Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (eBook, PDF)
Redaktion: Das, Swagatam; Mandal, Jyotsna Kumar; Satapathy, Suresh Chandra; Kar, Samarjit; Pal, Tandra
Alle Infos zum eBook verschenken
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (eBook, PDF)
Redaktion: Das, Swagatam; Mandal, Jyotsna Kumar; Satapathy, Suresh Chandra; Kar, Samarjit; Pal, Tandra
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 19.89MB
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)258,95 €
- Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)161,95 €
- Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (eBook, PDF)161,95 €
- Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (eBook, PDF)161,95 €
- Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)161,95 €
- Frontiers in Intelligent Computing: Theory and Applications (eBook, PDF)161,95 €
- Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (eBook, PDF)161,95 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer India
- Seitenzahl: 729
- Erscheinungstermin: 24. Oktober 2015
- Englisch
- ISBN-13: 9788132226956
- Artikelnr.: 44132927
- Verlag: Springer India
- Seitenzahl: 729
- Erscheinungstermin: 24. Oktober 2015
- Englisch
- ISBN-13: 9788132226956
- Artikelnr.: 44132927
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
spaces to Discover Conducive Living Environment of Migratory Animals.- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph.- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images.- Offline Signature Verification Using Artificial Neural Network.- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition.- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework.- Offline Writer Identification from Isolated Characters Using Textural Features.- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts.- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint.- Optimal allocation of Distributed Generator using Chemical Reaction Optimization.- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget.- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems.- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm.- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks.- Service Provisioning middleware for Wireless Sensor Network.- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network.- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design.- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata.- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA.- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form.- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms.- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making.- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients.- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour.- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks.- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks.- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches.- Secure Remote Login Scheme with Password and Smart Card Update Facilities.- Generation and Risk Analysis of Network Attack Graph.- Unsupervised Spam Detection in Hyves Using SALSA.- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection.- Part 12: Text Processing_Sentiment Analysis with Modality Processing.- Query-Based Extractive Text Summarization for Sanskrit.- Code Obfuscation by Using Floating Points and Conditional Statements.- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption.- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD.- Compression of Hyper-Spectral Images and Its Performance Evaluation.- Hand Gesture Recognition for Sign Language: A Skeleton Approach.- Modified Cuckoo Searchbased Image Enhancement.- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm.- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery.- Adaptive Multi-Layer Routing for Incremental Design of an SoC.- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour.- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation.- A Multi-Agent Planning Algorithm with Joint Actions.- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System.- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.
spaces to Discover Conducive Living Environment of Migratory Animals.- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph.- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images.- Offline Signature Verification Using Artificial Neural Network.- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition.- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework.- Offline Writer Identification from Isolated Characters Using Textural Features.- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts.- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint.- Optimal allocation of Distributed Generator using Chemical Reaction Optimization.- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget.- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems.- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm.- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks.- Service Provisioning middleware for Wireless Sensor Network.- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network.- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design.- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata.- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA.- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form.- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms.- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making.- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients.- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour.- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks.- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks.- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches.- Secure Remote Login Scheme with Password and Smart Card Update Facilities.- Generation and Risk Analysis of Network Attack Graph.- Unsupervised Spam Detection in Hyves Using SALSA.- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection.- Part 12: Text Processing_Sentiment Analysis with Modality Processing.- Query-Based Extractive Text Summarization for Sanskrit.- Code Obfuscation by Using Floating Points and Conditional Statements.- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption.- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD.- Compression of Hyper-Spectral Images and Its Performance Evaluation.- Hand Gesture Recognition for Sign Language: A Skeleton Approach.- Modified Cuckoo Searchbased Image Enhancement.- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm.- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery.- Adaptive Multi-Layer Routing for Incremental Design of an SoC.- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour.- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation.- A Multi-Agent Planning Algorithm with Joint Actions.- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System.- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.