000 | 03702nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-981-10-2630-0 | ||
003 | DE-He213 | ||
005 | 20200420220220.0 | ||
007 | cr nn 008mamaa | ||
008 | 170119s2016 si | s |||| 0|eng d | ||
020 |
_a9789811026300 _9978-981-10-2630-0 |
||
024 | 7 |
_a10.1007/978-981-10-2630-0 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUT _2bicssc |
|
072 | 7 |
_aCOM069000 _2bisacsh |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.7 _223 |
245 | 1 | 0 |
_aAdvances in Computing Applications _h[electronic resource] / _cedited by Amlan Chakrabarti, Neha Sharma, Valentina Emilia Balas. |
264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2016. |
|
300 |
_aXIV, 285 p. 124 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _a1. Wait Event Tuning in Database Engine -- 2. Machine Learning using k-Nearest Neighbor for Library Resources Classification in Agent based Library Recommender System -- 3. An Efficient Dynamic Scheduling of Tasks for Multi-Core Real Time Systems -- 4. Model based approach for Shadow Detection of Static Images -- 5. Light Fidelity (Li-Fi): In Mobile Communication and Ubiquitous Computing Applications -- 6. Performance Analysis of De Noising Filters MR Images -- 7. A Detailed View on SecureString 3.0 -- 8. Performance Comparison for EMD based Classification of Unstructured Acoustic Environments using GMM and K-NN Classifiers -- 9. Performance of Multimodal Biometric System Based on Level and Method of Fusion -- 10. A DSK based Authentication Technique for Secure Smart Grid Wireless Communication -- 11. A Smart Security Framework for High Risk Locations Using Wireless Authentication by Smart Phone -- 12. High Performance Computation Analysis for Medical Images using High Computational Methods -- 13. Terrorist Scanner Radar and Multiple Object Detection System -- 14. Inexact Implementation of Wavelet Transform and its Performance Evaluation through Bit Width Reduction -- 15. A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency Based Systems -- 16. Performance of Statistical and Neural Network Method for Prediction of Survival of Oral Cancer Patients. | |
520 | _aThis edited volume presents latest high-quality technical contributions and research results in the areas of computing, informatics, and information management. The book deals with state-of-the-art topics, discussing challenges and possible solutions, and explores future research directions. The main goal of this volume is not only to summarize new research findings but also place these in the context of past work. This volume is designed for a professional audience, composed of researchers, practitioners, scientists and engineers in both academia and the industry. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputers. | |
650 | 0 | _aComputer graphics. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
700 | 1 |
_aChakrabarti, Amlan. _eeditor. |
|
700 | 1 |
_aSharma, Neha. _eeditor. |
|
700 | 1 |
_aBalas, Valentina Emilia. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789811026294 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-981-10-2630-0 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c51853 _d51853 |