Chapter 1. Gesture Controlled Wireless Device for Disabled.- Chapter 2. Implementation of Genetic Algorithm for Optimization of Network Rout.- Chapter 3. An Investigation of Gabor PCA and Different Similarity Measure Techniques for Image Classification.- Chapter 4. A Low Power-high Speed Double Manchester Carry Chain with Carry-skip Using D3L.- Chapter 5. Study and Analysis of Electrocardiography Signal in Time Domain for Computation of R-peak Value for Sleep Apnea Patient.- Chapter 6. Design and Implementation of Two Wheeled Self Balancing Vehicle Using Accelerometer and Fuzzy Logic.- Chapter 7. A Time Efficient Secret Image Sharing Scheme for Group Authentication System without Pixel Expansions.- Chapter 8. Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization.- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language.- Chapter 10. On Context Awareness for Multi-Sensor Data Fusion in IoT.- Chapter 11. CRiPT : Cryptography in Penetration Testing.- Chapter 12. Simultaneous Localization and Mapping for Visually Impaired People for Outdoor Environment.- Chapter 13. Automatic ECG Image Classification Using HOG and RPC features by Template Matching.- Chapter 14. Enhancement of Fuzzy Rank Aggregation Technique.- Chapter 15. Intelligent Tele-communication System Using Semantic Based Information Retrieval.- Chapter 16. Minimizing Excessive Handovers by Using Optimized Cuckoo Algorithm in Heterogeneous Wireless Networks.- Chapter 17. Audio Songs Classification Based on Music Patterns.- Chapter 18. Software Reliability Based on Software Measures Applying Bayesian Technique.- Chapter 19. On Context Awareness and Analysis of Various Classification Algorithms.- Chapter 20. Neural Network Based Automated Priority Assigner.- Chapter 21. Design of IMC Controller for TI
TO Process with Dynamic Close-loop Time Constant.- Chapter 22. All Optical SOA-MZI Based Encryption Decryption System Using Co-propagating Optical Pulses and CW Wave at 40 Gb/s.- Chapter 23. Exploiting Common Nodes in Overlapped Clusters for Path Optimization in Wireless Sensor Networks.- Chapter 24. Maximizing Availability and Minimizing Markesan for Task Scheduling in Grid Computing Using NSGA II.- Chapter 25. Moving Object Detection for Visual Surveillance Using Quasi-Euclidian Distance.- Chapter 26. iOTA: Internet of Things Application.- Chapter 27. Improving Performance of Wireless Mesh Networks Through User Association Method.- Chapter 28. Characterization of Human Fingernails Using Iterative Thresholding Segmentation.- Chapter 29. Confidential Terms Detection Using Language Modeling Technique in Data Leakage Prevention.- Chapter 30. Estimation of Respiration Rate from ECG Using Canonical Components Analysis and Ensemble Empirical Mode Decomposition.- Chapter 31. An Efficient On-chip Implementation of Reconfigurable Continuous Time Sigma Delta ADC for Digital Beam-forming Applications.- Chapter 32. Random Forest for the Real Forests.- Chapter 33. Hybrid GA and PSO Approach for Transmission Expansion Planning.- Chapter 34. Pattern Detection Framework for MRI Images and Labeling Volume of Interest (VoI).- Chapter 35. A Distributed Spanning Tree Based Dynamic Self Organizational framework for Web Server.- Chapter 36. Recursive Ant Colony Optimization Routing in Wireless Mesh Network.- Chapter 37. Image Processing Representation by Using Binary Image; Grayscale, Color Image and Histogram.- Chapter 38. A Vector Space Model Approach for Web Attack Classification Using Machine Learning Technique.- Chapter 39. Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN).- Chapter 40. Visual K-Means approach for Handling ClLe informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
(nessuna copia disponibile)
Cerca: Inserisci un desiderataNon riesci a trovare il libro che stai cercando? Continueremo a cercarlo per te. Se uno dei nostri librai lo aggiunge ad AbeBooks, ti invieremo una notifica!
Inserisci un desiderata