Unlimited Access
For Registered Users
To contact us, you can contact us via the following mobile numbers by calling and WhatsApp
For Registered Users
100% Secure Payment
10 Days Returns
Call Us Anytime
edition: Authors: Patnaik. Srikanta, Popentiu-Vladicescu. Florin serie: Advances in intelligent systems and computing 555 ISBN : 9789811037795, 9789811037788 publisher: Springer publish year: 2017 pages: 172 language: English ebook format : PDF (It will be converted to PDF, EPUB OR AZW3 if requested by the user) file size: 5 MB
Front Matter ....Pages i-xviii
Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System (Shancheng Tang, Bin Wang, Xinguan Dai, Yunyue Bai)....Pages 1-8
An Investigation of Matching Approaches in Fingerprints Identification (Asraful Syifaa’ Ahmad, Rohayanti Hassan, Noraini Ibrahim, Mohamad Nazir Ahmad, Rohaizan Ramlan)....Pages 9-15
Figure Plagiarism Detection Using Content-Based Features (Taiseer Eisa, Naomie Salim, Salha Alzahrani)....Pages 17-20
An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction (P. Chandana, P. Srinivas Rao, C. H. Satyanarayana, Y. Srinivas, A. Gauthami Latha)....Pages 21-30
Emotion Recognition System Based on Facial Expressions Using SVM (Ielaf Osaamah Abdul-Majjed)....Pages 31-35
An AES–CHAOS-Based Hybrid Approach to Encrypt Multiple Images (Shelza Suri, Ritu Vijay)....Pages 37-43
Automatic Text Summarization of Video Lectures Using Subtitles (Shruti Garg)....Pages 45-52
Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders (Sakuntala Mahapatra, Debasis Mohanta, Prasant Kumar Mohanty, Santanu Kumar Nayak)....Pages 53-60
Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation (Jyoti Chaudhary, Arvind K. Sharma, S. C. Jain)....Pages 61-72
Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System (Jamal Hussain, Samuel Lalmuanawma)....Pages 73-87
Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques (Manisha Khorgade, Pravin Dakhole)....Pages 89-96
Privacy Preservation of Infrequent Itemsets Mining Using GA Approach (Sunidhi Shrivastava, Punit Kumar Johari)....Pages 97-104
A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR (Priyanka Sahu, Mohit Dua)....Pages 105-111
Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization (Ghosh Abhijyoti, Chakraborty Subhradeep, Ghosh Kumar Sanjay, Singh L. Lolit Kumar, Chattopadhyay Sudipta, Basu Banani)....Pages 113-119
Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks (Shantala Devi Patil, B. P. Vijayakumar, Kiran Kumari Patil)....Pages 121-128
Histogram-Based Human Segmentation Technique for Infrared Images (Di Wu, Zuofeng Zhou, Hongtao Yang, Jianzhong Cao)....Pages 129-132
Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions (S. Anuradha, C. H. Satyanarayana)....Pages 133-140
Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution (Kakollu Vanitha, P. Chandrasekhar Reddy)....Pages 141-148
Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light (Wen-feng Li, Bo Zhang, M. T. E. Kahn, Meng-yuan Su, Xian-yu Qiu, Ya-ge Guo)....Pages 149-155
Data Preprocessing Techniques for Research Performance Analysis (Fatin Shahirah Zulkepli, Roliana Ibrahim, Faisal Saeed)....Pages 157-162
Back Matter ....Pages 163-164