Innovations in Computer Science and Engineering Proceedings of the Third ICICSE, 2015 /

The book is a collection of high-quality peer-reviewed research papers presented at the third International Conference on Innovations in Computer Science and Engineering (ICICSE 2015) held at Guru Nanak Institutions, Hyderabad, India during 7 – 8 August 2015. The book discusses a wide variety of ind...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Saini, H. S. (Editor), Sayal, Rishi (Editor), Rawat, Sandeep Singh (Editor)
Format: Electronic eBook
Language:English
Published: Singapore : Springer Singapore : Imprint: Springer, 2016.
Edition:1st ed. 2016.
Series:Advances in intelligent systems and computing ; 413.
Subjects:
Online Access: Full text (Wentworth users only)
Table of Contents:
  • Chapter 1. Secure ATM Door Locking System Using RFID
  • Chapter 2. Analysis of Various Parameters for Link Adaptation in Wireless Transmission
  • Chapter 3. N-Gram Classifier System to Filter Spam Messages from OSN User Wall
  • Chapter 4. A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics
  • Chapter 5. Registration Plate Recognition Using Dynamic Image Processing and Genetic Algorithm
  • Chapter 6. Comparing the Capacity, NCC and Fidelity of Various Quantization Intervals on DWT
  • Chapter 7. Enhancing Cloud Computing Server to Use Cloud Safely and to Produce Infrastructure of High Performance Computing
  • Chapter 8. 3D Array Pattern Distortion Analysis
  • Chapter 9. Elastic Search and Carrot2 Based Log Analytics and Management
  • Chapter 10. High Security Pipelined Elastic Substitution Box with Embedded Permutation Facility
  • Chapter 11. An Integrated Approach to High Dimensional Data Clustering
  • Chapter 12. Performance Analysis of Network Virtualization in Cloud Computing Infrastructures on OpenStack
  • Chapter 13. A Shoulder Surfing Resistant Graphical Password Authentication Scheme
  • Chapter 14. A Proposal for Searching Desktop Data
  • Chapter 15. Low Power Analog Bus for System on Chip Communication
  • Chapter 16. Text Clustering and Text Summarization on the Use of Side Information
  • Chapter 17. Image Correspondence Using Affine SIFT Flow
  • Chapter 18. Link Quality Based Multi-hop Relay Protocol For WiMedia Medium Access Control
  • Chapter 19. Assessment of Reusability Levels on Domain Specific Components Using Heuristic Function
  • Chapter 20. Reliable Propagation of Real Time Traffic Conditions in VANETS to Evade Broadcast Storm
  • Chapter 21. Hybrid Multi-objective Optimization Approach for Neural Network Classification using Local Search
  • Chapter 22. Effectiveness of Email Address Obfuscation on Internet
  • Chapter 23. A Proof-of-Concept Model for Vehicular Cloud Computing Using OMNet++ and SUMo
  • Chapter 24. Password Reuse Behavior: How Massive Online Data Breaches Impacts Personal Data in Web
  • Chapter 25. Identifying Significant Features to Improve Crowd Funded Projects’ Success
  • Chapter 26. A Survey on Challenges in Software Development during the Adoption of Agile Environment
  • Chapter 27. A Novel Approach for Detection of Motion Vector-Based Video Steganography by AoSO Motion Vector Value
  • Chapter 28. Image Resolution Enhancement Technique Using Lifting Wavelet and Discrete Wavelet Transforms
  • Chapter 29. A Real Time Implementation of Face and Eye Tracking on OMAP Processor
  • Chapter 30. A Study on Cyber Security, its Issues and Cyber Crime Rates in India
  • Chapter 31. A Concept Based Model for Query Management in Service Desks
  • Chapter 32. Designing Chaotic Chirikov Map Based Secure Hash Function
  • Chapter 33. Data Fusion Approach for Enhanced Anomaly detection
  • Chapter 34. NUNI (New User and New Item) Problem for SRSs Using Content Aware Multimedia based Approach
  • Chapter 35. Computerized Evaluation of Subjective Answers Using Hybrid Technique
  • Chapter 36. A Proposal: High Throughput Robust Architecture for Log Analysis and Data Stream Mining. .