Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/proceedings-of-the-first-international-conference-on-intelligent-computing-and-communication/descriptif_3964567
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3964567

Proceedings of the First International Conference on Intelligent Computing and Communication, 1st ed. 2017 Advances in Intelligent Systems and Computing Series, Vol. 458

Langue : Anglais

Coordonnateurs : Mandal Jyotsna Kumar, Satapathy Suresh Chandra, Sanyal Manas Kumar, Bhateja Vikrant

Couverture de l’ouvrage Proceedings of the First International Conference on Intelligent Computing and Communication

The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.

Section 1. Biomedical Image Processing and Bioinformatics: Chapter 1. Altered PPI due to Mutations in hPER2 and CKI Delta Locus, causing ASPS.- Chapter 2. A Comparative Framework of Probabilistic Atlas Segmentation Method for Human Organs MRI.- Chapter 3. Concentration of Acetone Levels in Breath for Monitoring Blood Glucose Level.- Chapter 4. Computational Molecular Analysis of Human Rhodopsin, Transducin and Arrestin Interactions: An Insight into Signal Transduction for Ophthalmology.- Chapter 5. Evaluating the Performance of State of the Art Algorithms for Enhancement of Seismocardiogram Signals.- Chapter 6. Common Sub-cluster Mining to Explore Molecular Markers of Lung Cancer.- Section 2. Cloud Computing: Chapter 7.Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA).- Chapter 8. On Demand IOPS Calculation in Cloud Environment to Ease Linux-Based Application Delivery.- Chapter 9. Intelligent Storage Management Using Cloud Shared Disk Architecture.- Chapter 10. Hybrid Application Partitioning and Process Offloading Method for the Mobile Cloud Computing.- Chapter 11. Encrypted Data Searching Techniques and Approaches for Cloud Computing: A Survey.- Chapter 12. A Proposed Conceptual Framework to Migrate Microsoft Technology Based Applications to Cloud Environment.- Section 3.  Communication Network and Services: Chapter 13. An Adaptive Cloud Communication Network Using VSAT with Enhanced Security Implementation.- Chapter 14. Introspecting Effect of Packet Size on End-to-end Network Delay.- Chapter 15. An Ontology Based Context Aware protocol in Healthcare Services.- Chapter 16. Processing ASP.Net Web Services Using Generic Delegation Approach.- Chapter 17. Link Based Protection of Light Trail in WDM Mesh Networks.- Section 4. Data Analytics and Data Mining: Chapter 18. Prediction of Twitter Users’ Interest Based on Tweets.- Chapter 19. Event Detection over Twitter Social Media.- Chapter 20. DMDAM: Data Mining Based Detection of Android Malware.- Chapter 21. Comparative Study of Parallelism on Data Mining.- Chapter 22. Brief Review on Optimal Suffix Data Structures.- Chapter 23. Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks.- Chapter 24. Closure Based Integrated Approach for Associative Classier.- Chapter 25. Approaches and Challenges of Big Data Analytics Study of a Beginner.- Chapter 26. A Novel MapReduce Based k-Means Clustering.- Chapter 27. Supplier Selection in Uncertain Environment: A Fuzzy MCDM Approach.- Chapter 28. Intelligent Computing for Skill-Set Analytics in a Big Data Framework – A Practical Approach.- Chapter 29. Implication of Performance Appraisal Process on Employee Engagement Mediated through the Development and Innovation Oriented Culture: A Study on the Software Professionals of IT Companies in West Bengal.- Section 5. Device System and Modeling: Chapter 30. Estimation of MOS Capacitance Across Different Technology Nodes.- Chapter 31. Cross-coupled Dynamic CMOS Latches: Scalability Analysis.- Chapter 32. Cross-coupled Dynamic CMOS Latches: Robustness Study of Timing.- Chapter 33. A Design of a 4 Dot 2 Electron QCA Full Adder Using Two Reversible Half Adders.- Chapter 34. Secure Data Outsourcing in the Cloud Using Multi-Secret Sharing Scheme (MSSS).- Chapter 35. Design of a BCD Adder Using 2-Dimensional Two-dot One-electron Quantum-dot Cellular Automata.- Chapter 36. Design Based New Coupling Metric for Component Based Development Environment.- Chapter 37. Scientific Workflow Management System for Community Model in Data Fusion.- Chapter 38. An Improved Stator Resistance Adaptation Mechanism in MRAS Estimator for Sensorless Induction Motor Drives.- Chapter 39. A New Implementation Scheme in Robotic Vehicle Propulsion Using Brushless DC Motor.- Chapter 40. Binary Fuzzy Goal Programming for Effective Utilization of IT Professionals.- Chapter 41. AVR Microcontroller Based Conference Presentation Timer.- Section 6. Image Processing and Pattern Recognition: Chapter 42. A Person Identification System with Biometrics Using Modified RBFN Based Multiple Classifiers.- Chapter 43. An Application of GIS Techniques towards Pasture Land Use Studies.- Chapter 44. Wavelet-based Image Compression Using SPIHT and Windowed Huffman Coding with Limited Distinct Symbol and Its Variant.- Chapter 45. Extraction of Distinct Bifurcation Points from Retinal Fundus Images.- Chapter 46. Automatic Measurement and Analysis of Vessel Width in Retinal Fundus Image.- Chapter 47. Recognition of Handwritten Indic Script Numerals Using Mojette Transform.- Chapter 48. A Survey of Prospects and Problems in Hindustani Classical Raga Identification Using Machine Learning Techniques.- Chapter 49. A Neuro Fuzzy Based Black Tea Classifying Technique Using Electronic Nose and Electronic Tongue.- Chapter 50. Design of Novel Feature Vector for Recognition of Online Handwritten Bangla Basic Characters.- Chapter 51. An Eigencharacter Technique for Offline-Tamil Handwritten Character Recognition.- Chapter 52. Text and Non-text Separation in Handwritten Document Images Using Local Binary Pattern Operator.- Chapter 53. Page-to-Word Extraction from Unconstrained Handwritten Document Images.- Chapter 54. A Computer Vision Framework for Detecting Dominant Points on Contour of Image-Object through Thick-Edge Polygonal Approximation.- Chapter 55. Kuan Modified Anisotropic Diffusion Approach for Speckle Filtering.- Section 7. Security and Cryptography: Chapter 56. Dual-Image Based Reversible Data Hiding Scheme through Pixel Value Differencing With Exploiting Modification Direction.- Chapter 57. Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN.- Chapter 58. Chaotic Map Based Image Encryption in Spatial Domain: A Brief Survey.- Chapter 59. A Novel Approach to e-voting Using Multi-Bit Steganography.- Chapter 60. Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems.- Chapter 61. A New & Resilient Image Encryption Technique Based on Pixel Manipulation, Value Transformation and Visual Transformation Utilizing Single Level Haar Wavelet Transform.- Chapter 62. A Scheme for QR Code Based Smart Door Locks Security System Using an ARM Computer.- Chapter 63. Image Steganography Using BitPlane Complexity Segmentation and Hessenberg QR Method.- Chapter 64. A Novel Scheme for Analyzing Confusion Characteristics of Block Ciphers.- Section 8. Wireless Sensor Network: Chapter 65. Source-initiated Routing to Support Large-scale Pseudo-linear ZigBee Networks.- Chapter 66. SSeS: A Self-Configuring Selective Single-path Routing Protocol for Cloud-based Mobile Wireless Sensor Network.- Chapter 67. Link Quality Modeling for Energy Harvesting Wireless Sensor Networks.- Chapter 68. GA based Energy Efficient and Balanced Routing in k-connected Wireless Sensor Networks.- Chapter 69. An Approach towards Energy Efficient Channel Reduction in Cellular Networks.- Chapter 70. Military Robot Path Control Using RF Communication.

 

 

 

Prof. J.K. Mandal received his M.Sc. in Physics from Jadavpur University in 1986 and M. Tech. in Computer Science from University of Calcutta. Prof. Mandal was awarded Ph.D. in Computer Science and Engineering by the Jadavpur University in 2000. Presently, he is working as Professor of Computer Science and Engineering and former Dean, Faculty of Engineering, Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as Lecturer at NERIST, Arunachal Pradesh in September 1988. He has teaching and research experience of 28 years. His areas of research include coding theory, data and network security, remote sensing and GIS based applications, data compression, error correction, visual cryptography, steganography, security in MANET, wireless networks and unify computing. He has produced 15 Ph.D. degrees, 2 submitted (2015-16) and 8 ongoing. He has supervised 3 M.Phils. and more than 50 M.Tech dissertations. He is a life member of the Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow member of IETE since 2012, Honorary Chairman of CSI Kolkata Chapter. He has chaired more than 30 sessions in various international conferences and delivered more than 50 expert/invited lectures during last 5 years. He has acted as program chair of many international conferences and edited more than 15 volumes of proceedings from Springer Series, Science Direct etc. He is reviewer of various international journals and conferences. He has over 360 articles and 6 books published to his credit. He is one of the editors for Springer AISC Series, FICTA 2014, CSI 2013, IC3T 2015, INDIA 2015, and INDIA 2016. He is also the corresponding editors of CIMTA 2013 (Procedia Technology, Elsevier), INDIA 2015  (AISC Springer) and ICIC2 2016 (AISC Springer).

Dr. Manas Kumar Sanyal obtained his M.Tech. in Computer Science from Calcutta University in 1989. He worked in i

Focusses on intelligent computing and communication, bio-molecular and nano-technology, security and forensics

Covers a wide range of topics in computer science and information technology

Presents original research papers from eminent practitioners and researchers in the field

Includes supplementary material: sn.pub/extras

Date de parution :

Ouvrage de 707 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

Prix indicatif 210,99 €

Ajouter au panier