|
|
|
|
LEADER |
07495nam a22003375i 4500 |
001 |
000287963 |
005 |
20210903133114.0 |
007 |
cr nn 008mamaa |
008 |
120913s2013 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461433637
|
024 |
7 |
|
|a 10.1007/978-1-4614-3363-7
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing /
|c edited by Vinu V. Das.
|
250 |
|
|
|a 1st ed. 2013.
|
260 |
# |
# |
|a New York, NY :
|b Springer New York :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XIV, 670 p. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|v 150
|
505 |
0 |
|
|a Full Papers -- High Through-put VLSI Architecture for FFT Computation -- Formal Approach to Reliability Improvement with Model Checker -- DDoS attacks Defense System using Information Metrics -- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs) -- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs) -- DoS Attack-resistant Framework for Client/Server Intelligent Computing -- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks -- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine -- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements -- Hybrid Extremal Optimization and Glowworm Swarm Optimization -- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks -- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems -- Developing Embedded Systems from Formal Specifications written in Temporal Logic -- Network log Clustering Using K-means Algorithm -- Improvement Public Key Kerberos using Identity-Based Signcryption -- Intrusion Detection Using Keystroke Dynamics -- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform -- Comparison of Routing Protocols in Mobile Ad-hoc Network -- Analysis of Image Segmentation Algorithms Using MATLAB -- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions -- Mean-Shift Algorithm: Verilog HDL Approach -- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks -- A Security Framework for DDoS Detection In MANETs -- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC) -- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators -- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks -- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation -- Performance Analysis of Different Current Controllers for Active Power Filter -- Optimum LQR Switching Approach for the Improvement of STATCOM Performance -- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine -- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers -- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters -- A Novel Inverter Topology for Low Power Drives -- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods -- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System -- Design of Adaptive FLANN based model for Non-linear Channel Equalization -- Short Papers -- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network -- Voice Transformation using Radial Basis Function -- IPTC based Ontological Representation of Educational News RSS Feeds -- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem -- Automatic Generation of P2P botnet Network Attack Graph -- Parallelization of Fractal Image Compression over CUDA -- Distributed Shared Files Management -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems -- An Algorithm for Traffic Analysis using RFID Technology -- Trust-Based Grid Resource Management -- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach -- An Approach to Encryption using Superior Fractal Sets -- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding -- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network -- Security based Requirements Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based Approach for Heart Disease Prediction -- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks -- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint -- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition -- Performance Evaluation of Web Browsers in Android -- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator® -- Face Recognition Using PCA and Bit-Plane Slicing -- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor -- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters -- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques -- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation -- Artificial Neural Network based Power System Stability Analysis -- Poster Paper -- Efficient Bandwidth Utilization in Client-Server Models -- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz -- Intelligent Enterprise Application Servers - A Vision for self-managing performance -- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems -- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey -- Itinerary Management System -- Trust and Reliability based Scheduling Algorithm for Cloud IaaS -- Hybrid Covert Channel an Obliterate for Information Hiding -- Steganography and Its Technique: Technical Overview -- Data Stream Mining: A Review -- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces -- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler -- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes -- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
|
0 |
|a Computer hardware.
|
650 |
|
0 |
|a Input-output equipment (Computers).
|
650 |
1 |
4 |
|a Circuits and Systems.
|
650 |
2 |
4 |
|a Computer Hardware.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
700 |
1 |
|
|a Das, Vinu V.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|