Muutke küpsiste eelistusi

E-raamat: Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

  • Formaat - PDF+DRM
  • Hind: 221,68 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.

A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors
1(12)
M. Poongothai
A. Rajeswari
Study of Chunking Algorithm in Data Deduplication
13(8)
A. Venish
K. Siva Sankar
Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography
21(12)
M. Breezely George
S. Igni Sabasti Prabu
Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents
33(14)
J. Albert Mayan
R. Julian Menezes
M. Breezely George
Real-Time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity
47(10)
R. Prakash
Siva V. Girish
A. Balaji Ganesh
Task Scheduling Using Multi-objective Particle Swarm Optimization with Hamming Inertia Weight
57(10)
S. Sarathambekai
K. Umamaheswari
Pedagogue: A Model for Improving Core Competency Level in Placement Interviews Through Interactive Android Application
67(12)
N.M. Dhanya
T. Senthil Kumar
C. Sujithra
S. Prasanth
U.K. Shruthi
Non Functional QoS Criterion Based Web Service Ranking
79(12)
M. Suchithra
M. Ramakrishnan
Experimental Study on Chunking Algorithms of Data Deduplication System on Large Scale Data
91(8)
T.R. Nisha
S. Abirami
E. Manohar
A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities
99(14)
J. Arunagiri
S. Rakhi
K.P. Jevitha
Facial Expression Recognition Using PCA and Texture-Based LDN Descriptor
113(10)
Roshni C. Rahul
Merin Cherian
Role-Based Access Control for Encrypted Data Using Vector Decomposition
123(10)
D. Nidhin
I. Praveen
K. Praveen
Mobile Controlled Door Locking System with Two-Factor Authentication
133(8)
S. Priyadharshini
D. Nivetha
T. Anjalikumari
P. Prakash
Integration of UMTS with WLAN Using Intermediate IMS Network
141(12)
A. Bagubali
V. Prithiviraj
P.S. Mallick
Kishore V. Krishnan
Building a Knowledge Vault with Effective Data Processing and Storage
153(6)
R.R. Sathiya
S. Swathi
S. Nevedha
U. Shanmuga Sruthi
Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional
159(8)
M. Puthanial
P.C. Kishore Raja
A Study on Security Issues in Cloud Computing
167(10)
Kaaviyan Kanagasabapathi
S. Deepak
P. Prakash
An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection
177(10)
Shilpa Jose
K. Priyadarshini
K. Abirami
Search Optimization in Cloud
187(8)
U.M. Ramya
M. Anurag
S. Preethi
J. Kundana
Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping-Based Approach
195(10)
T.R. Swapna
Chandan Chakraborty
K.A. Narayanankutty
Advanced Cluster-Based Attribute Slicing: A New Approach for Privacy Preservation
205(10)
V. Shyamala Susan
T. Christopher
Advanced Power Demand Controller and Billing System Using GSM
215(8)
I. Monah Pradeep
S.G. Rahul
A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor
223(12)
Resmi Sekhar
R.S. Shaji
FSM-Based VLSI Architecture for the 3 × 3 Window-Based DBUTMPF Algorithm
235(14)
K. Vasanth
V. Elanangai
S. Saravanan
G. Nagarajan
Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene
249(10)
S. Sreelakshmi
Anupa Vijai
T. Senthilkumar
Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT
259(8)
G. Nivedhitha
G.S. Anandha Mala
Scalable Casual Data Consistency for Wide Area Storage with Cloud
267(14)
Kishor Kumar Patel
E. Christal Joy
An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications
281(10)
C. Devasanthiya
S. Vigneshwari
J. Vivek
Big Data and Analytics---A Journey Through Basic Concepts to Research Issues
291(16)
Manjula Ramannavar
Nandini S. Sidnal
Efficient Identification of Bots by K-Means Clustering
307(12)
S. Prayla Shyry
Message Authentication and Source Privacy in Wi-Fi
319(12)
K. Gnana Sambandam
Ethala Kamalanaban
Timely Prediction of Road Traffic Congestion Using Ontology
331(14)
M. Prathilothamai
S. Marilakshmi
Nilu Majeed
V. Viswanathan
Optimal Selection of Security Countermeasures for Effective Information Security
345(10)
R. Sarala
G. Zayaraz
V. Vijayalakshmi
Stabilization of Load in Content Delivery Networks
355(10)
P. Asha
Eigen-Based Indexing and Retrieval of Similar Videos
365(12)
R. Sunitha
A. Mary Posonia
FoetusCare: An Android App for Pregnancy Care
377(16)
M. Bharathi
V. Nirmalrani
Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD)
393(12)
S. Rajendran
N.P. Gopalan
MIMO-Based Efficient Data Transmission Using USRP
405(16)
M. Lenin
J. Shankar
A. Venkateswaran
N.R. Raajan
Automatic Road Sign Detection and Recognition Based on SIFT Feature Matching Algorithm
421(12)
P. Sathish
D. Bharathi
A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks
433(12)
V. Manjusha
N. Radhika
Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture
445(12)
M.V. Babitha
A.K. Sumesh
Bio-sensor Authentication for Medical Applications Using WBAN
457(12)
Gomathi Venkatesan
Chithra Selvaraj
PSO-Based Multipath Routing in Wireless Sensor Network
469(10)
T. Vairam
C. Kalaiarasan
Information Hiding in H.264, H.265, and MJPEG
479(10)
S. Priya
P.P. Amritha
Intelligent Data Prediction System Using Data Mining and Neural Networks
489(12)
M. Sudhakar
J. Albert Mayan
N. Srinivasan
Resource Allocation for Wireless Network Environment
501(8)
V. Noor Mohammed
Siddharth Jere
Vora Sulay Kaushikbhai
Design of PSO-Based PI Controller for Tension Control in Web Transport Systems
509(8)
N. Hari Priya
P. Kavitha
N. Muthukumar
Seshadhri Srinivasan
K. Ramkumar
Distributed Service Level Agreement-Driven Dynamic Cloud Resource Management
517(12)
M.K. Gayatri
G.S. Anandha Mala
Efficient Route Discovery in VANET Using Binary Bat Approach
529(8)
D. Saravanan
S. Janakiraman
S. Sheeba Roseline
M.P. Sharika
U. Madhivadhani
J. Amudhavel
Mining Ambiguities Using Pixel-Based Content Extraction
537(8)
B.S. Charulatha
Paul Rodrigues
T. Chitralekha
Arun Rajaraman
Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm
545(8)
S. Sampath Kumar
D. Rajaguru
T. Vengattaraman
P. Dhavachelvan
A. Juanita Jesline
J. Amudhavel
Enhancing the Interactivity in Distributed Interactive Applications
553(8)
D. Saravanan
S. Janakiraman
P. Niranjna Devy
T. Sophia
M. Mahalakshmi
J. Amudhavel
Comparison and Analysis of Fuzzy Methods---TOPSIS, COPRAS-G, ANP, ELECTRE and AHP Using MATLAB
561(10)
S. Kumarakrishsnan
K. Devika P. Kumar
S. Sreelakshmi
S. Sevvanthi
B. Asha
Ramachandiran
D. Arvind Kumar
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner
571(8)
B. Thiyagarajan
M.R. Gokul
G. Hemanth Kumar
R. Rahul Prasanth
M. Shanmugam
N. Pazhaniraja
K. Prem Kumar
V. Vijayakumar
Forecasting the Stability of the Data Centre Based on Real-Time Data of Batch Workload Using Times Series Models
579(12)
R. Vijay Anand
P. Bagavathi Sivakumar
Dhan V. Sagar
Active Warden Attack on Steganography Using Prewitt Filter
591(10)
P.P. Amritha
K. Induja
K. Rajeev
Similarity Scores Evaluation in Social Networking Sites
601(14)
Amrita Ravindran
P.N. Kumar
P. Subathra
Estimating Random Delays in Modbus Over TCP/IP Network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing
615(12)
B. Sreram
F. Bounapane
B. Subathra
Seshadhri Srinivasan
Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features
627(12)
P. Venkata Rajeev
V. Smrithi Rekha
Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining
639(8)
M. Divya Shree
J. Visumathi
P. Jesu Jayarin
NEBULA: Deployment of Cloud Using Open Source
647(8)
Mulimani Manjunath
Bhandary Anjali
N. Ashwini
K. Nagadeeksha
S. Jayashree
An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory
655(8)
S. Sujan
R. Kanniga Devi
A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System
663(12)
Ethala Kamalanaban
R. Seshadri
Towards Modelling a Trusted and Secured Centralised Reputation System for VANET's
675(14)
T. Thenmozhi
R.M. Somasundaram
A Survey on Trusted Platform Module for Data Remanence in Cloud
689(8)
M. Arun Fera
M. Saravana Priya
Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval
697(10)
G. Nagarajan
R.I. Minu
A Hybrid Cloud Architecture for Secure Service---Measures Against Poodle Vulnerability
707(8)
V. Sabapathi
P. Visu
K.A. Varun Kumar
An Efficient Authentication System for Data Forwarding Under Cloud Environment
715(12)
S.V. Divya
R.S. Shaji
Survey on Data Mining Techniques with Data Structures
727
Y. Jeya Sheela
S.H. Krishnaveni
S. Vinila Jinny
Author Index
Dr. L. Padma Suresh obtained his doctorate from M S University and Dr. M.G.R University, respectively. He is presently working as a Professor and Head in Department of Electrical and Electronics Engineering, Noorul Islam University, Kumaracoil, India. Dr. Suresh is well known for his contributions to the field in both research and education contributing over 50 research articles in journal and conferences. He is the editorial member of International Journal of Advanced Electrical and Computer Engineering and also served as reviewer for various reputed journals. He has been a life member of the Indian Society for Technical Education. He also served in many committees as Convener, Chair, and Advisory member for various external agencies. His research is currently focused on Artificial Intelligence, Power Electronics, Evolutionary Algorithms, Image Processing, and Control Systems.





Dr. Bijaya Ketan Panigrahi is an Associate Professor of Electrical and Electronics Engineering Department in Indian Institute of Technology Delhi, India. He received his Ph.D. degree from Sambalpur University. He is serving as a chief editor to the International Journal of Power and Energy Conversion. His interests focus on Power Quality, FACTS Devices, Power System Protection, and AI Application to Power System.