network in Normal and Sub-diffusive Regimes.- Chapter 26. Application of Locally Weighted Regression for Predicting Faults Using Software Entropy Metrics.- Chapter 27. Effect of Defects on Current-Voltage Characteristics of a Silicene ZNR Based Field Effect Transistor.- Chapter 28. Performance Improvement of Read Operations in Distributed File System through Anticipated Parallel Processing.- Chapter 29. Steerable Texture Descriptor for an Effective Content Based Medical Image Retrieval System Using PCA.- Chapter 30. A Novel Multi-View Similarity for Clustering Spatio-Temporal Data.- Chapter 31. WRSP-Miner Algorithm for Mining Weighted Sequential Patterns from Spatio-Temporal Databases.- Chapter 32. Performance Analysis in Free Space Optical Communication System Using Aperture Averaging.- Chapter 33. Performance Evaluation of Free Space Optical Link Under Various Weather Conditions.- Chapter 34. Evolutionary Improved Swarm Based Hybrid K-means Algorithm for Cluster Analysis.- Chapter 35. Analysis of Energy Efficient, LEACH Based Cooperative Wireless Sensor Network.- Chapter 36. A Monotonic Digitally Controlled Delay Element Based Programmable Trigger Pulse Generator.- Chapter 37. Layered-Encoding Video Multicasting IPTV over Mobile WiMAX Networks.- Chapter 38. Intuitionistic Fuzzy Similarity and Information Measures with Physical Education Teaching Quality Assessment.- Chapter 39. Molecular Level Insight into the Interactions of SoxC and SoxD from Epsilonproteobacteria Sulfurimonas Denitri
Chapter 1. Human Gait Recognition Using Gait Flow Image and Extension Neural Network.- Chapter 2. Enhanced Topology Preserving Maps for Wireless Sensor Network through D-VCS.- Chapter 3. Real-time Processing and Analysis for Activity Classification to Enhance Wearable Wireless ECG.- Chapter 4. Adaptive Video Quality Throttling Based on Network Bandwidth for Virtual Classroom Systems.- Chapter 5. Efficiency-Fairness Trade-Off Approaches For Resource Allocation In Cooperative Wireless Network.- Chapter 6. An Enhanced Security Pattern for Wireless Sensor Network.- Chapter 7. Honey Pot: A Major Technique for Intrusion Detection.- Chapter 8. Computational Intelligence Based Parameterization on Force Filed Modeling for Silicon Cluster Using ASBO.- Chapter 9. Natural Language Based Self Learning Feedback Analysis System.- Chapter 10. Adaptive Filter Design for Extraction of Fetus ECG Signal.- Chapter 11. Improving Query Processing Performance Using Optimization Techniques for Object Oriented DBMS.- Chapter 12. Linear and Non Linear Buckling Testing on Aluminium Structures.- Chapter 13. A Performance Analysis of Open Stack Open-source Solution for IaaS Cloud Computing.- Chapter 14. The Application of Sub-pattern Approach in 2D Shape Recognition and Retrieval.- Chapter 15. A Data Driven Approach for the Option Pricing Algorithm.- Chapter 16. Moderator Intuitionistic Fuzzy Sets and Application in Medical Diagnosis.- Chapter 17. An Empirical Comparative Study of Novel Clustering algorithms for Class Imbalance Learning.- Chapter 18. Augmenting Women's Safety-In-Numbers in Railway Carriages with Wireless Sensor Networks.- Chapter 19. Analysis of Student Feedback by Ranking the Polarities.- Chapter 20. Seizure Onset Detection by Analyzing Long Duration EEG Signals.- Chapter 21. Enhancing the Performance of MapReduce Default Scheduler by Detecting Prolonged TaskTrackers in Heterogeneous Environments.- Chapter 22. Prototype of a Coconut Harvesting Robot with Visual Feedback.- Chapter 23. Suppression of Impulse Noise in Digital Images Using Hermite Interpolation.- Chapter 24. Wireless Personal Area Network and PSO Based Home Security System.- Chapter 25. A Framework for Ranking Reviews Using Ranked Voting Method.- Chapter 26. Multilevel Thresholding Segmentation Approach Based on Spider Monkey Optimization Algorithm.- Chapter 27. Dynamic Multiuser Scheduling with Interference Mitigation in SC-FDMA Based Communication Systems.- Chapter 28. Design of Proportional-Integral-Derivative Controller Using Stochastic Particle Swarm Optimization Technique for single Area AGC including SMES and RFB units.- Chapter 29. A Enhanced Microstrip Antenna Using Metamaterial at 2.4 GHz.- Chapter 30. Adaptive MAC for Bursty Traffic in Wireless Sensor Networks.- Chapter 31. Secured Authentication and Signature Routing Protocol for WMN (SASR).- Chapter 32. A Minimal Subset of Features Using Correlation Feature Selection Model for Intrusion Detection System.- Chapter 33. Analysis of Single Layered Multiple Aperture Shield for Better Shield Effectiveness.- Chapter 34. MRI Classification of Parkinson's Disease Using SVM and Texture Features.- Chapter 35. Variational Mode Feature Based Hyperspectral Image Classification.- Chapter 36. Implementation Of Fuzzy Based Robotic Path Planning.- Chapter 37. Texture Segmentation by a New Variant of Local Binary Pattern.- Chapter 38. Integrating Writing Direction and Handwriting Letter Recognition in Touch Enabled Devices.- Chapter 39. A New Approach for Single Text Document Summarization.- Chapter 40. Analysis, Classification and Estimation of Pattern for Land of Aurangabad Region Using High Resolution Satellite Image.- Chapter 41.
Описание: This book contains the proceedings of the 17th International Conference on Computing and Information Technology (IC2IT2021) that was held during May 13-14, 2021, in Bangkok, Thailand.
Описание: This book includes high quality research papers presented at the International Conference on Communication, Computing and Electronics Systems 2021, held at the PPG Institute of Technology, Coimbatore, India, on 28-29 October 2021. The volume focuses mainly on the research trends in cloud computing, mobile computing, artificial intelligence and advanced electronics systems. The topics covered are automation, VLSI, embedded systems, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, communication networks, Internet of Things, cyber-physical systems, and healthcare informatics.
Описание: This book presents a collection of high-quality research papers accepted to multi-conference consisting of International Conference on Image Processing and Communications (IP&C 2021), International Conference on Computer Recognition Systems (CORES 2021), International Conference on Advanced Computer Systems (ACS 2021) held jointly in Bydgoszcz, Poland (virtually), in June 2021. The accepted papers address current computer science and computer systems-related technological challenges and solutions, as well as many practical applications and results. The first part of the book deals with advances in pattern recognition and classifiers, the second part is devoted to image processing and computer vision, while the third part addresses practical applications of computer recognition systems. Machine learning solutions for security and networks are tackled in part four of the book, while the last part collects papers on progress in advanced computer systems. We believe this book will be interesting for researchers and practitioners in many fields of computer science and IT applications.
Описание: This book gathers the proceedings of the 16th International Conference on Computing and Information Technology (IC2IT 2020), held on May 14th-15th, 2020, at Dusit Thani Pattaya, Thailand.
Описание: This book explores how the European Union designs its trade policy to face the most recent challenges and to influence global policy issues. It studies a broad set of trade instruments that are used by the EU in its trade policy, such as: trade agreements, multilateral initiatives, unilateral trade policies, as well as, internal market tools.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru