Proceedings of the 5th International...
International Conference on Frontiers in Intelligent Computing (2016 :)

FindBook      Google Book      Amazon      博客來     
  • Proceedings of the 5th International Conference on Frontiers in Intelligent Computing = theory and applications : FICTA 2016.. Volume 1 /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing/ edited by Suresh Chandra Satapathy ... [et al.].
    其他題名: theory and applications : FICTA 2016.
    其他題名: FICTA 2016
    其他作者: Satapathy, Suresh Chandra.
    團體作者: International Conference on Frontiers in Intelligent Computing
    出版者: Singapore :Springer Singapore : : 2017.,
    面頁冊數: xxiv, 809 p. :ill., digital ;24 cm.
    內容註: Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India - A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things - Energy Evaluation Model -- Chapter 59. READ - A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language.
    Contained By: Springer eBooks
    標題: Computational intelligence - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-981-10-3153-3
    ISBN: 9789811031533
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入