Mahesh S. Shewale, Sharad S. Mulik, Suhas P. Deshmukh, A. Patange, Hrishikesh B. Zambare, Advait P. Sundare
{"title":"Novel Machine Health Monitoring System","authors":"Mahesh S. Shewale, Sharad S. Mulik, Suhas P. Deshmukh, A. Patange, Hrishikesh B. Zambare, Advait P. Sundare","doi":"10.1007/978-981-13-1610-4_47","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_47","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harshit Pandey, P. Ranjan, Saumay Pushp, M. Tripathy
{"title":"Optimal Rate Allocation for Multilayer Networks","authors":"Harshit Pandey, P. Ranjan, Saumay Pushp, M. Tripathy","doi":"10.1007/978-981-13-1610-4_66","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_66","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fog Computing Paradigm: A Rising Need of IoT World","authors":"Shivani Desai, Ankit Thakkar","doi":"10.1007/978-981-13-1610-4_39","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_39","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramasubbareddy Somula, Y. Narayana, S. Nalluri, Anilkumar Chunduru, K. V. Sree
{"title":"POUPR: Properly Utilizing User-Provided Recourses for Energy Saving in Mobile Cloud Computing","authors":"Ramasubbareddy Somula, Y. Narayana, S. Nalluri, Anilkumar Chunduru, K. V. Sree","doi":"10.1007/978-981-13-1610-4_59","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_59","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122758817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Allocation of Cloud Resources in a Dynamic Way Using an SLA-Driven Approach","authors":"S. Anithakumari, K. Chandrasekaran","doi":"10.1007/978-981-13-1610-4_42","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_42","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Folding Automaton for Paths and Cycles","authors":"N. Subashini, K. Thiagarajan, J. Padmashree","doi":"10.1007/978-981-13-1610-4_67","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_67","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"S-LSTM-GAN: Shared Recurrent Neural Networks with Adversarial Training","authors":"Amit Adate, B. Tripathy","doi":"10.1007/978-981-13-1610-4_11","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_11","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"78 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Music Composition Inspired by Sea Wave Patterns Observed from Beaches","authors":"C. Florintina, E. Gopi","doi":"10.1007/978-981-13-1610-4_5","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_5","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Runoff Using Feed Forward-Back Propagation and Layer Recurrent Neural Networks","authors":"D. K. Ghose","doi":"10.1007/978-981-13-1610-4_8","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_8","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Models with Threshold Cryptography for Withdrawal of Nodes Certificate in Mobile Ad Hoc Networks","authors":"Priti Swapnil Rathi, Kanika Bhalla, C. Rao","doi":"10.1007/978-981-13-1610-4_49","DOIUrl":"https://doi.org/10.1007/978-981-13-1610-4_49","url":null,"abstract":"","PeriodicalId":133916,"journal":{"name":"Proceedings of the 2nd International Conference on Data Engineering and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129607381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}