E-Book, Englisch, Band 516, 685 Seiten, eBook
Satapathy / Bhateja / Udgata Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications
1. Auflage 2017
ISBN: 978-981-10-3156-4
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
FICTA 2016, Volume 2
E-Book, Englisch, Band 516, 685 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-981-10-3156-4
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals’ Utilization ProblemsUsing Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier.- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews.- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data.- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews.- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis.- Chapter 43. Approach for Emotion Extraction from Text.- Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm.- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach.- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image.- Chapter 47. Analysis of Logs by Using Logstash.- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining.- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design.- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System.- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM.- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks.- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process.- Chapter 54. Confidentiality and Storage of Data in Cloud Environment.- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing.- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method.- Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line.- Chapter 58. Recognizing Human Faces with Tilt.- Chapter 59. Word-Level Script Identification from Scene Images.- Chapter 60. Writer Specific Parameters for Online Signature Verification.- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network.- Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets.- Chapter 63. Predicting Defect of Software System.- Chapter 64. Fusion of Medical Image Using STSVD.- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid.- Chapter 66. A Method for the Selection of Agile Methods Using AHP.- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network.- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs.- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.- Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.