000 | 09962nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-81-322-1157-0 | ||
003 | DE-He213 | ||
005 | 20200420221258.0 | ||
007 | cr nn 008mamaa | ||
008 | 130913s2014 ii | s |||| 0|eng d | ||
020 |
_a9788132211570 _9978-81-322-1157-0 |
||
024 | 7 |
_a10.1007/978-81-322-1157-0 _2doi |
|
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTHR _2bicssc |
|
072 | 7 |
_aTEC007000 _2bisacsh |
|
082 | 0 | 4 |
_a621.3 _223 |
245 | 1 | 0 |
_aEmerging Research in Electronics, Computer Science and Technology _h[electronic resource] : _bProceedings of International Conference, ICERECT 2012 / _cedited by V Sridhar, Holalu Seenappa Sheshadri, M C Padma. |
264 | 1 |
_aNew Delhi : _bSpringer India : _bImprint: Springer, _c2014. |
|
300 |
_aXXIII, 947 p. 560 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v248 |
|
505 | 0 | _aRetinal Vessel Segmentation Using Local Entropy Thresholding -- Implementation of Minutiae Extraction and False Minutiae Elimination for Fingerprint Image on FPGA -- Resistive Fractal FSS Based Broad Band Radar Absorber for Aircraft Stealth Applications -- FPGA AND ASIC Implementation of 16-bit Vedic Multiplier Using Urdhva Triyakbhyam Sutra -- Multi-Algorithm Decision Level Fusion Using Finger Knuckle Print Biometric -- Encryption of Compressed Video Using Efficient RSA-CRT Algorithm -- Design of High Speed Reconfigurable Coprocessor for Next Generation Communication Platform -- Secret Code Authentication Using Enhanced Visual Cryptography -- A Data Acquisition (DAQ) Architecture for FPGA Implementation -- Finite Dimensional Realization of Lavrentiev Regularization for Nonlinear Ill-posed Equations -- Video Signals Demodulator for Satellite Communication -- Importance of On-Demand Modified Power Aware DSR in MANETs -- Studies on Quasi-Z-Source-Based Isolated DC/DC Converter for Distributed Power Generation -- Security in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique for Intelligent DoS Attack Targeting Firewalls -- A Practical Current Measurement Using Rogowski Coil and Haar Wavelet -- Improved Accuracy of High Order Legendre Polynomial Roots in MATLAB -- Stability Analysis of Speech Synthesis Filter of CELP Based AMR-WB Codec -- Performance Analysis of AODV and AOMDV Routing Protocols on Scalability for MANETs -- Feature Level Image Fusion Using DWT, SWT & DT-CWT -- Aircraft Recognition System Using Image Analysis -- Design of Physical Layer Transmitter and Receiver for Proximity-1 Space Link Protocol Using VHDL -- Semantic Analysis of Precise Detection Rate in Multi-Object Mobility on Natural Scene Using Kalman Filter -- EEG Seizure Analysis Using Fractal Dimensions during Electroconvulsive Therapy -- Medical Image Denoising Using Wavelet Based Ridgelet Transform -- Real-Time Retrieval System for Heritage Images -- PDMWSN - A Probable Approach to Detect Malicious Node in Wireless Sensor Network -- Study of Partial Discharge in Pressboards -- 3DS3: A Framework for 3D Static Scene Streaming -- An Efficient Approach to Detect Clone Attacks in Wireless Sensor Networks Using Random Walk Protocol -- Size and Shape Based Ovarian Abnormality Detection of Ultrasound Images -- Rate Quality Factor Optimization for VP8 Video Codec for Mobile Communication Applications -- Congestion Control by Heuristics in High Speed Networks Using ANN -- Low Power Sum of Absolute Difference Architecture for Video Coding -- An Integrated Method for Classification of Indus and English Document Images -- Uterine Fibroid Segmentation and Measurement Based on Morphological Functions in Graphical Vision Assistant Tool -- Efficient Algorithm for Image Compression Using DWT Techniques -- Identification of Common Indian Leafy Vegetables Based on Statistical Measures on Combined Color and Texture Features -- Fast Pattern Matching Approach for Intrusion Detection Systems -- A Comparative Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks -- Implementation of an Ethernet Bridge Using Avalon Memory Mapped Interface -- Performance Analysis of EBG Antenna for Base Station Applications -- Web Images Evaluations Based on Visual Content -- Robust Speech Recognition Using Wavelet Domain Front End and Hidden Markov Models -- Combining Ensemble of Classifiers Using Voting Based Rule to Predict Radiological Ratings for Lung Nodule Malignancy -- A Secured Authentication System Using an Effective Keystroke Dynamics -- High Speed Low Power VLSI Architecture for SPST Equipped Booth Multiplier Using Modified Carry Look Ahead Adder -- Energy Efficient ECC Encryption Using ECDH -- Adaptive Support Weight Based Stereo Correspondence Algorithm for Face Images -- Adaptive Traffic Load-Sharing for GSM Network -- Psychoacoustic Model-1 Implementation for MPEG Audio Encoder Using Wavelet Packet Decomposition -- Recommending Music by Combining Content-Based and Collaborative Filtering with User Preferences -- Performance of Sphere Decoder for MIMO System Using LLL Algorithm -- Reduced Bit Rate Using Image Inpainting -- Biometric Vault Scheme Using Data Hiding and Standard Encryption -- Voltage Stabilization Through Reactive Power Injection at Secondary Terminals of Distribution Level Feeders - Using Thyristor Switched Capacitor -- Exposing Digital Forgery in Video By Mean Frame Comparison Techniques -- Mobile WiMAX Performance Improvement Using MRRC Scheme for Real Time Application -- Feature Extraction Using Shearlet Cone Representation for Face Recognition -- Combined SLM and Companding for PAPR Reduction in OFDM -- Color Image Digital Watermarking -- Damped Sinusoidal Basis Functions Based Transformation for Image Compression -- Energy Model for the Configured MSP430F1612 on a TELOSB Mote with the Help of Contiki -- Design and Implementation of an Advanced Rectifier Stage Topology with Maximum Power Point Tracking for Hybrid Energy Systems -- Novel Boundary Evolving Algorithm Using Iterative Curve fitting Technique to Trim Down the Image Inpainting Complexity Under Extreme Conditions -- ICA and PCA Based Face Recognition Systems-A Survey -- Relationship between View Angle and Distance Between Parallel Edges with Vanishing Point in 2D Images -- Air Borne Character Recognition System with Image Processing Techniques -- An Intelligent Clustered Cooperative Transmission Protocol for Wireless Sensor Networks -- An Embedded Web Server for Industrial Automation -- High Performance Service Scheduling Strategy for Cloud Environment -- Embedding Patient Information in Medical Images Augmented with Compression by Rotation Technique -- Development of Morphological Stemmer, Analyzer and Generator for Kannada Nouns -- Quadtree Based Feature Extraction Technique for Recognizing Handwritten Kannada Characters -- Effect of Contribution Links on Choosing Hard Goals in GORE Using AHP and TOPSIS -- Transformation of Artistic form Text to Linear Form Text for OCR Systems Using Radon Transform -- Boolean Arithmetic Polynomials and Equivalence Checking -- Generation of High Frequency Pulses for Transient Studies -- Toffoli Cascade Synthesis of an Optimized Two-bit Comparator -- Design and Development of BIO-Signal Conditioning and Processing Electronic System by Employing AD-549 and LabVIEW -- Design of an Optimal Yaw Damper for 747 Jet Aircraft Model -- Design, Implementation and Verification of CAN Node Interface to Peripheral Ports in FPGA -- Mining Information from Model Build without Information Disclosure -- Quantitative Analysis of the Openness of the Major Temporal Arcade in Retinal Fundus Images of Retinopathy of Prematurity -- DCT-SVM Based Technique for Off-line Signature Verification -- Headset Prototype Design for Industrial Noise Reduction Using DSP -- Optimal Location of Series FACTS Device Using PSO Technique to Reduce the Losses and to Enhance Power Transfer Capability in a Power System -- Effective Integration of Wind Distributed Generation to Power Grid with STATCOM -- Novel Shannon Based Low Power Full Adder Architecture for Neural Network Applications -- Novel Algorithm for Mobile Location Identification -- Handwritten Kannada Numerals Recognition Using Discrete Cosine Transform Coefficients -- Development of Randomized Hybrid Cryptosystem Using Public and Private Key -- Dynamic Coverage by Homogeneous Mobile Sensor Nodes Using Tri-Hexagonal Scheme. | |
520 | _aPES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles from the field of Electronics, Computer Science and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aControl engineering. | |
650 | 0 | _aElectrical engineering. | |
650 | 0 | _aBiomedical engineering. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aElectrical Engineering. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
650 | 2 | 4 | _aBiomedical Engineering. |
650 | 2 | 4 | _aControl. |
700 | 1 |
_aSridhar, V. _eeditor. |
|
700 | 1 |
_aSheshadri, Holalu Seenappa. _eeditor. |
|
700 | 1 |
_aPadma, M C. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9788132211563 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v248 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-81-322-1157-0 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c53066 _d53066 |