Suchergebnisse - "2015 International Conference on Computing Communication Control and Automation"

  1. 1

    Plant Disease Detection Using Image Processing von Khirade, Sachin D., Patil, A. B.

    Veröffentlicht: IEEE 01.02.2015
    “… Identification of the plant diseases is the key to preventing the losses in the yield and quantity of the agricultural product. The studies of the plant …”
    Volltext
    Tagungsbericht
  2. 2

    Intrusion Detection System Using Bagging Ensemble Method of Machine Learning von Gaikwad, D. P., Thool, Ravindra C.

    Veröffentlicht: IEEE 01.02.2015
    “… Intrusion detection system is widely used to protect and reduce damage to information system. It protects virtual and physical computer networks against …”
    Volltext
    Tagungsbericht
  3. 3

    A Review on Hand Gesture Recognition System von Sonkusare, Jayesh S., Chopade, Nilkanth B., Sor, Ravindra, Tade, Sunil L.

    Veröffentlicht: IEEE 01.02.2015
    “… From the ancient age, gesture was the first mode of communication, after the evolution of human civilization they developed the verbal communication, but still …”
    Volltext
    Tagungsbericht
  4. 4

    Robust and Smooth Nonlinear Control of an Industrial Robot for Automated Pick and Place von Sinha, Abhinav, Mishra, Rajiv Kumar, Jaiswal, Supratik

    Veröffentlicht: IEEE 01.02.2015
    “… This paper seeks to achieve an efficient control scheme that can be applied to industrial pick and place robotic manipulators. The mathematical model of this …”
    Volltext
    Tagungsbericht
  5. 5

    Fabric Defect Detection Using Wavelet Filter von Karlekar, Vaibhav V., Biradar, M. S., Bhangale, K. B.

    Veröffentlicht: IEEE 01.02.2015
    “… Fabric defect detection is now an active area of research for identifying and resolving problems of textile industry, to enhance the performance and also to …”
    Volltext
    Tagungsbericht
  6. 6

    Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery Using Self Recovery Blocks von Dhole, Vinayak S., Patil, Nitin N.

    Veröffentlicht: IEEE 01.02.2015
    “… Fragile watermarking is discovered for authentication and content integrity verification. This paper introduces a modified fragile watermarking technique for …”
    Volltext
    Tagungsbericht
  7. 7

    Notice of Violation of IEEE Publication Principles: A Speedy Data Uploading Approach for Twitter Trend and Sentiment Analysis Using HADOOP von Rajurkar, Gaurav D., Goudar, Rajeshwari M.

    Veröffentlicht: IEEE 01.02.2015
    “… The current Analytics tools and models that are available in the market are very costly, unable to handle Big Data and less secure. The traditional Analytics …”
    Volltext
    Tagungsbericht
  8. 8

    Improvement in k-Means Clustering Algorithm Using Data Clustering von Rajeswari, K., Acharya, Omkar, Sharma, Mayur, Kopnar, Mahesh, Karandikar, Kiran

    Veröffentlicht: IEEE 01.02.2015
    “… The set of objects having same characteristics are organized in groups and clusters of these objects reformed known as Data Clustering. It is an unsupervised …”
    Volltext
    Tagungsbericht
  9. 9

    An Effective Method of Controlling the Greenhouse and Crop Monitoring Using GSM von Asolkar, P. S., Bhadade, U. S.

    Veröffentlicht: IEEE 01.02.2015
    “… The advent of green house technology has become most important and most widely used part in daily life because greenhouse environment protects plants from …”
    Volltext
    Tagungsbericht
  10. 10

    Low Cost E-Book Reading Device for Blind People von Kulkarni, Abhinav, Bhurchandi, Kishor

    Veröffentlicht: IEEE 01.02.2015
    “… Document describes e-book reading device for visually impaired people using two electronic refreshable Braille display units. A blind person has access to …”
    Volltext
    Tagungsbericht
  11. 11

    Applying Agile Methodologies in Industry Projects: Benefits and Challenges von Kaur, Kamaljeet, Jajoo, Anuj, Manisha

    Veröffentlicht: IEEE 01.02.2015
    “… Agile software development has been prevalent in IT industry since more than two decades now. Conceptually, Agile was introduced as an iterative, incremental …”
    Volltext
    Tagungsbericht
  12. 12

    Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud von Bharadi, Vinayak Ashok, D'Silva, Godson Michael

    Veröffentlicht: IEEE 01.02.2015
    “… The signature recognition systems are widely used and measure of security and authenticity in terms of commercial as well as official transactions. The …”
    Volltext
    Tagungsbericht
  13. 13

    A Personalized Framework for Health Care Recommendation von Ahire, Shreya B., Khanuja, Harmeet Kaur

    Veröffentlicht: IEEE 01.02.2015
    “… In this world, for any kind of information, people depend on internet. They use search engines like Google to search information over internet. The queries …”
    Volltext
    Tagungsbericht
  14. 14

    Detection of DoS/DDoS Attack against HTTP Servers Using Naive Bayesian von Katkar, Vijay, Zinjade, Amol, Dalvi, Suyed, Bafna, Tejal, Mahajan, Rashmi

    Veröffentlicht: IEEE 01.02.2015
    “… With a growth of E-commerce and availability of resources over internet number of attacks on servers providing these services, resources are also increased …”
    Volltext
    Tagungsbericht
  15. 15

    Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm von Shimbre, Nivedita, Deshpande, Priya

    Veröffentlicht: IEEE 01.02.2015
    “… Cloud computing model is very exciting model especially for business peoples. Many business peoples are getting attracted towards cloud computing model because …”
    Volltext
    Tagungsbericht
  16. 16

    Glass Shaped Antenna with Defected Ground Structure for Cognitive Radio Application von Bramhe, Shital S., Dalal, Akshay, Tajne, Dhanashree, Marotkar, Devashree

    Veröffentlicht: IEEE 01.02.2015
    “… The proposed micro strip-feed antenna consists of glass shaped with defected ground structure for cognitive radio application. The proposed antenna uses FR-4 …”
    Volltext
    Tagungsbericht
  17. 17

    Analysis of Fingerprint Image for Gender Classification or Identification: Using Wavelet Transform and Singular Value Decomposition von Shinde, Mangesh K., Annadate, S. A.

    Veröffentlicht: IEEE 01.02.2015
    “… Fingerprint evidence is undoubtedly the most reliable and acceptable evidence till date in the court of law. Fingerprints are obtained at the site of crime and …”
    Volltext
    Tagungsbericht
  18. 18

    Efficient Intrusion Detection System Using Stream Data Mining Classification Technique von Desale, Ketan Sanjay, Kumathekar, Chandrakant Namdev, Chavan, Arjun Pramod

    Veröffentlicht: IEEE 01.02.2015
    “… Recent emerging growth of data created so many challenges in data mining. Data mining is the process of extracting valid, previously known & comprehensive …”
    Volltext
    Tagungsbericht
  19. 19

    Analysis of Speech Features for Emotion Detection: A Review von Sudhakar, Rode Snehal, Anil, Manjare Chandraprabha

    Veröffentlicht: IEEE 01.02.2015
    “… Emotion detection of speech in human machine interaction is very important. Framework for emotion detection is essential, that includes various modules …”
    Volltext
    Tagungsbericht
  20. 20

    Modular Snake Robot with Mapping and Navigation: Urban Search and Rescue (USAR) Robot von Chavan, Pramod, Murugan, M., Vikas Unnikkannan, E. V., Singh, Abhinavkumar, Phadatare, Pallavi

    Veröffentlicht: IEEE 01.02.2015
    “… This paper focuses on the design of a hyper redundant snake robot inspired from a real biological snake. Snakes have unique capabilities for moving on a wide …”
    Volltext
    Tagungsbericht