Bhateja, Vikrant
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications
1. Human Action Recognition Using Trajectory-Based Spatiotemporal Descriptors
Chandni Dhamsania, Tushar Ratanpara
2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend
Saumil C Patel, Pragnesh K Brahmbhatt
3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern
K. Sathyavikasini, M.S. Vijaya
4. Basic Arithmetic Coding Based Approach to Compress a Character String
Ipsita Mondal, Subhra J. Sarkar
5. Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection
Abhishek Bhattacharya, Radha Tamal Goswami
6. Feature Optimality-Based Semi-supervised Face Recognition Approach
Taqdir, Renu dhir
7. Fuzzy-Based Algorithm for Resource Allocation
Gurpreet Singh Saini, Sanjay Kumar Dubey, Sunil Kumar Bharti
8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN)
Diksha, Poonam Saini
9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing
Surbhi Malik, Poonam Saini, Sudesh Rani
10. Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals
Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman
11. Text Document Classification with PCA and One-Class SVM
B. Shravan Kumar, Vadlamani Ravi
12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease
Anurag Bhatt, Sanjay Kumar Dubey, Ashutosh Kumar Bhatt, Manish Joshi
13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time
Barnali Chaudhuri, R. K. Jana, P. K. Dan
14. Efficient and Parallel Framework for Analyzing the Sentiment
Ankur Sharma, Gopal Krishna Nayak
15. Content-Aware Video Retargeting by Seam Carving
Shrinivas D. Desai, Mahalaxmi Bhille, Namrata D. Hiremath
16. Intelligence System Security Based on 3-D Image
K. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai
17. PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks
Kanaka Raju Gariga, A. Rama Mohan Reddy, N. Sambasiva Rao
18. Evaluation of Barriers of Health Care Waste Management in India—A Gray Relational Analysis Approach
Suchismita Swain, Kamalakanta Muduli, Jitendra Narayan Biswal, Sushanta Tripathy, Tushar Kanti Panda
19. Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration
G. Kalyani, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah
20. Performance Analysis of Compressed Sensing in Cognitive Radio Networks
N. Swetha, Panyam Narahari Sastry, Y. Rajasree Rao, G. Murali Divya Teja
21. Robust Multiple Composite Watermarking Using LSB Technique
S. Rashmi, Priyanka, Sushila Maheshkar
22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines
Dadabada Pradeepkumar, Vadlamani Ravi
23. Gray Scale Image Compression Using PSO with Guided Filter and DWT
Namrata Vij, Jagjit Singh
24. Graph Partitioning Methods
Prabhu Dessai Tanvi, Rodrigues Okstynn, Fernandes Sonia
25. Smart and Accountable Water Distribution for Rural Development
Ishaani Priyadarshini, Jay Sarraf
26. Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring Parameters
Subhra J. Sarkar, Nabendu Kumar Sarkar, Ipsita Mondal
27. Color Image Visual Cryptography Scheme with Enhanced Security
Prachi Khokhar, Debasish Jena
28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System
Babita Panda, Bhagabat Panda, P. K. Hota
29. Fault Mitigation in Five-Level Inverter-Fed Induction Motor Drive Using Redundant Cell
B. Madhu Kiran, B. V. Sanker Ram
30. A Web-of-Things-Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach
Debajyoti Mukhopadhyay, Sourabh Saha, Rajdeep Rao, Anish Paranjpe
31. On the Security of Chaos-Based Watermarking Scheme for Secure Communication
Musheer Ahmad, Hamed D. AlSharari
32. Neighborhood Topology to Discover Influential Nodes in a Complex Network
Chandni Saxena, M. N. Doja, Tanvir Ahmad
33. Venn Diagram-Based Feature Ranking Technique for Key Term Extraction
Neelotpal Chakraborty, Sambit Mukherjee, Ashes Ranjan Naskar, Samir Malakar, Ram Sarkar, Mita Nasipuri
34. Bangla Handwritten City Name Recognition Using Gradient-Based Feature
Shilpi Barua, Samir Malakar, Showmik Bhowmik, Ram Sarkar, Mita Nasipuri
35. Shortest Path Algorithms for Social Network Strengths
Amreen Ahmad, Tanvir Ahmad, Harsh Vijay
36. Improvised Symbol Table Structure
Narander Kumar, Shivani Dubey
37. Digital Watermarking Using Enhanced LSB Technique
Narander Kumar, Jaishree
38. Fuzzy-Based Adaptive IMC-PI Controller for Real-Time Application on a Level Control Loop
Ujjwal Manikya Nath, Chanchal Dey, Rajani K. Mudi
39. Face Recognition Using PCA and Minimum Distance Classifier
Shalmoly Mondal, Soumen Bag
40. A Soft Computing Approach for Modeling of Nonlinear Dynamical Systems
Rajesh Kumar, Smriti Srivastava, J. R. P. Gupta
41. Optimization of Workload Scheduling in Computational Grid
Sukalyan Goswami, Ajanta Das
42. Cloud Security and Jurisdiction: Need of the Hour
Tamanna Jena, J. R. Mohanty
43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation
Sunanda Das, Sourav De
44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic
Smita Banerjee, Rajeev Chatterjee
45. A Study on Various Training Programmes and Their Effects Offered by the IT Firms
Pattnaik Manjula, Pattanaik Balachandra
46. Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network
Ashima Rout, Anurupa Kar, Srinivas Sethi
47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC)
Hisham M. Alsaghier, Shaik Shakeel Ahamad, Siba K. Udgata, L. S. S. Reddy
48. Cloud Based Malware Detection Technique
Sagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty
49. Abnormal Network Traffic Detection Using Support Vector Data Description
Jyostna Devi Bodapati, N. Veeranjaneyulu
50. Real-Time Automotive Engine Fault Detection and Analysis Using BigData Platforms
Yedu C. Nair, Sachin Kumar, K. P. Soman
51. Load Flow Analysis of Distribution System Using Artificial Neural Networks
M. Suresh, T. S. Sirish, T. V. Subhashini, T. Daniel Prasanth
52. An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth
K Divyavarma, M Remya, G Deepa
53. Implementing Anti-Malware as Security-as-a-Service from Cloud
Deepak H. Sharma, C. A. Dhote, Manish M. Potey
54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based Feature
Shibaprasad Sen, Ram Sarkar, Kaushik Roy, Naoto Hori
55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts
T. G. Gregory Paul, T. Gireesh Kumar
56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells
Kamaldeep Kaur, Shilpi Jain
57. Snort Rule Detection for Countering in Network Attacks
Venkateswarlu Somu, D. B. K. Kamesh, J. K. R. Sastry, S. N. M. Sitara
58. Trust and Energy-Efficient Routing for Internet of Things—Energy Evaluation Model
Carynthia Kharkongor, T. Chithralekha, Reena Varghese
59. READ—A Bangla Phoneme Recognition System
Himadri Mukherjee, Chayan Halder, Santanu Phadikar, Kaushik Roy
60. Information Fusion in Animal Biometric Identification
Gopal Chaudhary, Smriti Srivastava, Saurabh Bhardwaj, Shefali Srivastava
61. Small World Network Formation and Characterization of Sports Network
Paramita Dey, Maitreyee Ganguly, Priya Sengupta, Sarbani Roy
62. UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital Structure
Yatindra Gaurav, R. K. Chauhan
63. Finding Clusters of Data: Cluster Analysis in R
Tulika Narang
64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimisation
Sandipan Choudhuri, Nibaran Das, Mita Nasipuri
65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition
Tathagata Bandyopadhyay, Sreetama Mitra, Shyamali Mitra, Luis Miguel Rato, Nibaran Das
66. A Systematic Review on Materialized View Selection
Anjana Gosain, Kavita Sachdeva
67. SQLI Attacks: Current State and Mitigation in SDLC
Daljit Kaur, Parminder Kaur
68. Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional Model
Anjana Gosain, Rakhi Gupta
69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles
B J Sowmya, Chetan, D Pradeep Kumar, K. G. Srinivasa
70. Cognitive Architectural Model for Solving Clustering Problem
Meenakhi Sahu, Hima Bindu Maringanti
71. Action Classification Based on Mutual Difference Score
Shamama Anwar, G. Rajamohan
72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews
Monalisa Ghosh, Gautam Sanyal
73. BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network
Afreen Fatimah, Rahul Johari
74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs
Md. Khaja Mohiddin, V. B. S. Srilatha Indra Dutt
75. An Automated Approach to Prevent Suicide in Metro Stations
Anindya Mukherjee, Bavrabi Ghosh
76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
A. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, R. K. Manu, P. Hrudya
77. Active Steganalysis on SVD-Based Embedding Algorithm
P. P. Amritha, Rithu P. Ravi, M. Sethumadhavan
78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach
Pawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri
79. A Rule-Based Approach to Identify Stop Words for Gujarati Language
Rajnish M. Rakholia, Jatinderkumar R. Saini
Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics), Complexity
- Editor
- Bhateja, Vikrant
- Pattnaik, Prasant Kumar
- Satapathy, Suresh Chandra
- Udgata, Siba K.
- Publisher
- Springer
- Publication year
- 2017
- Language
- en
- Edition
- 1
- Series
- Advances in Intelligent Systems and Computing
- Page amount
- 24 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9789811031533
- Printed ISBN
- 978-981-10-3152-6