Third International Conference, ICACDS 2019, Ghaziabad, India, April 12-13, 2019, Revised Selected Papers,
نام نخستين پديدآور
edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap.
مشخصه جلد
Part II /
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Singapore :
نام ناشر، پخش کننده و غيره
Springer Singapore,
تاریخ نشرو بخش و غیره
2019
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (XX, 752 pages) :
ساير جزييات
426 illustrations, 245 illustrations in color
فروست
عنوان فروست
Communications in computer and information science ;
مشخصه جلد
1046
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; Preface; Organization; Contents -- Part II; Contents -- Part I; Advanced Computing; A Face Detection Using Support Vector Machine: Challenging Issues, Recent Trend, Solutions and Proposed Framework; Abstract; 1 Introduction; 2 Literature Review; 3 Face Detection Approaches; 4 Challenging Issues; 5 Recent Trends; 6 Proposed Framework; 7 Conclusion and Future Work; References; Empirical Study of Test Driven Development with Scrum; Abstract; 1 Introduction; 2 Related Work; 3 Interaction Model; 4 Implementation; 5 Comparison in Terms of Quality and Duration; 6 Conclusion; References
متن يادداشت
3 Maximin Distance Classifier3.1 Maximin Distance Classifier Algorithm; 4 Fuzzy C-Means Clustering; 5 Bat Based Fuzzy C-Means; 6 Proposed Work; 6.1 Hybrid Clustering Algorithm Using Bat Based Randomized Fuzzy C-Means Algorithm and Maximin Distance Classifier Algorithm; 7 Results and Comparisons; 8 Conclusion; References; Network Motifs: A Survey; Abstract; 1 Introduction; 2 Preliminaries; 3 Application Areas; 4 Applications; 4.1 Motifs in Vehicular Technology [41]; 4.2 Temporal Motifs in Communication Network [18]; 4.3 Spatio Temporal Network Motif Reveals the Biological Traits [16]
متن يادداشت
3.1 Healthcare3.2 AADHAR Card -- Database Breach; 3.3 ATM Hijacking; 4 Summary of Vulnerabilities; 5 Proposed Preventive Measures; 6 Conclusion and Future Work; Acknowledgement; References; Recognition of Hand Gestures and Conversion of Voice for Betterment of Deaf and Mute People; Abstract; 1 Introduction; 2 Related Works; 3 Gesture Recognition Techniques; 3.1 Glove Based Methods; 3.2 Vision-Based Method; 4 Basic Concepts; 4.1 Grayscaling; 4.2 Canny Edge Detection; 4.3 Gaussian Blur; 5 Proposed System Architecture and Results; 5.1 Image Acquirer; 5.2 Image Processor; 5.3 Feature Extractor
متن يادداشت
5.4 Image Classifier5.5 Recognition; 6 Conclusion; References; General Outlook of Wireless Body Area Sensor Networks; Abstract; 1 Introduction; 2 The General Architecture of the Healthcare System; 3 Wireless Body Area Sensor Networks (WBASNs); 3.1 Security of WBASN; 4 Need for Security and Privacy of WBASNs; 4.1 Data Storage Threats for WBANs; 4.2 Data Access Security Requirements; 4.3 Other Requirements; 4.4 Open Areas for Research; 5 Summary; References; Hybrid Fuzzy C-Means Using Bat Optimization and Maxi-Min Distance Classifier; 1 Introduction; 2 Related Works
متن يادداشت
Microprocessor Based Edge Computing for an Internet of Things (IoT) Enabled Distributed Motion ControlAbstract; 1 Introduction; 1.1 Related Work; 2 Work Procedure; 2.1 PMDC Motor Prototype; 2.2 System Identification and PI Controller Design for the PMDC Motor; 3 Proposed Method for PI Controller Integration with IoT Technology; 3.1 Edge Level; 3.2 Gateway Level; 3.3 Cloud Level; 4 Conclusion; References; Cyber Threat Analysis of Consumer Devices; Abstract; 1 Introduction; 2 Smart Home Threat Analysis; 2.1 Smart Lock; 2.2 Smart Thermostat; 2.3 Smart Bulb; 3 Other Cyber-Attacks on IoT Devices
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This is part 2 of a two-volume set (CCIS 1045 and CCIS 1046) that constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, held in Ghaziabad, India, in April 2019. The 112 full papers were carefully reviewed and selected from 621 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.