Contemporary Computing Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I

This book constitutes the first part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.

Bibliographic Details
Other Authors: Ranka, Sanjay (Editor), Banerjee, Arunava (Editor), Biswas, Kanad Kishore (Editor), Dua, Sumeet (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Communications in Computer and Information Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 06971nmm a2200481 u 4500
001 EB000385013
003 EBX01000000000000000238065
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642148347 
100 1 |a Ranka, Sanjay  |e [editor] 
245 0 0 |a Contemporary Computing  |h Elektronische Ressource  |b Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I  |c edited by Sanjay Ranka, Arunava Banerjee, Kanad Kishore Biswas, Sumeet Dua, Prabhat Mishra, Rajat Moona, Sheung-Hung Poon, Cho-Li Wang 
250 |a 1st ed. 2010 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010, 2010 
300 |a XXIV, 613 p. 264 illus  |b online resource 
505 0 |a A New SVD Based Watermarking Framework in Fractional Fourier Domain -- Mining Frequent and Associated Gene Expression Patterns from Spatial Gene Expression Data: A Proposed Approach -- Minimization of Lennard-Jones Potential Using Parallel Particle Swarm Optimization Algorithm -- An Artificial Bee Colony Algorithm for the 0–1 Multidimensional Knapsack Problem -- Automatic Summary Generation from Single Document Using Information Gain -- Technical Session-4: Algorithm-4 (A-4) -- An Alternate Approach to Compute the Reliability of a Computer Communication Network Using Binary Decision Diagrams -- A Multi-Level Blocks Scrambling Based Chaotic Image Cipher -- Maxillofacial Surgery Using X-Ray Based Face Recognition by Elastic Bunch Graph Matching -- A Phenomic Approach to Genetic Algorithms for Reconstruction of Gene Networks -- An Algorithm to Determine Minimum Velocity-Based Stable Connected Dominating Sets for Ad Hoc Networks -- Technical Session-5: Algorithm-5 (A-5) --  
505 0 |a Online Signature Classification Using Modified Fuzzy Min-Max Neural Network with Compensatory Neuron Topology -- Multifaceted Classification of Websites for Goal Oriented Requirement Engineering -- Technical Session-10: Application-5 (P-5) -- A Simplified and Corroborative Approach towards Formalization of Requirements -- Robust Multiple Watermarking Using Entropy Based Spread Spectrum -- Application of Adaptive Learning in Generalized Neuron Model for Short Term Load Forecasting under Error Gradient Functions -- Intelligent Schemes for Indexing Digital Movies -- Fuzzy Reasoning Boolean Petri Nets Based Method for Modeling and Analysing Genetic Regulatory Networks -- Technical Session-11: Application-6 (P-6) -- Mining the Blogosphere for Sociological Inferences -- Modeling for Evaluation of Significant Features in siRNA Design -- A Fast Progressive Image Transmission Algorithm Using Linear Bivariate Splines -- Building Optimization --  
505 0 |a Adaptive Bacterial Foraging Optimization Based Tuning of Optimal PI Speed Controller for PMSM Drive -- Missing Value Imputation Based on K-Mean Clustering with Weighted Distance. 
505 0 |a An Efficient Intrusion Detection System Using Clustering Combined with Fuzzy Logic -- Assessing the Performance of Bi-objective MST for Euclidean and Non-Euclidean Instances -- PSO - SVM Based Classifiers: A Comparative Approach -- Efficient Job Division for Grids Running SIMD Algorithms -- A Novel Algorithm for Achieving a Light-Weight Tracking System -- Technical Session-6: Application-1 (P-1) -- Computer Simulation Studies of Drug-DNA Interactions: Neothramycin B -- Effect of Speech Coding on Recognition of Consonant-Vowel (CV) Units -- Cloudbank: A Secure Anonymous Banking Cloud -- Alignment Model and Training Technique in SMT from English to Malayalam -- Emotion Classification Based on Speaking Rate -- Technical Session-7: Application-2 (P-2) -- A Vulnerability Metric for the Design Phase of Object Oriented Software -- A Framework for Synthesis of Human Gait Oscillation Using Intelligent Gait Oscillation Detector (IGOD) --  
505 0 |a Detection of Significant Opinionated Sentence for Mining Web Users’ Opinion -- Hyperspectral Data Compression Model Using SPCA (Segmented Principal Component Analysis) and Classification of Rice Crop Varieties -- Impulse Noise Removal from Color Images Using Adaptive Neuro–fuzzy Impulse Detector -- Technical Session-8: Application-3 (P-3) -- Measuring of Time-Frequency Representation (TFR) Content – Using the Kapur’s Entropies -- An Ontology Based Framework for Domain Analysis of Interactive System -- Entropy Based Clustering to Determine Discriminatory Genes for Microarray Dataset -- A Framework for Incremental Domain-Specific Hidden Web Crawler -- Impact of K-Means on the Performance of Classifiers for Labeled Data -- Technical Session-9: Application-4 (P-4) -- Digital Watermarking Based Stereo Image Coding -- Content Based Multimodal Retrieval for Databases of Indian Monuments -- Evolutionary Based Automated Coverage Analysis for GUI Testing --  
505 0 |a Technical Session-1: Algorithm-1 (A-1) -- A PDE-Based Nonlinear Filter Adapted to Rayleigh’s Speckle Noise for De-speckling 2D Ultrasound Images -- Face Recognition Using Kernel Fisher Linear Discriminant Analysis and RBF Neural Network -- Parallel Enumeration Sort on OTIS-Hypercube -- A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks -- A Heuristic Algorithm for Constrained Redundancy Optimization in Complex Systems -- Technical Session-2: Algorithm-2 (A-2) -- A Hybrid Genetic Algorithm Based Test Case Generation Using Sequence Diagrams -- LACAIS: Learning Automata Based Cooperative Artificial Immune System for Function Optimization -- Image Reconstruction from Projection under Periodicity Constraints Using Genetic Algorithm -- A Robust Watermarking Algorithm for Audio Signals Using SVD -- Differential Evolution Using Interpolated Local Search -- Technical Session-3: Algorithm-3 (A-3) --  
653 |a Computation by Abstract Devices 
653 |a Information Systems Applications (incl. Internet) 
653 |a Pattern Recognition 
653 |a Application software 
653 |a Artificial Intelligence 
653 |a Artificial intelligence 
653 |a Algorithm Analysis and Problem Complexity 
653 |a Pattern recognition 
653 |a Algorithms 
653 |a Computer communication systems 
653 |a Computers 
653 |a Computer Communication Networks 
700 1 |a Banerjee, Arunava  |e [editor] 
700 1 |a Biswas, Kanad Kishore  |e [editor] 
700 1 |a Dua, Sumeet  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Communications in Computer and Information Science 
856 4 0 |u https://doi.org/10.1007/978-3-642-14834-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.4 
520 |a This book constitutes the first part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.