Information Systems Design And Intelligent Applications: Proceedings Of Third International Conference India 2016, Volume 3 by Suresh Chandra SatapathyInformation Systems Design And Intelligent Applications: Proceedings Of Third International Conference India 2016, Volume 3 by Suresh Chandra Satapathy

Information Systems Design And Intelligent Applications: Proceedings Of Third International…

bySuresh Chandra SatapathyEditorJyotsna Kumar Mandal, Siba K. Udgata

Paperback | February 4, 2016

Pricing and Purchase Info

$317.61 online 
$386.50 list price save 17%
Earn 1,588 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Thethird international conference on INformation Systems Design and IntelligentApplications (INDIA - 2016) held in Visakhapatnam, India during January 8-9,2016. The book covers all aspects of information system design, computerscience and technology, general sciences, and educational research. Upon adouble blind review process, a number of high quality papers are selected andcollected in the book, which is composed of three different volumes, and coversa variety of topics, including natural language processing, artificialintelligence, security and privacy, communications, wireless and sensornetworks, microelectronics, circuit and systems, machine learning, softcomputing, mobile computing and applications, cloud computing, software engineering,graphics and image processing, rural engineering, e-commerce, e-governance,business computing, molecular computing, nano-computing, chemical computing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist.

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science...
Title:Information Systems Design And Intelligent Applications: Proceedings Of Third International…Format:PaperbackDimensions:669 pagesPublished:February 4, 2016Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:8132227565

ISBN - 13:9788132227564

Look for similar items by category:


Table of Contents

Chapter 1. A New Private Security Policy Approach for DDoSAttack Defense in NGNs.- Chapter2. An EffectiveApproach for Providing Diverse and Serendipitous Recommendations.- Chapter 3.Envelope Fluctuation Reduction for WiMAX MIMO-OFDMSignals Using Adaptive Network Fuzzy Inference Systems.- Chapter 4.Modeling and Performance Analysis of Free SpaceQuantum Key Distribution.- Chapter5. Design ofa Low-delay-write Model of a TMCAM.- m]Chapter 6. SLA Based E-Learning Service Provisioning in Cloud.-Chapter 7. Estimatingthe Similarities of G7 Countries Using Economic Parameters.- Chapter 8.Offline Malayalam Character Recognition: AComparative Study Using Multiple Classifier Combination Techniques.- Chapter 9.A Comparative Study on Load Balancing Algorithmsfor SIP servers.- Chapter 10. Design ofWireless Sensor Network Based Embedded Systems for Aquaculture EnvironmentMonitoring.- Chapter 11. Touch-to-learn:A Tangible Learning System for Hard-of Hearing Children.- Chapter 12.Creating Low Cost Multi-gesture Device Control by UsingDepth Sensing.- Chapter 13. Evaluationof Glomerular Filtration Rate by Single Frame Method applying GATES Formula.- Chapter 14.Design and Development of Cost Effective WearableGlove for Automotive Industry.- Chapter15. TamperingLocalization in Digital Image Using First Two Digit Probability Features.- Chapter 16.Classification of Bank Direct Marketing Data UsingSubsets of Training Data.- Chapter17. OfflineWriter Identification and Verification - A State-of-the-Art.- Chapter 18.Handwritten Oriya Digit Recognition Using MaximumCommon Sub-graph Based Similarity Measures.- Chapter 19. Design of Non-volatile SRAM Cell Using Memristor.- Chapter 20.Evolutionary Algorithm Based LFC of Single AreaThermal Power System with Different Steam Configurations and Nonlinearity.- Chapter 21.Game Theory and Its Applications in MachineLearning.- Chapter 22. A Study onSpeech Processing.- Chapter 23. ForestType Classification: A Hybrid NN-GA Model Based Approach.- Chapter 24.Optimizing Technique to Improve the Speed of Data throughputthrough Pipeline.- Chapter 25. AnImproved Data Hiding Scheme in Motion Vectors of Video Streams.- Chapter 26.Hiding Sensitive Items Using Pearson's CorrelationCoefficient Weighing Mechanism.- Chapter27. OpenCV BasedImplementation of Zhang-Suen Thinning Algorithm Using Java for Arabic TextRecognition.- Chapter 28. NumericalModeling of Twin Band MIMO Antenna.- Chapter 29. Performance Evaluation of Video-based Face RecognitionApproaches for Online Video Contextual Advertisement User-oriented System.- Chapter 30.A Survey on Power Gating Techniques in Low PowerVLSI Design.- Chapter 31. PhaseBased Mel Frequency Cepstral Coefficients for Speaker Identification.- Chapter 32.A New Block Least Mean Square Algorithm forImproved Active Noise Cancellation.- Chapter 33. An Improved Feedback Filtered-X NLMS Algorithm forNoise Cancellation.- Chapter 34. Applicationof Internet of Things (IoT) for Smart Process Manufacturing in Indian PackagingIndustry.- Chapter 35. FunctionOptimization Using Robust Simulated Annealing.- Chapter 36. Analysis and Optimization of Feature ExtractionTechniques for Content Based Image Retrieval.- Chapter 37. Parametric Curve Based Human Gait Recognition.- Chapter 38.An Energy Efficient Proposed Framework for TimeSynchronization Problem of Wireless Sensor Network.- Chapter 39.Epigenetic and Hybrid Intelligence in Mining Patterns.-Chapter 40. ATechnical Review on LVRT of DFIG Systems.- Chapter 41. An AIS Based Approach for Extraction of PV Module Parameters.-Chapter 42. Word SenseDisambiguation in Bengali: An Auto-updated Learning Set Increases the Accuracyof the Result.- Chapter 43. EfficientMethods to Generate Inverted Indexes for IR.- Chapter 44. Intelligent Mail Box.- Chapter 45. LearningBased No Reference Algorithm for Dropped Frame Identification in UncompressedVideo.- Chapter 46. Multi-viewVideo Summarization.- Chapter 47. ComprehensiveReview of Video Enhancement Algorithms for Low Lighting Conditions.- Chapter 48.A Detailed Review of Color Image ContrastEnhancement Techniques for Real Time Applications.- Chapter 49. A Conceptual Model for Acquisition of MorphologicalFeatures of Highly Agglutinative Tamil Language Using Unsupervised Approach.- Chapter 50.A Fuzzy Approach for the Maintainability Assessmentof Aspect Oriented Systems.- Chapter51. Split andMerge Multi-scale Retinex Enhancement of Magnetic Resonance Medical Images.- Chapter 52.Review on Secured Medical Image Processing.- Chapter 53.Identification of Stages of Malignant Tumor in MRMImages using Level Set algorithm and Textural Analysis.- Chapter 54.Reviews Based Mobile Application Development Model(RBMAD).- Chapter 55. Three PhaseSecurity System for Vehicles Using Face Recognition on Distributed Systems.- Chapter 56.SLA Based Utility Analysis for Improving QoS inCloud Computing.- Chapter 57. ADescriptive Study on Resource Provisioning Approaches in Cloud ComputingEnvironment.- Chapter 58. Analyzingthe Performance of a Software and IT Growth with Special Reference to India.- Chapter 59.Stock Price Forecasting Using ANN Method.- Chapter 60.Recognition of Handwritten English Text UsingEnergy Minimisation.- Chapter 61. A NovelCodification Technique for Tacit Knowledge in Software Industry Using Data Miningtechniques.- Chapter 62. AnAnalysis on the Effect of Malicious Nodes on the Performance of LAR Protocol inMANETs.- Chapter 63. QualitativePerformance Analysis of Punjabi and Hindi Websites of Academic Domain: A CaseStudy.- Chapter 64. A Robust, PrivacyPreserving Secret Data Concealing Embedding Technique into Encrypted Video Stream.-Chapter 65. TrustedExecution Environment for Data Protection in Cloud.