Proceedings of the first International Conference on Computational Intelligence and Informatics : ICCII 2016

The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireles...

Full description

Saved in:
Bibliographic Details
Corporate Author International Conference on Computational Intelligence and Informatics Hyderabad, India
Other Authors Satapathy, Suresh Chandra, 1964- (Editor), Prasad, V. Kamakshi (Editor), Rani, B. Padmaja (Editor), Udgata, Siba K. (Editor), Raju, K. Srujan (Editor)
Format Electronic eBook
LanguageEnglish
Published Singapore : Springer, [2017]
SeriesAdvances in intelligent systems and computing ; 507.
Subjects
Online AccessFull text
ISBN9789811024719
9789811024702
Physical Description1 online resource

Cover

Table of Contents:
  • Preface; Contents; About the Editors; 1 GUI-Based Automated Data Analysis System Using Matlab®; Abstract; 1 Introduction; 2 Related Work; 2.1 Data Gathering; 2.2 Documentation; 3 Future Work; Acknowledgments; References; 2 A Survey Study on Singular Value Decomposition and Genetic Algorithm Based on Digital Watermarking Techniques; Abstract; 1 Introduction; 2 Digital Watermarking Based on SVD; 2.1 Embedding Process; 2.2 Extraction Process; 3 Digital Watermarking Based on Genetic Algorithm; 4 Survey of Watermarking Techniques Using SVD and GA; 5 Conclusion; References.
  • 3 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social NetworksAbstract; 1 Introduction; 2 Brief Review of Sarpong et al. Matchmaking Algorithm; 2.1 Initial Phase; 2.2 Key Generation; 2.3 Attribute Certification; 2.4 Matchmaking Phase; 3 Cryptanalysis of Sarpong et al. Algorithm; 4 Pitfalls or Anomalies in Sarpong et al. Algorithm; 4.1 Requires Huge Communication Cost; 4.2 Requires Huge Computation Cost; 5 Our Proposed Scheme; 5.1 Matchmaking Phase; 6 Security Strengths of Our Proposed Scheme; 7 Experimental Implementation; 8 Conclusion; References.
  • 4 Artificial Neural Networks Model to Improve the Performance Index of the Coil-Disc Assembly in Tube FlowAbstract; 1 Introduction; 2 Literature Review; 3 Problem Statement; 4 Experimentation; 5 Mass Transfer; 6 Artificial Neural Networks; 7 Backpropagation (BP) Learning Algorithm; 8 Methodology; 9 Experimental Results; 10 Conclusion; 11 Future Enhancements; References; 5 Handling Wormhole Attacks in WSNs Using Location Based Approach; Abstract; 1 Introduction; 2 Related Work; 3 Background Approach; 4 Proposed Methodology; 5 Experimental Results; 6 Conclusion; References.
  • 6 Video Authentication Using Watermark and Digital Signature-A StudyAbstract; 1 Introduction; 2 Video Authentication; 3 Watermark Approach; 3.1 Video Watermarking Based on Watermark Characteristics; 3.2 Video Watermark Based on Video Domain; 3.3 Limitations of Watermark Approach; 4 Digital Signature Approach; 4.1 Limitations of Digital Signature Approach; 5 Conclusion and Future Scope; References; 7 A Comparative Study and Performance Analysis Using IRNSS and Hybrid Satellites; Abstract; 1 Introduction; 2 Methodology; 3 Math Modeling; 4 Results and Analysis.
  • 4.1 Position Error with GPS Mode Only4.2 Position Error with IRNNS Dual Frequency; 4.3 Position Error for Third User Selection-DF IRNSS + GPS Hybrid Mode; 5 Conclusion; Acknowledgment; References; Generalized Approach to Enhance the Shared Cache Performance in Multicore Platform; 1 Introduction; 2 Background; 3 ENCAP; 4 Experimental Setup; 4.1 Tools Used; 4.2 System Configuration; 5 Experimental Results; 6 Conclusion; References; 9 A Novel Framework for Road Traffic Data Management for Cloud-Based Storage; Abstract; 1 Introduction; 2 Outcomes of the Parallel Researches.