![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
ICACDS 2018: Dehradun, India
- Mayank Singh
, P. K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer I. Ören:
Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science 905, Springer 2018, ISBN 978-981-13-1809-2 - Farha Fatina Wahid, K. Sugandhi
, Raju G.
:
Two Stage Histogram Enhancement Schemes to Improve Visual Quality of Fundus Images. 1-11 - V. Sudarsan Rao, N. Satyanarayana:
A Secure and Efficient Computation Outsourcing Scheme for Multi-users. 12-24 - Sagnik Sen
, Ujjwal Maulik:
Detecting the Common Biomarkers for Early Stage Parkinson's Disease and Early Stage Alzheimer's Disease Associated with Intrinsically Disordered Protein. 25-34 - Gitimoni Talukdar, Pranjal Protim Borah, Arup Baruah
:
Assamese Named Entity Recognition System Using Naive Bayes Classifier. 35-43 - R. Nanmaran
, G. Thirugnanam, P. Mangaiyarkarasi:
Medical Image Multiple Watermarking Scheme Based on Integer Wavelet Transform and Extraction Using ICA. 44-53 - Pratik Kanani
, Mamta Padole
:
Recognizing Real Time ECG Anomalies Using Arduino, AD8232 and Java. 54-64 - Garima Joshi
, Anu Gaur, Sheenu:
Interpretation of Indian Sign Language Using Optimal HOG Feature Vector. 65-73 - Bhagyashri R. Hanji, Rajashree Shettar:
Stable Reduced Link Break Routing Technique in Mobile Ad Hoc Network. 74-83 - Kissan G. Gauns Dessai, Venkatesh V. Kamat:
Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-Examinations. 84-94 - Adil Husain, Muneeb H. Khan
:
Early Diabetes Prediction Using Voting Based Ensemble Learning. 95-103 - Vinaya Sawant
, Ketan Shah
:
A System that Performs Data Distribution and Manages Frequent Itemsets Generation of Incremental Data in a Distributed Environment. 104-113 - Arun Sharma
, Deepika Sharma
, Mayank Singh
:
Assessing Autonomic Level for Self-managed Systems - FAHP Based Approach. 114-123 - Bhargavi B.
, K. Swarupa Rani
:
Bounded Paths for LCR Queries in Labeled Weighted Directed Graphs. 124-133 - Sonam, Manoj Kumar:
An Efficient Image Fusion Technique Based on DTCWT. 134-143 - M. Ambigavathi
, D. Sridharan:
Low-Delay Channel Access Technique for Critical Data Transmission in Wireless Body Area Network. 144-153 - Nitika Nigam
, Divakar Yadav
:
Lexicon-Based Approach to Sentiment Analysis of Tweets Using R Language. 154-164 - Amrah Maryam, Rashid Ali:
Twitter Based Event Summarization. 165-174 - Rashmi Bisht, Ritu Vijay, Shweta Singh:
Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image Enhancement. 175-184 - S. B. Kshama
, K. R. Shobha
:
A Novel Load Balancing Algorithm Based on the Capacity of the Virtual Machines. 185-195 - NagaPrasanthi Kundeti, M. V. P. Chandra Sekhara Rao, Nagaraju Devarakonda
, Suresh Thommandru:
A Hybrid Approach for Privacy-Preserving Data Mining. 196-207 - Prabhjot Kaur
, Prashant Chaudhary
, Anchit Bijalwan
, Amit Awasthi:
Network Traffic Classification Using Multiclass Classifier. 208-217 - Rohini Rajpal, Sanmeet Kaur:
An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection. 218-227 - Sanmeet Kaur, Ishan Garg:
Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection. 228-238 - Subhi Jain, Rahul Chauhan
:
Recognition of Handwritten Digits Using DNN, CNN, and RNN. 239-248 - Junali Jasmine Jena, G. Girish, Manisha Patro:
Evaluating Effectiveness of Color Information for Face Image Retrieval and Classification Using SVD Feature. 249-259 - Karan Kalra, Riya Goyal, Sanmeet Kaur, Parteek Kumar:
PDD Algorithm for Balancing Medical Data. 260-269 - Menaxi J. Bagchi, Figlu Mohanty, Suvendu Rup
, Bodhisattva Dash, Banshidhar Majhi:
Digital Mammogram Classification Using Compound Local Binary Pattern Features with Principal Component Analysis Based Feature Reduction Approach. 270-278 - Deepa Anand, M. Swathi, A. Purushothaman, Sundararaman Gopalan
:
Assessing the Performance of CMOS Amplifiers Using High-k Dielectric with Metal Gate on High Mobility Substrate. 279-289 - Rachna Mehta
, Navneet Agrawal
:
The Impact of Picture Splicing Operation for Picture Forgery Detection. 290-301 - N. Sasikaladevi
, N. Mahalakshmi, N. Archana:
LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images. 302-311 - N. Sasikaladevi
, A. Revathi
, N. Mahalakshmi, N. Archana:
HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection. 312-320 - Rishab Gupta, Nilay Shrivastava, Mohit Jain
, Vijander Singh, Asha Rani:
Greedy WOA for Travelling Salesman Problem. 321-330 - Ranjit Rajak:
Deterministic Task Scheduling Method in Multiprocessor Environment. 331-341 - Kankanala Srinivas
, Nagapuri Srinivas, Puli Kishore Kumar, Gayadhar Pradhan
:
Performance Comparison of Measurement Matrices in Compressive Sensing. 342-351 - Deepak A. Vidhate, Parag A. Kulkarni
:
A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL). 352-361 - Mampi Kerani, Sharmila:
Novel Technique for the Test Case Prioritization in Regression Testing. 362-371 - Ashu Bansal, Sanmeet Kaur:
Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems. 372-380 - S. Rayhan Kabir
, Mirza Mohtashim Alam, Shaikh Muhammad Allayear, Md Tahsir Ahmed Munna
, Syeda Sumbul Hossain
, Sheikh Shah Mohammad Motiur Rahman
:
Relative Direction: Location Path Providing Method for Allied Intelligent Agent. 381-391 - Nagapuri Srinivas, Kankanala Srinivas
, Gayadhar Pradhan
, Puli Kishore Kumar:
FPGA Implementation for Real-Time Epoch Extraction in Speech Signal. 392-400 - Amit Kumar Shakya, Ayushman Ramola, Akhilesh Kandwal, Vivek Chamoli
:
Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations. 401-410 - Jitendra Kumar Seth
, Satish Chandra:
MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO. 411-420 - Jayanta Mondal, Debabala Swain, Devee Darshani Panda:
An Improved RDH Model for Medical Images with a Novel EPR Embedding Technique. 421-430 - Krista Chaudhary, Mayank Singh
, Sandhya Tarar, D. K. Chauhan, Viranjay M. Srivastava
:
Machine Learning Based Adaptive Framework for Logistic Planning in Industry 4.0. 431-438 - Mayank Singh
, Viranjay M. Srivastava
:
An Analysis of Key Challenges for Adopting the Cloud Computing in Indian Education Sector. 439-448 - Ghanshyam Raghuwanshi, Vipin Tyagi
:
Texture Image Retrieval Based on Block Level Directional Local Extrema Patterns Using Tetrolet Transform. 449-460 - Shamkumar B. Chavan, Umesh A. Kshirsagar, Mahesh S. Chavan:
Development of Transformer-Less Inverter System for Photovoltaic Application. 461-470 - Sai Sawant, Mangesh Sudhir Deshpande:
English Text to Speech Synthesizer Using Concatenation Technique. 471-480 - Ira Natu, Sahasra Iyer, Anagha Kulkarni, Kajol Patil, Pooja Patil:
Text Translation from Hindi to English. 481-488 - Pritish Mahendra Vibhute, Mangesh Sudhir Deshpande:
Optical Character Recognition (OCR) of Marathi Printed Documents Using Statistical Approach. 489-498 - Siddharth Bhorge
, Deepak Bedase:
Multi View Human Action Recognition Using HODD. 499-508 - Rupali V. Pawar, R. M. Jalnekar, J. S. Chitode
:
Segmental Analysis of Speech Signal for Robust Speaker Recognition System. 509-519 - Seema Vitthal Arote, Mangesh Sudhir Deshpande:
Multimicrophone Based Speech Dereverberation. 520-529 - Premanand Pralhad Ghadekar
:
Modeling Nonlinear Dynamic Textures Using Isomap with GPU. 530-542 - Poonam Rana, Vineet Sharma, P. K. Gupta
:
Exploration of Apache Hadoop Techniques: Mapreduce and Hive for Big Data. 543-552
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.