000 06485nam a22005775i 4500
001 978-81-322-3592-7
003 DE-He213
005 20220801220249.0
007 cr nn 008mamaa
008 161013s2017 ii | s |||| 0|eng d
020 _a9788132235927
_9978-81-322-3592-7
024 7 _a10.1007/978-81-322-3592-7
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aProceedings of the International Conference on Signal, Networks, Computing, and Systems
_h[electronic resource] :
_bICSNCS 2016, Volume 1 /
_cedited by Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo.
250 _a1st ed. 2017.
264 1 _aNew Delhi :
_bSpringer India :
_bImprint: Springer,
_c2017.
300 _aXVI, 352 p. 159 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v395
505 0 _aPart 1. Signal Processing Systems and Applications: Chapter 1. DFT-DCT Combination Based Novel Feature Extraction Method for Enhanced Iris Recognition -- Chapter 2. Novel Digital Image Watermarking in SWT+SVD Domain -- Chapter 3. An Improved Histogram Bin Shifting Based Reversible Data Hiding of Color Images -- Chapter 4. Face Recognition Using Background Removal Based on Eccentricity and Area Using YCbCr and HSV Color Models -- Chapter 5. An Efficient Multi-focus Image Fusion Approach Based on DWT -- Chapter 6. A Novel Fuzzy Filter for Mixed Impulse Gaussian Noise from Color Images -- Chapter 7. Face Recognition Using Snakes Algorithm and Skin Detection Based Face Localization -- Chapter 8. Quantifiable Image Nearness Approach Using Descriptive Neighbourhood -- Chapter 9. Robust Speaker Verification Using GFCC Based i-vectors -- Chapter 10. Enhanced Automatic Speech Recognition with Non-acoustic Parameters.-Chapter 11. Dynamic Gesture Recognition – A Machine Vision Based Approach -- Chapter 12.Medical Image Security with Cheater Identification Using Secret Sharing Scheme -- Chapter 13. The Role of Fractal Dimension, Lacunarity and Multifractal Dimension for Texture Analysis in SAR Image- A Comparison Based Analysis -- Chapter 14. Efficient Storage and Processing of Video Data for Moving Object Detection Using Hadoop/MapReduce -- Chapter 15. Performance Evaluation of Digital Color Image Watermarking Using Column Walsh Wavelet Transform -- Chapter 16.Structural (Shape) Feature Extraction for Ear Biometric System -- Part 2. Networking Theory and Distributed Systems: Chapter 17. DHAC Based Routing in Wireless Sensor Network with Asymmetric Links -- Chapter 18. Automatization of AAOCC to find Trust Score of Websites -- Chapter 19. A Multi-level Weight Based Routing Algorithm for Prolonging Network Lifetime in Cluster Based Sensor Networks -- Chapter 20. An Approach to Optimize Unnecessary Energy Consumption During Dynamic Routing in Wireless Sensor Networks -- Chapter 21. Game Theoretic Modeling of Gray Hole Attacks in Wireless Ad Hoc Networks -- Chapter 22. Chi-Square Based Mobile Radio Propagation Model Analysis and Validation -- Chapter 23. Collision Theory Based Sentiment Detection of Twitter Using Discourse Relations -- Chapter 24. Malicious Account Detection Based on Short URLs in Twitter -- Chapter 25. Distance, Energy and Link Quality Based Routing Protocol for Internet of Things -- Chapter 26. Effect and Suppression of Noise in 2D PC/OOC Scheme for Optical CDMA Systems -- Chapter 27. On-the-Fly Segment Density (OFSD) in Adaptive Beaconing System (ABS) Based Connectivity-Aware Geocast Routing (CAGR) in VANETs -- Chapter 28.Investigation and Analysis of Energy Efficiency in Distributed Antenna System: Technology towards Green Communications -- Chapter 29. A Novel Trust Based Access Control Model for Cloud Environment -- Chapter 30. Live News Streams Extraction for Visualization of Stock Market Trends -- Chapter 31. Categorization of Cloud Workload Types with Clustering -- Chapter 32.Development of a General Search Based Path Follower in Real Time Environment -- Chapter 33. SDN Architecture on Fog Devices for Realtime Traffic Management: A Case Study -- Chapter 34.Maximizing Network Lifetime of Wireless Sensor Networks: An Energy Harvesting Approach.-Chapter 35. Hybrid Network Intrusion Detection Systems: A Decade’s Perspective. .
520 _aThe book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
650 0 _aTelecommunication.
_910437
650 0 _aSignal processing.
_94052
650 0 _aComputer networks .
_931572
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aComputer Communication Networks.
_949269
700 1 _aLobiyal, Daya K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949270
700 1 _aMohapatra, Durga Prasad.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949271
700 1 _aNagar, Atulya.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949272
700 1 _aSahoo, Manmath N.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_949273
710 2 _aSpringerLink (Online service)
_949274
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9788132235903
776 0 8 _iPrinted edition:
_z9788132235910
776 0 8 _iPrinted edition:
_z9788132238607
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v395
_949275
856 4 0 _uhttps://doi.org/10.1007/978-81-322-3592-7
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78383
_d78383