| TÃtulo : |
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Ganapathi, Geetha, ; Subramaniam, Arumugam, ; Graña, Manuel, ; Balusamy, Suresh, ; Natarajan, Rajamanickam, ; Ramanathan, Periakaruppan, |
| Mención de edición: |
1 ed. |
| Editorial: |
Singapore [Malasya] : Springer |
| Fecha de publicación: |
2018 |
| Número de páginas: |
XII, 255 p. 89 ilustraciones |
| ISBN/ISSN/DL: |
978-981-1307164-- |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Inteligencia Computacional Inteligencia artificial Visión por computador Informática Seguridad de datos e información Matemáticas de la Computación |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas de la Tercera Conferencia Internacional sobre Inteligencia Computacional, Seguridad Cibernética y Modelos Computacionales, ICC3 2017, que se celebró en Coimbatore, India, en diciembre de 2017. Los 15 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 63 presentaciones. Estaban organizados en secciones temáticas denominadas: inteligencia computacional; la seguridad cibernética; y modelos computacionales. |
| Nota de contenido: |
A Short Review of Recent ELM Applications -- Critical Feature Selection and Critical Sampling for Data Mining -- From Recognition to Generation using Deep Learning: A Case Study with Video Generation -- Economic Dispatch Problem using Clustered Firefly -- Algorithm for Wind Thermal Power System -- A Novel and Efficient Multi-Hop Routing Algorithm for Manet -- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm -- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images -- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks -- Frequent Sequence Mining Approach to Video Compression -- Deep Learning based Audio Scene Classification -- Cyber Security -- Certain Challenges in Biometrics System Development -- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-HocNetworks -- Computational Models -- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears -- Violation Resolution in Distributed Stream Networks -- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience -- Hyers-Ulam Stability of Linear Differential Equations -- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure -- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers -- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption -- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative -- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings [documento electrónico] / Ganapathi, Geetha, ; Subramaniam, Arumugam, ; Graña, Manuel, ; Balusamy, Suresh, ; Natarajan, Rajamanickam, ; Ramanathan, Periakaruppan, . - 1 ed. . - Singapore [Malasya] : Springer, 2018 . - XII, 255 p. 89 ilustraciones. ISBN : 978-981-1307164-- Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Inteligencia Computacional Inteligencia artificial Visión por computador Informática Seguridad de datos e información Matemáticas de la Computación |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas de la Tercera Conferencia Internacional sobre Inteligencia Computacional, Seguridad Cibernética y Modelos Computacionales, ICC3 2017, que se celebró en Coimbatore, India, en diciembre de 2017. Los 15 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 63 presentaciones. Estaban organizados en secciones temáticas denominadas: inteligencia computacional; la seguridad cibernética; y modelos computacionales. |
| Nota de contenido: |
A Short Review of Recent ELM Applications -- Critical Feature Selection and Critical Sampling for Data Mining -- From Recognition to Generation using Deep Learning: A Case Study with Video Generation -- Economic Dispatch Problem using Clustered Firefly -- Algorithm for Wind Thermal Power System -- A Novel and Efficient Multi-Hop Routing Algorithm for Manet -- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm -- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images -- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks -- Frequent Sequence Mining Approach to Video Compression -- Deep Learning based Audio Scene Classification -- Cyber Security -- Certain Challenges in Biometrics System Development -- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-HocNetworks -- Computational Models -- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears -- Violation Resolution in Distributed Stream Networks -- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience -- Hyers-Ulam Stability of Linear Differential Equations -- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure -- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers -- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption -- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative -- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |