Muutke küpsiste eelistusi

Contemporary Computing: 5th International Conference, IC3 2012, Noida, India, August 6-8, 2012. Proceedings 2012 ed. [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 508 pages, kõrgus x laius: 235x155 mm, kaal: 801 g, 246 Illustrations, black and white; XVII, 508 p. 246 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 306
  • Ilmumisaeg: 26-Jul-2012
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642321283
  • ISBN-13: 9783642321283
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 508 pages, kõrgus x laius: 235x155 mm, kaal: 801 g, 246 Illustrations, black and white; XVII, 508 p. 246 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 306
  • Ilmumisaeg: 26-Jul-2012
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642321283
  • ISBN-13: 9783642321283
This volume constitutes the refereed proceedings of the 5th International Conference on Contemporary Computing, IC3 2010, held in Noida, India, in August 2011. The 42 revised full papers presented together with 7 short papers were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on: algorithm; applications; systems (hardware and software); biomedical informations; poster papers.
Abstract of Keynotes
Computational Modeling and Visualization in the Biological Sciences
1(1)
Chandrajit Bajaj
Analytical and Experimental Methods for High-Performance Network Testing
2(1)
Nageswara S. V. Rao
Power Consumption in Multi-core Processors
3(1)
M. Balakrishnan
Parallel Computing Goes Mainstream
4(2)
Sunil D. Sherlekar
Big Data and Compressive Sensing
6(1)
H.T. Kung
Data-Driven Biology and Computation
7(1)
Ramesh Hariharan
Regular Papers
Track: Algorithm
Dynamic Model of Blended Biogeography Based Optimization for Land Cover Feature Extraction
8(12)
Lavika Goel
Daya Gupta
V.K. Panchal
Grenade Explosion Method for Maximum Weight Clique Problem
20(8)
Manohar Pallantla
Alok Singh
A Greedy Heuristic and Its Variants for Minimum Capacitated Dominating Set
28(12)
Anupama Potluri
Alok Singh
Developing Heuristic for Subgraph Isomorphism Problem
40(13)
Saifuddin Kaijar
S. Durga Bhavani
0-1 Integer Programming for Generation Maintenance Scheduling in Power Systems Based on Teaching Learning Based Optimization (TLBO)
53(11)
Suresh Chandra Satapathy
Anima Naik
K. Parvathi
Time Series Quanslet: A Novel Primitive for Image Classification
64(9)
Tusar Kanti Mishra
Arun K. Pujari
A Fast Algorithm for Learning Weighted Ensemble of Roles
73(13)
Abdullah Almutairi
Sanjay Ranka
Manas Somaiya
Dynamic Optimization Algorithm for Fast Job Completion in Grid Scheduling Environment
86(9)
Monika Choudhary
Sateesh Kumar Peddoju
Track: Applications
Range Grouping for Routing in Dynamic Networks
95(11)
Prachi Badera
Akanksha Bhardwaj
K. Rajalakshmi
Intensity Modeling for Syllable Based Text-to-Speech Synthesis
106(12)
V. Ramu Reddy
K. Sreenivasa Rao
Data-Driven Phrase Break Prediction for Bengali Text-to-Speech System
118(12)
Krishnendu Ghosh
K. Sreenivasa Rao
Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space
130(11)
Sumit Kumar Vishwakarma
Shishir Gupta
Financial Application as a Software Service on Cloud
141(11)
Saurabh Kumar Garg
Bhanu Sharma
Rodrigos N. Calheiros
Ruppa K. Thulasiram
Parimala Thulasiraman
Rajkumar Buyya
An Automated Metamorphic Testing Technique for Designing Effective Metamorphic Relations
152(12)
Gagandeep
Gurdeepak Singh
Service Oriented Architecture Adoption Trends: A Critical Survey
164(12)
Ashish Seth
Ashim Raj Singla
Himanshu Aggarwal
Gender Classification Based on Lip Colour
176(12)
Anand Gupta
Sundeep Narang
Tasha Chandolia
Using Strong, Acquaintance and Weak Tie Strengths for Modeling Relationships in Facebook Network
188(13)
Arnab Kumar
Tushar Rao
Sushama Nagpal
Context Based Relevance Evaluation of Web Documents
201(12)
Pooja Gupta
A Novel Faster Approximate Fuzzy Clustering Approach with Highly Accurate Results
213(12)
Gargi Aggarwal
M.P.S. Bhatia
Materialized View Selection Using Genetic Algorithm
225(13)
T.V. Vijay Kumar
Santosh Kumar
Routing Table Implementation Using Integer Data Structure
238(12)
P. Manasa
M.R. Prasad
T. Sobha Rani
Real Life Emotion Classification from Speech Using Gaussian Mixture Models
250(12)
Shashidhar G. Koolagudi
Anurag Barthwal
Swati Devliyal
K. Sreenivasa Rao
Storage and Retrieval of Large Data Sets: Dimensionality Reduction and Nearest Neighbour Search
262(11)
A. Poorna Chandrasekhar
T. Sobha Rani
Emotion Recognition from Semi Natural Speech Using Artificial Neural Networks and Excitation Source Features
273(10)
Shashidhar G. Koolagudi
Swati Devliyal
Anurag Barthwal
K. Sreenivasa Rao
Maximizing Automatic Code Generation: Using XML Based MDA
283(11)
Atul Saurabh
Deepak Dahiya
Rajni Mohana
Proposed Mobile Controlled Handoff (MCHO) in 3GPP Long Term Evolution (LTE) System
294(12)
Vikrant Chauhan
Juhi Gupta
Chhavi Singla
A Different Approach of Addressing, Energy Efficient Routing and Data Aggregation for Enhanced Tree Routing Protocol
306(16)
Sharad
Shailendra Mishra
Ashok Kumar Sharma
D.S. Chauhan
Packet and Flow Based Network Intrusion Dataset
322(13)
Prasanta Gogoi
Monowar H. Bhuyan
D.K. Bhattacharyya
J.K. Kalita
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks
335(12)
Adarsh Kumar
Alok Aggarwal
Charu
A Cloud Based Robot Localization Technique
347(11)
Faimy Q. Ansari
Jitendra Kumar Pal
Jainendra Shukla
G.C. Nandi
Pavan Chakraborty
File Replication and Dereplication of Replica's in Distributed Environment
358(12)
Manu Vardhan
Paras Gupta
Dharmender Singh Kushwaha
Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services
370(13)
Durgesh Bajpai
Manu Vardhan
Dharmender Singh Kushwaha
A Non-iterative Learning Based Artificial Neural Network Classifier for Face Recognition under Varying Illuminations
383(12)
Virendra P. Vishwakarma
DDoS Detection with Daubechies
395(12)
Gagandeep Kaur
Vikas Saxena
J.P. Gupta
Track: Systems (Hardware & Software)
Rigorous Design of Lazy Replication System Using Event-B
407(12)
Raghuraj Suryavanshi
Divakar Yadav
Saturation Analysis of IEEE 802.11 EDCA for Ad Hoc Networks
419(12)
Ash Mohammad Abbas
Khaled Abdullah
Mohammed Al Soufy
Financial Option Pricing on APU
431(11)
Matthew Doerksen
Steven Solomon
Parimala Thulasiraman
Ruppa K. Thulasiram
Object Oriented Software Maintenance in Presence of Indirect Coupling
442(10)
Nirmal Kumar Gupta
Mukesh Kumar Rohil
Development of a Robust Microcontroller Based Intelligent Prosthetic Limb
452(11)
Anup Nandy
Soumik Mondal
Pavan Chakraborty
G.C. Nandi
SMART - A Social Mobile Advanced Robot Test Bed for Humanoid Robot Researchers
463(8)
Jainendra Shukla
Jitendra Kumar Pal
Faimy Q. Ansari
G.C. Nandi
Pavan Chakraborty
Track: Biomedical Informatics
Skin Infection Identification Using Color and Euclidean Distance Algorithm
471(10)
Manish Kumar Sharma
Rohit Maurya
Ajay Shankar Shukla
P.R. Gupta
Annotation of Human Genomic Sequence by Combining Existing Gene Prediction Tools Using Hybrid Approach
481(9)
Anubhav Saxena
Gokulakrishnan Pitchaipillai
Pritish Kumar Vardawaj
Poster Papers
A Comparison of the DCT JPEG and Wavelet Image Compression Encoder for Medical Images
490(2)
Farah Jamal Ansari
Aleem Ali
Depth Map Based Recognition of Activities Involving Two Persons
492(2)
Anupam
K.K. Biswas
Achyut Shukla
Rajesh Kumar Pandey
Real-Time Depth Estimation from a Monocular Moving Camera
494(2)
Aniket Handa
Prateek Sharma
Spoken Language Identification Using Spectral Features
496(2)
Shashidhar G. Koolagudi
Deepika Rastogi
K. Sreenivasa Rao
A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment
498(2)
Sanchika Gupta
Susmita Horrow
Anjali Sardana
Telephonic Vowel Recognition in the Case of English Vowels
500(2)
Sujata Negi Thakur
Manoj Kumar Singh
Anurag Barthwal
Application of 2D OVSF Codes in OFCDM for Downlink Communication in 4G Systems
502(3)
Parul Puri
Neetu Singh
Author Index 505