000772549 000__ 03640cam\a2200469Ii\4500 000772549 001__ 772549 000772549 005__ 20230306142544.0 000772549 006__ m\\\\\o\\d\\\\\\\\ 000772549 007__ cr\cn\nnnunnun 000772549 008__ 170123s2016\\\\si\a\\\\o\\\\\001\0\eng\d 000772549 019__ $$a970037802 000772549 020__ $$a9789811026300$$q(electronic book) 000772549 020__ $$a9811026300$$q(electronic book) 000772549 020__ $$z9789811026294 000772549 020__ $$z9811026297 000772549 035__ $$aSP(OCoLC)ocn969738499 000772549 035__ $$aSP(OCoLC)969738499$$z(OCoLC)970037802 000772549 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dYDX$$dIDEBK$$dOCLCF$$dUAB$$dNJR 000772549 049__ $$aISEA 000772549 050_4 $$aQA76 000772549 08204 $$a004$$223 000772549 24500 $$aAdvances in computing applications /$$cAmlan Chakrabarti, Neha Sharma, Valentina Emilia Balas, editors. 000772549 264_1 $$aSingapore :$$bSpringer,$$c2016. 000772549 300__ $$a1 online resource (xiv, 285 pages) :$$billustrations. 000772549 336__ $$atext$$btxt$$2rdacontent 000772549 337__ $$acomputer$$bc$$2rdamedia 000772549 338__ $$aonline resource$$bcr$$2rdacarrier 000772549 500__ $$aIncludes author index. 000772549 5050_ $$a1. Wait Event Tuning in Database Engine -- 2. Machine Learning using k-Nearest Neighbor for Library Resources Classification in Agent based Library Recommender System -- 3. An Efficient Dynamic Scheduling of Tasks for Multi-Core Real Time Systems -- 4. Model based approach for Shadow Detection of Static Images -- 5. Light Fidelity (Li-Fi): In Mobile Communication and Ubiquitous Computing Applications -- 6. Performance Analysis of De Noising Filters MR Images -- 7. A Detailed View on SecureString 3.0 -- 8. Performance Comparison for EMD based Classification of Unstructured Acoustic Environments using GMM and K-NN Classifiers -- 9. Performance of Multimodal Biometric System Based on Level and Method of Fusion -- 10. A DSK based Authentication Technique for Secure Smart Grid Wireless Communication -- 11. A Smart Security Framework for High Risk Locations Using Wireless Authentication by Smart Phone -- 12. High Performance Computation Analysis for Medical Images using High Computational Methods -- 13. Terrorist Scanner Radar and Multiple Object Detection System -- 14. Inexact Implementation of Wavelet Transform and its Performance Evaluation through Bit Width Reduction -- 15. A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency Based Systems -- 16. Performance of Statistical and Neural Network Method for Prediction of Survival of Oral Cancer Patients. 000772549 506__ $$aAccess limited to authorized users. 000772549 520__ $$aThis edited volume presents latest high-quality technical contributions and research results in the areas of computing, informatics, and information management. The book deals with state-of-the-art topics, discussing challenges and possible solutions, and explores future research directions. The main goal of this volume is not only to summarize new research findings but also place these in the context of past work. This volume is designed for a professional audience, composed of researchers, practitioners, scientists and engineers in both academia and the industry. 000772549 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 27, 2017). 000772549 650_0 $$aComputer science. 000772549 650_0 $$aInformation technology. 000772549 7001_ $$aChakrabarti, Amlan,$$eeditor. 000772549 7001_ $$aSharma, Neha,$$eeditor. 000772549 7001_ $$aBalas, Valentina Emilia,$$eeditor. 000772549 77608 $$iPrint version:$$z9811026297$$z9789811026294$$w(OCoLC)956749568 000772549 852__ $$bebk 000772549 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-2630-0$$zOnline Access$$91397441.1 000772549 909CO $$ooai:library.usi.edu:772549$$pGLOBAL_SET 000772549 980__ $$aEBOOK 000772549 980__ $$aBIB 000772549 982__ $$aEbook 000772549 983__ $$aOnline 000772549 994__ $$a92$$bISE