Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_30
C. Prashanth, M. N. Naik
{"title":"Design of Compact Multiband Annular-Ring Slot Antenna","authors":"C. Prashanth, M. N. Naik","doi":"10.1007/978-981-10-8797-4_30","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_30","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_39
P. Maratha, Kapil
{"title":"A Comparative Study on Prominent Strategies of Cluster Head Selection in Wireless Sensor Networks","authors":"P. Maratha, Kapil","doi":"10.1007/978-981-10-8797-4_39","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_39","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"703 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_29
C. Pandey, Neeraj Kumar, V. Mishra
{"title":"Analyzing the Applicability of Smartphone Sensors for Roadway Obstacle Identification in an Infrastructure-Free Environment Using a Soft Learning Approach","authors":"C. Pandey, Neeraj Kumar, V. Mishra","doi":"10.1007/978-981-10-8797-4_29","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_29","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_35
H. S. Jennath, S. Adarsh, V. Anoop
{"title":"Distributed IoT and Applications: A Survey","authors":"H. S. Jennath, S. Adarsh, V. Anoop","doi":"10.1007/978-981-10-8797-4_35","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_35","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_66
M. Shafina, S. Aji
{"title":"A Single Image Haze Removal Method with Improved Airlight Estimation Using Gradient Thresholding","authors":"M. Shafina, S. Aji","doi":"10.1007/978-981-10-8797-4_66","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_66","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_18
Radhakrishna Bhat, N. Sunitha
{"title":"A Novel Private Information Retrieval Technique for Private DNS Resolution","authors":"Radhakrishna Bhat, N. Sunitha","doi":"10.1007/978-981-10-8797-4_18","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_18","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_11
R. Gayathri, V. Uma
{"title":"A Review of Description Logic-Based Techniques for Robot Task Planning","authors":"R. Gayathri, V. Uma","doi":"10.1007/978-981-10-8797-4_11","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_11","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_34
G. Selvakumar, K. Ramesh, Shashikant Chaudhari, Manoj Jain
{"title":"Throughput Optimization Methods for TDMA-Based Tactical Mobile Ad Hoc Networks","authors":"G. Selvakumar, K. Ramesh, Shashikant Chaudhari, Manoj Jain","doi":"10.1007/978-981-10-8797-4_34","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_34","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124603135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_36
V. Siddaramappa, K. B. Ramesh
{"title":"DNA-Based XOR Operation (DNAX) for Data Security Using DNA as a Storage Medium","authors":"V. Siddaramappa, K. B. Ramesh","doi":"10.1007/978-981-10-8797-4_36","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_36","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_32
M. Saikia, M. Hussain
{"title":"A Novel Key Predistribution Scheme for Minimum Angle Routing in Wireless Sensor Network","authors":"M. Saikia, M. Hussain","doi":"10.1007/978-981-10-8797-4_32","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_32","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}