Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
1111361112
Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
109.99 In Stock
Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III

Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III

Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III

Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III

Paperback(2011)

$109.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.

Product Details

ISBN-13: 9783642178801
Publisher: Springer Berlin Heidelberg
Publication date: 03/09/2011
Series: Communications in Computer and Information Science , #133
Edition description: 2011
Pages: 483
Product dimensions: 0.00(w) x 0.00(h) x 0.03(d)

Table of Contents

Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)

Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic Aravinthan Parthibarajan Gopalakrishnan Narayanmurthy Arun Srinivas Parthibarajan Vigneswaran Narayanamurthy 1

An Intelligent Network for Offline Signature Verification Using Chain Code Minal Tomar Pratibha Singh 10

An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP Antu Annam Thomas M. Wilscy 23

An Automatic Evolution of Rules to Identify Students' Multiple Intelligence Kunjal Mankad Priti Srinivas Sajja Rajendra Akerkar 35

A Survey on Hand Gesture Recognition in Context of Soft Computing Ankit Chaudhary J. L. Raheja Karen Das Sonia Raheja 46

Handwritten Numeral Recognition Using Modified BP ANN Structure Amit Choudhary Rahul Rishi Savita Ahlawat 56

Expert System for Sentence Recognition Bipul Pandey Anupam Shukla Ritu Tiwari 66

RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets Monowar H. Bhuyan D. K. Bhattacharyya J. K. Kalita 76

Distributed and Parallel Systems and Algorithms

A Review of Dynamic Web Service Composition Techniques Demian Antony D'Mello V. S. Ananthanarayana Supriya Salian 85

Output Regulation of Arneodo-Coullet Chaotic System Sundarapandian Vaidyanathan 98

A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS Indranil Hatai Indrajit Chakrabarti 108

A Mathematical Modeling of Exceptions in Healthcare Workflow Sumagna Patnaik 120

Functional Based Testing in Web Services Integrated Software Applications Selvakumar Ramachandran Lavanya Santapoor Haritha Rayudu 130

Design and Implementation of a Novel Distributed Memory File System Urvashi Karnani Rajesh Kalmady Phool Chand Anup Bhattacharjee B. S. Jagadeesh 139

Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment Malarvizhi Nandagopal V. Rhymend Uthariaraj 149

Adoption of Cloud Computing in e-Governance Rama Krushna Das Sachidananda Patnaik Ajita Kumar Misro 161

Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching Khushboo Hemnani Dushyant Chawda Bhupendra Verma 173

A Semantic Approach to Design an Intelligent Self Organized Search Engine for Extracting Information Relating to Educational Resources B. Saleena S. K. Srivatsa M. Chenthil Kumar 183

Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System Katheeja Parveen Sheik Abdul Khader Munir Ahamed Rabbani 190

Integration Testing of Multiple Embedded Processing Components Hara Gopal Mani Pakala K. V. S. V. N. Raju Ibrahim Khan 200

Security and Information Assurance

A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks S.A. Arunmozhi Y. Venkataramani 210

A Model for Delegation Based on Authentication and Authorization Coimbatore Chandersekaran William R. Simpson 217

Identification of Encryption Algorithm Using Decision Tree R. Manjula R. Anitha 237

A Novel Mechanism for Detection of Distributed Denial of Service Attacks Jaydip Sen 247

Authenticating and Securing Mobile Applications Using Microlog Siddharth Gupta Sunil Kumar Singh 258

Assisting Programmers Resolving Vulnerabilities in Java Web Applications Pranjal Bathia Bharath Reddy Beerelli Marc-André Laverdiére 268

Estimating Strength of a DDoS Attack Using Multiple Regression Analysis B. B. Gupta P. K. Agrawal R. C. Joshi Manoj Misra 280

A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application G. A. Sathishkumar K. Bhoopathybagan N. Sriraam SP. Venkatachalam R. Vignesh 290

Chest X-Ray Analysis for Computer-Aided Diagnostic Kim Le 300

Overcoming Social Issues in Requirements Engineering Selvakumar Ramachandran Sandhyarani Dodda Lavanya Santapoor 310

Ad Hoc and Ubiquitous Computing

Range-Free Localization for Air-Dropped WSNs by Filtering Neighborhood Estimation Improvements Eva M. García Aurelio Bermúdez Rafael Casado 325

Evolution of Various Controlled Replication Routing Schemes for Opportunistic Networks Hemal Shah Yogeshwar P. Kosta 338

Collaborative Context Management and Selection in Context Aware Computing B. Vanathi V. Rhymend Uthariaraj 348

Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis Keshavamurthy B. N. Durga Toshniwal 358

Wireless Ad Hoc Networks and Sensor Networks

Application of Euclidean Distance Power Graphs in Localization of Sensor Networks G. N. Purohit Seema Verma Usha Sharma 367

A New Protocol to Secure AODV in Mobile AdHoc Networks Avinash Krishnan Aishwarya Manjunath Geetha J. Reddy 378

Spelling Corrector for Indian Languages K. V. N. Sunitha A. Sharada 390

Voltage Collapse Based Critical Bus Ranking Shobha Shankar T. Ananthapadmanabha 400

Multiplexer Based Circuit Synthesis with Area-Power Trade-Off Sambhu Nath Pradhan Santanu Chattopadhyay 410

Exergaming - New Age Gaming for Health, Rehabilitation and Education Ankit Kamal 421

Inclusion/Exclusion Protocol for RFID Tags Selwyn Piramuthu 431

Min Max Threshold Range (MMTR) Approach in Palmprint Recognition Jyoti Malik G. Sainarayanan Ratna Dahiya 438

Power and Buffer Overflow Optimization in Wireless Sensor Nodes Gauri Joshi Sudhanshu Dwivedi Anshul Goel Jaideep Mulherkar Prabhat Ranjan 450

Web Log Data Analysis and Mining L. K. Joshila Grace V. Maheswari Dhinaharan Nagamalai 459

Steganography Using Version Control System Vaishali S. Tidake Sopan A. Talekar 470

Author Index 481

From the B&N Reads Blog

Customer Reviews