Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This volume gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision and Bio-inspired Computing (ICCVBIC) conference which was held in Coimbatore, India, on November 29-30, 2018. The works included here offer a rich and diverse sampling of recent developments in the fields of Computational Vision, Fuzzy, Image Processing and Bio-inspired Computing. The topics covered include computer vision; cryptography and digital privacy; machine learning and artificial neural networks; genetic algorithms and computational intelligence; the Internet of Things; and biometric systems, to name but a few. The applications discussed range from security, healthcare and epidemic control to urban computing, agriculture and robotics.
In this book, researchers, graduate students and professionals will find innovative solutions to real-world problems in industry and society as a whole, together with inspirations for further research.
Chapter 1: Image Encryption based on 3 Dimensional Multi Linear (3D-MLT) Chaotic Transformation.- Chapter 2: A Computer Vision Based Approach for Object Recognition in Smart Buildings.- Chapter 3: A Cascade Color Image Retrieval Framework for Image Retrieval.- Chapter 4: Enhanced Geographical Information System Architecture for Geospatial Data.- Chapter 5: IoT Based Power Management and Condition Monitoring in Microgrid.- Chapter 6: A Comparative performance study of cloud resource scheduling techniques.- Chapter 7: Image Context Based Similarity Retrieval System.- Chapter 8: Emotions Recognition from Spoken Marathi Speech using LPC and PCA Technique.- Chapter 9: Implementation of Point Of Care system Using Bio-Medical Signal Stegano-graphy.- Chapter 10: Privacy assurance with content based access protocol to secure cloud storage.- Chapter 11: Leaf Recognition using Artificial Neural Network.- Chapter 12: Data Security in Cloud Using RSA and GNFS Algorithms - An Integrated Approach.- Chapter 13: Machine Learning Supported Statistical Analysis of IoT Enabled Physical Location Monitoring Data.- Chapter 14: A Genetic Algorithm based System with Different Crossover Operators for Solving the Course Allocation Problem of Universities.- Chapter 15: Detecting Anomalies in Credit Card Transaction Using Efficient Techniques.- Chapter 16: Secure Data Processing System using Decision Tree Architecture.- Chapter 17: A Novel Framework for Detection of Morphed images using Deep Learning Techniques.- Chapter 18: A Novel Non-invasive Framework for Predicting Bilirubin Levels.- Chapter 19: A Comprehensive Study on the Load Assessment Techniques in Cloud Data Center.- Chapter 20: Multimodal biometric system using Ear and Palm Vein recognition based on GwPeSOA - Multi-SVNN for security applications.- Chapter 21: E-Agriculture.- Chapter 22: Ultra Wide Band Monopole Antenna Design by Using Split Ring Resonator.- Chapter 23: Green supply chain management of chemical Industrial development for warehouse and its impact on the environment using artificial bee colony algorithm: A Review Articles.- Chapter 24: A Novel Dyno-Quick Reduct Algorithm For Heart Disease Prediction Using Supervised Learning Algorithm.- Chapter 25: Impact of Meltdown and Spectre Threats in Parallel Processing.- Chapter 26: Algorithm For Finding Minimum Dominating Set Using Sticker Based Model In Dna Computing.- Chapter 27: Assistive Technology Evolving as Intelligent System.- Chapter 28: A Bio Potential Sensor Circuit of AFE DesignWith CT ?-? Modulator.- Chapter 29: Image Encryption based on Transformation and Chaotic Substitution.- Chapter 30: An Efficient Geographical Opportunistic Routing Algorithm Using Diffusion and Sparse Approximation Models for Cognitive Radio Ad Hoc Networks.- Chapter 31: Traffic Violation Tracker and Controller.- Chapter 32: PTCWA: Performance Testing of Cloud based Web Applications.- Chapter 33: Analysis of Regularized Echo State Networks on the Impact of Air Pollutants on Human Health.- Chapter 34: Detection of Cancer by Biosensor through Optical Lithography.- Chapter 35: Paradigms in Computer Vision: Biology Based Carbon Domain Postulates Nano Electronic Devices for Generation Next.- Chapter 36: A Secure Authenticated Bio-Cryptosystem Using Face Attribute Based On Fuzzy Extractor.- Chapter 37: Implementation of Scan logic and Pattern generation for RTL Design.- Chapter 38: Optimization Load Balancing Over Imbalance Datacenter Topology.- Chapter 39: Text Attentional Character Detection using Morphological Operations: A Survey.- Chapter 40: IoT Based Environment Monitoring System.- Chapter 41: Design & Development of Algorithms for Detection of Glaucoma Using Water Shed Algorithm.- Chapter 42: A novel development of glaucoma detection technique using the water shed algorithm.- Chapter 43: Solutions of Viral Dynamics in Hepatitis B Virus Infection using HPM.- Chapter 44: A Mathematical Modeling Of Dengue Fever For The Dynamics System Using HAM.- Chapter 45: Vision-based Robot for Boiler Tube Inspection.- Chapter 46: Qualitative Study on Data Mining Algorithms for classification of Mammogram Images.- Chapter 47: Designing a framework for data migration of Odoo ERP PostgreSQL database into NoSQL database.- Chapter 48: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data.- Chapter 49: Voltage Stabilization By Using Buck Converters In The Integration Of Renewable Energy Into The Grid.- Chapter 50: OCR System For Recognition of Used Printed Com-ponents For Recycling.- Chapter 51: Modern WordNet: An Affective Extension of WordNet.- Chapter 52: Analysis of Computational Intelligence Techniques for Path Planning.- Chapter 53: Techniques for Analysis of the Effectiveness of Yoga through EEG Signals: A Review.- Chapter 54: Multiobjective integrated stochastic and deterministic search method for economic emission dispatch problem.- Chapter 55: Enhanced webpage prediction using Rank based Feedback Process.- Chapter 56: A study on distance based representation of molecules for statistical learning.- Chapter 57: Comparative Analysis of Evolutionary Approaches and computational methods for optimization in Data Clustering.- Chapter 58: Bringing Digital Transformation from a Traditional RDBMS Centric Solution to a Big Data Platform with Azure Data Lake Store.- Chapter 59: Smart Assist For Alzheimer’s Patients And Elderly People.- Chapter 60: An Unconstrained Rotation Invariant Approach For Document Skew Estimation And Correction.- Chapter 61: Smart Assistive Shoes For Blind.- Chapter 62: Comparative study on Various techniques involved in designing a Computer Aided Diagnosis (CAD) System for mammogram classification.- Chapter 63: Traffic Flow Prediction Using Regression and Deep Learning Approach.- Chapter 64: A Comparative Study on Assessment of Carotid Artery Using various Techniques.- Chapter 65: Evaluation of Fingerprint Minutiae on Ridge Structure Using Gabor and Closed hull Filters.- Chapter 66: A Perspective View on Sybil Attack Defense Mechanisms in Online Social Networks.- Chapter 67: Minor Finger Knuckle Print Image Enhancement using CLAHE Technique.- Chapter 68: Learning Path Construction Based On Ant Colony Optimization and Genetic Algorithm.- Chapter 69: Pneumonia Detection And Classification Using Chest X-Ray Images With Convolutional Neural Network.- Chapter 70: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data.- Chapter 71: An Optimized Approach Of Outlier Detection Algorithm for Outlier Attributes on Data Streams.- Chapter 72: Indo – Pak Sign Language Translator Using Kinect.- Chapter 73: Semantic interoperability for a defining Query.- Chapter 74: Gestational Diabetics prediction using Logisitic Regression in R.- Chapter 75: IOT Based Gas Pressure Detection for LPG with real time No SQL Database.- Chapter 76: Hybrid Steerable Pyramid with DWT for Multiple Medi-cal Image Watermarking and Extraction using ICA.- Chapter 77: Dimensional & Spatial Analysis of Ultrasound Imaging through Image Processing - A Review.- Chapter 78: A Review on methods to handle Uncertainty.- Chapter 79: Identity-based Hashing and Light Weight Signature Scheme for IoT.- Chapter 80: Adaptive Particle Swarm Optimization Based Wire-length Minimization for Placement in FPGA.- Chapter 81: Clustering of Various Diseases by Collagen Gene Using the Positional Factor.- Chapter 82: Prediction Of Water Demand For Domestic Purpose Using Multiple Linear Regression.- Chapter 83: Implementation of Regression Analysis using Regression Algorithms for Decision Making In Business Domains.- Chapter 84: Blockchain Based System for Human Organ Transplantation Management.- Chapter 85: Identification of Melanoma using Convolutional Neural Networks for Non Dermoscopic Images.- Chapt
Dr. S. Smys received his M.E and Ph.D degrees all in Wireless Communication and Networking from Anna University and Karunya University, India. His main area of research activity is localization and routing architecture in wireless networks. He serves as Associate Editor of Computers and Electrical Engineering (C&EE) Journal, Elsevier and Guest Editor of MONET Journal, Springer. He is served as a reviewer for IET, Springer, Inderscience and Elsevier journals. He has published many research articles in refereed journals and IEEE conferences. He has been the General chair, Session Chair, TPC Chair and Panelist in several conferences. He is member of IEEE and senior member of IACSIT wireless research group. He has been serving as Organizing Chair and Program Chair of several International conferences, and in the Program Committees of several International conferences. Currently he is working as a professor in the Department of Computer Science at RVS Technical Campus, Coimbatore,India.
Abdullah M. Iliyasu (aka Abdul M. Elias) received the M.E., Ph.D., and Dr. Eng. degrees in computational intelligence and intelligent systems engineering from the Tokyo Institute of Technology, Japan, where he is presently a Research Professor with the School of Computing. Concurrently, Prof Elias is the Principal Investigator and Team Leader of the Computational Intelligence and Intelligent Systems (CIIS) Research Group at the College of Engineering, Prince Sattam Bin Abdulaziz University in the Kingdom of Saudi Arabia. He is also a Professor with the School of Computer Science and Engineering, Changchun University of Science and Technology, China. He has to his credit more than 100 publications traversing the areas of computational intelligence, quantum cybernetics, quantum image processing, quantum machine learning, cyber and information security, hybrid intelligent systems, health informatics, and electronics systems reliability.
Dr. Robert Bestakobtained a PhD degree in Computer Science from ENST Paris, France (2003) and MSc degree in Telecommunications from Czech Technical University in Prague, CTU, (1999). Since 2004, he has been an Assistant Professor at Department of Telecommunication Engineering, Faculty of Electrical Engineering, CTU. His main research interests include 5G networks, cognitive networks and spectrum management. He is the Czech representative in the IFIP TC6 working group and he serves as associate editor of Telecommunication System and Electronic Commerce Research, Springer and . Dr. Bestak has served as Steering and Technical Program Committees member for numerous IEEE/IFIP international conferences. He participated in several national and EU founded research projects (FP7-ROCKET, FP7-TROPIC, etc.)
Dr. Fuqian Shi currently working as a Professor in Wenzhou Medical University, P. R. China. His research interest includes Computer Networks, Computer Programming, Computer Graphics, Image Processing, Data Structure, Operating System and Medical Informatics.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.