Advances in Computer Vision and Information Technology

Front Cover
I. K. International Pvt Ltd, Jan 31, 2008 - Computer vision - 1688 pages
The latest trends in information technology represent a new intellectual paradigm for scientific exploration and the visualization of scientific phenomena. This title covers the emerging technologies in the field. Academics, engineers, industrialists, scientists and researchers engaged in teaching, and research and development of computer science and information technology will find the book useful for their academic and research work. This text includes 225 articles covering the following topics:
  • Advance Networking and Security/Wireless Networking/Cyber Laws.
  • Advance Software Computing.
  • Artificial Intelligence/Natural Language Processing/Neural Networks.
  • Bioinformatics/Biometrics.
  • Data Mining/E-Commerce/E-Learning.
  • Image Processing, Content Based Image Retrieval, Medical and Bio-Medical Imaging, Wavelets.
  • Information Processing/Audio and Text Processing/Cryptology, Steganography and Digital Watermarking.
  • Pattern Recognition/Machine Vision/Image Motion, Video Processing.
  • Signal Processing and Communication/Remote Sensing.
  • Speech Processing & Recognition, Human Computer Interaction.
  • Information and Communication Technology.
 

What people are saying - Write a review

User Review - Flag as inappropriate

The latest trends in Information Technology represent a new intellectual paradigm for scientific exploration and visualization of scientific phenomena. The present treatise covers almost all the emerging technologies in the field. Academicians, engineers, industralists, scientists and researchers engaged in teaching, research and development of Computer Science and Information Technology will find the book useful for their future academic and research work. The present treatise comprising 225 articles broadly covers the following topics exhaustively. 01. Advance Networking and Security/Wireless Networking/Cyber Laws 02. Advance Software Computing 03. Artificial Intelligence/Natural Language Processing/ Neural Networks 04. Bioinformatics/Biometrics 05. Data Mining/E-Commerce/E-Learning 06. Image Processing, Content Based Image Retrieval, Medical and Bio-Medical Imaging, Wavelets 07. Information Processing/Audio and Text Processing/Cryptology, Steganography and Digital Watermarking 08. Pattern Recognition/Machine Vision/Image Motion, Video Processing 09. Signal Processing and Communication/Remote Sensing 10. Speech Processing & Recognition, Human Computer Interaction 11. Information and Comm 

User Review - Flag as inappropriate

This book is really nice and the Paper on Document Securiy using Encryption.. was really nice.. and it is going to help me alot in my research work..

Contents

Advance Networking and SecurityWireless
1
Residual Energy Based and Aggregation Enhanced Data Dissemination
9
Performance of Protecting FreeRoaming Mobile Agent Against Multiple
16
Classification of Software Security Vulnerabilities
24
Securing Emails with Encryption and Compression
31
Speech Recognition using the Template Approach
43
Reliable and Secure Group Key Distribution Protocol
55
Performance Analysis of Priqueue Scheduling Algorithm
61
Comparison Between PCA and Kernel PCA for Face Recognition
830
Improving Microarray Spots for Gene Determination using Morphological
847
A Robust PreProcessing Step for Efficient Edge Detection
860
Image Retrieval By Shape
874
Methods on Urdu Documents
894
PixSO Scene Change Detection for MPEG Based Digital Video Library
908
Segmentation of Tumour Images Using Graph Cuts Based Active Contours
923
Face Detection using Genetic Model
941

Performance Evaluation of Online Hose Model VPN Provisioning
69
Implementation of Secure File Syatem SFS using Blowfish
75
Trapping A Stegoimage on the Basis of Statistical Evidence
88
Using Google
106
Next Generation Mobile Technology
124
Investigative System for Evidence Collection in Internet Explorer Cache Files
142
Spreadspectrum Solution to Will
157
Making Omnipresent High Speed Data Services A Reality
171
Enhancement in Bluetooth Communication Security
188
Protecting TCP Performance in Presence of Errors in Reverse Link
203
Wireless Networking using Bluetooth
218
Impact On ISM Band Technologies
231
A Wireless intrusion Detection Method Based on Neural Network
244
Performance Evaluation of AODV on Depleting Energy Level of Nodes
258
QoS Provisioning for Voice Over IEEE 802 11 WLAN
272
A Soft Computing Approach to Design Miniaturised
287
Object Oriented Distributed Architecture System Through UML
305
Clairvoyant Scheduling Algorithm for Tasks with Variable Execution Time
311
Mapping SDLC Phases with Various Agile Methods
318
Artificial intelligence Natural Language
326
Knowledge Acquisition and Quantifying Risk Levels Associated with
336
Transformation of Grammar using Genetic Algorithm
342
Dimensionality Reduction and Reconstruction using Mirroring Neural
348
Automatic Pattern Classification by Unsupervised Learning using
354
Recommender System inspired by ANT Colony
361
Operator for Solving the Traveling Salesman Problem
370
Robust Preprocessing of Source Language in Machine Translation
378
Syntax Tree Construction using Dynamic Data Structure to Evaluate
391
Hidden Web Data Processing for Knowledge Management
397
Optimal Dss for Diagnosis of Cardiac Arrhythmias using PCA Neural
406
Adaptive Signal Prediction using Neural Network
414
Longitudinal Vehicle Control with Neuro Fuzzy Controller using
423
Removal of Noise From EMG Signal using Focused Time Lagged Recurrent
429
Cognitive Science A Methodological Framework for Social Development
439
Artificial Neural Network Based Cumulative Scoring Pattern Method
451
Ontological Architecture for Querying Bioinformatics Databases
458
SVM Based Prediction of TAP Transporter Binding Affinity of Bhendi
465
Genetic Algorithm for Biomolecular Optimization
472
A Novel Approach to Fingerprint Identification using Minutiae Features
479
Customised Iris Extraction from Unfilterd Eye Image and Feature
489
Rotaional invariant Edge Directional Based Coarse Classification
495
Biometric Verification using Contourbased Hand Geometry
505
MultiAlgorithmic Robust Face Detection
515
Fast Secure Memory Efficient and Accurate Fingerprint Verification
522
Agent based Approach
537
A Software Agent
553
An Effective Retrieval Strategy in information Retreival using Data
562
OLAP Data Scalability
568
Tree Based Algorithm for Outlier Detection
576
Refining Quality Requirements in Agent Mediated ECommerce from
590
ELearning Unity of Human Knowledge and Computer
598
Smart Browser for ELearning
607
Image Processing Content Based Image Retrieval
621
Recognition of Cursive Characters using Connectivity of Segments
627
Biomedical Images Resolution Enhancement
637
Approaches to Overlap Estimation in Photo Parts for Panorama Making
644
Seismic Imaging
653
A Region Based Segmentation of Moving foreground Object using
659
Standard Codebook Generation Algorithms for Gray Scale Images
668
Efficient Algorithm for Scale and Pose independent Face Extraction from
674
New Image Compression Technique using Multiwavelets
680
Color Image Segmentation using Wavelet Transform
699
Hiding Digital Watermark using Spread Spectrum at Multiresolution
718
Face Recognition Using Wavelet Hybrid Features and Knearest
738
PrePrinted form Recognition and Extraction of Data
755
Fast Retrieval of Similar or Partially Matching Images in Image Databases
768
Quality Analysis of Color Images Compressed with Enhanced Vector
789
A Cognizant Kmeans Clustering for Low Contrast Image Segmentation
805
Network Based Approach for Image Enhancement using
811
Statistical Approach for Texture Based CBIR System
962
A Multilevel Keyword indexing Method for Contentbased Image Retrieval
978
An Overview of Contentbased Image Retrieval Techniques
992
A CBIR Method for Extracting Similar MRI Scan Images
1010
Comparison of Wavelet based Despeckling of Medical Ultrasound Images
1026
A New Methodology for Segmentation of Functional Magnetic
1040
Dicom Medical Image Compression for Telemedicine Application
1057
Cryptology Steganogarphy and Digital Watermarking
1076
Architecture for information Services on Mobile Devices Based
1085
Reconstruction of A Tree from its Preorder Traversal
1095
Audio Security in Cepstrum Domain using Image Watermarking Techniques
1109
Steganography for Text and Image
1115
Implementation of invisible Image Watermarking using Colour
1125
Information Hiding in Palette Images
1137
Digital Steganography
1146
Digital Watermarking
1152
A New Trend in information Warfare and Security
1158
A Fuzzy Commitment Scheme
1164
Recursive Visual Cryptography
1170
Video Processing
1175
Digital Modulation Scheme Recognition Technique using Radial Basis
1186
Handwritten Numeral Classification using Structural Features
1192
An OCR for Tamil Language
1203
Sketch Conversion and Recognition
1214
Unconstrained Handwritten Kannada Numerals Recognition Based
1224
Gabor Features for Recognition of Handwriten Kannada Numerals
1231
Vector Quantization Applied for Signature Recognition
1237
A Block Based Approach
1247
Performance Analysis of Exact Pattern Matching Algorithms
1259
Word Level Script Identification from Handwritten Document Images
1268
Isolated Kannada Handwritten Numeral Recognition based on Template
1276
Identification and Separation of Text Words of Kannada Telugu Tamil
1283
Recognition of Fossil Leaves Genera Lower Gondwana Flora
1302
Analysis
1323
Development of Novel Fast Block Based MultiValued Symbolic Data
1337
Signal Matched Two Channel Multirate Filter Bank using Nyquist Filter
1356
Design of Digital PLL for High Frequency Clock Generation
1373
Network LIN in MasterSlave Configuration
1380
GSM Mobile Based Steam Monitoring System
1387
Effect of Hamming Code for Error Detection and Correction on Varying
1395
Ramesh Manza and K V Kale
1400
Application of Geographic information System for Optimal Site Selection
1406
Review on Application of GIS and Remote Sensing Technologies
1415
Speech Processing Recognition Human
1421
Dialog Person Identification and Recognition using KMeans Algorithm
1428
Speech Recognition using Artificial Neural Network
1437
Emotion Recognition
1447
Automatic Grapheme to Phone Conversion for Hindi using Machine
1457
A Novel Approach to Deviceless Computer Access for Disabled Users
1465
A CostEffective Solution
1473
Principles and Goals for Efficient interactive
1485
Information and Communication Technology
1492
Traffic Source Modelling for A Multi Service Network
1498
SMS Based Remote Database Access through Mobile
1506
Implemenation of Algorithm for Breaking the Visual Captcha
1516
Abstraction of Structural Components From Legacy C Program
1523
Moulding the Legacy C Programs for Reengineering
1531
Modeling of Distributed Database Design Using UML 2 0
1538
Transaction Scheduling in RealTime Database Systems
1546
Overall Overview of Javaos
1552
Software Performance Modeling of Data Extraction in ETL Processes
1558
Bandwidth Enhancement of Planar Microstrip Antenna using
1567
Software Reliability Increment through Redundancy
1583
SMS Based Hospital information System SHIS
1601
Design Implementation and Simulation of Somatotype Data Models
1618
An Effective Scenario Functionality Model for Requirement Elicitation
1631
A Case Study
1645
Getting Gene Expressions through Micro Array Image of DNA
1661
Copyright

Common terms and phrases

Bibliographic information