Proceedings of the 5th International...
International Conference on Frontiers in Intelligent Computing (2016 :)

FindBook      Google Book      Amazon      博客來     
  • Proceedings of the 5th International Conference on Frontiers in Intelligent Computing = theory and applications : FICTA 2016.. Volume 2 /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing/ edited by Suresh Chandra Satapathy ... [et al.].
    其他題名: theory and applications : FICTA 2016.
    其他題名: FICTA 2016
    其他作者: Satapathy, Suresh Chandra.
    團體作者: International Conference on Frontiers in Intelligent Computing
    出版者: Singapore :Springer Singapore : : 2017.,
    面頁冊數: xxiv, 685 p. :ill., digital ;24 cm.
    內容註: Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field -- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations -- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications -- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment -- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs -- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree -- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention -- Chapter 9. Low Power 14T Hybrid Full Adder Cell -- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm -- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence -- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition -- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage -- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API -- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing -- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm -- Chapter 17. A Novel Representation for Classification of User Sentiments -- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model -- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application -- Chapter 20. Multi-objective IT Professionals' Utilization Problems Using Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier -- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features -- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification -- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network -- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization -- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques -- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach -- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications -- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise -- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications -- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) -- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques -- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus -- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier -- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews -- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data -- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews -- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis -- Chapter 43. Approach for Emotion Extraction from Text -- Chapter 44. Bio-inspired Algorithms for Mobile Location Management - A New Paradigm -- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations - A Novel Approach -- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image -- Chapter 47. Analysis of Logs by Using Logstash -- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining -- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design -- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System -- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM -- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks -- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process -- Chapter 54. Confidentiality and Storage of Data in Cloud Environment -- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing -- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method -- Chapter 57. Series Smart Wire - Managing Load and Congestion in Transmission Line -- Chapter 58. Recognizing Human Faces with Tilt -- Chapter 59. Word-Level Script Identification from Scene Images -- Chapter 60. Writer Specific Parameters for Online Signature Verification -- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network -- Chapter 62. TKAR: Efficient Mining of Top - k Association Rules on Real - Life Datasets -- Chapter 63. Predicting Defect of Software System -- Chapter 64. Fusion of Medical Image Using STSVD -- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid -- Chapter 66. A Method for the Selection of Agile Methods Using AHP -- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network -- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images -- Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
    Contained By: Springer eBooks
    標題: Artificial intelligence - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-981-10-3156-4
    ISBN: 9789811031564
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入