libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

satapathy suresh chandra (curatore); bhateja vikrant (curatore); udgata siba k. (curatore); pattnaik prasant kumar (curatore) - proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
216,98 €
NICEPRICE
206,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 03/2017
Edizione: 1st ed. 2017





Trama

The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 – 17 September 2016. The book presents theories, methodologies, new ideas, experiences and applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical and mechanical engineering.





Sommario

Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors.- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend.- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern.- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String.- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection.- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach.- Chapter 7. Fuzzy Based Algorithm for Resource Allocation.- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN).- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing.- Chapter 10. Accent RecognitionSystem Using Deep Belief Networks for Telugu Speech Signals.- Chapter 11. Text Document Classification with PCA and One-Class SVM.- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease.- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time.- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment.- Chapter 15. Content Aware Video Retargeting by Seam Carving.- Chapter 16. Intelligence System Security Based on 3D Image.- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks.- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India – A Grey Relational Analysis Approach.- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration.- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks.- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique.- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines.- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT.- Chapter 24. Graph Partitioning Methods.- Chapter 25. Smart and Accountable Water Distribution for Rural Development.- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters.- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security.- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System.- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell.- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional ProgrammingApproach.- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication.- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network.- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction.- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature.- Chapter 35. Shortest Path Algorithms for Social Network Strengths.- Chapter 36. Improvised Symbol Table Structure.- Chapter 37. Digital Watermarking Using Enhanced LSB Technique.- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop.- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier.- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems.- Chapter 41. Optimization of Workload Scheduling in Computational Grid.- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour.- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation.- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic.- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms.- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network.- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC).- Chapter 48. Cloud Based Malware Detection Technique.- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description.- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms.- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks.- Chapter 52. An Enhanced Bug Miningfor Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth.- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud.- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature.- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts.- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells.- Chapter 57. Snort Rule Detection for Countering in Network Attacks.- Chapter 58. Trust and Energy Efficient Routing for Internet of Things – Energy Evaluation Model.- Chapter 59. READ - A Bangla Phoneme Recognition System.- Chapter 60. Information Fusion in Animal Biometric Identification.- Chapter 61. Small World Network Formation and Characterization of Sports Network.- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure.- Chapter 63. Finding Clusters of Data: Cluster Analysis in R.- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization.- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition.- Chapter 66. A Systematic Review on Materialized View Selection.- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC.- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model.- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles.- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem.- Chapter 71. Action Classification Based on Mutual Difference Score.- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews.- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network.- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs.- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations.- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths.- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm.- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach.- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language.





Autore

Dr. Suresh Chandra Satapathy is currently working as Professor and Head, Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology and Sciences (ANITS), Visakhapatnam, Andhra Pradesh, India. He obtained his PhD in Computer Science Engineering from JNTUH, Hyderabad and Master degree in Computer Science and Engineering from National Institute of Technology (NIT), Rourkela, Odisha. He has more than 27 years of teaching and research experience. His research interest includes machine learning, data mining, swarm intelligence studies and their applications to engineering. He has more than 98 publications to his credit in various reputed international journals and conference proceedings. He has edited many volumes from Springer AISC, LNEE, SIST and LNCS in past and he is also the editorial board member in few international journals. He is a senior member of IEEE and life member of Computer Society of India. Currently, he is the National Chairman ofDivision-V (Education and Research) of Computer Society of India.

Prof. Vikrant Bhateja is Associate Professor, Department of Electronics & Communication Engineering, Shri Ramswaroop Memorial Group of Professional Colleges (SRMGPC), Lucknow and also the Head (Academics & Quality Control) in the same college. His areas of research include digital image and video processing, computer vision, medical imaging, machine learning, pattern analysis and recognition. He has published 100 quality publications in various international journals and conference proceedings. Prof. Vikrant has been on TPC and chaired various sessions from the above domain in international conferences of IEEE and Springer. He has been the track chair and served in the core-technical/editorial teams for international conferences: FICTA 2014, CSI 2014, INDIA 2015, ICICT 2015 and ICTIS 2015 under Springer-ASIC Series and INDIACom 2015, ICACCI 2015 under IEEE. He is associate editor in International Journal of Synthetic Emotions (IJSE) and International Journal of Ambient Computing and Intelligence (IJACI) under IGI Global. He is also serving in the editorial board of International Journal of Image Mining (IJIM) and International Journal of Convergence Computing (IJConvC) under Inderscience Publishers. He has been editor of three published volumes with Springer and another two are in press.

Dr. Siba K. Udgata is a Professor of School of Computer and Information Sciences, University of Hyderabad, India. He is presently heading Centre for Modelling, Simulation and Design (CMSD), a high performance computing facility at University of Hyderabad. He has got his Masters followed by PhD in Computer Science (mobile computing and wireless communication). His main research interests are wireless communication, mobile computing, wireless sensor networks and intelligent algorithms. He was a United Nations Fellow and worked in the United Nations University/International Institute for Software Technology (UNU/IIST), Macau as research fellow in the year 2001. Dr. Udgata is working as a principal investigator in many Government of India funded research projects mainly for development of wireless sensor network applications and application of swarm intelligence techniques. He has published extensively in refereed international journals and conferences in India as well as abroad. He has edited many volumes in Springer LNCS/LNAI and Springer AISC Proceedings.

Dr. Prasant Kumar Pattnaik, PhD (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT University, Bhubaneswar. He has more than a decade of teaching and research experience. Dr. Pattnaik has published numbers of research papers in peer-reviewed International Journals and conferences. His areas of specialization are mobile computing, cloud computing, brain computer interface and privacy preservation.p>











Altre Informazioni

ISBN:

9789811031526

Condizione: Nuovo
Collana: Advances in Intelligent Systems and Computing
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XXIV, 809 p. 335 illus.
Pagine Arabe: 809
Pagine Romane: xxiv


Dicono di noi