feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Boca Raton ; London ; New York :CRC Press,
    UID:
    almahu_BV048862188
    Format: 1 Online-Ressource (xix, 624 Seiten) : , Illustrationen, Diagramme.
    ISBN: 978-0-429-44427-2
    Note: Proceedings of the 2nd International Conference on Communication and Computing Systems (ICCCS 2018), December 1-2, 2018, Gurgaon, India
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-0-367-00147-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949385797502882
    Format: 1 online resource (1 volume)
    ISBN: 9780429444272 , 0429444273 , 9780429814570 , 0429814577 , 9780429814587 , 0429814585 , 9780429814594 , 0429814593
    Content: The International Conference on Communication and Computing Systems (ICCCS 2018) provides a high-level international forum for researchers and recent advances in the field of electronic devices, computing, big data analytics, cyber security, quantum computing, biocomputing, telecommunication, etc. The aim of the conference was to bridge the gap between the technological advancements in the industry and the academic research.
    Note: 〈P〉Preface/Forward〈BR〉Acknowledgement〈BR〉Committees〈BR〉Features〈/P〉〈B〉〈I〉〈P〉Image processing and its applications〈/P〉〈/B〉〈/I〉〈P〉3D Tumor segmentation using surface rendering technique; 〈I〉Sudha Rani, K. Mani Kumari, K. Aruna Kumari & T. Gnana Prakash〈BR〉〈/I〉Integration of big data and cloud computing for future internet of things; 〈I〉Mittal, S. Mall, S. Juyal & R. Chauhan〈BR〉〈/I〉Five-grade cancer classification of colon histology images via deep learning; 〈I〉Dabass, R. Vig & S. Vashisth〈BR〉〈/I〉An RGB image steganography with dual layer security; 〈I〉Biswas & S. Chand〈BR〉〈/I〉Software requirements selection using different patterns of pairwise comparison matrices of anaylytic hierarchy proces;〈I〉.W. Mohammad, S. Khan & M. Sadiq〈BR〉〈/I〉Identification of the forged images using image forensic tools; 〈I〉A. Parveen, Z.H. Khan & S.N. Ahmad〈BR〉〈/I〉KNN classification using multi-core architecture for intrusion detection system; 〈I〉B.S. Sharmila & R. Nagapadma〈BR〉〈/I〉Creating 3D facial model from a 2D facial image; 〈I〉S. Mukherjee & D. Kamthania〈BR〉〈/I〉A novel Zernike moment based approach for optical flow estimation; 〈I〉S. Anthwal & D. Ganotra〈BR〉〈/I〉Epidemic spreading based word sense disambiguation of Hindi text; 〈I〉G. Jain & D.K. Lobiyal〈BR〉〈/I〉Empowering IoT with cloud technology; 〈I〉A. Kumar & A. Mehta〈BR〉〈/I〉nalysis of deforestation using satellite images of a region by color image segmentation; 〈I〉M. Pentakota & K. Kundu〈/P〉〈B〉〈P〉Recent trends in communication and soft computing〈/P〉〈/B〉〈/I〉〈P〉Available bandwidth estimation in wireless ad-hoc networks: A modified approach; 〈I〉Mukta & N. Gupta〈BR〉〈/I〉An efficient maximal frequent itemset mining algorithm based on linear prefix tree; 〈I〉M. Sinthuja, N. Puviarasan & P. Aruna〈BR〉〈/I〉Passive fault-tolerant control system design with tracking control against major system faults: Application to a canonical tank level system; 〈I〉H.R. Patel & V.A. Shah〈BR〉〈/I〉Asymmetric cryptosystem based on fractional Fourier transform domain using triple random phase masks; 〈I〉S. Yadav & H. Singh〈BR〉〈/I〉Implementation of fiber network survivability by using P-L approach; 〈EM〉C. Singh〈BR〉〈/EM〉Performance analysis of cognitive radio networks over Nakagami-〈I〉m 〈/I〉fading channel; 〈EM〉S. Sharma, H. Verma, A. Jain, A. Sharma & V. Pathak〈BR〉〈/EM〉Performance analysis of photodetector for application in optical interconnect; 〈I〉S. Chaturvedi, A. Chaturvedi, S. Thomas, S. Sharma & B.B. Saga〈BR〉〈/I〉Optical networks-survivability aspect and prospect; 〈I〉C. Singh, P. SaiVamsi, K. Annapurna & K. Sarveswara Rao〈BR〉〈/I〉Real audio input signal transmission of OFDM for AWGN channel; 〈EM〉P. Manhas, S. Thakral & M.K Soni〈BR〉〈/EM〉〈EM〉P〈/EM〉erformance analysis of dual-hop Double Generalized Gamma (DGG) and Málaga distributed FSO network; 〈I〉A. Singha, S. Sharma & J. Gupta〈BR〉〈/I〉Effective-coverage and connectivity in WSN; 〈EM〉A. Prakash & M.Y. Ansari〈BR〉〈/EM〉Enhancement of ATC with load models using FACTS devices; 〈I〉T. Nireekshana, J. Bhavani, G. Kesava Rao & K. Jej〈BR〉〈/I〉Multiple hole detection in wireless underground sensor networks; 〈I〉A. Kaushik〈BR〉〈/I〉Word sense disambiguation using the unsupervised method; 〈I〉A. Kumari〈BR〉〈/I〉Edible electronics -- smart approach towards medical applications; 〈I〉A. Anand, D. Sharma & P. Bansal〈BR〉〈/I〉Investigation of optical properties of a-Se80-xTe20Bix (x=0, 3, 9) thin films; 〈I〉Deepika, B.M.K. Prasad & S. Singh〈BR〉〈/I〉Energy aware image coding technique for wireless multimedia sensor network; 〈I〉A. Genta & D.K. Lobiyal〈BR〉〈/I〉FRP bio digester for efficient waste management; 〈I〉S. Singla & Vinod Kumar H.A.〈BR〉〈/I〉Next generation smart portal (Grouppy); 〈I〉S. Kumar, N. Gola, Kartik, N.S. Siddqui, P. Sharma & A. Chauhan〈BR〉〈/I〉A comparative study between constant weight and variable weight fins; 〈I〉Y. Chauhan, P.L. Sahu & A. Shrivastava〈BR〉〈/I〉Coverage preserving scheduling for life span maximization in wireless sensor network based internet of things; 〈I〉V. Kumar & S. Kumar〈BR〉〈/I〉Profit analysis of a system of non identical units with priority and preventive maintenance; 〈I〉P. Jain & V. Garg〈BR〉〈/I〉Mobile assistive application for visually impaired; 〈I〉S. Sharma & V. Malhotra〈BR〉〈/I〉Best to smart green manufacturing practices for small and medium enterprises: An importance-performance analysis; 〈I〉K. Lalwani, M. Mishra & R. Mattoo〈BR〉〈/I〉Study of blockchains implementation prospects in manufacturing sector; 〈I〉S. Kumar, B. Narang, A. Pillai & P. Kochar〈BR〉2〈/I〉4/7 Work culture: Competitive advantages and challenges; 〈I〉d. Faiz, R. Singh, Siddharth & S. Mathur〈BR〉〈/I〉Relationship between economic value added and share prices of Hindustan Unilever Limited; 〈EM〉S. Yadav, M. Hasan, P.K. Yadav & H. Gupta〈BR〉〈/EM〉〈EM〉E〈/EM〉nhancement of the property of black cotton soil using corn cob ash & iron ore tailings; 〈I〉N. Singh & T. Chauhan〈BR〉〈/I〉Gravitational search optimized resource allocation in underlay cognitive radio networks; 〈I〉S. Singh, B.M.K. Prasad〈BR〉〈/I〉Algorithms for maximal independent set problems; 〈I〉K. Yadav & M. Manjul〈/P〉〈B〉〈P〉Secure computing〈/P〉〈/B〉〈/I〉〈P〉Detection and localization of copy move forgery using improved centre symmetric local binary pattern for enhanced accuracy and robustness; 〈I〉S. Sharma & U. Ghanekar〈BR〉〈/I〉Polynomial based key management security schemes in wireless sensor networks: A review; 〈I〉A.G. Dinker & V. Sharma〈BR〉〈/I〉A brief survey on negative sequential pattern mining and its impacts; 〈I〉P. Yadav〈BR〉〈/I〉A secure login method based on typing pattern: 〈I〉Md. Asraful Haque, N.Z. Khan & Gulnar Khatoon〈BR〉〈/I〉Analysis, design and implementation of fiber optic traffic by using Python; 〈I〉M.B. Harish, K.V.S.S.S.S. Sairam & C. Singh〈BR〉〈/I〉Detection and prevention of vulnerabilities in open source software: An experimental study; 〈I〉G.S. Rawat, & K. Singh〈BR〉〈/I〉Retrospection on security in cloud computing; 〈EM〉Hansraj & A. Mehta〈BR〉〈/EM〉SLA penalty and reward strategy for cloud computing; 〈I〉P. Tiwari & A. Mehta〈BR〉〈/I〉Vehicle detection and classification in surveillance video using KNN classifier; 〈I〉S. Gautam, Y. Sahu & P.L. Sahu〈BR〉〈/I〉Beyond CMOS devices for hardware security: A review; 〈I〉V. Singh, R. Kapoor & V. Malhotra〈BR〉〈/I〉Role of Social Networking Websites (SNS) in recruitment: A review analysis; 〈I〉T. Yadav, M. Narula & A. Singh〈/P〉〈B〉〈P〉Soft computing, intelligent system, machine vision and artificial neural network〈/P〉〈/B〉〈/I〉〈P〉Dynamic reliability evaluation framework for mobile ad-hoc network with non-stationary node distribution; 〈I〉N. Padmavathy & K. Anusha〈BR〉〈/I〉Re-designing an Indian kitchen for the elderly using REVIT; 〈I〉S. Atreya & S. Agarwal〈BR〉〈/I〉Sarcasm detection in social media posts: A division of sentiment analysis; 〈I〉M. Vats & Y. Soni〈BR〉〈/I〉Applications of type II fuzzy sets-a mathematical review on breast cancer imaging modalities; 〈I〉J. Dabass, R. Vig & S. Arora〈BR〉〈/I〉New homotopy pertubation method for solving of coupled equation and heat equation and Laplace equation; 〈I〉M. Dhariwal & N. Fatima〈BR〉〈/I〉Implementation of survivability by using tier modes approach; 〈I〉C. Singh〈BR〉〈/I〉Association rule mining using swarm-based approaches: An analytical survey; 〈I〉P. Yadav〈BR〉〈/I〉Python programming for machine learning of big data analysis: Issues, solutions and benchmarks; 〈I〉K. Biswas & S. Chand〈BR〉〈/I〉Cloud Reports tool to implement IaaS framework with location-based authentication in cloud; A〈I〉. Mehta & S.N. Panda〈BR〉〈/I〉Characterization of solar panels received from manufacturers in real field conditions using LabVIEW 394; 〈I〉A. Aggarwal, M. Kumar & R. Vig〈BR〉〈/I〉Analysis of PSO based clustering protocol in assorted scenarios of WSN; 〈I〉A. Gambhir, A. Payal & R. Arya〈BR〉〈/I〉Fuzzy based analysis of reality show analytics for TRP ratings based on the viewer's opinion; 〈I〉V. Kakulapati, S.M. Reddy & K. Iswarya〈BR〉〈/I〉A study on dementia using machine learning techniques; 〈I〉D. Bansal, K. Khanna, R. Chhikara, R.K. Dua & R. Malhotra〈BR〉
    Additional Edition: Print version: International Conference on Communication and Computing Systems (2nd : 2018 : Gurgaon, India), creator. Communication and computing systems. Boca Raton : CRC Press, 2019 ISBN 9780367001476
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Conference papers and proceedings.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages