Search Results - categorical data analysis

Refine Results
  1. 1

    Big Data Analytics Proceedings of CSI 2015 /

    Published 2018
    Table of Contents: “…Title of the Papers along with the Name of the Authors -- Need for Developing Intelligent Interfaces for Big Data Analytics in the Micro Finance Industry -- Unified Resource Descriptor over KAAS Framework Refining Cloud Dynamics -- An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing -- A Framework for Ontology Learning from Taxonomic Data -- Leveraging Map-Reduce with Column Oriented Stores: Study of Solutions and Benefits -- Hadoop: Solution to Unstructured Data Handling -- Task Based Load Balancing Algorithm by Efficient Utilization of VMs in Cloud Computing -- A Load Balancing Algorithm Based on Processing Capacities of VMs in Cloud Computing -- Package Based Approach for Load Balancing in Cloud Computing -- Workload Prediction of e-Business Websites on Cloud Using Different Methods of ANN -- Data Security in Cloud Based Analytics -- Ontology Based Ranking in Search Engine -- Hidden Data extraction Using URL Templates Processing -- Automatic Generation of Ontology for Extracting Hidden Web Pages -- Importance of SLA in Cloud Computing -- A Survey on Cloud Computing -- Adapting & Reducing Cost in Cloud Paradigm (ARCCP) -- Power Aware Based Workflow Model of Grid Computing Using Ant Based Heuristic Approach -- Image Categorization Using Improved Data Mining Technique -- An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security -- Big Data Analytics: Recent and Emerging Application in Services Industry -- An Analysis of Resource Aware Adaptive Scheduling for HPC Clusters with Hadoop -- Analytical and Perspective Approach of Big Data in Cloud Computing -- Implementation of CouchDB Views -- Evolution of FOAF and SIOC in Semantic Web: A Survey -- Classification of e-Commerce Products Using Rep-Tree And K-Mean Hybrid Approach -- A Study of Factors Affecting MapReduce Scheduling -- Outlier Detection in Agriculture Domain: Application and Techniques -- A Framework for Twitter Data Analysis -- Web Structure Mining Algorithms: A Survey -- Big Data Analytics via IoT with Cloud Service -- A Proposed Contextual Model for Big Data Analysis Using Advanced Analytics -- Ranked Search over Encrypted Cloud Data in Azure Using Secure kNN -- DCI3 Model for Privacy Preserving in Big Data -- Study of Sentiment Analysis Using Hadoop -- OPTIMA(OPinionated Tweet Implied Mining and Analysis) - An Innovative Tool to Automate Sentiment Analysis -- Mobile Agent Based MapReduce Framework for Big Data Processing -- Review of Parallel Apriori Algorithm on Map Reduce Framework for Performance Enhancement -- A Novel Approach to Realize Internet of Intelligent Things -- An Innovative Approach of Web Page Ranking Using Hadoop and MapReduce Based Cloud Framework -- SAASQUAL: A Quality Model for Evaluating SaaS on the Cloud Computing Environment -- Scalable Aspect Based Summarization in the Hadoop Environment -- Parallel Mining of Frequent Itemsets from Memory Mapped Files -- Handling Smurfing Through Big Data -- A Novel Approach for Semantic Prefetching Using Semantic Information and Semantic Association -- Optimized Cost Model with Optimal Resource Usage for Cloud -- Understanding Live Migration Techniques Intended for Resource Interference Minimization in Virtualized Cloud Environment -- Cloud Security Issues and Challenges -- A Novel Approach to Protect Cloud Environments Against DDOS Attacks -- An Approach for Workflow Scheduling in Cloud Using ACO -- Data Type Identification and Extension Validator Framework Model for Public Cloud Storage -- Robust Fuzzy Neuro System for Big Data Analytics -- Deployment of Cloud Using Open Source Virtualization: Study of VM Migration Methods and Benefits -- Implementation of Category-wise Focused Web Crawler -- MAYA: An Approach for Energy and Cost Optimization for Mobile Cloud Computing Environments -- Load Balancing in Cloud - A Systematic Review -- Cloud-Based Big Data Analytics - A Survey of Current Research and Future Directions -- Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler'sTheorem and Application in Cloud Computing -- Big Data: Issues, Challenges and Techniques in Business Intelligence -- Cloud Computing in Bioinformatics and Big Data Analytics: Current Status and Future Research -- Generalized Query Processing Mechanism in CDBMS -- Deliberative Study of Security Issues in Cloud Computing -- Green Cloud Computing: An Overview -- Literature Review of QoS with Load Balancing in Cloud Computing Environment -- WAMLB: Weighted Active Monitoring Load Balancing in Cloud Computing -- Applications of Attribute Based Encryption in Cloud Computing Environment -- Query Optimization: Issues and Challenges in Mining of Distributed Data -- Comprehensive Study of Cloud Computing and Related Security Issues -- Healthcare Data Analysis Using R and MongoDB -- Data Mining Tools and Techniques for Mining Software Repositories: A Systematic Review -- SWOT Analysis of Cloud Computing Environment -- A Review on Quality of Service in Cloud Computing -- Association Rule Mining for Finding Admission Tendency of Engineering Student with Pattern Growth Appraoch -- Integrated Effect of Nearest Neighbors and Distance Measures in k-NN Algorithm.…”
    Full-text access
    View in OPAC
    e-Book
  2. 2

    Computational Analysis of Sound Scenes and Events

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  3. 3
  4. 4

    Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 /

    Published 2016
    Table of Contents: “…A New Approach to Intuitionistic Fuzzy Soft Sets and its Application in Decision Making -- Chapter 13. Categorical Data Clustering Based on Cluster Ensemble Process -- Chapter 14. …”
    Full-text access
    View in OPAC
    e-Book
  5. 5
  6. 6

    Information and Communication Technology for Competitive Strategies Proceedings of Third International Conference on ICTCS 2017 /

    Published 2019
    Table of Contents: “…Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication -- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices -- Performance Analysis of Parallel Implementation of Morphological Operations -- US Dollar's Influence on Indian Gold price Assessment using Artificial Neural Network -- Attribute based storage mechanism with de-duplication filter: A Review Paper -- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm -- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph -- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization -- Digitization of Disaster Management: A Multimedia Ontological Approach -- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics -- Most Persistent Feature Selection method for Opinion mining of social media reviews -- PhysicalLayer Security with Energy Harvesting Techniques: A Study -- One-tip Secure: Nex-Gen of Text Based Password -- New Text Based User Authentication Scheme Using CAPTCHA -- FPGA Implementation of Parallel Transformative Approach in AES Algorithm -- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals -- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation -- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data -- Age classification with LPCC features using SVM and ANN -- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers -- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE -- Decision Tree Algorithms for prediction of Heart Diseases -- Green communication for wireless cooperative networks: A survey -- Instance Selection using Multi-objective CHC Evolutionary Algorithm -- Inclusive device to connect people with the surrounding World -- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method -- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry -- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants -- Hand Geometry and Palmprint Based Biometric System with Image Deblurring -- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology -- Syllable Based Concatenative Speech Synthesis for Marathi Language -- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications -- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique -- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs -- Privacy Preserving K-NN Classification Using Vector Operations -- A Comparative Study on Segmentation Techniques for Brain Tumor MRI -- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW -- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm -- Synthesis of Reversible Array Divider Circuit -- Finding Right Doctors and Hospitals: A Personalized Health Recommender -- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm -- Simulation of Phasor Measurement Unit for Research and Teaching Applications -- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks -- Various Machine Learning Algorithms for Twitter Sentiment Analysis.…”
    Full-text access
    View in OPAC
    e-Book
  7. 7

    Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications /

    Published 2018
    Table of Contents: “…Introduction -- Part I: Privacy and game theory -- A Novel Perfect Privacy PIR scheme for Privacy Critical Applications -- Heterogeneous Sensor Privacy Protection with Stackelberg Privacy Games -- Intelligent Access Control: A Self-Adaptable Trust Based Access Control Framework (SATBAC) using Game Theory Strategy -- Public Key Cryptosystem for Privacy Sensitive Location Based Services -- Stochastic Tools for Network Intrusion Detection -- Part II: High performance computing and the cloud -- Accelerating the Big Data Analytics by GPU based Machine Learning: A Survey -- Multimedia Data Management for Disaster Situation Awareness -- On the Need of Security Standards in Big Data Information Flow -- Using Markov models and statistics to learn, extract, fuse, and detect patterns in raw data -- Dynamic Firewall Policy Management Framework for Private Cloud -- Security threats and solutions for virtualization and migration in virtual machines -- Techniques to certify integrity and proof of existence for a periodical re-encryption based long term archival systems -- Part III: Networking and the Internet of Things (IoT) -- A Study of Contact Durations for Vehicle to Vehicle Communications -- Evolution of Sensors leading to Smart Objects and Security Issues in IoT -- Flexible Bandwidth Scheduling for Streaming Data Movement Over Dedicated Networks -- Internet of Things: Current Trends and Emerging Prospects -- Measurements and Analytics of Data Transport Over Dedicated Connections -- Trends and Future Directions of Research for Smart Grid IoT Sensor Networks -- SCADA: Analysis of Attacks on Communication Protocols -- Part IV: Bioinformatics -- TASB-AC: Term Annotated Sliding-window based Boosting Associative Classifier for DNA Repair Gene Categorization -- Temporal analysis of stress classification using QRS complex of ECG signals -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  8. 8
  9. 9

    Fuzzy Pictures as Philosophical Problem and Scientific Practice A Study of Visual Vagueness / by Cat, Jordi

    Published 2017
    Table of Contents: “…Pictorial representation and simplicity of categorization -- 19. Fuzzy visual thinking: interpreting and thinking with fuzzy pictures and fuzzy data -- 20. …”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2018)

    Published 2018
    Table of Contents: “…Content -- -- Part(1) Swarm intelligence and optimzation -- A Hybrid Grey Wolf-Bat Algorithm for Global Optimization -- Fractional Order Sliding Mode PID Controller/Observer for Continuous Nonlinear Switched Systems with PSO Parameter Tuning -- Modified Optimal Foraging Algorithm for Parameters Optimization of Support Vector Machine -- Pareto based Bat Algorithm for Multi Objectives Multiple Constraints Optimization in GMPLS Networks -- Fish Image Segmentation using Salp Swarm Algorithm -- Swarming behaviors of chicken for predicting posts on Facebook branding pages -- Enhancing AGDE algorithm using population size reduction for global numerical optimization -- Simulated Annealing based Quantum Inspired Automatic Clustering Technique -- Hybrid grasshopper optimization algorithm and support vector machines for automatic seizure detection in EEG Signals -- A Novel Genetic Algorithm Based k-means Algorithm for Cluster Analysis -- Pairwise Global Sequence Alignment using Sine-Cosine Optimization Algorithm -- An automated fish species identification system based on crow search algorithm -- Part(2) Fuzzy Logic and applications -- Design and implementation of Fuzzy PID controller into Multi agent Smart Library System Prototype -- Fuzzy Logic controller with color vision system tracking for mobile manipulator robot -- Interactive Fuzzy Cellular Automata for Fast Person Re-Identification -- Decision Support System for Determination of Forces Applied in Orthodontic based on Fuzzy Logic -- Part (3) Advanced Machine Learning and Applications -- Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs -- Machine Learning: A Convergence of Emerging Technologies in Computing -- Discrimination of Satellite Signals from Opencast Mining of Mineral Ores of Hematite and Uranium using Digital Image Processing and Geostatistical Algorithms -- Detecting Cross-Site Scripting Attacks using Machine Learning -- Text Mining Approach to Extract Associations between Obesity and Arabic Herbal Plants -- A Reinforcement Learning-based Adaptive Learning System -- Performance Evaluation of SVM-Based Amazighe Named Entity Recognition -- Trained Neural Networks Ensembles Weight Connections Analysis -- An Empirical Analysis of User Behavior for P2P IPTV Workloads -- Intelligent Decision Framework to Explore And control Infection Of Hepatitis C Virus -- Supervised Rainfall Learning Model using Machine Learning Algorithms -- Reducing Stage Weight Estimation Error of Slow Task Detection in MapReduce Scheduling -- Analysis of Complete-Link Clustering for Identifying Multi-attributes Software Quality Data -- Student Profile in E-learning Environment Based on Two-Dimensional Ontologies -- Comparative Sentiment Analysis on a Set of Movie Reviews using Deep Learning Approach -- Medical Equipment Failure Rate Analysis Using Supervised Machine Learning -- Part(4) Big data and classification -- Big-Data Aggregating, Linking, Integrating and Representing using Semantic Web Technologies -- Computer Aided Diagnostic System for Automatic Detection of Brain Tumor through MRI Using Clustering Based Segmentation Technique and SVM Classifier -- Feature selection using Genetic algorithm for big data -- Prediction of Liver Diseases Based on Machine Learning Technique for Big Data -- Stance Detection in Tweets Using a Majority Vote Classifier -- A Comparative Study of Classification Methods for Flash Memory Error Rate Prediction -- Opinion extraction and classification of real time YouTube cooking recipes comments -- A Framework for Big Data Analysis in Smart Cities -- Performance Enhancement of Distributed Clustering for Big Data Analytics -- Open Circuit Fault Diagnosis of Cascaded H-Bridge MLI using k-NN Classifier based on PPCA -- Improved Production Key Performance Indicators (KPI's) Using Intelligent-Manufacturing Execution Systems (I-MES) -- Improving Land-Cover and Crop-Types Classification of Sentinel-2 Satellite Images -- GPU-based CAPSO with N-Dimension Particles -- Machine Learning and Big Data Processing: A Technological Perspective and Review -- Harnessing the power of Big Data in Science -- Building Online Social Network Dataset for Arabic Text Classification -- Breast Cancer Detection and Classification using Thermography: A Review -- An Optimized K-Nearest Neighbor Algorithm for Extending Wireless Sensor Network Lifetime -- Efficient Sentiment Analysis Approach Using Feature Selection and Classifier Ensemble -- Part(5) Intelligent Systems and Applications -- Development of an Ontology Based Solution for Energy Saving Through a Smart Home in the City of Adrar in Algeria -- Embeddings of Categorical Variables for Sequential Data in Fraud Context -- Hybrid Information Filtering Engine for Personalized Job Recommender System -- Behaviorally-Based Textual Similarity Engine for Matching Job-Seekers with Jobs -- Adaptive Task Scheduling on Multicore Processors -- PFastNCA: Parallel Fast Network Component Analysis for gene regulatory network -- Robots That Can Mix Serious With Fun -- Dialect versus MSA Sentiment Analysis -- Energy Aware Optimized Hierarchical Routing Technique for Wireless Sensor Networks -- Multi-filter Score-level Fusion for Fingerprint Verification -- Color Image Segmentation of Fishes with Complex Background in Water -- Analysis of Credit Risk Prediction using ARSkNN -- Dental Age Estimation in East Asian Population with Least Squares Regression -- Text Mining Approach to Analyse Stock Market Movement -- Stock Market Real Time Recommender Model Using Apache Spark Framework -- Patient Fingerprint Minutiae based Medical Image Watermarking and Adaptive Integrity -- Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment -- Gray matter volume abnormalities in the reward system in first-episode patients with major depressive disorder .…”
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Thriving Rough Sets 10th Anniversary - Honoring Professor Zdzisław Pawlak's Life and Legacy & 35 Years of Rough Sets /

    Published 2017
    Table of Contents: “…Part 1: Historical Review of Professor Zdzisław Pawłak and Rough Set -- The Born and Growing of Chinese Rough Set Community with Help of Professor Zdzisław Pawłak -- Zdzisław Pawłak as I Saw Him and Remember Him Now -- Recent Development of Rough Computing: A Scientometrics View -- Part 2: Review of Rough Set Research -- Rough Sets, Rough Mereology and Uncertainty -- Rough Sets in Machine Learning: A Review -- Application of Tolerance Rough Sets in Structured and Unstructured Text Categorization: A Survey -- Medical Diagnosis: Rough Set View -- Rough Set Analysis of Imprecise Classes -- Pawłak's Many Valued Information System, Non-deterministic Information System, and a Proposal of New Topics on Information Incompleteness Toward the Actual Application -- Part 3: Rough Set Theory -- From Information Systems to Interactive Information Systems -- Back to the Beginnings: Pawłak's Definitions of the Terms Information System and Rough Set -- Knowledge and Consequence in AC Semantics for General Rough Sets -- Measuring Soft Roughness of Soft Rough Sets Induced by Covering -- Rough search of vague knowledge -- Vagueness and Uncertainty: An F-Rough Set Perspective -- Directions of Use of the Pawłak's Approach to Conflict Analysis -- Lattice Structure of Variable Precision Rough Sets -- Part 4: Rough Set Based Data Mining -- Mining for Actionable Knowledge in Tinnitus Datasets -- Rough-Granular Computing for Relational Data -- The Boosting and Bootstrap Ensembles for the Pair Classifier Based on the Dual Indiscernibility Matrix.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12

    Cognitive Informatics and Soft Computing Proceeding of CISC 2017 /

    Published 2019
    Table of Contents: “…Multi-Tumor Detection and Analysis Based on Advance Region Quantitative Approach of Brest MRI -- A Secure and Computational Efficient Multicast Key Distribution for Wireless Networks -- Data Mining Approaches for Correlation and Cache Replacement in Wireless Ad Hoc Networks -- An approach to detect an image as a Selfie using object recognition methods -- T wave Analysis: Potential Marker of Arrhythmia and Ischemia Detection-A Review -- Functional Link Artificial Neural Network (FLANN) based Design of a Conditional Branch Predictor -- Development of a Model Recommender System for Agriculture using Apriori Algorithm -- Emotion Speech Recognition based on Adaptive Fractional Deep Belief Network and Reinforcement Learning -- A Change Detection Technique using Rough C-Means on Medical Images -- Autonomous Path Guiding Robot for Visually Impaired People -- Analysis of Diabetes for Indian Ladies using Deep Neural Network -- A Survey: Classification of Big Data -- Security Measures In Distributed Approachof Cloud Computing -- The Extent Analysis Based Fuzzy AHP Approach for Relay Selection in WBAN -- Fingerprint Classification by Filter Bank Approach Using Evolutionary ANN -- A sequence based Cellular Manufacturing System design using Genetic Algorithm -- Multimodal Biometrics Authentication using Multiple Matching Algorithm -- Kinship Verification from facial images using feature descriptors -- A Feature Averaging method for Kinship Verification -- An Artificial Intelligence Technique for Low Order Harmonic Elimination in Multilevel Inverters -- A Hybrid Approach to Address IP Traceback Problem using Nature Inspired Algorithm -- OEFC Algorithm - Sentiment Analysis on Goods and Service Tax System in India -- Graph Based Sentiment Analysis Model for E-Commerce websites' data -- Isolated Word Recognition based on Different Statistical Analysis and Feature Selection Technique -- Keyword Extraction from Tweets using Weighted Graph -- A novel method for Epileptic EEG classification using DWT, MGA, andANFIS: A real time application to cardiac patients with epilepsy -- Exploring hybrid recommender systems for personalized travel applications -- Aggregated Rank in First-Fit-Decreasing for Green Cloud Computing -- Real-Time Vehicle-Type Categorization and Character Extraction from the License Plates -- Ranking decision rules using rough set theory - A comparative analysis -- Performance Comparison of Clustering Algorithms based Image Segmentation on Mobile Devices -- An Enhanced Approach to Memetic Algorithm used for Character Recognition -- Performance Analysis of Extreme Learning Machine Variants with varying Intermediate Nodes and Different Activation Functions -- Role of Filter Sizes in effective Image Classification using Convolutional Neural Network -- Sentiment Analysis on Product Reviews Using Machine Learning Techniques -- Optimization of Electricity Bill on Study of Energy Audit by Using Grid Integration of Renewable Energy Sources -- Computer Aided Diagnosis of Epilepsy Based on the Time-Frequency Texture Descriptors of EEG Signals Using Wavelet Packet Decomposition and Artificial Neural Network -- User identification methods in Cognitive Radio Networks -- Design and Performance Analysis of Optical Signal Processing Module in Open Air & Underwater Environment -- Analysis of Jitter and Shimmer for Parkinson's disease diagnosis using telehealth -- Real Time Bio-Medical Recursive Images Detection Algorithm for Indian Telemedicine Environment -- Application of Multi Domain Fusion Methods for Detecting Epilepsy from Electroencephalogram Using Classification Methods -- A Cognitive Approach for Design of Smart Toilet in Healthcare Units -- A Novel Trimet Graph Optimization (TGO) topology for Wireless Networks.…”
    Full-text access
    View in OPAC
    e-Book
  13. 13

    Proceedings of the International Conference on Microelectronics, Computing & Communication Systems MCCS 2015 /

    Published 2018
    Table of Contents: “…A Secure Three-Factor Remote User Authentication Scheme Using Elliptic Curve Cryptosystem -- Implementation of Fingerprint-Based Biometric System and Its Integration With Hrms Application At Rdcis, Sail -- Fabrication and Investigation of Low Voltage Programmable Flash Memory Gate Stac -- An Effective Method For Maintenance Scheduling of Vehicles Using Neural Network -- Universally Verifiable Certificateless Signcryption Scheme For Manet -- Impact of Sidewall Spacer Layers On The Analog/Rf Performance of Nanoscale Double-Gate Junctionless Transistors -- A Novel Data Encryption Approach In The Grid Structured Binary Image -- Analysis of Electromagnetic Wave Using Explicit FDTD in TM Mode with Extrapolation -- A Dea Based Evolutionary Computation Model For Stock Market Forecasting -- Electrical Equivalent Model For Gene Regulatory System -- Colour Image Segmentation Techniques: A Survey -- Wireless Image Sensor Networks: A Review -- Design of A Low Cost Heart Rate Monitoring System -- Design of Da Based Fir Filter Architectures Using Lut Reduction Techniques -- Fractional Delay Fir Filter Architecture Using Numeric Strength Reduction Techniques -- Lifetime Enhancement of Wsn Based On Modified Heterogeneous Leach Protocol -- Modeling and Investigation of Electrothermally Actuated Micro-Gripper -- An Ultra Low Power Internet Controlled Home Automation System -- Depth Averaged Velocity Distribution For Symmetrical and Asymmetrical Compound Channels -- A 0.533 Db Noise Figure, 7 Mw Narrowband  Low Noise Amplifier For Global Position System Application -- Design of Ultra Low Power Cmos Class E Power Amplifier -- Cryptic Mining For Automatic Variable Key Based Cryptosystem -- Single Mode Negative Dispersion Hexagonal Photonic Crystal Fiber -- Improved Clustering For Categorical Data With Genetic Algorithm -- Balanced Wrapper Design To Test The Embedded Core Partitioned Into Multiple Layer For 3d Soc Targeting Power and Number of TSVS -- Investigations On The Logic Performance of Hybrid Cmosfets Comprising P-Ge/ N-Ingaas Mosfets With  Barrier Layers -- Antenna Path Loss Propagation Model In The Dehradun Valley At 1800 Mhz In L- Band -- Reduction of Dark Current In Qwip -- Design of Circular Disc Monopole Antenna For Uwb Application.…”
    Full-text access
    View in OPAC
    e-Book
  14. 14

    Systems Engineering in Context Proceedings of the 16th Annual Conference on Systems Engineering Research /

    Published 2019
    Table of Contents: “…-- Review and Constructive Definitions for Mathematically Engineered Systems as Categorical Interpretation -- Systems Engineering Grand Challenges in Security and Safety -- Application of the Rayleigh Model to Predict Information Technology Program Cost and Schedule Performance -- Integrating set-based design into cost analysis -- A proposed application of systems engineering principles to healthcare decision-making: evaluating patient decision regret in the treatment of oropharyngeal cancer -- How frustrations about oversight can lead to inefficiencies in contractor work -- A method to use the SoS Explorer application with fuzzy-genetic algorithms to support military veterans within higher education -- DisplayText cannot span more than one -- The Data-Ontology-Rule Footing: A Building Block for Knowledge-based -- Why not Teaching systems Architecture as a Studio Art Class? …”
    Full-text access
    View in OPAC
    e-Book
  15. 15

    Proceedings of the International Conference on Signal, Networks, Computing, and Systems ICSNCS 2016, Volume 1 /

    Published 2017
    Table of Contents: “…The Role of Fractal Dimension, Lacunarity and Multifractal Dimension for Texture Analysis in SAR Image- A Comparison Based Analysis -- Chapter 14. …”
    Full-text access
    View in OPAC
    e-Book
  16. 16

    Intelligent Engineering Informatics Proceedings of the 6th International Conference on FICTA /

    Published 2018
    Table of Contents: “…Content-Aware Reversible Data Hiding: Urhs -- 6. Application of TF-IDF Feature for Categorizing Documents of Online Bangla Web Text Corpus -- 7. …”
    Full-text access
    View in OPAC
    e-Book
  17. 17
  18. 18

    Disciplinary Convergence in Systems Engineering Research

    Published 2018
    Table of Contents: “…Model-based Engineering: Analysis of Alternatives for Optical Satellite Observation -- Chapter26. …”
    Full-text access
    View in OPAC
    e-Book
  19. 19
  20. 20

    Proceedings of International Conference on Computer Vision and Image Processing CVIP 2016, Volume 1 /

    Published 2017
    Table of Contents: “…Video Synopsis for IR Imagery Considering Video as a 3D Data Cuboid -- Chapter 22. Performance Analysis of Texture Image Retrieval in Curvelet, Contourlet and Local Ternary Pattern Using DNN and ELM Classifiers for MRI Brain Tumor Images -- Chapter 23. …”
    Full-text access
    View in OPAC
    e-Book