Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Herausgegeben:Das, Swagatam; Pal, Tandra; Kar, Samarjit; Satapathy, Suresh Chandra; Mandal, Jyotsna K.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Herausgegeben:Das, Swagatam; Pal, Tandra; Kar, Samarjit; Satapathy, Suresh Chandra; Mandal, Jyotsna K.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The…mehr
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications148,99 €
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications243,99 €
- Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014148,99 €
- Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014148,99 €
- Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013147,99 €
- Proceedings of 4th International Conference in Software Engineering for Defence Applications110,99 €
- Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015148,99 €
-
-
-
- Produktdetails
- Advances in Intelligent Systems and Computing 404
- Verlag: Springer / Springer India / Springer, Berlin
- Artikelnr. des Verlages: 978-81-322-2693-2
- 1st ed. 2016
- Seitenzahl: 756
- Erscheinungstermin: 4. Mai 2016
- Englisch
- Abmessung: 235mm x 155mm x 41mm
- Gewicht: 1129g
- ISBN-13: 9788132226932
- ISBN-10: 8132226933
- Artikelnr.: 43780955
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Advances in Intelligent Systems and Computing 404
- Verlag: Springer / Springer India / Springer, Berlin
- Artikelnr. des Verlages: 978-81-322-2693-2
- 1st ed. 2016
- Seitenzahl: 756
- Erscheinungstermin: 4. Mai 2016
- Englisch
- Abmessung: 235mm x 155mm x 41mm
- Gewicht: 1129g
- ISBN-13: 9788132226932
- ISBN-10: 8132226933
- Artikelnr.: 43780955
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
spaces to Discover Conducive Living Environment of Migratory Animals.- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph.- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images.- Offline Signature Verification Using Artificial Neural Network.- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition.- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework.- Offline Writer Identification from Isolated Characters Using Textural Features.- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts.- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint.- Optimal allocation of Distributed Generator using Chemical Reaction Optimization.- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget.- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems.- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm.- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks.- Service Provisioning middleware for Wireless Sensor Network.- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network.- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design.- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata.- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA.- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form.- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms.- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making.- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients.- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour.- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks.- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks.- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches.- Secure Remote Login Scheme with Password and Smart Card Update Facilities.- Generation and Risk Analysis of Network Attack Graph.- Unsupervised Spam Detection in Hyves Using SALSA.- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection.- Part 12: Text Processing_Sentiment Analysis with Modality Processing.- Query-Based Extractive Text Summarization for Sanskrit.- Code Obfuscation by Using Floating Points and Conditional Statements.- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption.- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD.- Compression of Hyper-Spectral Images and Its Performance Evaluation.- Hand Gesture Recognition for Sign Language: A Skeleton Approach.- Modified Cuckoo Searchbased Image Enhancement.- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm.- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery.- Adaptive Multi-Layer Routing for Incremental Design of an SoC.- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour.- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation.- A Multi-Agent Planning Algorithm with Joint Actions.- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System.- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.
spaces to Discover Conducive Living Environment of Migratory Animals.- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph.- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images.- Offline Signature Verification Using Artificial Neural Network.- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition.- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework.- Offline Writer Identification from Isolated Characters Using Textural Features.- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts.- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint.- Optimal allocation of Distributed Generator using Chemical Reaction Optimization.- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget.- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems.- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm.- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks.- Service Provisioning middleware for Wireless Sensor Network.- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network.- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design.- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata.- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA.- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form.- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms.- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making.- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients.- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour.- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks.- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks.- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches.- Secure Remote Login Scheme with Password and Smart Card Update Facilities.- Generation and Risk Analysis of Network Attack Graph.- Unsupervised Spam Detection in Hyves Using SALSA.- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection.- Part 12: Text Processing_Sentiment Analysis with Modality Processing.- Query-Based Extractive Text Summarization for Sanskrit.- Code Obfuscation by Using Floating Points and Conditional Statements.- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption.- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD.- Compression of Hyper-Spectral Images and Its Performance Evaluation.- Hand Gesture Recognition for Sign Language: A Skeleton Approach.- Modified Cuckoo Searchbased Image Enhancement.- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm.- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery.- Adaptive Multi-Layer Routing for Incremental Design of an SoC.- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour.- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation.- A Multi-Agent Planning Algorithm with Joint Actions.- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System.- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.