Shortcuts
Bitte warten Sie, bis die Seite geladen ist.
 
PageMenu- Hauptmenü-
Page content

Katalogdatenanzeige

Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2

Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2
Kataloginformation
Feldname Details
Vorliegende Sprache eng
ISBN 978-81-322-2008-4
Name Jain, Lakhmi C.
Patnaik, Srikanta ¬[Hrsg.]¬
Name ANZEIGE DER KETTE Patnaik, Srikanta ¬[Hrsg.]¬
Name Ichalkaranje, Nikhil ¬[Hrsg.]¬
T I T E L Intelligent Computing, Communication and Devices
Zusatz zum Titel Proceedings of ICCD 2014, Volume 2
Verlagsort New Delhi ; s.l.
Verlag Springer India
Erscheinungsjahr 2015
2015
Umfang Online-Ressource (XX, 535 p. 249 illus, online resource)
Reihe Advances in Intelligent Systems and Computing ; 309
Notiz / Fußnoten Description based upon print version of record
Weiterer Inhalt Preface; Contents; ICCD-2014 Conference Committee; About the Editors; 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks; Abstract; 1…Introduction; 1.1 Data Aggregation; 1.2 Data Aggregation Security Concerns; 2…Secure Data Aggregation Protocols; 2.1 Secure Data Aggregation Based on Cryptographic Techniques; 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography; 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography; 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function. 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation; 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques; 3…Comparison of Secure Data Aggregation Protocols; 4…Conclusion; References; 2 Secure and Dynamic IP Address Configuration Scheme in MANET; Abstract; 1…Introduction; 2…Related Work Review; 3…Proposed Work; 4…Conclusion; References; 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET; Abstract; 1…Introduction; 2…Literature Survey; 3…Proposed Scheme; 4…Conclusion. References4 Dual Security Against Grayhole Attack in MANETs; Abstract; 1…Introduction; 2…Related Work; 3…Proposed Methodology; 3.1 Route Discovery Phase Detection; 3.2 Data Transmission Phase; 4…Conclusion and Future Scope; References; 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs; Abstract; 1…Introduction; 2…Related Work; 3…Proposed Approach; 3.1 Proposed Detection Algorithm; 4…Conclusion and Future Work; References; 6 Frequency Domain Incremental Strategies Over Distributed Network; Abstract; 1…Introduction; 2…Estimation Problem and the Adaptive Distributed Solution. 3…Frequency-Domain Adaptive Distributed Solution3.1 DCT-LMS and DFT-LMS Algorithm; 4…Simulation; 5…Conclusion; References; 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard; Abstract; 1…Introduction; 1.1 MAC Layer Architecture; 1.2 QoS Classes; 1.3 Scheduler at MAC Layer; 2…Literature Survey; 3…Methodology; 3.1 Design of Scheduler; 4…Mathematical Model; 4.1 Probability of Packets Being Served; 4.2 Average Waiting Time; 4.3 Average Time Spent by a Packet in Queue Ws; 5…Result Analysis; 6…Conclusion; References. 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor NetworkAbstract; 1…Introduction; 2…Proposed Architecture and Methodology; 3…Result Analysis; 4…Conclusion; References; 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks; Abstract; 1…Introduction; 2…Literature Review; 3…The Procedure; 3.1 Initialization Phase; 3.2 Detection and Reporting Phase; 3.3 Action Phase; 4…Implementation and Result Analysis; 5…Conclusion; References. 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network. A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor NetworksSecure and Dynamic IP Address Configuration Scheme in MANET -- A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Dual Security against Grayhole Attack in MANET’s -- I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Frequency Domain Incremental Strategies over Distributed Network -- Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- A Probabilistic Packet Filtering based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Energy saving Performance Analysis of Hierarchical Data Aggregation Protocols used in Wireless Sensor Network -- Performance Analysis of IEEE 802.11 DCF & IEEE 802.11e EDCF under Same Type of Traffic -- A Distributed Prime Node-ID Connected Dominating Set for Target Coverage using Adjustable Sensing Range -- Token based Group Local Mutual Exclusion Algorithm in MANETs -- A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Characteristic Function for Variable-Bit-Rate Multimedia QoS -- A Fully Simulatable Oblivious Transfer Scheme using Vector Decomposition -- Query by Humming System through Multiscale Music Entropy -- An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification using Java Framework -- Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- First-fit Semi-partitioned Scheduling based on Rate Monotonic Algorithm -- A Novel Approach for Data Hiding in Color Images using LSB based Steganography with Improved Capacity and Resistance to Statistical Attacks -- A Comparative Study of Correlation based Stereo Matching Algorithms: Illumination and Exposure -- A Hybrid Motion based Object Tracking Algorithm for VTS -- Side Lobe Level and Null Control Design of Linear Antenna Array using Taguchi’s Method -- A Novel Approach for Jamming and Tracking of Mobile Objects -- Performance Analysis of Low Complexity Multiuser STBC MC-CDMA System -- On the Design An Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal monopole -- Antenna for UWB Application -- Design of Microstrip Branch Line Coupler Phase Shifter in L-Band -- Capturing Node Resource Status and Classifying Workload for Map Reduce Resource Aware Scheduler -- Grid Computing based Performance Analysis of Power System: A Graph Theoretic Approach -- Investigation on Power Saving Mechanism for IEEE 802.16m Networks in Mobile Internet Traffic -- Hybrid Edge Detection based Image Steganography Technique for Color Images -- Haze Removal: An Approach based on Saturation Component -- Biomedical Image Registration using Genetic Algorithm -- Bi-dimensional Statistical Empirical Mode Decomposition based Video Analysis for Detecting Colon Polyps using Composite Similarity Measure -- A Wavelet based Text Hiding Method using Novel Mapping Technique -- Unsupervised Segmentation of Satellite Images based on Neural Network and Genetic Algorithm -- Comparative Analysis of Cuckoo Search Optimization based Multilevel Image Thresholding -- An Intelligent Method for Moving Object Detection -- Prediction of Monthly Rainfall in Tamil Nadu using MSARIMA Models -- An Ontology based Approach for Test Case Reuse -- A Decision Driven Computer Forensic Classification using ID3 Algorithm -- Non Ideal Iris Segmentation using Wavelet based Anisotropic Diffusion -- Detection of Video Objects in Dynamic Scene using Local Binary Pattern Subtraction Method -- Automatic Lane Detection in NH5 of Odisha -- Mammogram Image Segmentation using Hybridization of Fuzzy Clustering and Optimization Algorithms -- A New ICA based Algorithm for Diagnosis of Coronary Artery Disease -- Static Hand Gesture Recognition based on Fusion of Moments -- Real-time Human Face Detection in Noisy Images based on Skin Color Fusion Model and Eye Detection -- Investigation of Full-reference Image Quality Assessment -- Image Compression using Edge Enhancing Diffusion -- Comparative Analysis of Edge Detection Techniques for Extracting Blood Vessels in Diabetic Retinopathy -- Realization of Different Algorithms using Raspberry Pi for Real-time Image Processing Application -- Edge Preserving Region Growing for Aerial Color Image Segmentation -- ILSB: Indicator based LSB Steganography -- Odia Running Text Recognition using Moment based Feature Extraction and Mean Distance Classification Technique -- Keyword Extraction from Hindi Documents using Statistical Approach -- Development of Odia Language Corpus from Modern News Paper Texts: Some Problems and Issues -- A Rule-Based Concatenative Approach to Speech Synthesis in Indian Language Text-to-Speech Systems.
Titelhinweis Druckausg.ISBN: 978-813-2220-08-4
ISBN ISBN 978-81-322-2009-1
Klassifikation COM004000
UYQ
TEC009000
006.3
Q342
Kurzbeschreibung A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Secure and Dynamic IP Address Configuration Scheme in MANET -- A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Dual Security against Grayhole Attack in MANET’s -- I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Frequency Domain Incremental Strategies over Distributed Network -- Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- A Probabilistic Packet Filtering based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Energy saving Performance Analysis of Hierarchical Data Aggregation Protocols used in Wireless Sensor Network -- Performance Analysis of IEEE 802.11 DCF & IEEE 802.11e EDCF under Same Type of Traffic -- A Distributed Prime Node-ID Connected Dominating Set for Target Coverage using Adjustable Sensing Range -- Token based Group Local Mutual Exclusion Algorithm in MANETs -- A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Characteristic Function for Variable-Bit-Rate Multimedia QoS -- A Fully Simulatable Oblivious Transfer Scheme using Vector Decomposition -- Query by Humming System through Multiscale Music Entropy -- An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification using Java Framework -- Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- First-fit Semi-partitioned Scheduling based on Rate Monotonic Algorithm -- A Novel Approach for Data Hiding in Color Images using LSB based Steganography with Improved Capacity and Resistance to Statistical Attacks -- A Comparative Study of Correlation based Stereo Matching Algorithms: Illumination and Exposure -- A Hybrid Motion based Object Tracking Algorithm for VTS -- Side Lobe Level and Null Control Design of Linear Antenna Array using Taguchi’s Method -- A Novel Approach for Jamming and Tracking of Mobile Objects -- Performance Analysis of Low Complexity Multiuser STBC MC-CDMA System -- On the Design An Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal monopole -- Antenna for UWB Application -- Design of Microstrip Branch Line Coupler Phase Shifter in L-Band -- Capturing Node Resource Status and Classifying Workload for Map Reduce Resource Aware Scheduler -- Grid Computing based Performance Analysis of Power System: A Graph Theoretic Approach -- Investigation on Power Saving Mechanism for IEEE 802.16m Networks in Mobile Internet Traffic -- Hybrid Edge Detection based Image Steganography Technique for Color Images -- Haze Removal: An Approach based on Saturation Component -- Biomedical Image Registration using Genetic Algorithm -- Bi-dimensional Statistical Empirical Mode Decomposition based Video Analysis for Detecting Colon Polyps using Composite Similarity Measure -- A Wavelet based Text Hiding Method using Novel Mapping Technique -- Unsupervised Segmentation of Satellite Images based on Neural Network and Genetic Algorithm -- Comparative Analysis of Cuckoo Search Optimization based Multilevel Image Thresholding -- An Intelligent Method for Moving Object Detection -- Prediction of Monthly Rainfall in Tamil Nadu using MSARIMA Models -- An Ontology based Approach for Test Case Reuse -- A Decision Driven Computer Forensic Classification using ID3 Algorithm -- Non Ideal Iris Segmentation using Wavelet based Anisotropic Diffusion -- Detection of Video Objects in Dynamic Scene using Local Binary Pattern Subtraction Method -- Automatic Lane Detection in NH5 of Odisha -- Mammogram Image Segmentation using Hybridization of Fuzzy Clustering and Optimization Algorithms -- A New ICA based Algorithm for Diagnosis of Coronary Artery Disease -- Static Hand Gesture Recognition based on Fusion of Moments -- Real-time Human Face Detection in Noisy Images based on Skin Color Fusion Model and Eye Detection -- Investigation of Full-reference Image Quality Assessment -- Image Compression using Edge Enhancing Diffusion -- Comparative Analysis of Edge Detection Techniques for Extracting Blood Vessels in Diabetic Retinopathy -- Realization of Different Algorithms using Raspberry Pi for Real-time Image Processing Application -- Edge Preserving Region Growing for Aerial Color Image Segmentation -- ILSB: Indicator based LSB Steganography -- Odia Running Text Recognition using Moment based Feature Extraction and Mean Distance Classification Technique -- Keyword Extraction from Hindi Documents using Statistical Approach -- Development of Odia Language Corpus from Modern News Paper Texts: Some Problems and Issues -- A Rule-Based Concatenative Approach to Speech Synthesis in Indian Language Text-to-Speech Systems.
2. Kurzbeschreibung In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Communication which are from the areas such as Communications and Wireless Ad Hoc & Sensor Networks, Speech & Natural Language Processing, including Signal, Image and Video Processing and Mobile broadband and Optical networks, which are the key to the ground-breaking inventions to intelligent communication technologies. Secondly, Intelligent Device is any type of equipment, instrument, or machine that has its own computing capability. Contributions from the areas such as Embedded Systems, RFID, RF MEMS, VLSI Design & Electronic Devices, Analog and Mixed-Signal IC Design and Testing, MEMS and Microsystems, CMOS MEMS, Solar Cells and Photonics, Nano Devices, Single Electron & Spintronics Devices, Space Electronics, and Intelligent Robotics are covered in this volume.
SWB-Titel-Idn 416042848
Signatur Springer E-Book
Bemerkungen Elektronischer Volltext - Campuslizenz
Elektronische Adresse $uhttp://dx.doi.org/10.1007/978-81-322-2009-1
Internetseite / Link Volltext
Siehe auch Volltext
Siehe auch Cover
Kataloginformation500192052 Datensatzanfang . Kataloginformation500192052 Seitenanfang .
Vollanzeige Katalogdaten 

Auf diesem Bildschirm erhalten Sie Katalog- und Exemplarinformationen zum ausgewählten Titel.

Im Bereich Kataloginformation werden die bibliographischen Details angezeigt. Per Klick auf Hyperlink-Begriffe wie Schlagwörter, Autoren, Reihen, Körperschaften und Klassifikationen können Sie sich weitere Titel des gewählten Begriffes anzeigen lassen.

Der Bereich Exemplarinformationen enthält zum einen Angaben über den Standort und die Verfügbarkeit der Exemplare. Zum anderen haben Sie die Möglichkeit, ausgeliehene Exemplare vorzumerken oder Exemplare aus dem Magazin zu bestellen.
Schnellsuche