Login

Bhateja, Vikrant

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Bhateja, Vikrant - Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, ebook

353,30€

Ebook, PDF with Adobe DRM
ISBN: 9789811031533
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Human Action Recognition Using Trajectory-Based Spatiotemporal Descriptors
Chandni Dhamsania, Tushar Ratanpara

2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend
Saumil C Patel, Pragnesh K Brahmbhatt

3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern
K. Sathyavikasini, M.S. Vijaya

4. Basic Arithmetic Coding Based Approach to Compress a Character String
Ipsita Mondal, Subhra J. Sarkar

5. Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection
Abhishek Bhattacharya, Radha Tamal Goswami

6. Feature Optimality-Based Semi-supervised Face Recognition Approach
Taqdir, Renu dhir

7. Fuzzy-Based Algorithm for Resource Allocation
Gurpreet Singh Saini, Sanjay Kumar Dubey, Sunil Kumar Bharti

8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN)
Diksha, Poonam Saini

9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing
Surbhi Malik, Poonam Saini, Sudesh Rani

10. Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals
Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman

11. Text Document Classification with PCA and One-Class SVM
B. Shravan Kumar, Vadlamani Ravi

12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease
Anurag Bhatt, Sanjay Kumar Dubey, Ashutosh Kumar Bhatt, Manish Joshi

13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time
Barnali Chaudhuri, R. K. Jana, P. K. Dan

14. Efficient and Parallel Framework for Analyzing the Sentiment
Ankur Sharma, Gopal Krishna Nayak

15. Content-Aware Video Retargeting by Seam Carving
Shrinivas D. Desai, Mahalaxmi Bhille, Namrata D. Hiremath

16. Intelligence System Security Based on 3-D Image
K. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai

17. PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks
Kanaka Raju Gariga, A. Rama Mohan Reddy, N. Sambasiva Rao

18. Evaluation of Barriers of Health Care Waste Management in India—A Gray Relational Analysis Approach
Suchismita Swain, Kamalakanta Muduli, Jitendra Narayan Biswal, Sushanta Tripathy, Tushar Kanti Panda

19. Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration
G. Kalyani, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah

20. Performance Analysis of Compressed Sensing in Cognitive Radio Networks
N. Swetha, Panyam Narahari Sastry, Y. Rajasree Rao, G. Murali Divya Teja

21. Robust Multiple Composite Watermarking Using LSB Technique
S. Rashmi, Priyanka, Sushila Maheshkar

22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines
Dadabada Pradeepkumar, Vadlamani Ravi

23. Gray Scale Image Compression Using PSO with Guided Filter and DWT
Namrata Vij, Jagjit Singh

24. Graph Partitioning Methods
Prabhu Dessai Tanvi, Rodrigues Okstynn, Fernandes Sonia

25. Smart and Accountable Water Distribution for Rural Development
Ishaani Priyadarshini, Jay Sarraf

26. Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring Parameters
Subhra J. Sarkar, Nabendu Kumar Sarkar, Ipsita Mondal

27. Color Image Visual Cryptography Scheme with Enhanced Security
Prachi Khokhar, Debasish Jena

28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System
Babita Panda, Bhagabat Panda, P. K. Hota

29. Fault Mitigation in Five-Level Inverter-Fed Induction Motor Drive Using Redundant Cell
B. Madhu Kiran, B. V. Sanker Ram

30. A Web-of-Things-Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach
Debajyoti Mukhopadhyay, Sourabh Saha, Rajdeep Rao, Anish Paranjpe

31. On the Security of Chaos-Based Watermarking Scheme for Secure Communication
Musheer Ahmad, Hamed D. AlSharari

32. Neighborhood Topology to Discover Influential Nodes in a Complex Network
Chandni Saxena, M. N. Doja, Tanvir Ahmad

33. Venn Diagram-Based Feature Ranking Technique for Key Term Extraction
Neelotpal Chakraborty, Sambit Mukherjee, Ashes Ranjan Naskar, Samir Malakar, Ram Sarkar, Mita Nasipuri

34. Bangla Handwritten City Name Recognition Using Gradient-Based Feature
Shilpi Barua, Samir Malakar, Showmik Bhowmik, Ram Sarkar, Mita Nasipuri

35. Shortest Path Algorithms for Social Network Strengths
Amreen Ahmad, Tanvir Ahmad, Harsh Vijay

36. Improvised Symbol Table Structure
Narander Kumar, Shivani Dubey

37. Digital Watermarking Using Enhanced LSB Technique
Narander Kumar, Jaishree

38. Fuzzy-Based Adaptive IMC-PI Controller for Real-Time Application on a Level Control Loop
Ujjwal Manikya Nath, Chanchal Dey, Rajani K. Mudi

39. Face Recognition Using PCA and Minimum Distance Classifier
Shalmoly Mondal, Soumen Bag

40. A Soft Computing Approach for Modeling of Nonlinear Dynamical Systems
Rajesh Kumar, Smriti Srivastava, J. R. P. Gupta

41. Optimization of Workload Scheduling in Computational Grid
Sukalyan Goswami, Ajanta Das

42. Cloud Security and Jurisdiction: Need of the Hour
Tamanna Jena, J. R. Mohanty

43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation
Sunanda Das, Sourav De

44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic
Smita Banerjee, Rajeev Chatterjee

45. A Study on Various Training Programmes and Their Effects Offered by the IT Firms
Pattnaik Manjula, Pattanaik Balachandra

46. Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network
Ashima Rout, Anurupa Kar, Srinivas Sethi

47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC)
Hisham M. Alsaghier, Shaik Shakeel Ahamad, Siba K. Udgata, L. S. S. Reddy

48. Cloud Based Malware Detection Technique
Sagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty

49. Abnormal Network Traffic Detection Using Support Vector Data Description
Jyostna Devi Bodapati, N. Veeranjaneyulu

50. Real-Time Automotive Engine Fault Detection and Analysis Using BigData Platforms
Yedu C. Nair, Sachin Kumar, K. P. Soman

51. Load Flow Analysis of Distribution System Using Artificial Neural Networks
M. Suresh, T. S. Sirish, T. V. Subhashini, T. Daniel Prasanth

52. An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth
K Divyavarma, M Remya, G Deepa

53. Implementing Anti-Malware as Security-as-a-Service from Cloud
Deepak H. Sharma, C. A. Dhote, Manish M. Potey

54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based Feature
Shibaprasad Sen, Ram Sarkar, Kaushik Roy, Naoto Hori

55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts
T. G. Gregory Paul, T. Gireesh Kumar

56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells
Kamaldeep Kaur, Shilpi Jain

57. Snort Rule Detection for Countering in Network Attacks
Venkateswarlu Somu, D. B. K. Kamesh, J. K. R. Sastry, S. N. M. Sitara

58. Trust and Energy-Efficient Routing for Internet of Things—Energy Evaluation Model
Carynthia Kharkongor, T. Chithralekha, Reena Varghese

59. READ—A Bangla Phoneme Recognition System
Himadri Mukherjee, Chayan Halder, Santanu Phadikar, Kaushik Roy

60. Information Fusion in Animal Biometric Identification
Gopal Chaudhary, Smriti Srivastava, Saurabh Bhardwaj, Shefali Srivastava

61. Small World Network Formation and Characterization of Sports Network
Paramita Dey, Maitreyee Ganguly, Priya Sengupta, Sarbani Roy

62. UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital Structure
Yatindra Gaurav, R. K. Chauhan

63. Finding Clusters of Data: Cluster Analysis in R
Tulika Narang

64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimisation
Sandipan Choudhuri, Nibaran Das, Mita Nasipuri

65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition
Tathagata Bandyopadhyay, Sreetama Mitra, Shyamali Mitra, Luis Miguel Rato, Nibaran Das

66. A Systematic Review on Materialized View Selection
Anjana Gosain, Kavita Sachdeva

67. SQLI Attacks: Current State and Mitigation in SDLC
Daljit Kaur, Parminder Kaur

68. Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional Model
Anjana Gosain, Rakhi Gupta

69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles
B J Sowmya, Chetan, D Pradeep Kumar, K. G. Srinivasa

70. Cognitive Architectural Model for Solving Clustering Problem
Meenakhi Sahu, Hima Bindu Maringanti

71. Action Classification Based on Mutual Difference Score
Shamama Anwar, G. Rajamohan

72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews
Monalisa Ghosh, Gautam Sanyal

73. BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network
Afreen Fatimah, Rahul Johari

74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs
Md. Khaja Mohiddin, V. B. S. Srilatha Indra Dutt

75. An Automated Approach to Prevent Suicide in Metro Stations
Anindya Mukherjee, Bavrabi Ghosh

76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
A. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, R. K. Manu, P. Hrudya

77. Active Steganalysis on SVD-Based Embedding Algorithm
P. P. Amritha, Rithu P. Ravi, M. Sethumadhavan

78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach
Pawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri

79. A Rule-Based Approach to Identify Stop Words for Gujarati Language
Rajnish M. Rakholia, Jatinderkumar R. Saini

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics), Complexity

Editor
 
 
 
Publisher
Springer
Publication year
2017
Language
en
Edition
1
Series
Advances in Intelligent Systems and Computing
Page amount
24 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9789811031533
Printed ISBN
978-981-10-3152-6

Similar titles