did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642289613

Emerging Trends and Applications in Information Communication Technologies

by ; ; ;
  • ISBN13:

    9783642289613

  • ISBN10:

    3642289614

  • Format: Paperback
  • Copyright: 2012-03-10
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $109.99 Save up to $91.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Second International Multi-topic Conference, IMTIC 2012, held in Jamshoro, Pakistan, in March 2012.The 51 revised full papers presented were carefully reviewed and selected from 205 submissions. The papers address topics from information communication technologies.

Table of Contents

Impact Analysis of Renewable Energy in National Grids for Energy Deficit Countriesp. 1
Chebyshev Multiband Patch Antennap. 10
A Compact Multiband Antenna for GSM and WiMAX Applicationsp. 20
Haplotype Segment Algorithm for Predicting Disease Gene Locus Based on Distance/Similarity Measuresp. 31
Effect of Fast Moving Object on RSSI in WSN: An Experimental Approachp. 43
Performance Analysis of Bessel Beamformer and LMS Algorithm for Smart Antenna Array in Mobile Communication Systemp. 52
Adaptive Minimum Entropy Beamforming Algorithms for Narrowband Signalsp. 62
Gender Classification Using Local Binary Pattern and Particle Swarm Optimizationp. 73
Parametric Study of Nonlinear Adaptive Cruise Control Vehicle Model by Vehicle Massp. 81
ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocolp. 92
An External Approach to Improve the Information Content of Diagnostic Ultrasound Imagesp. 101
Comparative Analysis of Group Centric Access Control Modelsp. 110
Nonlinear System Identification Using Neural Networkp. 122
Intrusion Damage Assessment for Multi-stage Attacks for Cloudsp. 132
Emotions in Robotsp. 144
On the Use of the Universal Okumura-Hata Model for Defining Different ICT Areasp. 154
A Novel Approach for Automatic Generation of UML Class Diagrams from XMIp. 164
An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availabilityp. 176
Improvement of Small Signal Performance of Multi Machine Power System Using SMIB Based PSS and STATCOM Designsp. 188
Are QoE Requirements for Multimedia Services Different for Men and Women? Analysis of Gender Differences in Forming QoE in Virtual Acoustic Environmentsp. 200
Facilitating an Off-Site Customer in Product-Based Agile Software Development: An industrial Case Studyp. 210
Segmentation of Brain Tumor Tissue Using Marker Controlled Watershed Transform Methodp. 222
Performance Evaluation of Statistical Techniques for Adaptive Scheduling in Autonomic Systemsp. 228
Angle Differential Modulation Scheme for Odd-Bit QAMp. 240
Adaptive Wavelets Based Fuzzy NN Control for Active Suspension Modelp. 249
Blind Deconvolution of Blurred Images with Fuzzy Size Detection of Point Spread Functionp. 261
Bluetooth Usage Control Policy Enforcement Modelp. 272
A Comparative Study on Particle Swarm Optimization and Genetic Algorithms for Fixed Order Controller Designp. 284
Design of WLAN Patch and UWB Monopole Antennap. 295
Single-Bit Ternary FIR Filter in FPGA Using Canonical Signed Digit Encodingp. 305
A Parametric Analysis of Stream Based Joinsp. 314
Efficient Usage of Memory Resources in Near-Real-Time Data Warehousingp. 326
Classifier Ensemble Framework Based on Clustering Methodp. 338
Usability Cost Benefit Analysis Using a Mathematical Equationp. 349
Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalistp. 361
Capture Largest Included Circles: An Approach for Counting Red Blood Cellsp. 373
Enhanced Image Encryption Techniques Using Modified Advanced Encryption Standardp. 385
Virtual Instrumentation for Control Applicationsp. 397
Data Management in Mobile Wireless Sensor Networksp. 409
Implementation of Load Shedding Apparatus for Energy Management in Pakistanp. 421
JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networksp. 432
Aggregating Node Level Risk Assessment in Grids Using an R-out-of-N Modelp. 445
Hybrid Ant Bee Colony Algorithm for Volcano Temperature Predictionp. 453
Building Wireless Sensor Networks Application Using Sun SPOTsp. 466
Study of Arduino for Creative and Interactive Artwork Installations: An Open Source Software Knowledge for Creativenessp. 478
Developing and Managing SLAs for Business Applications in Information Systemsp. 489
Image Retrieval Based on Color and Texture Feature Using Artificial Neural Networkp. 501
An Objective Based Classification of Aggregation Techniques for Wireless Sensor Networksp. 512
A New Data Compression Technique Using an Evolutionary Programming Approachp. 524
Evaluation of Dc/Dc Buck Converter Controlled by LMS (Least Mean Square) Algorithm for Different Values of Load Capacitorp. 532
Exploiting Multi View Video for Maximizing Lifetime of Wireless Video Sensor Networksp. 541
Author Indexp. 553
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program