Proceedings of the International Conference on Soft Computing Systems
Home > Computing and Information Technology > Computer science > Artificial intelligence > Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

|
     0     
5
4
3
2
1




International Edition


About the Book

The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.

Table of Contents:
Chapter 1. A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors.- Chapter 2. Study of Chunking Algorithm in Data De-Duplication.- Chapter 3. Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography.- Chapter 4. Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents.- Chapter 5. Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity.- Chapter 6. Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight.- Chapter 7. Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application.- Chapter 8. Non-functional QoS Criterion Based Web Service Ranking.- Chapter 9. Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data.- Chapter 10. A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities.- Chapter 11. Facial Expression Recognition Using PCA and Texture Based LDN Descriptor.- Chapter 12. Role Based Access Control for Encrypted Data Using Vector Decomposition.- Chapter 13. Mobile Controlled Door Locking System with Two-factor Authentication.- Chapter 14. Integration of UMTS With WLAN Using Intermediate IMS Network.- Chapte r 15. Building a Knowledge Vault with Effective Data Processing and Storage.- Chapter 16. Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional.- Chapter 17. A Study on Security Issues in Cloud Computing.- Chapter 18. An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection.- Chapter 19. Search Optimisation in Cloud.- Chapter 20. Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach.- Chapter 21. Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation.- Chapter 22. Advanced Power Demand Controller and Billing System Using GSM.- Chapter 23. A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor.- Chapter 24. FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm.- Chapter 25. Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene.- Chapter 26. Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT.- Chapter 27. Scalable Casual Data Consistency for Wide Area Storage with Cloud.- Chapter 28. An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications.- Chapter 29. Big Data and Analytics – A Journey Through Basic Concepts to Research Issues.- Chapter 30. Efficient Identification of Bots by K-Means Clustering.- Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology.- Chapter 33. Optimal Selection of Security Countermeasures for Effective Information Security.- Chapter 34. Stabilization of Load in Content Delivery Networks.- Chapter 35. Eigen Based Indexing and Retrieval of Similar Videos.- Chapter 36. FoetusCare: An Android App for Pregnancy Care.- Chapter 37. Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD).- Chapter 38. MIMO Based Efficient Data Transmission Using USRP.- Chapter 39. Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm.- Chapter 40. A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks.- Chapter 41. Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture.- Chapter 42. Bio-Sensor Authentication for Medical Applications Using WBAN.- Chapter 43. PSO Based Multipath Routing in Wireless Sensor Network.- Chapter 44. Information Hiding in H.264, H.265 and MJPEG.- Chapter 45. Intelligent Data Prediction System Using Data Mining and Neural Networks.- Chapter 46. Resource Allocation for Wireless Network Environment.- Chapter 47. Design of PSO Based PI controller for Tension Control in Web Transport Systems.- Chapter 48. Distributed Service Level Agreement Driven Dynamic Cloud Resource Management.- Chapter 49. Efficient Route Discovery in VANET Using Binary Bat Approach.- Chapter 50. Mining Ambiguities Using Pixel-based Content Extraction.- Chapter 51. Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm.- Chapter 52. Enhancing the Interactivity in Distributed Interactive Applications.- Chapter 53. Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab.- Chapter 54. Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner.- Chapter 55. Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models.- Chapter 56. Active Warden Attack on Steganography Using Prewitt Filter.- Chapter 57. Similarity Scores Evaluation in Social Networking Sites.- Chapter 58. Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing.- Chapter 59. Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features.- Chapter 60. Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining.- Chapter 61. NEBULA: Deployment of Cloud Using Open source.- Chapter 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory.- Chapter 63. A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System.- Chapter 64. Towards Modelling a Trusted and Secured Centralised Reputation System for VANET’s.- Chapter 65. A Surveyon Trusted Platform Module For Data Remanence in Cloud.- Chapter 66. Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval.- Chapter 67. A Hybrid Cloud Architecture for Secure Service –Measures Against Poodle Vulnerability.- Chapter 68. An Efficient Authentication System for Data Forwarding Under Cloud Environment.- Chapter 69. Survey on Data Mining Techniques with Data Structures.


Best Sellers


Product Details
  • ISBN-13: 9788132226727
  • Publisher: Springer, India, Private Ltd
  • Publisher Imprint: Springer, India, Private Ltd
  • Height: 235 mm
  • No of Pages: 743
  • Returnable: Y
  • Width: 155 mm
  • ISBN-10: 8132226720
  • Publisher Date: 08 Dec 2015
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: ICSCS 2015, Volume 2


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
Springer, India, Private Ltd -
Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!