Suchergebnisse - "2015 International Conference on Computing Communication Control and Automation"
-
1
Plant Disease Detection Using Image Processing
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Identification of the plant diseases is the key to preventing the losses in the yield and quantity of the agricultural product. The studies of the plant …”
Volltext
Tagungsbericht -
2
Intrusion Detection System Using Bagging Ensemble Method of Machine Learning
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Intrusion detection system is widely used to protect and reduce damage to information system. It protects virtual and physical computer networks against …”
Volltext
Tagungsbericht -
3
A Review on Hand Gesture Recognition System
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… From the ancient age, gesture was the first mode of communication, after the evolution of human civilization they developed the verbal communication, but still …”
Volltext
Tagungsbericht -
4
Robust and Smooth Nonlinear Control of an Industrial Robot for Automated Pick and Place
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… This paper seeks to achieve an efficient control scheme that can be applied to industrial pick and place robotic manipulators. The mathematical model of this …”
Volltext
Tagungsbericht -
5
Fabric Defect Detection Using Wavelet Filter
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Fabric defect detection is now an active area of research for identifying and resolving problems of textile industry, to enhance the performance and also to …”
Volltext
Tagungsbericht -
6
Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery Using Self Recovery Blocks
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Fragile watermarking is discovered for authentication and content integrity verification. This paper introduces a modified fragile watermarking technique for …”
Volltext
Tagungsbericht -
7
Notice of Violation of IEEE Publication Principles: A Speedy Data Uploading Approach for Twitter Trend and Sentiment Analysis Using HADOOP
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… The current Analytics tools and models that are available in the market are very costly, unable to handle Big Data and less secure. The traditional Analytics …”
Volltext
Tagungsbericht -
8
Improvement in k-Means Clustering Algorithm Using Data Clustering
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… The set of objects having same characteristics are organized in groups and clusters of these objects reformed known as Data Clustering. It is an unsupervised …”
Volltext
Tagungsbericht -
9
An Effective Method of Controlling the Greenhouse and Crop Monitoring Using GSM
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… The advent of green house technology has become most important and most widely used part in daily life because greenhouse environment protects plants from …”
Volltext
Tagungsbericht -
10
Low Cost E-Book Reading Device for Blind People
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Document describes e-book reading device for visually impaired people using two electronic refreshable Braille display units. A blind person has access to …”
Volltext
Tagungsbericht -
11
Applying Agile Methodologies in Industry Projects: Benefits and Challenges
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Agile software development has been prevalent in IT industry since more than two decades now. Conceptually, Agile was introduced as an iterative, incremental …”
Volltext
Tagungsbericht -
12
Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… The signature recognition systems are widely used and measure of security and authenticity in terms of commercial as well as official transactions. The …”
Volltext
Tagungsbericht -
13
A Personalized Framework for Health Care Recommendation
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… In this world, for any kind of information, people depend on internet. They use search engines like Google to search information over internet. The queries …”
Volltext
Tagungsbericht -
14
Detection of DoS/DDoS Attack against HTTP Servers Using Naive Bayesian
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… With a growth of E-commerce and availability of resources over internet number of attacks on servers providing these services, resources are also increased …”
Volltext
Tagungsbericht -
15
Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Cloud computing model is very exciting model especially for business peoples. Many business peoples are getting attracted towards cloud computing model because …”
Volltext
Tagungsbericht -
16
Glass Shaped Antenna with Defected Ground Structure for Cognitive Radio Application
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… The proposed micro strip-feed antenna consists of glass shaped with defected ground structure for cognitive radio application. The proposed antenna uses FR-4 …”
Volltext
Tagungsbericht -
17
Analysis of Fingerprint Image for Gender Classification or Identification: Using Wavelet Transform and Singular Value Decomposition
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Fingerprint evidence is undoubtedly the most reliable and acceptable evidence till date in the court of law. Fingerprints are obtained at the site of crime and …”
Volltext
Tagungsbericht -
18
Efficient Intrusion Detection System Using Stream Data Mining Classification Technique
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Recent emerging growth of data created so many challenges in data mining. Data mining is the process of extracting valid, previously known & comprehensive …”
Volltext
Tagungsbericht -
19
Analysis of Speech Features for Emotion Detection: A Review
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… Emotion detection of speech in human machine interaction is very important. Framework for emotion detection is essential, that includes various modules …”
Volltext
Tagungsbericht -
20
Modular Snake Robot with Mapping and Navigation: Urban Search and Rescue (USAR) Robot
Veröffentlicht: IEEE 01.02.2015Veröffentlicht in 2015 International Conference on Computing Communication Control and Automation (01.02.2015)“… This paper focuses on the design of a hyper redundant snake robot inspired from a real biological snake. Snakes have unique capabilities for moving on a wide …”
Volltext
Tagungsbericht