語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the 5th International...
~
(1998 :)
Proceedings of the 5th International Conference on Frontiers in Intelligent Computingtheory and applications : FICTA 2016.Volume 2 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proceedings of the 5th International Conference on Frontiers in Intelligent Computingedited by Suresh Chandra Satapathy ... [et al.].
其他題名:
theory and applications : FICTA 2016.
其他題名:
FICTA 2016
其他作者:
Satapathy, Suresh Chandra.
團體作者:
出版者:
Singapore :Springer Singapore :2017.
面頁冊數:
xxiv, 685 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Artificial intelligence
電子資源:
http://dx.doi.org/10.1007/978-981-10-3156-4
ISBN:
9789811031564$q(electronic bk.)
Proceedings of the 5th International Conference on Frontiers in Intelligent Computingtheory and applications : FICTA 2016.Volume 2 /
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing
theory and applications : FICTA 2016.Volume 2 /[electronic resource] :FICTA 2016edited by Suresh Chandra Satapathy ... [et al.]. - Singapore :Springer Singapore :2017. - xxiv, 685 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.5162194-5357 ;. - Advances in intelligent systems and computing ;176..
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field -- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations -- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications -- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment -- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs -- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree -- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention -- Chapter 9. Low Power 14T Hybrid Full Adder Cell -- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm -- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence -- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition -- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage -- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API -- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing -- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm -- Chapter 17. A Novel Representation for Classification of User Sentiments -- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model -- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application -- Chapter 20. Multi-objective IT Professionals' Utilization Problems Using Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier -- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features -- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification -- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network -- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization -- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques -- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach -- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications -- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise -- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications -- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) -- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques -- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus -- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier -- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews -- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data -- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews -- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis -- Chapter 43. Approach for Emotion Extraction from Text -- Chapter 44. Bio-inspired Algorithms for Mobile Location Management - A New Paradigm -- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations - A Novel Approach -- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image -- Chapter 47. Analysis of Logs by Using Logstash -- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining -- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design -- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System -- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM -- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks -- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process -- Chapter 54. Confidentiality and Storage of Data in Cloud Environment -- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing -- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method -- Chapter 57. Series Smart Wire - Managing Load and Congestion in Transmission Line -- Chapter 58. Recognizing Human Faces with Tilt -- Chapter 59. Word-Level Script Identification from Scene Images -- Chapter 60. Writer Specific Parameters for Online Signature Verification -- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network -- Chapter 62. TKAR: Efficient Mining of Top - k Association Rules on Real - Life Datasets -- Chapter 63. Predicting Defect of Software System -- Chapter 64. Fusion of Medical Image Using STSVD -- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid -- Chapter 66. A Method for the Selection of Agile Methods Using AHP -- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network -- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images -- Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc.
ISBN: 9789811031564$q(electronic bk.)
Standard No.: 10.1007/978-981-10-3156-4doiSubjects--Topical Terms:
252958
Artificial intelligence
LC Class. No.: Q334
Dewey Class. No.: 006.3
Proceedings of the 5th International Conference on Frontiers in Intelligent Computingtheory and applications : FICTA 2016.Volume 2 /
LDR
:08359nmm a2200337 a 4500
001
509196
003
DE-He213
005
20170915164526.0
006
m d
007
cr nn 008maaau
008
171121s2017 si s 0 eng d
020
$a
9789811031564$q(electronic bk.)
020
$a
9789811031557$q(paper)
024
7
$a
10.1007/978-981-10-3156-4
$2
doi
035
$a
978-981-10-3156-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q334
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
006.3
$2
23
090
$a
Q334
$b
.I61 2016
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing
$h
[electronic resource] :
$b
theory and applications : FICTA 2016.
$n
Volume 2 /
$c
edited by Suresh Chandra Satapathy ... [et al.].
246
3
$a
FICTA 2016
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2017.
300
$a
xxiv, 685 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.516
505
0
$a
Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field -- Chapter 3. Design of Visual Cryptography Scheme Using C(m,w) Combinations -- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications -- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment -- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs -- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree -- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention -- Chapter 9. Low Power 14T Hybrid Full Adder Cell -- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm -- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence -- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition -- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage -- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API -- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing -- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm -- Chapter 17. A Novel Representation for Classification of User Sentiments -- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model -- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application -- Chapter 20. Multi-objective IT Professionals' Utilization Problems Using Fuzzy Goal Programming -- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing -- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier -- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features -- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification -- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network -- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization -- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques -- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach -- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications -- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise -- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications -- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) -- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques -- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus -- Chapter 38. Automatic Classification of Lung Nodules into Benign or Malignant Using SVM Classifier -- Chapter 39. RSentiment: A Tool to Extract Meaningful Insights from Textual Reviews -- Chapter 40. Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data -- Chapter 41. Domain Independent Approach for Aspect Oriented Sentiment Analysis for Product Reviews -- Chapter 42. Privacy Preserving Data Mining: A Parametric Analysis -- Chapter 43. Approach for Emotion Extraction from Text -- Chapter 44. Bio-inspired Algorithms for Mobile Location Management - A New Paradigm -- Chapter 45. Automatic Detection of Diabetic Retinopathy Using Two Phase Top-hat Transformations - A Novel Approach -- Chapter 46. Evaluation of Heart Rate Using Reflectance of An Image -- Chapter 47. Analysis of Logs by Using Logstash -- Chapter 48. Performance of Multiple String Matching Algorithms in Text Mining -- Chapter 49. Estimation of Degree of Connectivity to Predict Quality of Software Design -- Chapter 50. Information Retrieval through the Web and Semantic Knowledge-Driven Automatic Question Answering System -- Chapter 51. Level Set Based Liver Segmentation and Classification by SVM -- Chapter 52. A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-hoc Networks -- Chapter 53. GOASREP: Goal Oriented Approach for Software Requirements Elicitation and Prioritization Using Analytic Hierarchy Process -- Chapter 54. Confidentiality and Storage of Data in Cloud Environment -- Chapter 55. An Exploratory Study of RDF: A Data Model for Cloud Computing -- Chapter 56. Optimization of Overcurrent Relays in Microgrid Using Interior Point Method and Active Set Method -- Chapter 57. Series Smart Wire - Managing Load and Congestion in Transmission Line -- Chapter 58. Recognizing Human Faces with Tilt -- Chapter 59. Word-Level Script Identification from Scene Images -- Chapter 60. Writer Specific Parameters for Online Signature Verification -- Chapter 61. Gene Ontology Based Function Prediction of Human Protein Using Protein Sequence and Neighborhood Property of PPI Network -- Chapter 62. TKAR: Efficient Mining of Top - k Association Rules on Real - Life Datasets -- Chapter 63. Predicting Defect of Software System -- Chapter 64. Fusion of Medical Image Using STSVD -- Chapter 65. Modified Cuckoo Search Algorithm for Fittest Relay Identification in Microgrid -- Chapter 66. A Method for the Selection of Agile Methods Using AHP -- Chapter 67. Load Balancing with Job Switching in Cloud Computing Network -- Chapter 68. An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. Novel Techniques for Detection of Anomalies in Brain MR Images -- Chapter 71. Convex Hyperspectral Unmixing Algorithm Using Parameterized Non-Convex Penalty Function.
520
$a
The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc.
650
0
$a
Artificial intelligence
$3
252958
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
252959
650
2 4
$a
Complexity.
$3
274400
700
1
$a
Satapathy, Suresh Chandra.
$3
559144
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
176.
$3
567349
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-3156-4
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000139129
電子館藏
1圖書
電子書
EB Q334 I61 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-981-10-3156-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入