| TÃtulo : |
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 1 |
| Tipo de documento: |
documento electrónico |
| Autores: |
Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, |
| Mención de edición: |
1 ed. |
| Editorial: |
Singapore [Malasya] : Springer |
| Fecha de publicación: |
2017 |
| Número de páginas: |
XXIV, 809 p. 335 ilustraciones |
| ISBN/ISSN/DL: |
978-981-10-3153-3 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados |
| Ãndice Dewey: |
006.3 Inteligencia artificial |
| Resumen: |
El libro es una colección de artÃculos de investigación revisados ​​por pares de alta calidad presentados en la Conferencia Internacional sobre Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática, Universidad KIIT, Bhubaneswar, India durante el 16 y 17 de septiembre de 2016. El libro presenta teorÃas, metodologÃas, nuevas ideas, experiencias y aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a varias disciplinas de ingenierÃa como la informática, la electrónica, la ingenierÃa eléctrica y mecánica. |
| Nota de contenido: |
Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent RecognitionSystem Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India – A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional ProgrammingApproach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Miningfor Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things – Energy Evaluation Model -- Chapter 59. READ - A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications : FICTA 2016, Volume 1 [documento electrónico] / Satapathy, Suresh Chandra, ; Bhateja, Vikrant, ; Udgata, Siba K., ; Pattnaik, Prasant Kumar, . - 1 ed. . - Singapore [Malasya] : Springer, 2017 . - XXIV, 809 p. 335 ilustraciones. ISBN : 978-981-10-3153-3 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Inteligencia Computacional Inteligencia artificial Dinámica TeorÃas no lineales Sistemas Dinámicos Aplicados |
| Ãndice Dewey: |
006.3 Inteligencia artificial |
| Resumen: |
El libro es una colección de artÃculos de investigación revisados ​​por pares de alta calidad presentados en la Conferencia Internacional sobre Fronteras de la Computación Inteligente: TeorÃa y aplicaciones (FICTA 2016) celebrada en la Escuela de IngenierÃa Informática, Universidad KIIT, Bhubaneswar, India durante el 16 y 17 de septiembre de 2016. El libro presenta teorÃas, metodologÃas, nuevas ideas, experiencias y aplicaciones en todas las áreas de la computación inteligente y sus aplicaciones a varias disciplinas de ingenierÃa como la informática, la electrónica, la ingenierÃa eléctrica y mecánica. |
| Nota de contenido: |
Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent RecognitionSystem Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India – A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional ProgrammingApproach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Miningfor Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things – Energy Evaluation Model -- Chapter 59. READ - A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |