Innovations in Computer Science and Engineering: Proceedings of the Third Icicse, 2015 (Advances in Intelligent Systems and Computing #413)
Description
Chapter 1. Secure ATM Door Locking System Using RFID.- Chapter 2. Analysis of Various Parameters for Link Adaptation in Wireless Transmission.- Chapter 3. N-Gram Classifier System to Filter Spam Messages from OSN User Wall.- Chapter 4. A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics.- Chapter 5. Registration Plate Recognition Using Dynamic Image Processing and Genetic Algorithm.- Chapter 6. Comparing the Capacity, NCC and Fidelity of Various Quantization Intervals on DWT.- Chapter 7. Enhancing Cloud Computing Server to Use Cloud Safely and to Produce Infrastructure of High Performance Computing.- Chapter 8. 3D Array Pattern Distortion Analysis.- Chapter 9. Elastic Search and Carrot2 Based Log Analytics and Management.- Chapter 10. High Security Pipelined Elastic Substitution Box with Embedded Permutation Facility.- Chapter 11. An Integrated Approach to High Dimensional Data Clustering.- Chapter 12. Performance Analysis of Network Virtualization in Cloud Computing Infrastructures on OpenStack.- Chapter 13. A Shoulder Surfing Resistant Graphical Password Authentication Scheme.- Chapter 14. A Proposal for Searching Desktop Data.- Chapter 15. Low Power Analog Bus for System on Chip Communication.- Chapter 16. Text Clustering and Text Summarization on the Use of Side Information.- Chapter 17. Image Correspondence Using Affine SIFT Flow.- Chapter 18. Link Quality Based Multi-hop Relay Protocol For WiMedia Medium Access Control.- Chapter 19. Assessment of Reusability Levels on Domain Specific Components Using Heuristic Function.- Chapter 20. Reliable Propagation of Real Time Traffic Conditions in VANETS to Evade Broadcast Storm.- Chapter 21. Hybrid Multi-objective Optimization Approach for Neural Network Classification using Local Search.- Chapter 22. Effectiveness of Email Address Obfuscation on Internet.- Chapter 23. A Proof-of-Concept Model for Vehicular Cloud Computing Using OMNet++ and SUMo.- Chapter 24. Password Reuse Behavior: How Massive Online Data Breaches Impacts Personal Data in Web.- Chapter 25. Identifying Significant Features to Improve Crowd Funded Projects' Success.- Chapter 26. A Survey on Challenges in Software Development during the Adoption of Agile Environment.- Chapter 27. A Novel Approach for Detection of Motion Vector-Based Video Steganography by AoSO Motion Vector Value.- Chapter 28. Image Resolution Enhancement Technique Using Lifting Wavelet and Discrete Wavelet Transforms.- Chapter 29. A Real Time Implementation of Face and Eye Tracking on OMAP Processor.- Chapter 30. A Study on Cyber Security, its Issues and Cyber Crime Rates in India.- Chapter 31. A Concept Based Model for Query Management in Service Desks.- Chapter 32. Designing Chaotic Chirikov Map Based Secure Hash Function.- Chapter 33. Data Fusion Approach for Enhanced Anomaly detection.- Chapter 34. NUNI (New User and New Item) Problem for SRSs Using Content Aware Multimedia based Approach.- Chapter 35. Computerized Evaluation of Subjective Answers Using Hybrid Technique.- Chapter 36. A Proposal: High Throughput Robust Architecture for Log Analysis and Data Stream Mining.