Jump to ratings and reviews
Rate this book

Innovations in Computer Science and Engineering: Proceedings of the Third ICICSE, 2015

Rate this book
Chapter 1. Secure ATM Door Locking System Using RFID.- Chapter 2. Analysis of Various Parameters for Link Adaptation in Wireless Transmission.- Chapter 3. N-Gram Classifier System to Filter Spam Messages from OSN User Wall.- Chapter 4. A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics.- Chapter 5. Registration Plate Recognition Using Dynamic Image Processing and Genetic Algorithm.- Chapter 6. Comparing the Capacity, NCC and Fidelity of Various Quantization Intervals on DWT.- Chapter 7. Enhancing Cloud Computing Server to Use Cloud Safely and to Produce Infrastructure of High Performance Computing.- Chapter 8. 3D Array Pattern Distortion Analysis.- Chapter 9. Elastic Search and Carrot2 Based Log Analytics and Management.- Chapter 10. High Security Pipelined Elastic Substitution Box with Embedded Permutation Facility.- Chapter 11. An Integrated Approach to High Dimensional Data Clustering.- Chapter 12. Performance Analysis of Network Virtualization in Cloud Computing Infrastructures on OpenStack.- Chapter 13. A Shoulder Surfing Resistant Graphical Password Authentication Scheme.- Chapter 14. A Proposal for Searching Desktop Data.- Chapter 15. Low Power Analog Bus for System on Chip Communication.- Chapter 16. Text Clustering and Text Summarization on the Use of Side Information.- Chapter 17. Image Correspondence Using Affine SIFT Flow.- Chapter 18. Link Quality Based Multi-hop Relay Protocol For WiMedia Medium Access Control.- Chapter 19. Assessment of Reusability Levels on Domain Specific Components Using Heuristic Function.- Chapter 20. Reliable Propagation of Real Time Traffic Conditions in VANETS to Evade Broadcast Storm.- Chapter 21. Hybrid Multi-objective Optimization Approach for Neural Network Classification using Local Search.- Chapter 22. Effectiveness of Email Address Obfuscation on Internet.- Chapter 23. A Proof-of-Concept Model for Vehicular Cloud Computing Using OMNet++ and SUMo.- Chapter 24. Password Reuse How Massive Online Data Breaches Impacts Personal Data in Web.- Chapter 25. Identifying Significant Features to Improve Crowd Funded Projects' Success.- Chapter 26. A Survey on Challenges in Software Development during the Adoption of Agile Environment.- Chapter 27. A Novel Approach for Detection of Motion Vector-Based Video Steganography by AoSO Motion Vector Value.- Chapter 28. Image Resolution Enhancement Technique Using Lifting Wavelet and Discrete Wavelet Transforms.- Chapter 29. A Real Time Implementation of Face and Eye Tracking on OMAP Processor.- Chapter 30. A Study on Cyber Security, its Issues and Cyber Crime Rates in India.- Chapter 31. A Concept Based Model for Query Management in Service Desks.- Chapter 32. Designing Chaotic Chirikov Map Based Secure Hash Function.- Chapter 33. Data Fusion Approach for Enhanced Anomaly detection.- Chapter 34. NUNI (New User and New Item) Problem for SRSs Using Content Aware Multimedia based Approach.- Chapter 35. Computerized Evaluation of Subjective Answers Using Hybrid Technique.- Chapter 36. A High Throughput Robust Architecture for Log Analysis and Data Stream Mining.

336 pages, Paperback

Published February 25, 2016

About the author

H.S. Saini

5 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.