000781220 000__ 10989cam\a2200577Ii\4500 000781220 001__ 781220 000781220 005__ 20230306143225.0 000781220 006__ m\\\\\o\\d\\\\\\\\ 000781220 007__ cr\nn\nnnunnun 000781220 008__ 160829t20172017si\a\\\\ob\\\\101\0\eng\d 000781220 019__ $$a957464791$$a957613740$$a959592454$$a960710744$$a960716115$$a962436403$$a974651305 000781220 020__ $$a9789811016783$$q(electronic book) 000781220 020__ $$a981101678X$$q(electronic book) 000781220 020__ $$z9789811016776$$q(paperback) 000781220 020__ $$z9811016771$$q(paperback) 000781220 020__ $$z9811016755 000781220 0247_ $$a10.1007/978-981-10-1678-3$$2doi 000781220 035__ $$aSP(OCoLC)ocn957656122 000781220 035__ $$aSP(OCoLC)957656122$$z(OCoLC)957464791$$z(OCoLC)957613740$$z(OCoLC)959592454$$z(OCoLC)960710744$$z(OCoLC)960716115$$z(OCoLC)962436403$$z(OCoLC)974651305 000781220 040__ $$aIDEBK$$beng$$epn$$erda$$cIDEBK$$dN$T$$dEBLCP$$dGW5XE$$dN$T$$dOCLCO$$dYDX$$dOCLCF$$dOCLCO$$dUAB$$dWAU$$dCOO$$dUPM$$dIOG 000781220 049__ $$aISEA 000781220 050_4 $$aT58.5 000781220 08204 $$a004.6$$223 000781220 08204 $$a620 000781220 1112_ $$aInternational Conference on Data Engineering and Communication Technology$$n(1st :$$d2016 :$$cLavasa City, Pune, India) 000781220 24510 $$aProceedings of the International Conference on Data Engineering and Communication Technology :$$bICDECT 2016.$$nVolume 2 /$$cSuresh Chandra Satapathy, Vikrant Bhateja, Amit Joshi, editors. 000781220 2463_ $$aICDECT 2016 000781220 264_1 $$aSingapore :$$bSpringer,$$c[2017] 000781220 264_4 $$c©2017 000781220 300__ $$a1 online resource (841 pages) :$$billustrations. 000781220 336__ $$atext$$btxt$$2rdacontent 000781220 337__ $$acomputer$$bc$$2rdamedia 000781220 338__ $$aonline resource$$bcr$$2rdacarrier 000781220 347__ $$atext file$$bPDF$$2rda 000781220 4901_ $$aAdvances in intelligent systems and computing ;$$vvolume 469 000781220 504__ $$aIncludes bibliographical references and author index. 000781220 5050_ $$aChapter 1. Experimental Analysis on Big Data in IOT based Architecture -- Chapter 2. Morphology Based Approach for Number Plate Extraction -- Chapter 3. NeSeDroid -- Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing -- Chapter 4. RiCoBiT -- Ring Connected Binary Tree: A Structured and Scalable Architecture for Network on Chip Based Systems: An Exclusive Summary -- Chapter 5. Application of Compressed Sensing (CS) for ECG Signal Compression: A Review -- Chapter 6. Tracking Pointer Based Approach for Iceberg Query Evaluation -- Chapter 7. Performance Evaluation of Shortest Path Routing Algorithms in Real-road Networks -- Chapter 8. An Outlook in Some Aspects of Hybrid Decision Tree Classification Approach: A Survey -- Chapter 9. Content Search Quaternary Look-up Table Architecture -- Chapter 10. Exhaust Gas Emission Analysis of Automotive Vehicles Using FPGA -- Chapter 11. A Graph Based Active Learning Approach Using Forest Classifier for Image Retrieval -- Chapter 12. Comparative Analysis of Android Malware Detection Techniques -- Chapter 13. Developing Secure Cloud Storage System by Using Access Control Models -- Chapter 14. ETLR ? Effective DWH Design Paradigm -- Chapter 15. Prediction of Reactor Performance in CATSOL Based Sulphur Recovery Unit by ANN -- Chapter 16. A Multilevel Clustering Using Multi-hop and Multi-head in VANET -- Chapter 17. Patient-speci Cardiac Computational Modeling Based on Left Ventricle Segmentation from Magnetic Resonance Images -- Chapter 18. A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition -- Chapter 19. Methods for Individual and Group Decision Making Using Interval Valued Fuzzy Preference Relations -- Chapter 20. A New Approach to Determine Tie Line Frequency Bias (B) in Interconnected Power System with Integral Control AGC Scheme -- Chapter 21. Significance of Frequency Band Selection of MFCC for Text-independent Speaker Identification -- Chapter 22. Ensuring Performance of Graphics Processing Units: A Programmer's Perspective -- Chapter 23. Analytical Study of Miniaturization of Microstrip Antenna for Bluetooth/WiMax -- Chapter 24. Novel All Optical Encoding and Decoding Scheme for Code Preservation -- Chapter 25. XPM BASED Bandwidth Efficient WDM-to-OTDM Conversion Using HNLF -- Chapter 26. Analysis of a Sporting Event on a Social Network: True Popularity & Popularity Bond -- Chapter 27. Performance Analysis of LPC and MFCC Features in Voice Conversion using Artificial Neural Networks -- Chapter 28. Person Detection & Tracking Using Sparse Matrix Measurement for Visual Surveillance -- Chapter 29. Improvisation in Frequent Pattern Mining Technique -- Chapter 30. Design and Simulation of Hybrid SETMOS Operator Using Multiple Value Logic at 120nm Technology -- Chapter 31. Detailed Survey on Attacks in Wireless Sensor Network -- Chapter 32. Comparative Analysis of Frontal Face Recognition Using Radial Curves and Back Propagation Neural Network -- Chapter 33. Data Perturbation: An Approach to Protect Confidential Data in Cloud Environment -- Chapter 34. Biologically Inspired Techniques for Cognitive Decision-Making -- Chapter 35. Analysis of Edge Detection Techniques for Side Scan Sonar Image Using Block Processing and Fuzzy Logic Methods -- Chapter 36. Leveraging Virtualization for Optimal Resource Management in a Cloud Environment -- Chapter 37. Reconfigurable Circular Microstrip Patch Antenna With Polarization Diversity -- Chapter 38. Issues with DCR and NLSR in Named Based Routing Protocol -- Chapter 39. Design and Analysis of Quantum Dot Cellular Automata Technology based Reversible Multifunction Block -- Chapter 40. Text Independent Automatic Accent Identification System for Kannada Language -- Chapter 41. Study The Effect of Adaptive Boosting on Performance of Classifiers for Human Activity Recognition -- Chapter 42. Towards Improved performance of emotion detection: Multimodal approach -- Chapter 43. Priority Dissection Supervision for Intrusion Detection in Wireless Sensor Networks -- Chapter 44. Multi-Objective Evolution based Scheduling of Computational Intensive Applications in Grid Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless Multimedia Sensor Networks -- Chapter 46. Mining Frequent Quality Factors of Software System using Apriori Algorithm -- Chapter 47. Algorithm for the Enumeration and Identification of Kinematic Chains -- Chapter 48. A New Congestion Avoidance and Mitigation Mechanism based on Traffic Assignment Factor and Transit Routing in MANET -- Chapter 49. MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks -- Chapter 50. Self-coordinating bus route system to avoid bus bunching -- Chapter 51. Review on Data Hiding In Motion Vectors and in Intra prediction modes for video compression -- Chapter 52. Generation of Product Cipher for Secure Encryption and Decryption based on Vedic Encryption Ideology and using Variable and Multiple Keys -- Chapter 53. A Novel Integer Representation Based Approach for Classification of Text Documents -- Chapter 54. Communication Device for Differently-abled people: A Prototype Model -- Chapter 55. Combination of PCA and Contourlets for Multispectral Image Fusion -- Chapter 56. A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and their Hybridizations -- Chapter 57. An Adaptive MapReduce Scheduler for Scalable Heterogeneous Systems -- Chapter 58. Enhancement In Connectivity By Distributed Beamforming In WSN -- Chapter 59. Sparse Representation Based Query Classification using LDA Topic Modeling -- Chapter 60. MULTIPLE HOME AUTOMATION ON RASPBERRY PI -- Chapter 61. Sentiment Analysis based on A.I. over Big Data -- Chapter 62. Negotiation and Monitoring of Service Level Agreements in cloud computing Services -- Chapter 63. IMPACT OF PERFORMANCE MANAGEMENT PROCESS ON PRINT ORGANIZATIONAL PERFORMANCE- IN INDIAN CONTEXT -- Chapter 64. Mobility Aware Path Discovery for efficient routing in Wireless Multimedia Sensor Network -- Chapter 65. Emerging Internet of Things in Revolutionizing Healthcare -- Chapter 66. Swarm Intelligent WSN for Smart City -- Chapter 67. Representing natural language Sentences in RDF graphs to derive Knowledge Patterns -- Chapter 68. A Framework to Enhance Security for OTP SMS in E-Banking Environment using Cryptography and Text Steganography -- Chapter 69. Study on the use of Geographic Information System (GIS) for Effective Transport Planning for Transport for London (TfL) -- Chapter 70. AN INTEGRATION OF BIG DATA AND CLOUD COMPUTING -- Chapter 71. A New Approach for Fast Transmission to Remote Cooperative Groups with a New Key Paradigm using Voice Authentication -- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture -- Chapter 73. Software Maintenance: From the Perspective of Effort and Cost Requirement -- Chapter 74. FPGA IMPLEMENTATION OF LOW POWER PIPELINED 32-BIT RISC PROCESSOR USING CLOCK GATING -- Chapter 75. Dynamic Software Aging Detection Based Fault Tolerant Software Rejuvenation Model for Virtualized Environment -- Chapter 76. Analysis of Group Performance by Swarm Agents in SACA Architecture -- Chapter 77. Background Modeling and Foreground Object Detection for Indoor Video Sequence -- Chapter 78. Agri-Guide: An Integrated Approach for Plant Disease Precaution, Detection & Treatment -- Chapter 79. <Determination of Area Change in Water Bodies and Vegetation for Geological Applications by using Temporal Satellite Images of IRS 1C/1D -- Chapter 80. Significance of Independent Component Analysis (ICA) for Epileptic Seizure Detection Using EEG Signals. 000781220 506__ $$aAccess limited to authorized users. 000781220 520__ $$aThis two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10?11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study. 000781220 588__ $$aDescription based on print version record. 000781220 650_0 $$aInformation technology$$vCongresses. 000781220 650_0 $$aComputer networks$$vCongresses. 000781220 7001_ $$aSatapathy, Suresh Chandra,$$d1964-$$eeditor. 000781220 7001_ $$aBhateja, Vikrant,$$eeditor. 000781220 7001_ $$aJoshi, Amit,$$eeditor 000781220 77608 $$iPrint version:$$tProceedings of the International Conference on Data Engineering and Communication Technology : Volume 2.$$dSingapore : Springer, [2017]$$z9789811016776$$w(OCoLC)950953599 000781220 830_0 $$aAdvances in intelligent systems and computing ;$$vv. 469. 000781220 85280 $$bebk$$hSpringerLink 000781220 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-1678-3$$zOnline Access$$91397441.1 000781220 909CO $$ooai:library.usi.edu:781220$$pGLOBAL_SET 000781220 980__ $$aEBOOK 000781220 980__ $$aBIB 000781220 982__ $$aEbook 000781220 983__ $$aOnline 000781220 994__ $$a92$$bISE