


default search action
ICACDS 2018: Dehradun, India
- Mayank Singh

, P. K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer I. Ören:
Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science 905, Springer 2018, ISBN 978-981-13-1809-2 - Farha Fatina Wahid, K. Sugandhi

, Raju G.
:
Two Stage Histogram Enhancement Schemes to Improve Visual Quality of Fundus Images. 1-11 - V. Sudarsan Rao, N. Satyanarayana:

A Secure and Efficient Computation Outsourcing Scheme for Multi-users. 12-24 - Sagnik Sen

, Ujjwal Maulik:
Detecting the Common Biomarkers for Early Stage Parkinson's Disease and Early Stage Alzheimer's Disease Associated with Intrinsically Disordered Protein. 25-34 - Gitimoni Talukdar, Pranjal Protim Borah

, Arup Baruah
:
Assamese Named Entity Recognition System Using Naive Bayes Classifier. 35-43 - R. Nanmaran

, G. Thirugnanam, P. Mangaiyarkarasi:
Medical Image Multiple Watermarking Scheme Based on Integer Wavelet Transform and Extraction Using ICA. 44-53 - Pratik Kanani

, Mamta Padole
:
Recognizing Real Time ECG Anomalies Using Arduino, AD8232 and Java. 54-64 - Garima Joshi

, Anu Gaur, Sheenu:
Interpretation of Indian Sign Language Using Optimal HOG Feature Vector. 65-73 - Bhagyashri R. Hanji

, Rajashree Shettar:
Stable Reduced Link Break Routing Technique in Mobile Ad Hoc Network. 74-83 - Kissan G. Gauns Dessai, Venkatesh V. Kamat:

Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-Examinations. 84-94 - Adil Husain

, Muneeb H. Khan
:
Early Diabetes Prediction Using Voting Based Ensemble Learning. 95-103 - Vinaya Sawant

, Ketan Shah
:
A System that Performs Data Distribution and Manages Frequent Itemsets Generation of Incremental Data in a Distributed Environment. 104-113 - Arun Sharma

, Deepika Sharma
, Mayank Singh
:
Assessing Autonomic Level for Self-managed Systems - FAHP Based Approach. 114-123 - Bhargavi B.

, K. Swarupa Rani
:
Bounded Paths for LCR Queries in Labeled Weighted Directed Graphs. 124-133 - Sonam, Manoj Kumar:

An Efficient Image Fusion Technique Based on DTCWT. 134-143 - M. Ambigavathi

, D. Sridharan:
Low-Delay Channel Access Technique for Critical Data Transmission in Wireless Body Area Network. 144-153 - Nitika Nigam

, Divakar Yadav
:
Lexicon-Based Approach to Sentiment Analysis of Tweets Using R Language. 154-164 - Amrah Maryam, Rashid Ali

:
Twitter Based Event Summarization. 165-174 - Rashmi Bisht, Ritu Vijay, Shweta Singh:

Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image Enhancement. 175-184 - S. B. Kshama

, K. R. Shobha
:
A Novel Load Balancing Algorithm Based on the Capacity of the Virtual Machines. 185-195 - NagaPrasanthi Kundeti, M. V. P. Chandra Sekhara Rao, Nagaraju Devarakonda

, Suresh Thommandru:
A Hybrid Approach for Privacy-Preserving Data Mining. 196-207 - Prabhjot Kaur

, Prashant Chaudhary
, Anchit Bijalwan
, Amit Awasthi
:
Network Traffic Classification Using Multiclass Classifier. 208-217 - Rohini Rajpal, Sanmeet Kaur

:
An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection. 218-227 - Sanmeet Kaur

, Ishan Garg:
Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection. 228-238 - Subhi Jain, Rahul Chauhan

:
Recognition of Handwritten Digits Using DNN, CNN, and RNN. 239-248 - Junali Jasmine Jena, G. Girish, Manisha Patro:

Evaluating Effectiveness of Color Information for Face Image Retrieval and Classification Using SVD Feature. 249-259 - Karan Kalra, Riya Goyal, Sanmeet Kaur

, Parteek Kumar:
PDD Algorithm for Balancing Medical Data. 260-269 - Menaxi J. Bagchi, Figlu Mohanty, Suvendu Rup

, Bodhisattva Dash, Banshidhar Majhi:
Digital Mammogram Classification Using Compound Local Binary Pattern Features with Principal Component Analysis Based Feature Reduction Approach. 270-278 - Deepa Anand, M. Swathi, A. Purushothaman, Sundararaman Gopalan

:
Assessing the Performance of CMOS Amplifiers Using High-k Dielectric with Metal Gate on High Mobility Substrate. 279-289 - Rachna Mehta

, Navneet Agrawal
:
The Impact of Picture Splicing Operation for Picture Forgery Detection. 290-301 - N. Sasikaladevi

, N. Mahalakshmi, N. Archana:
LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images. 302-311 - N. Sasikaladevi

, A. Revathi
, N. Mahalakshmi, N. Archana:
HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection. 312-320 - Rishab Gupta, Nilay Shrivastava, Mohit Jain

, Vijander Singh, Asha Rani:
Greedy WOA for Travelling Salesman Problem. 321-330 - Ranjit Rajak

:
Deterministic Task Scheduling Method in Multiprocessor Environment. 331-341 - Kankanala Srinivas

, Nagapuri Srinivas, Puli Kishore Kumar, Gayadhar Pradhan
:
Performance Comparison of Measurement Matrices in Compressive Sensing. 342-351 - Deepak A. Vidhate, Parag A. Kulkarni

:
A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL). 352-361 - Mampi Kerani, Sharmila

:
Novel Technique for the Test Case Prioritization in Regression Testing. 362-371 - Ashu Bansal, Sanmeet Kaur

:
Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems. 372-380 - S. Rayhan Kabir

, Mirza Mohtashim Alam, Shaikh Muhammad Allayear, Md Tahsir Ahmed Munna
, Syeda Sumbul Hossain
, Sheikh Shah Mohammad Motiur Rahman
:
Relative Direction: Location Path Providing Method for Allied Intelligent Agent. 381-391 - Nagapuri Srinivas, Kankanala Srinivas

, Gayadhar Pradhan
, Puli Kishore Kumar:
FPGA Implementation for Real-Time Epoch Extraction in Speech Signal. 392-400 - Amit Kumar Shakya, Ayushman Ramola, Akhilesh Kandwal, Vivek Chamoli

:
Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert Operations. 401-410 - Jitendra Kumar Seth

, Satish Chandra:
MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO. 411-420 - Jayanta Mondal, Debabala Swain, Devee Darshani Panda:

An Improved RDH Model for Medical Images with a Novel EPR Embedding Technique. 421-430 - Krista Chaudhary, Mayank Singh

, Sandhya Tarar, D. K. Chauhan, Viranjay M. Srivastava
:
Machine Learning Based Adaptive Framework for Logistic Planning in Industry 4.0. 431-438 - Mayank Singh

, Viranjay M. Srivastava
:
An Analysis of Key Challenges for Adopting the Cloud Computing in Indian Education Sector. 439-448 - Ghanshyam Raghuwanshi

, Vipin Tyagi
:
Texture Image Retrieval Based on Block Level Directional Local Extrema Patterns Using Tetrolet Transform. 449-460 - Shamkumar B. Chavan, Umesh A. Kshirsagar, Mahesh S. Chavan:

Development of Transformer-Less Inverter System for Photovoltaic Application. 461-470 - Sai Sawant, Mangesh Sudhir Deshpande:

English Text to Speech Synthesizer Using Concatenation Technique. 471-480 - Ira Natu, Sahasra Iyer, Anagha Kulkarni

, Kajol Patil, Pooja Patil:
Text Translation from Hindi to English. 481-488 - Pritish Mahendra Vibhute, Mangesh Sudhir Deshpande:

Optical Character Recognition (OCR) of Marathi Printed Documents Using Statistical Approach. 489-498 - Sidharth Bhorge

, Deepak Bedase:
Multi View Human Action Recognition Using HODD. 499-508 - Rupali V. Pawar, R. M. Jalnekar, J. S. Chitode

:
Segmental Analysis of Speech Signal for Robust Speaker Recognition System. 509-519 - Seema Vitthal Arote, Mangesh Sudhir Deshpande:

Multimicrophone Based Speech Dereverberation. 520-529 - Premanand Pralhad Ghadekar

:
Modeling Nonlinear Dynamic Textures Using Isomap with GPU. 530-542 - Poonam Rana, Vineet Sharma, P. K. Gupta

:
Exploration of Apache Hadoop Techniques: Mapreduce and Hive for Big Data. 543-552

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














