Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3

Paperback(1st ed. 2016)

Eligible for FREE SHIPPING
  • Want it by Thursday, September 27?   Order by 12:00 PM Eastern and choose Expedited Shipping at checkout.


Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3 by Suresh Chandra Satapathy

The third international conference on INformation Systems Design and Intelligent
Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9,
2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering,
graphics and image processing, rural engineering, e-commerce, e-governance,
business computing, molecular computing, nano-computing, chemical computing,
intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only limited to computer researchers but also include mathematics, chemistry, biology, bio-chemistry, engineering,
statistics, and all others in which computer techniques may assist.

Product Details

ISBN-13: 9788132227564
Publisher: Springer India
Publication date: 08/28/2016
Series: Advances in Intelligent Systems and Computing , #435
Edition description: 1st ed. 2016
Pages: 669
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and
Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS),
Vishakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science
Engineering from JNTUH, Hyderabad and Master degree in Computer Science and
Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of
IEEE and Life Member of Computer society of India. Currently, he is the
National Chairman of Division-V (Education and Research) of Computer Society of

Dr. J.K. Mandal has M.Sc. in
Physics from Jadavpur University in 1986, M.Tech. in Computer Science from
University of Calcutta. He was awarded PhD. in Computer Science &
Engineering by Jadavpur University in 2000. Presently, he is working as
Professor of Computer Science & Engineering and former Dean, Faculty of
Engineering, Technology and Management, Kalyani University, Kalyani, Nadia,
West Bengal for two consecutive terms. He started his career as lecturer at
NERIST, Arunachal Pradesh in September, 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression,
error correction, visual cryptography, steganography, security in MANET,
wireless networks and unify computing. He has produced 11 PhD degrees, three submitted (2015) and 8 are ongoing. He has supervised 3 M.Phil and 30 M.Tech thesis. He is life member of Computer Society of India since 1992, CRSI since
2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012,
Executive member of CSI Kolkata Chapter. He has delivered invited lectures and acted as program chair of many international conferences and also edited 9
volumes of proceedings from Springer AISC series, CSI 2012 from McGraw-Hill,
CIMTA 2013 from Procedia Technology, Elsevier. He is reviewer of various
International Journals and Conferences. He has over 355 articles and 5 books published to his credit.

Dr. Siba K. Udgata is a Professor of School of Computer and Information
Sciences, University of Hyderabad,
India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by Ph.D in Computer Science (mobile computing and wireless communication). His main research interests are Wireless Communication, Mobile
Computing, Wireless Sensor Networks and Intelligent Algorithms. He was a United
Nations Fellow and worked in the United
Nations University/
International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He was also in the editorial board of many Springer
LNCS/LNAI and Springer AISC Proceedings.

Prof. Vikrant Bhateja is Associate
Professor, Department of Electronics & Communication Engineering, Shri
Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His area of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition, neural networks,
soft computing and bio-inspired computing techniques. He has more than 90
quality publications in various international journals and conference proceedings.
Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Series and
INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor in International
Journal of Convergence Computing (IJConvC) and also serving in the editorial board of International Journal of Image Mining (IJIM) under Inderscience
Publishers. At present he is guest editors for two special issues floated in
International Journal of Rough Sets and Data Analysis (IJRSDA) and
International Journal of System Dynamics Applications (IJSDA) under IGI Global publications.

Table of Contents

Chapter 1. A New Private Security Policy Approach for DDoS
Attack Defense in NGNs.- Chapter
An Effective
Approach for Providing Diverse and Serendipitous Recommendations.- Chapter 3.
Envelope Fluctuation Reduction for WiMAX MIMO-OFDM
Signals Using Adaptive Network Fuzzy Inference Systems.- Chapter 4.
Modeling and Performance Analysis of Free Space
Quantum Key Distribution.- Chapter
Design of a Low-delay-write Model of a TMCAM.- m]Chapter 6. SLA Based E-Learning Service Provisioning in Cloud.-
Chapter 7. Estimating the Similarities of G7 Countries Using Economic Parameters.- Chapter 8.
Offline Malayalam Character Recognition: A
Comparative Study Using Multiple Classifier Combination Techniques.- Chapter 9.
A Comparative Study on Load Balancing Algorithms for SIP servers.- Chapter 10. Design of
Wireless Sensor Network Based Embedded Systems for Aquaculture Environment
Monitoring.- Chapter 11. Touch-to-learn:
A Tangible Learning System for Hard-of Hearing Children.- Chapter 12.
Creating Low Cost Multi-gesture Device Control by Using
Depth Sensing.- Chapter 13. Evaluation of Glomerular Filtration Rate by Single Frame Method applying GATES Formula.- Chapter 14.
Design and Development of Cost Effective Wearable
Glove for Automotive Industry.- Chapter
Localization in Digital Image Using First Two Digit Probability Features.- Chapter 16.
Classification of Bank Direct Marketing Data Using
Subsets of Training Data.- Chapter
Writer Identification and Verification – A State-of-the-Art.- Chapter 18.
Handwritten Oriya Digit Recognition Using Maximum
Common Sub-graph Based Similarity Measures.- Chapter 19. Design of Non-volatile SRAM Cell Using Memristor.- Chapter 20.
Evolutionary Algorithm Based LFC of Single Area
Thermal Power System with Different Steam Configurations and Nonlinearity.- Chapter 21.
Game Theory and Its Applications in Machine
Learning.- Chapter 22. A Study on
Speech Processing.- Chapter 23. Forest
Type Classification: A Hybrid NN-GA Model Based Approach.- Chapter 24.
Optimizing Technique to Improve the Speed of Data throughput through Pipeline.- Chapter 25. An
Improved Data Hiding Scheme in Motion Vectors of Video Streams.- Chapter 26.
Hiding Sensitive Items Using Pearson’s Correlation
Coefficient Weighing Mechanism.- Chapter
OpenCV Based
Implementation of Zhang-Suen Thinning Algorithm Using Java for Arabic Text
Recognition.- Chapter 28. Numerical
Modeling of Twin Band MIMO Antenna.- Chapter 29. Performance Evaluation of Video-based Face Recognition
Approaches for Online Video Contextual Advertisement User-oriented System.- Chapter 30.
A Survey on Power Gating Techniques in Low Power
VLSI Design.- Chapter 31. Phase
Based Mel Frequency Cepstral Coefficients for Speaker Identification.- Chapter 32.
A New Block Least Mean Square Algorithm for
Improved Active Noise Cancellation.- Chapter 33. An Improved Feedback Filtered-X NLMS Algorithm for
Noise Cancellation.- Chapter 34. Application of Internet of Things (IoT) for Smart Process Manufacturing in Indian Packaging
Industry.- Chapter 35. Function
Optimization Using Robust Simulated Annealing.- Chapter 36. Analysis and Optimization of Feature Extraction
Techniques for Content Based Image Retrieval.- Chapter 37. Parametric Curve Based Human Gait Recognition.- Chapter 38.
An Energy Efficient Proposed Framework for Time
Synchronization Problem of Wireless Sensor Network.- Chapter 39.
Epigenetic and Hybrid Intelligence in Mining Patterns.-
Chapter 40. A
Technical Review on LVRT of DFIG Systems.- Chapter 41. An AIS Based Approach for Extraction of PV Module Parameters.-
Chapter 42. Word Sense
Disambiguation in Bengali: An Auto-updated Learning Set Increases the Accuracy of the Result.- Chapter 43. Efficient
Methods to Generate Inverted Indexes for IR.- Chapter 44. Intelligent Mail Box.- Chapter 45. Learning
Based No Reference Algorithm for Dropped Frame Identification in Uncompressed
Video.- Chapter 46. Multi-view
Video Summarization.- Chapter 47. Comprehensive
Review of Video Enhancement Algorithms for Low Lighting Conditions.- Chapter 48.
A Detailed Review of Color Image Contrast
Enhancement Techniques for Real Time Applications.- Chapter 49. A Conceptual Model for Acquisition of Morphological
Features of Highly Agglutinative Tamil Language Using Unsupervised Approach.- Chapter 50.
A Fuzzy Approach for the Maintainability Assessment of Aspect Oriented Systems.- Chapter
Split and
Merge Multi-scale Retinex Enhancement of Magnetic Resonance Medical Images.- Chapter 52.
Review on Secured Medical Image Processing.- Chapter 53.
Identification of Stages of Malignant Tumor in MRM
Images using Level Set algorithm and Textural Analysis.- Chapter 54.
Reviews Based Mobile Application Development Model
(RBMAD).- Chapter 55. Three Phase
Security System for Vehicles Using Face Recognition on Distributed Systems.- Chapter 56.
SLA Based Utility Analysis for Improving QoS in
Cloud Computing.- Chapter 57. A
Descriptive Study on Resource Provisioning Approaches in Cloud Computing
Environment.- Chapter 58. Analyzing the Performance of a Software and IT Growth with Special Reference to India.- Chapter 59.
Stock Price Forecasting Using ANN Method.- Chapter 60.
Recognition of Handwritten English Text Using
Energy Minimisation.- Chapter 61. A Novel
Codification Technique for Tacit Knowledge in Software Industry Using Data Mining techniques.- Chapter 62. An
Analysis on the Effect of Malicious Nodes on the Performance of LAR Protocol in
MANETs.- Chapter 63. Qualitative
Performance Analysis of Punjabi and Hindi Websites of Academic Domain: A Case
Study.- Chapter 64. A Robust, Privacy
Preserving Secret Data Concealing Embedding Technique into Encrypted Video Stream.-
Chapter 65. Trusted
Execution Environment for Data Protection in Cloud.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews