Advanced Computing Applications, Databases and Networks
Editor(s): Shahin Ara Begum, Prodipto Das
E-ISBN: E 978-81-8487-526-3
Publication Year: 2011
Binding: Hard Back Dimension: 185mm x 240mm Weight: 826
About the book
ADVANCED COMPUTING APPLICATIONS, DATABASES AND NETWORKS focuses on new developments and advances in three major areas of Computer Science. The first part presents some significant contributions and surveys major research areas of Advanced Computing Applications viz. Natural Language Processing, Medical Imaging, Soft Computing Methodologies and a wide variety of its application domains. The second part explains different approaches towards development of Unified Theoretical Model for Database Mining, Dimension Reduction of higher dimensional data and the applicability of Soft Computing Methodologies in Data Mining and Clustering. The third part provides the approaches taken to address the challenging problems in the areas of Wired and Wireless Networks. The chapters in this volume are representative of recent research efforts and advances in the area of Advanced Computing Applications, Databases and Networks, covering both theoretical and application issues.
Table of Contents
Preface / Acknowledgement / Section I: Advanced Computing Applications – Online Identification and Machine Transliteration of Named Entities from English to Telugu Language using Machine Learning Approach / Spelling Correction in Manipuri Text / Optimizing State Probabilities of Biological Systems: A Preliminary Study / NARX Network Prediction in Software Reliability / ANN in Numerals Recognition and Optimization Using PSO / A Comparison of Fuzzy Pattern Recognition Techniques for MR Imaging / An Overview of Fuzzy Sets and Rough Sets in Medical Image Analysis / Genetic Algorithm and Chaos in Information Security / Molecular Mechanism of Eugenol Activity: A computational Study / Metal-Oxide-Semiconductor Devices using Hafnium Oxide as Gate Dielectric: A Simulation Study / Capacitance-Voltage Characteristics of Al/SiO2/SiC-4H Structures Based Metal-Oxide-Semiconductor Devices / Nitrogen at the Near-Interface Region on the Reliability of SiO2/n-type 6H-SiC Metal-Oxide-Semiconductor (MOS) Device: An X-ray Photoelectron Spectroscopy Study / Switching Activity Power Minimization at Various Levels of Abstraction: A Survey / Testing Combinational VLSI Circuit using BDD / Switched-Capacitor ADC / Optimal Assignment Policy for Distributed Systems / An Algorithm and Graphical Representation for the Printer-Binder Sequential Problem / Steganography in Palette-Based Images / On Cloud Computing Deployment Architecture / Quantum Cryptography: A Futuristic Trend in Secure Data Transmission /
E-Payment Facilities and Practices in Silchar SSA – A Case Study / Databases – Data Mining using Fuzzy Set Theory and Evidence Theory / Towards a Unified Theoretical Model of Database Mining / On improvement of the PBM Validity Index for Numeric Data Clustering / Dimension Reduction using Flying Kites: Visualization of Higher Dimensional Data in Two Dimensions / Data Mining into the Performance of All-Rounders in Indian Premier Leagues (IPL) / Applications of Knowledge Management in Banking Sector: An Exploration / Wired and Wireless Networks – Estimation of Multipath Fading Channel of MIMO-OFDM System using ANN / Improving the Signal Quality by Reducing the Uncertain Errors with New Codec / Symbol Synchronization with Schmidl Algorithm for SISO-OFDM with various Fading Channels / The Square Contour Algorithm with Fourier Coefficients / Wireless Sensor Networks: A Brief Overview / Performance Evaluation and Comparison of AODV and AOMDV Routing Protocols / QAODV: An AODV Based Routing Protocol for QoS Parameters / Algorithms and Protocols for Mobile Ad Hoc Networks - A Comparative Study / Need for Cross Layered Protocol in Wireless Multi Hop Ad-Hoc Networks / An Energy-Efficient Multi-hop Protocol for Wireless Sensor Networks / A Hybrid Approach for Connectionless Bluetooth Service Performance Improvement / Improved Ad-Hoc On-Demand Vector Routing / Current Trends in Web Service Security.