LEADER 10724nam 22006975 450 001 9910254256903321 005 20251113193524.0 010 $a81-322-2755-7 024 7 $a10.1007/978-81-322-2755-7 035 $a(CKB)3710000000596747 035 $a(EBL)4391629 035 $a(SSID)ssj0001653550 035 $a(PQKBManifestationID)16433811 035 $a(PQKBTitleCode)TC0001653550 035 $a(PQKBWorkID)14982643 035 $a(PQKB)11597471 035 $a(DE-He213)978-81-322-2755-7 035 $a(MiAaPQ)EBC4391629 035 $a(PPN)192220535 035 $a(EXLCZ)993710000000596747 100 $a20160205d2016 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Design and Intelligent Applications $eProceedings of Third International Conference INDIA 2016, Volume 1 /$fedited by Suresh Chandra Satapathy, Jyotsna Kumar Mandal, Siba K. Udgata, Vikrant Bhateja 205 $a1st ed. 2016. 210 1$aNew Delhi :$cSpringer India :$cImprint: Springer,$d2016. 215 $a1 online resource (735 p.) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v433 300 $aDescription based upon print version of record. 311 08$a81-322-2753-0 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aChapter 1. Study and Analysis of Subthreshold Leakage Current in Sub-65 nm NMOSFET -- Chapter 2. Implementations of Secure Reconfigurable Cryptoprocessor: A Survey -- Chapter 3. Mitigating & Patching System Vulnerabilities Using Ansible: A Comparative Study of Various Configuration Management Tools for IAAS Cloud -- Chapter 4. Adaptive Fractal Image Compression Based on Adaptive Thresholding in DCT Domain -- Chapter 5. Improved Resource Exploitation by Combining Hadoop Map Reduce Framework with VirtualBox -- Chapter 6. Density Based Outlier Detection Technique -- Chapter 7. Systematic Evaluation of Seed Germination Models: A Comparative Analysis -- Chapter 8. Business Modeling Using Agile -- Chapter 9. An efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data -- Chapter 10. Application of Machine Learning on Process Metrics for Defect Prediction in Mobile Application -- Chapter 11. Automatic Insurance and Pollution Challan Generator System in India -- Chapter 12. Effectively Implementation of KNN-Search on Multidimensional Data Using Quadtree -- Chapter 13. Edge Detectors Based Telegraph Total Variational Model for Image Filtering -- Chapter 14. Cloud Based K-means Clustering Running as a MapReduce Job for Big Data Healthcare Analytics Using Apache Mahout -- Chapter 15. Symbolic Decision Tree for Interval Data - An Approach towards Predictive Streaming and Rendering of 3D Models -- Chapter 16. Predictive 3D Content Streaming Based on Decision Tree Classifier Approach -- Chapter 17. Quantitative Characterization of Radiographic Weld Defect Based on the Ground Truth Radiographs made on a Stainless Steel Plates -- Chapter 18. Research and Topology of Shunt Active Filters for Quality of Power -- Chapter 19. Development Of 3d High Definition Endoscope System -- Chapter 20. Excel Solver for Deterministic Inventory Model: INSOLVER -- Chapter 21. DSL Approach for Development of Gaming Applications -- Chapter 22. Digital Forensic Architecture for Cloud Computing Systems: Methods of Evidence Identification, Segregation, Collection and Partial Analysis -- Chapter 23. Brushing - An Algorithm for Data Deduplication -- Chapter 24. A New Approach for Integrating Social Data into Groups of Interest -- Chapter 25. Estimation of Shape Parameter of the Radial Distribution of Cosmic Ray Shower Particles -- Chapter 26. Network Security in Big Data: Tools and Techniques -- Chapter 27. Design of Ripple Carry Adder Using 2-Dimensional 2-Dot 1-Electron Quantum-Dot Cellular Automata -- Chapter 28. Advanced Congestion Control Techniques for MANET -- Chapter 29. A Method of Baseline Correction for Offline Handwritten Telugu Text Lines -- Chapter 30. A Technique for Prevention of Derailing and Collision of Trains in India --