語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the 4th International...
~
Mandal, Jyotsna Kumar.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015/ edited by Swagatam Das, Tandra Pal, Samarjit Kar, Suresh Chandra Satapathy, Jyotsna Kumar Mandal.
其他作者:
Das, Swagatam.
面頁冊數:
XX, 729 p. 258 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational intelligence. -
電子資源:
https://doi.org/10.1007/978-81-322-2695-6
ISBN:
9788132226956
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
[electronic resource] /edited by Swagatam Das, Tandra Pal, Samarjit Kar, Suresh Chandra Satapathy, Jyotsna Kumar Mandal. - 1st ed. 2016. - XX, 729 p. 258 illus.online resource. - Advances in Intelligent Systems and Computing,4042194-5357 ;. - Advances in Intelligent Systems and Computing,335.
Part 1: Special Session: Advances in Nature Inspired Algorithms for Engineering Optimization Problems_An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Task in Multiprocessor System Using Hybrid Quantum-Inspired Genetic Algorithm -- Equitable Machine Learning Algorithms to Probe over P2P Botnets -- Directed Search Based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor Environment -- Part 2: Bioinformatics and Computational Biology_JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP Classifiers -- Molecular Computing and Structural Biology for Interactions in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer Metastasis -- SVM Based Pre-microRNA Classifier Using Sequence, Structural and Thermodynamic Parameters -- DCoSpect: A Novel Differentially Co-expressed Gene Module Detection Algorithm Using Spectral Clustering -- Intelligent Topological Differential Gene Networks -- Part 3: Signal Processing_Impact of Threshold to Identify Vocal Tract -- Application of Compressed Sensing in Cognitive Radio -- Compressed Sensing Based NBI Mitigation in Ultra Wide Band Energy Detector -- Part 4: Data Mining_A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer Sensor -- Mining and Ranking Association Rules in Support, Confidence, Correlation and Dissociation Framework -- Mining Closed Interesting Sub spaces to Discover Conducive Living Environment of Migratory Animals -- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph -- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images -- Offline Signature Verification Using Artificial Neural Network -- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition -- Visual Analytic Based Technique for Handwritten Indic Script Identification – A Greedy Heuristic Feature Fusion Framework -- Offline Writer Identification from Isolated Characters Using Textural Features -- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts -- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint -- Optimal allocation of Distributed Generator using Chemical Reaction Optimization -- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget -- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems -- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm -- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks -- Service Provisioning middleware for Wireless Sensor Network -- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network -- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design -- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata -- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA -- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form -- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms -- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making -- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients -- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour -- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks -- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks -- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches -- Secure Remote Login Scheme with Password and Smart Card Update Facilities -- Generation and Risk Analysis of Network Attack Graph -- Unsupervised Spam Detection in Hyves Using SALSA -- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems -- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection -- Part 12: Text Processing_Sentiment Analysis with Modality Processing -- Query-Based Extractive Text Summarization for Sanskrit -- Code Obfuscation by Using Floating Points and Conditional Statements -- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption -- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD -- Compression of Hyper-Spectral Images and Its Performance Evaluation -- Hand Gesture Recognition for Sign Language: A Skeleton Approach -- Modified Cuckoo Search based Image Enhancement -- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm -- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery -- Adaptive Multi-Layer Routing for Incremental Design of an SoC -- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour -- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation -- A Multi-Agent Planning Algorithm with Joint Actions -- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System -- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.
The proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like Nature Inspired Algorithms, Fuzzy Systems, Data Mining, Signal Processing, Image processing, Text Processing, Wireless Sensor Networks, Network Security and Cellular Automata. .
ISBN: 9788132226956
Standard No.: 10.1007/978-81-322-2695-6doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
LDR
:08212nam a22003975i 4500
001
982659
003
DE-He213
005
20200705040321.0
007
cr nn 008mamaa
008
201211s2016 ii | s |||| 0|eng d
020
$a
9788132226956
$9
978-81-322-2695-6
024
7
$a
10.1007/978-81-322-2695-6
$2
doi
035
$a
978-81-322-2695-6
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
$h
[electronic resource] /
$c
edited by Swagatam Das, Tandra Pal, Samarjit Kar, Suresh Chandra Satapathy, Jyotsna Kumar Mandal.
250
$a
1st ed. 2016.
264
1
$a
New Delhi :
$b
Springer India :
$b
Imprint: Springer,
$c
2016.
300
$a
XX, 729 p. 258 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
404
505
0
$a
Part 1: Special Session: Advances in Nature Inspired Algorithms for Engineering Optimization Problems_An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Task in Multiprocessor System Using Hybrid Quantum-Inspired Genetic Algorithm -- Equitable Machine Learning Algorithms to Probe over P2P Botnets -- Directed Search Based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor Environment -- Part 2: Bioinformatics and Computational Biology_JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP Classifiers -- Molecular Computing and Structural Biology for Interactions in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer Metastasis -- SVM Based Pre-microRNA Classifier Using Sequence, Structural and Thermodynamic Parameters -- DCoSpect: A Novel Differentially Co-expressed Gene Module Detection Algorithm Using Spectral Clustering -- Intelligent Topological Differential Gene Networks -- Part 3: Signal Processing_Impact of Threshold to Identify Vocal Tract -- Application of Compressed Sensing in Cognitive Radio -- Compressed Sensing Based NBI Mitigation in Ultra Wide Band Energy Detector -- Part 4: Data Mining_A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer Sensor -- Mining and Ranking Association Rules in Support, Confidence, Correlation and Dissociation Framework -- Mining Closed Interesting Sub spaces to Discover Conducive Living Environment of Migratory Animals -- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph -- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images -- Offline Signature Verification Using Artificial Neural Network -- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition -- Visual Analytic Based Technique for Handwritten Indic Script Identification – A Greedy Heuristic Feature Fusion Framework -- Offline Writer Identification from Isolated Characters Using Textural Features -- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts -- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint -- Optimal allocation of Distributed Generator using Chemical Reaction Optimization -- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget -- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems -- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm -- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks -- Service Provisioning middleware for Wireless Sensor Network -- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network -- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design -- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata -- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA -- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form -- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms -- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making -- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients -- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour -- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks -- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks -- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches -- Secure Remote Login Scheme with Password and Smart Card Update Facilities -- Generation and Risk Analysis of Network Attack Graph -- Unsupervised Spam Detection in Hyves Using SALSA -- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems -- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection -- Part 12: Text Processing_Sentiment Analysis with Modality Processing -- Query-Based Extractive Text Summarization for Sanskrit -- Code Obfuscation by Using Floating Points and Conditional Statements -- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption -- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD -- Compression of Hyper-Spectral Images and Its Performance Evaluation -- Hand Gesture Recognition for Sign Language: A Skeleton Approach -- Modified Cuckoo Search based Image Enhancement -- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm -- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery -- Adaptive Multi-Layer Routing for Incremental Design of an SoC -- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour -- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation -- A Multi-Agent Planning Algorithm with Joint Actions -- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System -- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.
520
$a
The proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like Nature Inspired Algorithms, Fuzzy Systems, Data Mining, Signal Processing, Image processing, Text Processing, Wireless Sensor Networks, Network Security and Cellular Automata. .
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computational complexity.
$3
527777
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Complexity.
$3
669595
700
1
$a
Das, Swagatam.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
896903
700
1
$a
Pal, Tandra.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1274693
700
1
$a
Kar, Samarjit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
975025
700
1
$a
Satapathy, Suresh Chandra.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
889261
700
1
$a
Mandal, Jyotsna Kumar.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1208238
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9788132226932
776
0 8
$i
Printed edition:
$z
9788132226949
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-81-322-2695-6
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入