Información del autor
Autor Pattnaik, Prasant Kumar |
Documentos disponibles escritos por este autor (6)
Crear una solicitud de compra Refinar búsqueda
Cognitive Computing in Human Cognition / Mallick, Pradeep Kumar ; Pattnaik, Prasant Kumar ; Panda, Amiya Ranjan ; Balas, Valentina Emilia
TÃtulo : Cognitive Computing in Human Cognition : Perspectives and Applications Tipo de documento: documento electrónico Autores: Mallick, Pradeep Kumar, ; Pattnaik, Prasant Kumar, ; Panda, Amiya Ranjan, ; Balas, Valentina Emilia, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XIV, 125 p. 75 ilustraciones, 38 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-48118-6 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia artificial Inteligencia Computacional IngenierÃa de control Robótica Automatización IngenierÃa Biomédica Control IngenierÃa Biomédica y BioingenierÃa Clasificación: 006.3 Resumen: Este libro editado diseña la computación cognitiva en la cognición humana para analizar y mejorar la eficiencia de la toma de decisiones mediante la inteligencia cognitiva. El libro también pretende atraer a la audiencia que trabaja en computación cerebral, aprendizaje profundo, transporte y energÃa de células solares. Debido a esto, en la era reciente, muchos investigadores en el campo de la tecnologÃa de la información adoptan métodos inteligentes con toque humano llamados cognición humana con la computación cognitiva. Nota de contenido: Chapter 1: Improved Steganography using Odd Even substitution -- Chapter 2: A Tags Mining Approach for Automatic Image Annotation Using Neighbor Images Tree -- Chapter 3: A Survey: Implemented Architectures of 3D Convolutional Neural Networks -- Chapter 4: An approach for detection of dust on solar panels using CNN from RGB dust image to predict power loss -- Chapter 5: A Novel Method of Data Partitioning Using Genetic Algorithm Work Load Driven Approach Utilizing Machine Learning -- Chapter 6: Virtual Dermoscopy using Deep Learning Approach -- Chapter 7: Evaluating Robustness for Intensity Based Image Registration Measures Using Mutual Information and Normalized Mutual Information -- Chapter 8: A New Contrast Based Degraded Document Image Binarization. . Tipo de medio : Computadora Summary : This edited book designs the Cognitive Computing in Human Cognition to analyze to improve the efficiency of decision making by cognitive intelligence. The book is also intended to attract the audience who work in brain computing, deep learning, transportation, and solar cell energy. Due to this in the recent era, smart methods with human touch called as human cognition is adopted by many researchers in the field of information technology with the Cognitive Computing. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Cognitive Computing in Human Cognition : Perspectives and Applications [documento electrónico] / Mallick, Pradeep Kumar, ; Pattnaik, Prasant Kumar, ; Panda, Amiya Ranjan, ; Balas, Valentina Emilia, . - 1 ed. . - [s.l.] : Springer, 2020 . - XIV, 125 p. 75 ilustraciones, 38 ilustraciones en color.
ISBN : 978-3-030-48118-6
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia artificial Inteligencia Computacional IngenierÃa de control Robótica Automatización IngenierÃa Biomédica Control IngenierÃa Biomédica y BioingenierÃa Clasificación: 006.3 Resumen: Este libro editado diseña la computación cognitiva en la cognición humana para analizar y mejorar la eficiencia de la toma de decisiones mediante la inteligencia cognitiva. El libro también pretende atraer a la audiencia que trabaja en computación cerebral, aprendizaje profundo, transporte y energÃa de células solares. Debido a esto, en la era reciente, muchos investigadores en el campo de la tecnologÃa de la información adoptan métodos inteligentes con toque humano llamados cognición humana con la computación cognitiva. Nota de contenido: Chapter 1: Improved Steganography using Odd Even substitution -- Chapter 2: A Tags Mining Approach for Automatic Image Annotation Using Neighbor Images Tree -- Chapter 3: A Survey: Implemented Architectures of 3D Convolutional Neural Networks -- Chapter 4: An approach for detection of dust on solar panels using CNN from RGB dust image to predict power loss -- Chapter 5: A Novel Method of Data Partitioning Using Genetic Algorithm Work Load Driven Approach Utilizing Machine Learning -- Chapter 6: Virtual Dermoscopy using Deep Learning Approach -- Chapter 7: Evaluating Robustness for Intensity Based Image Registration Measures Using Mutual Information and Normalized Mutual Information -- Chapter 8: A New Contrast Based Degraded Document Image Binarization. . Tipo de medio : Computadora Summary : This edited book designs the Cognitive Computing in Human Cognition to analyze to improve the efficiency of decision making by cognitive intelligence. The book is also intended to attract the audience who work in brain computing, deep learning, transportation, and solar cell energy. Due to this in the recent era, smart methods with human touch called as human cognition is adopted by many researchers in the field of information technology with the Cognitive Computing. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Intelligent Engineering Informatics / Bhateja, Vikrant ; Coello Coello, Carlos A. ; Satapathy, Suresh Chandra ; Pattnaik, Prasant Kumar
TÃtulo : Intelligent Engineering Informatics : Proceedings of the 6th International Conference on FICTA Tipo de documento: documento electrónico Autores: Bhateja, Vikrant, ; Coello Coello, Carlos A., ; Satapathy, Suresh Chandra, ; Pattnaik, Prasant Kumar, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2018 Número de páginas: XX, 671 p. ISBN/ISSN/DL: 978-981-10-7566-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: TeorÃas no lineales Estructuras de control y microprogramación. Sistemas Dinámicos Aplicados Inteligencia artificial Inteligencia Computacional Microprogramación Dinámica Informática móvil Clasificación: 006.3 Resumen: Este libro presenta las actas de la VI Conferencia Internacional sobre las Fronteras de la Computación Inteligente: TeorÃa y Aplicaciones (FICTA 2017), celebrada en Bhubaneswar, Odisha. El evento reunió a investigadores, cientÃficos, ingenieros y profesionales para intercambiar sus nuevas ideas y experiencias en el ámbito de las teorÃas de la computación inteligente con posibles aplicaciones en diversas disciplinas de la ingenierÃa. El libro está dividido en dos volúmenes: Ciencias de la Información y la Decisión, e Informática de IngenierÃa Inteligente. Este volumen cubre amplias áreas de la informática de ingenierÃa inteligente, con artÃculos que exploran los aspectos teóricos y prácticos de diversas áreas como ANN y algoritmos genéticos, interacción persona-computadora, optimización del control inteligente, sistemas inteligentes de aprendizaje electrónico, aprendizaje automático, computación móvil, multi -sistemas de agentes, etc. El libro también ofrece un recurso valioso para estudiantes de posgrado en diversas disciplinas de ingenierÃa. Nota de contenido: 1. Assessment of Integrity Auditing Protocols for Outsourced Big Data -- 2. A New Term Weight Measure for Gender Prediction in Author Profiling -- 3. Image Encryption Based on Arnold Cat Map and GA operator. -- 4. SVM Based Method for Identification and Recognition of Faces by using Feature Distances -- 5. Content-Aware Reversible Data Hiding: Urhs -- 6. Application of TF-IDF Feature for Categorizing Documents of Online Bangla Web Text Corpus -- 7. An Ensemble Learning based Bangla Phoneme Recognition System using LPCC-2 Features -- 8. Solving Uncapacitated Facility Location Problem Using Monkey Algorithm -- 9. AISLDr: Artificial Intelligent Self-Learning Doctor -- 10. Kernel-Based Naive Bayes Classifier For Medical Predictions -- 11. AKM – Augmentation Of K-Means Clustering Algorithm for Big Data -- 12. Face Recognition Using Local Binary Pattern-Blockwise Method -- 13. Social Group Optimization (SGO) for Clustering in Wireless Sensor Networks -- 14. Implementation of High Performance FloatingPoint Divider using Pipeline Architecture on FPGA -- 15. GA_DTNB: A Hybrid Classifier for Medical Data Diagnosis -- 16. Applications of Spiking Neural Network to Predict Software Reliability -- 17. An Optimized Rendering Solution for Ranking Heterogeneous VM Instances -- 18. Gender prediction in Author Profiling using ReliefF Feature Selection Algorithm -- 19. Optimal Coordination of Overcurrent Relays using Simulated Annealing and Brute Force Algorithms -- 20. The Close-Loop Antenna Array Control System For Automatic Optimization in LTE and 3G Network -- 21. Tumour Classification in Graph-Cut Segmented Mammograms using GLCM Features fed SVM -- 22. Improving Feature Selection using Elite Breeding QPSO on Gene dataset for Cancer Classification -- 23. Epileptic Seizure Mining Via Novel Empirical Wavelet Feature with J48 and KNN Classifier -- 24. Gallbladder Shape Estimation using Tree Seed Optimization tuned Radial Basis Function Network for Assessment of Acute Cholecystitis -- 25. Materialized View Selection using Backtracking Search Optimization Algorithm -- 26. Fractal coding for texture, satellite and gray scale images to reduce searching time and complexity -- 27. Hybrid Genetic Algorithm Differential Evolution Approach for Localization in WSN -- 28. Local Tetra Pattern Based Fruit Grading Using Different Classifiers -- 29. An Integrated Approach Incorporating Non Linear Dynamics and Machine Learning for Predictive Analytics and Delving Causal Interaction -- 30. Adaptive Channel Equalization using Decision Directed & Dispersion Minimising Equalizers trained by Variable Step size Firefly Algorithm -- 31. A Study on Wrapper Based Feature Selection Algorithm for Leukemia Dataset -- 32. Wind Converter Monitoring Using ANN -- 33. Analysis and Prototype Sequences of Face Recognition Techniques in Real time Picture Processing -- 34. Closed-set Text-independent Automatic Speaker Recognition System using VQ/GMM -- 35. Differential Evolution based Sensor Allocation for Target Tracking Application in Sensor-Cloud -- 36. Design & Analysis of Kite for Producing Power up to 2.6 Watts -- 37. RSSI based Posture Identification for Repeated and Continuous Motions in Body Area Network -- 38. Old Age Health Risk Prediction And Maintenance Via IoT devices and Artificial Neural Network -- 39. Computational intelligence based Chaotic Time series Prediction using Evolved Neural Network -- 40. Intelligent and Integrated Books Recommendation and Best Price Identifier System using Machine Learning -- 41. Online Handwritten Bangla Character Recognition using CNN: A Deep Learning Approach -- 42. A Study on Clustering Algorithms for Large, Unstructured and Semi- structured Data -- 43. A chaotic steganography method using Ant Colony Optimization -- 44. Gene Selection for Diagnosis of Cancer in Microarray Data using Memetic Algorithm -- 45. Handwritten Bangla City Name Recognition using Shape-Context Feature -- 46. Driver Safety Approach Using Efficient Image Processing Algorithms for Driver Distraction Detection and Alerting -- 47. Feature Selection using Histogram based Multi-Objective GA for Handwritten Devanagari Numeral Recognition -- 48. Extended Kalman Filter for GPS Receiver Position Estimation -- 49. Energy Detection based Spectrum Sensing for AWGN and MIMO Wireless Channel -- 50. Spectrum Sensing using Matched Filter Detection -- 51. Multi-Antenna system Performance under ICSIT and ICSIR channel conditions -- 52. Cloud Adoption: A Future Road MAP for Indian SMEs -- 53. A Computational Intelligent Learning Architecture in Cloud Environment -- 54. Performance Scrutiny of Source and Drain Engineered Dual-Material Double-Gate (DMDG) SOI MOSFET with Various High-k -- 55. Analysis of N + N - Epi-Source Asymmetric Double Gate FD-SOI MOSFET -- 56. Solar Tracking for Optimizing Conversion Efficiency Using ANN -- 57. Human Gesture Recognition in Still Images using GMM Approach -- 58. Design of Rate 3/4, 16 States, 16 PSK, Trellis Coded Modulation Code for AWGN Channel -- 59. Baseline Correction inEMG Signals using Mathematical Morphology and Canonical Correlation Analysis -- 60. Measuring discharge using Back propagation neural network: a case study on Brahmani river basin -- 61. Prediction of suspended sediment load using Radial basis neural network -- 62. A Hybrid Task scheduling approach based on Genetic Algorithm and Particle Swarm Optimization technique in Cloud Environment -- 63. Segmentation of Edema in HGG MR Images using Convolutional Neural Networks -- 64. Real Time Sign Language Gesture (Word) Recognition from Video Sequences Using CNN and RNN -- 65. Application of Soft Computing in Crop Management -- 66. A Hybrid Shadow Removal Algorithm for Vehicle Classification in Traffic Surveillance System -- 67. Real-time Analysis of a Non Linear State Observer with Improved Disturbance Compensation for Sensorless Induction Motor. Tipo de medio : Computadora Summary : This book presents the proceedings of the 6th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2017), held in Bhubaneswar, Odisha. The event brought together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. The book is divided into two volumes: Information and Decision Sciences, and Intelligent Engineering Informatics. This volume covers broad areas of Intelligent Engineering Informatics, with papers exploring both the theoretical and practical aspects of various areas like ANN and genetic algorithms, human–computer interaction, intelligent control optimisation, intelligent e-learning systems, machine learning, mobile computing, multi-agent systems, etc. The book also offers a valuable resource for students at the post-graduate level in various engineering disciplines. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Intelligent Engineering Informatics : Proceedings of the 6th International Conference on FICTA [documento electrónico] / Bhateja, Vikrant, ; Coello Coello, Carlos A., ; Satapathy, Suresh Chandra, ; Pattnaik, Prasant Kumar, . - 1 ed. . - Singapore [Malasia] : Springer, 2018 . - XX, 671 p.
ISBN : 978-981-10-7566-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: TeorÃas no lineales Estructuras de control y microprogramación. Sistemas Dinámicos Aplicados Inteligencia artificial Inteligencia Computacional Microprogramación Dinámica Informática móvil Clasificación: 006.3 Resumen: Este libro presenta las actas de la VI Conferencia Internacional sobre las Fronteras de la Computación Inteligente: TeorÃa y Aplicaciones (FICTA 2017), celebrada en Bhubaneswar, Odisha. El evento reunió a investigadores, cientÃficos, ingenieros y profesionales para intercambiar sus nuevas ideas y experiencias en el ámbito de las teorÃas de la computación inteligente con posibles aplicaciones en diversas disciplinas de la ingenierÃa. El libro está dividido en dos volúmenes: Ciencias de la Información y la Decisión, e Informática de IngenierÃa Inteligente. Este volumen cubre amplias áreas de la informática de ingenierÃa inteligente, con artÃculos que exploran los aspectos teóricos y prácticos de diversas áreas como ANN y algoritmos genéticos, interacción persona-computadora, optimización del control inteligente, sistemas inteligentes de aprendizaje electrónico, aprendizaje automático, computación móvil, multi -sistemas de agentes, etc. El libro también ofrece un recurso valioso para estudiantes de posgrado en diversas disciplinas de ingenierÃa. Nota de contenido: 1. Assessment of Integrity Auditing Protocols for Outsourced Big Data -- 2. A New Term Weight Measure for Gender Prediction in Author Profiling -- 3. Image Encryption Based on Arnold Cat Map and GA operator. -- 4. SVM Based Method for Identification and Recognition of Faces by using Feature Distances -- 5. Content-Aware Reversible Data Hiding: Urhs -- 6. Application of TF-IDF Feature for Categorizing Documents of Online Bangla Web Text Corpus -- 7. An Ensemble Learning based Bangla Phoneme Recognition System using LPCC-2 Features -- 8. Solving Uncapacitated Facility Location Problem Using Monkey Algorithm -- 9. AISLDr: Artificial Intelligent Self-Learning Doctor -- 10. Kernel-Based Naive Bayes Classifier For Medical Predictions -- 11. AKM – Augmentation Of K-Means Clustering Algorithm for Big Data -- 12. Face Recognition Using Local Binary Pattern-Blockwise Method -- 13. Social Group Optimization (SGO) for Clustering in Wireless Sensor Networks -- 14. Implementation of High Performance FloatingPoint Divider using Pipeline Architecture on FPGA -- 15. GA_DTNB: A Hybrid Classifier for Medical Data Diagnosis -- 16. Applications of Spiking Neural Network to Predict Software Reliability -- 17. An Optimized Rendering Solution for Ranking Heterogeneous VM Instances -- 18. Gender prediction in Author Profiling using ReliefF Feature Selection Algorithm -- 19. Optimal Coordination of Overcurrent Relays using Simulated Annealing and Brute Force Algorithms -- 20. The Close-Loop Antenna Array Control System For Automatic Optimization in LTE and 3G Network -- 21. Tumour Classification in Graph-Cut Segmented Mammograms using GLCM Features fed SVM -- 22. Improving Feature Selection using Elite Breeding QPSO on Gene dataset for Cancer Classification -- 23. Epileptic Seizure Mining Via Novel Empirical Wavelet Feature with J48 and KNN Classifier -- 24. Gallbladder Shape Estimation using Tree Seed Optimization tuned Radial Basis Function Network for Assessment of Acute Cholecystitis -- 25. Materialized View Selection using Backtracking Search Optimization Algorithm -- 26. Fractal coding for texture, satellite and gray scale images to reduce searching time and complexity -- 27. Hybrid Genetic Algorithm Differential Evolution Approach for Localization in WSN -- 28. Local Tetra Pattern Based Fruit Grading Using Different Classifiers -- 29. An Integrated Approach Incorporating Non Linear Dynamics and Machine Learning for Predictive Analytics and Delving Causal Interaction -- 30. Adaptive Channel Equalization using Decision Directed & Dispersion Minimising Equalizers trained by Variable Step size Firefly Algorithm -- 31. A Study on Wrapper Based Feature Selection Algorithm for Leukemia Dataset -- 32. Wind Converter Monitoring Using ANN -- 33. Analysis and Prototype Sequences of Face Recognition Techniques in Real time Picture Processing -- 34. Closed-set Text-independent Automatic Speaker Recognition System using VQ/GMM -- 35. Differential Evolution based Sensor Allocation for Target Tracking Application in Sensor-Cloud -- 36. Design & Analysis of Kite for Producing Power up to 2.6 Watts -- 37. RSSI based Posture Identification for Repeated and Continuous Motions in Body Area Network -- 38. Old Age Health Risk Prediction And Maintenance Via IoT devices and Artificial Neural Network -- 39. Computational intelligence based Chaotic Time series Prediction using Evolved Neural Network -- 40. Intelligent and Integrated Books Recommendation and Best Price Identifier System using Machine Learning -- 41. Online Handwritten Bangla Character Recognition using CNN: A Deep Learning Approach -- 42. A Study on Clustering Algorithms for Large, Unstructured and Semi- structured Data -- 43. A chaotic steganography method using Ant Colony Optimization -- 44. Gene Selection for Diagnosis of Cancer in Microarray Data using Memetic Algorithm -- 45. Handwritten Bangla City Name Recognition using Shape-Context Feature -- 46. Driver Safety Approach Using Efficient Image Processing Algorithms for Driver Distraction Detection and Alerting -- 47. Feature Selection using Histogram based Multi-Objective GA for Handwritten Devanagari Numeral Recognition -- 48. Extended Kalman Filter for GPS Receiver Position Estimation -- 49. Energy Detection based Spectrum Sensing for AWGN and MIMO Wireless Channel -- 50. Spectrum Sensing using Matched Filter Detection -- 51. Multi-Antenna system Performance under ICSIT and ICSIR channel conditions -- 52. Cloud Adoption: A Future Road MAP for Indian SMEs -- 53. A Computational Intelligent Learning Architecture in Cloud Environment -- 54. Performance Scrutiny of Source and Drain Engineered Dual-Material Double-Gate (DMDG) SOI MOSFET with Various High-k -- 55. Analysis of N + N - Epi-Source Asymmetric Double Gate FD-SOI MOSFET -- 56. Solar Tracking for Optimizing Conversion Efficiency Using ANN -- 57. Human Gesture Recognition in Still Images using GMM Approach -- 58. Design of Rate 3/4, 16 States, 16 PSK, Trellis Coded Modulation Code for AWGN Channel -- 59. Baseline Correction inEMG Signals using Mathematical Morphology and Canonical Correlation Analysis -- 60. Measuring discharge using Back propagation neural network: a case study on Brahmani river basin -- 61. Prediction of suspended sediment load using Radial basis neural network -- 62. A Hybrid Task scheduling approach based on Genetic Algorithm and Particle Swarm Optimization technique in Cloud Environment -- 63. Segmentation of Edema in HGG MR Images using Convolutional Neural Networks -- 64. Real Time Sign Language Gesture (Word) Recognition from Video Sequences Using CNN and RNN -- 65. Application of Soft Computing in Crop Management -- 66. A Hybrid Shadow Removal Algorithm for Vehicle Classification in Traffic Surveillance System -- 67. Real-time Analysis of a Non Linear State Observer with Improved Disturbance Compensation for Sensorless Induction Motor. Tipo de medio : Computadora Summary : This book presents the proceedings of the 6th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2017), held in Bhubaneswar, Odisha. The event brought together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. The book is divided into two volumes: Information and Decision Sciences, and Intelligent Engineering Informatics. This volume covers broad areas of Intelligent Engineering Informatics, with papers exploring both the theoretical and practical aspects of various areas like ANN and genetic algorithms, human–computer interaction, intelligent control optimisation, intelligent e-learning systems, machine learning, mobile computing, multi-agent systems, etc. The book also offers a valuable resource for students at the post-graduate level in various engineering disciplines. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications / Satapathy, Suresh Chandra ; Bhateja, Vikrant ; Udgata, Siba K. ; Pattnaik, Prasant Kumar
TÃtulo : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 1 Tipo de documento: documento electrónico Autores: Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2017 Número de páginas: XXIV, 809 p. 335 ilustraciones ISBN/ISSN/DL: 978-981-10-3153-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados Clasificación: 006.3 Resumen: El libro es una colección de artÃculos de investigación revisados ​​por pares de alta calidad presentados en la Conferencia Internacional sobre Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática, Universidad KIIT, Bhubaneswar, India durante el 16 y 17 de septiembre de 2016. El libro presenta teorÃas, metodologÃas, nuevas ideas, experiencias y aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a varias disciplinas de ingenierÃa como la informática, la electrónica, la ingenierÃa eléctrica y mecánica. Nota de contenido: Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent RecognitionSystem Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India – A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional ProgrammingApproach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Miningfor Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things – Energy Evaluation Model -- Chapter 59. READ - A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language. Tipo de medio : Computadora Summary : The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 – 17 September 2016. The book presents theories, methodologies, new ideas, experiences and applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical and mechanical engineering. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 1 [documento electrónico] / Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, . - 1 ed. . - Singapore [Malasia] : Springer, 2017 . - XXIV, 809 p. 335 ilustraciones.
ISBN : 978-981-10-3153-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados Clasificación: 006.3 Resumen: El libro es una colección de artÃculos de investigación revisados ​​por pares de alta calidad presentados en la Conferencia Internacional sobre Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática, Universidad KIIT, Bhubaneswar, India durante el 16 y 17 de septiembre de 2016. El libro presenta teorÃas, metodologÃas, nuevas ideas, experiencias y aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a varias disciplinas de ingenierÃa como la informática, la electrónica, la ingenierÃa eléctrica y mecánica. Nota de contenido: Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent RecognitionSystem Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India – A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional ProgrammingApproach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Miningfor Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things – Energy Evaluation Model -- Chapter 59. READ - A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language. Tipo de medio : Computadora Summary : The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 – 17 September 2016. The book presents theories, methodologies, new ideas, experiences and applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical and mechanical engineering. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications / Satapathy, Suresh Chandra ; Bhateja, Vikrant ; Udgata, Siba K. ; Pattnaik, Prasant Kumar
TÃtulo : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 2 Tipo de documento: documento electrónico Autores: Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2017 Número de páginas: XXIV, 685 p. 277 ilustraciones ISBN/ISSN/DL: 978-981-10-3156-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados Clasificación: 006.3 Resumen: El libro es una colección de artÃculos de investigación de alta calidad revisados ​​por pares presentados en la Conferencia Internacional sobre las Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática de la Universidad KIIT, Bhubaneswar, India, del 16 al 17 de septiembre de 2016. El libro tiene como objetivo presentar teorÃas, metodologÃas, nuevas ideas, experiencias, aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a diversas disciplinas de la ingenierÃa como informática, electrónica, ingenierÃa eléctrica, mecánica, etc. Nota de contenido: Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field -- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations -- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications -- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment -- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs -- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree -- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention -- Chapter 9. Low Power 14T Hybrid Full Adder Cell -- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm -- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence -- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition -- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage -- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API -- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing -- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm -- Chapter 17. A Novel Representation for Classification of User Sentiments -- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model -- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application -- Chapter 20. Multi-objective IT Professionals' Utilization ProblemsUsing Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier -- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features -- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification -- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network -- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization -- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques -- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach -- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications -- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise -- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications -- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) -- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques -- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus -- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier -- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews -- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data -- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews -- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis -- Chapter 43. Approach for Emotion Extraction from Text -- Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm -- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach -- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image -- Chapter 47. Analysis of Logs by Using Logstash -- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining -- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design -- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System -- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM -- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks -- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process -- Chapter 54. Confidentiality and Storage of Data in Cloud Environment -- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing -- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method -- Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line -- Chapter 58. Recognizing Human Faces with Tilt -- Chapter 59. Word-Level Script Identification from Scene Images -- Chapter 60. Writer Specific Parameters for Online Signature Verification -- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network -- Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets -- Chapter 63. Predicting Defect of Software System -- Chapter 64. Fusion of Medical Image Using STSVD -- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid -- Chapter 66. A Method for the Selection of Agile Methods Using AHP -- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network -- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function. Tipo de medio : Computadora Summary : The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 2 [documento electrónico] / Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, . - 1 ed. . - Singapore [Malasia] : Springer, 2017 . - XXIV, 685 p. 277 ilustraciones.
ISBN : 978-981-10-3156-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados Clasificación: 006.3 Resumen: El libro es una colección de artÃculos de investigación de alta calidad revisados ​​por pares presentados en la Conferencia Internacional sobre las Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática de la Universidad KIIT, Bhubaneswar, India, del 16 al 17 de septiembre de 2016. El libro tiene como objetivo presentar teorÃas, metodologÃas, nuevas ideas, experiencias, aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a diversas disciplinas de la ingenierÃa como informática, electrónica, ingenierÃa eléctrica, mecánica, etc. Nota de contenido: Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field -- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations -- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications -- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment -- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs -- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree -- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention -- Chapter 9. Low Power 14T Hybrid Full Adder Cell -- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm -- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence -- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition -- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage -- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API -- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing -- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm -- Chapter 17. A Novel Representation for Classification of User Sentiments -- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model -- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application -- Chapter 20. Multi-objective IT Professionals' Utilization ProblemsUsing Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier -- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features -- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification -- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network -- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization -- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques -- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach -- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications -- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise -- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications -- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) -- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques -- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus -- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier -- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews -- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data -- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews -- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis -- Chapter 43. Approach for Emotion Extraction from Text -- Chapter 44. Bio-inspired Algorithms for Mobile Location Management – A New Paradigm -- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations – A Novel Approach -- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image -- Chapter 47. Analysis of Logs by Using Logstash -- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining -- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design -- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System -- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM -- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks -- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process -- Chapter 54. Confidentiality and Storage of Data in Cloud Environment -- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing -- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method -- Chapter 57. Series Smart Wire – Managing Load and Congestion in Transmission Line -- Chapter 58. Recognizing Human Faces with Tilt -- Chapter 59. Word-Level Script Identification from Scene Images -- Chapter 60. Writer Specific Parameters for Online Signature Verification -- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network -- Chapter 62. TKAR: Efficient Mining of Top – k Association Rules on Real – Life Datasets -- Chapter 63. Predicting Defect of Software System -- Chapter 64. Fusion of Medical Image Using STSVD -- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid -- Chapter 66. A Method for the Selection of Agile Methods Using AHP -- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network -- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images.-Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function. Tipo de medio : Computadora Summary : The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Progress in Computing, Analytics and Networking / Pattnaik, Prasant Kumar ; Rautaray, Siddharth Swarup ; Das, Himansu ; Nayak, Janmenjoy
TÃtulo : Progress in Computing, Analytics and Networking : Proceedings of ICCAN 2017 Tipo de documento: documento electrónico Autores: Pattnaik, Prasant Kumar, ; Rautaray, Siddharth Swarup, ; Das, Himansu, ; Nayak, Janmenjoy, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2018 Número de páginas: XX, 845 p. 289 ilustraciones ISBN/ISSN/DL: 978-981-10-7871-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia Computacional Procesamiento de la señal Telecomunicación Investigación cuantitativa Procesamiento de señales voz e imágenes IngenierÃa en Comunicaciones Redes Análisis de datos y Big Data Clasificación: 006.3 Resumen: El libro se centra en fomentar ideas y resultados de investigación nuevos y originales en tres áreas amplias: informática, análisis y redes con sus posibles aplicaciones en los diversos dominios interdisciplinarios de la ingenierÃa. Esta es un área interdisciplinaria emergente y apasionante en la que se está investigando y desarrollando una amplia gama de teorÃas y metodologÃas para abordar problemas complejos y desafiantes del mundo real. También proporciona información sobre la Conferencia Internacional sobre Análisis Informático y Redes (ICCAN 2017), que es un foro abierto internacional de primer nivel para cientÃficos, investigadores y tecnócratas del mundo académico, asà como de industrias de diferentes partes del mundo, para presentar, interactuar e intercambiar. el estado del arte de conceptos, prototipos e ideas de investigación innovadoras en varios campos diversificados. El libro incluye ponencias magistrales invitadas y presentaciones de artÃculos tanto del mundo académico como de la industria para iniciar e encender nuestras mentes jóvenes en el prado de investigaciones trascendentales y asà enriquecer sus conocimientos existentes. El libro está dirigido a estudiantes de posgrado e investigadores que trabajan en la disciplina de IngenierÃa y Ciencias de la Computación. También será útil para los investigadores que trabajan en el ámbito de la electrónica, ya que contiene algunas tecnologÃas de hardware y tecnologÃas de comunicación futuras. Nota de contenido: Preface -- Organizing Committee -- About the Editors -- Table of Contents -- 79 Papers -- Author Index. Tipo de medio : Computadora Summary : The book focuses to foster new and original research ideas and results in three broad areas: computing, analytics, and networking with its prospective applications in the various interdisciplinary domains of engineering. This is an exciting and emerging interdisciplinary area in which a wide range of theory and methodologies are being investigated and developed to tackle complex and challenging real world problems. It also provides insights into the International Conference on Computing Analytics and Networking (ICCAN 2017) which is a premier international open forum for scientists, researchers and technocrats in academia as well as in industries from different parts of the world to present, interact, and exchange the state of art of concepts, prototypes, innovative research ideas in several diversified fields. The book includes invited keynote papers and paper presentations from both academia and industry to initiate and ignite our young minds in the meadow of momentous research and thereby enrich their existing knowledge. The book aims at postgraduate students and researchers working in the discipline of Computer Science & Engineering. It will be also useful for the researchers working in the domain of electronics as it contains some hardware technologies and forthcoming communication technologies. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Progress in Computing, Analytics and Networking : Proceedings of ICCAN 2017 [documento electrónico] / Pattnaik, Prasant Kumar, ; Rautaray, Siddharth Swarup, ; Das, Himansu, ; Nayak, Janmenjoy, . - 1 ed. . - Singapore [Malasia] : Springer, 2018 . - XX, 845 p. 289 ilustraciones.
ISBN : 978-981-10-7871-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia Computacional Procesamiento de la señal Telecomunicación Investigación cuantitativa Procesamiento de señales voz e imágenes IngenierÃa en Comunicaciones Redes Análisis de datos y Big Data Clasificación: 006.3 Resumen: El libro se centra en fomentar ideas y resultados de investigación nuevos y originales en tres áreas amplias: informática, análisis y redes con sus posibles aplicaciones en los diversos dominios interdisciplinarios de la ingenierÃa. Esta es un área interdisciplinaria emergente y apasionante en la que se está investigando y desarrollando una amplia gama de teorÃas y metodologÃas para abordar problemas complejos y desafiantes del mundo real. También proporciona información sobre la Conferencia Internacional sobre Análisis Informático y Redes (ICCAN 2017), que es un foro abierto internacional de primer nivel para cientÃficos, investigadores y tecnócratas del mundo académico, asà como de industrias de diferentes partes del mundo, para presentar, interactuar e intercambiar. el estado del arte de conceptos, prototipos e ideas de investigación innovadoras en varios campos diversificados. El libro incluye ponencias magistrales invitadas y presentaciones de artÃculos tanto del mundo académico como de la industria para iniciar e encender nuestras mentes jóvenes en el prado de investigaciones trascendentales y asà enriquecer sus conocimientos existentes. El libro está dirigido a estudiantes de posgrado e investigadores que trabajan en la disciplina de IngenierÃa y Ciencias de la Computación. También será útil para los investigadores que trabajan en el ámbito de la electrónica, ya que contiene algunas tecnologÃas de hardware y tecnologÃas de comunicación futuras. Nota de contenido: Preface -- Organizing Committee -- About the Editors -- Table of Contents -- 79 Papers -- Author Index. Tipo de medio : Computadora Summary : The book focuses to foster new and original research ideas and results in three broad areas: computing, analytics, and networking with its prospective applications in the various interdisciplinary domains of engineering. This is an exciting and emerging interdisciplinary area in which a wide range of theory and methodologies are being investigated and developed to tackle complex and challenging real world problems. It also provides insights into the International Conference on Computing Analytics and Networking (ICCAN 2017) which is a premier international open forum for scientists, researchers and technocrats in academia as well as in industries from different parts of the world to present, interact, and exchange the state of art of concepts, prototypes, innovative research ideas in several diversified fields. The book includes invited keynote papers and paper presentations from both academia and industry to initiate and ignite our young minds in the meadow of momentous research and thereby enrich their existing knowledge. The book aims at postgraduate students and researchers working in the discipline of Computer Science & Engineering. It will be also useful for the researchers working in the domain of electronics as it contains some hardware technologies and forthcoming communication technologies. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Permalink