Limit search to available items
Book Cover
Book
Author International Conference on Information Processing (5th : 2011 : Bangalore, India)

Title Computer networks and intelligent computing
Published Berlin ; London : Springer, 2011

Copies

Location Call no. Vol. Availability
 MELB  004.6 Ico/Ipr 2011  AVAILABLE
Series Communications in computer and information science ; 157
Communications in computer and information science ; 157
Contents Contents note continued: A Study of the Performance of Motion Estimation in Vector Based Color Image Super-Resolution Analysis for Pure Translational Motion / Manish Phukan -- An Innovative Technique for Adaptive Video Summarization / Debotosh Bhattacharjee -- Emotion Recognition from Decision Level Fusion of Visual and Acoustic Features Using Hausdorff Classifier / K. Kyamakya -- Efficient Feature Extraction Techniques for Palmprint / Phalguni Gupta -- Studying the Elemental Resistivity Profile of Electrical Impedance Tomography (EIT) Images to Assess the Reconstructed Image Quality / J. Nagaraju -- Stereo Correspondence Using Census Based Dynamic Programming and Segmentation / V.K. Govindan -- Unsupervised Color Image Segmentation by Clustering into Multivariate Gaussians / V.K. Govindan -- A Novel Approach to Writer Identification in Malayalam Using Graphemes / Sumam Mary Idicula -- A Linear Manifold Representation for Color Correction in Digital Images / Vijayan K. Asari --
Contents note continued: Braille Character Recognition Using Generalized Feature Vector Approach / S. Majumder -- Kernel Discriminative Embedding Techmique with Entropy Component Analysis for Accurate Face Image Classification / B.H. Shekar -- Convolutional Neural Network Based Segmentation / V.K. Govindan -- An Efficient Preprocessing Methodology for Discovering Patterns and Clustering of Web Users Using a Dynamic ARTl Neural Network / G. Kavitha -- Moving Object Segmentation Using Fuzzy C-Means Clustering Affine Parameters / M.M. Kuber -- Age Estimation Using Gender Information / S. Majumder -- Section IV Soft Computing -- Robustness of Serial and Parallel Biometric Fusion against Spoof Attacks / Nasir Alfarid -- Robust Two-Way Locking Protocol for Key Exchange / Mohit P. Tahiliani -- Spam Control by Source Throttling Using Integer Factorization / Radhesh Mohandas -- Symmetric Encryption Using Sierpinski Fractal Geometry / Durga Bhavani S. --
Contents note continued: Cloud Computing Privacy Issues and User-Centric Solution / Saidalavi Kalady -- Kerberos Style Authentication and Authorization through CTES Model for Distributed Systems / Dharmender Singh Kushwaha -- Self Monitoring Analysis and Reporting Technology (SMART) Copyback / K.M. Sunjiv Soyjaudah -- Hierarchical DHT to Efficiently Load Balancing in Dynamic Peer-to-Peer Environment / P. Santhi Thilagam -- Remote Scan Using Secure Automated Client Server Model / Mahendra Pratap Singh -- Section IX Signal Processing -- A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images / Shoubhik Chakraborty -- New Curvelet Features for Image Indexing and Retrieval / Subrata Rakshit -- Expert System Design Based on Wavelet Transform and Linear Feature Selection / Niladri Prasad Mohanty -- Binarization of the Noisy Document Images: A New Approach / D.K. Basu -- Laser Communication Using High Speed Digital Design / S.N. Kale --
Contents note continued: Combining a Content Filtering Heuristic and Sentiment Analysis for Movie Recommendations / Ghanshyam Kumar Mehta -- Real Time Image Representation for Weather Forecast over Launch Pad / A.M. Khan -- Development of Edge Detection Technique for Images Using Adaptive Thresholding / Goutam Sanyal -- Speeded-Up Robust Features Based Moving Object Detection on Shaky Video / Vijayan K. Asari
Contents note continued: Comparison of Performance for Intrusion Detection System Using Different Rules of Classification / Jaya Sil -- Section II Web Mining -- SR-Match: A Novel Schema Matcher Based on Semantic Relationship / Rashmi Chauhan -- Detection and Prevention of SQL Injection Attacks Using Semantic Equivalence / Radhesh Mohandas -- PCF-Engine: A Fact Based Search Engine / L.M. Patnaik -- Online Identification of Illegitimate Web Server Requests / Sanjay Kumar Jena -- Dynamic Generation of Semantic Documents for Web Resources / M.M. Gore -- Information Propagation on Novel Social Network Model / Sreedhar Bhukya -- Deontic Based Ontology Matching for Conflict Resolution between Text Documents / A. Kannan -- Improving the Precision and Recall of Web People Search Using Hash Table Clustering / L.M. Patnaik -- Section III Artificial Intelligence -- Video Shot Cut Detection Using Least Square Approximation Method / S. Domnic --
Contents note continued: Performance Analysis of Multicarrier Code Division Multiple Access Transmission Techniques / D.S. Venkateshwarulu -- Optical Chaos Synchronization and Spatio-temporal Digital Cryptography / Sumona Mukhopadhyay -- Statistical Analysis of Network Traffic over LAN through IAMT / G. C. Nandi -- PT: A Path Tracing and Filtering Mechanism to Defend against DDoS Attacks / Ashok Singh Sairam -- Application of GA in Key Generation for Image Transposition Cipher Algorithm / Sriyankar Acharyya -- A Novel Reversible Data Embedding Method for Source Authentication and Tamper Detection of H.264/AVC Video / Mahendra Pratap Singh -- Section VII Wireless Networks -- Ant-CAMP: Ant Based Congestion Adaptive Multi-Path Routing Protocol for Wireless Networks / Mohit P. Tahiliani -- Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing / Sanjay Kumar Jena --
Contents note continued: Recent Advances and Future Potential of Computer Aided Diagnosis of Liver Cancer on Computed Tomography Images / G. Ram Mohana Reddy -- Computational Methods to Locate and Reconstruct Genes for Complexity Reduction in Comparative Genomics / L.M. Patnaik -- Section V Software Engineering -- Identifying an Appropriate Requirements Prioritization Methodology Using Fuzzy Decision-Making / Soni Anuja -- Analyzing Design Patterns for Extensibility / K.C. Shet -- Quality Determinants in Offshored IS Projects: A Comparison between Projects Completed Within-Budget and Over-Budget / G. Kannabiran -- A Framework for Security Design Engineering Process / Asok De -- Software Piracy Prevention through SMS Gateway / Vrijendra Singh -- Section VI Computer Communication Networks -- Estimating Strength of a DDoS Attack in Real Time Using ANN Based Scheme / M.K. Pattanshetti --
Contents note continued: Stability of Electromagnetic Waves in Solid Chiral Materials / V. Satyanaga Kumar -- Fusion of Cryptographic Watermarking Medical Image System with Reversible Property / P. Venkata Krishna -- A Comparative Analysis of Multilevel Daubechie Wavelet Based Image Fusion / Sai Shankar Nag -- Automatic Detection of Texture Defects Using Texture-Periodicity and Gabor Wavelets / P. Nagabhushan -- Facial Emotion Recognition in Curvelet Domain / Bhupesh Kumar Singh -- Automatic Identification of Instrument Type in Music Signal Using Wavelet and MFCC / Sanjoy Kumar Saha -- Design of Fuzzy Logic Based PID Controller for an Unstable System / Yogesh V. Hotel -- Section X Image Processing and Pattern Recognition -- Analysis of Spatio-temporal Relationship of Multiple Energy Spectra of EEG Data for Emotion Recognition / Vijayan K. Asari --
Contents note continued: On Downlink Inter Cell Interference Modeling in Cellular OFDMA Networks / Ranjan Bala Jain -- AMul: Adaptive Multicast Routing Protocol for Multi-hop Wireless Networks / Mohit P. Tahiliani -- Performance Evaluation of Multipath Source Routing Protocols in MANET / S. Geetha -- Steiner Tree-Based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks / B. Sathish Babu -- MFTR: Multipath Fault Tolerant Routing in Wireless Sensor Networks / Hafizur Rahaman -- Authentication in Wireless Sensor Networks Using Zero Knowledge Protocol / A. Sreekumar -- Energy Efficient Load Sharing Mechanism for Multipath Routing Protocol in Wireless Sensor Networks / G. Shiva Murthy -- Section VIII Distributed Systems and Storage Networks -- Global Distributed Indexing for In-Network Storage in Sensor Networks / Ashok Singh Sairam -- An Efficient Approach for Storage Migration of Virtual Machines Using Bitmap / S.D. Madhu Kumar --
Machine generated contents note: Section I Data Mining -- Interestingness Analysis of Semantic Association Mining in Medical Images / G. Santhosh Kumar -- On Improving the Generalization of SVM Classifier / R. Saravanan -- A Practical Rough Sets Analysis in Real-World Examination Timetabling Problem Instances / Bahari Belaton -- Mining Association Rules Using Non-Negative Matrix Factorization and Formal Concept Analysis / Aswani Kumar Ch -- Study of Diversity and Similarity of Large Chemical Databases Using Tanimoto Measure / G. Narahari Sastry -- Byte Level n-Gram Analysis for Malware Detection / Yogesh Kumar Meena -- Integrating ILM, E-Discovery and DPA 1998 for Effective Information Processing / Vijay K. Chaurasiya -- A Novel Ensemble Method for Time Series Classification / Amir Ahmad -- Apriori-Based Research Community Discovery from Bibliographic Database / Sumam Mary Idicula -- An Improved l-Diversity Anonymisation Algorithm / G.K. Panda --
Genre/Form Conference papers and proceedings.
ISBN 3642227856 (paperback)
9783642227851 (paperback)