000781228 000__ 10060cam\a2200553Ii\4500 000781228 001__ 781228 000781228 005__ 20230306143225.0 000781228 006__ m\\\\\o\\d\\\\\\\\ 000781228 007__ cr\nn\nnnunnun 000781228 008__ 170320s2017\\\\si\\\\\\ob\\\\101\0\eng\d 000781228 019__ $$a974739537$$a974967907$$a975013633$$a975136372$$a975420236$$a984869274 000781228 020__ $$a9789811031533$$q(electronic book) 000781228 020__ $$a9811031533$$q(electronic book) 000781228 020__ $$z9789811031526 000781228 020__ $$z981103155X 000781228 0247_ $$a10.1007/978-981-10-3153-3$$2doi 000781228 035__ $$aSP(OCoLC)ocn976433243 000781228 035__ $$aSP(OCoLC)976433243$$z(OCoLC)974739537$$z(OCoLC)974967907$$z(OCoLC)975013633$$z(OCoLC)975136372$$z(OCoLC)975420236$$z(OCoLC)984869274 000781228 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dYDX$$dGW5XE$$dOCLCF$$dUAB$$dIOG$$dAZU$$dUPM 000781228 049__ $$aISEA 000781228 050_4 $$aQ342 000781228 08204 $$a006.3$$223 000781228 1112_ $$aInternational Conference on Frontiers in Intelligent Computing$$n(5th :$$d2016 :$$cBhubaneswar, India) 000781228 24510 $$aProceedings of the 5th International Conference on Frontiers in Intelligent Computing :$$btheory and applications : FICTA 2016.$$nVolume 1 /$$cSuresh Chandra Satapathy, Vikrant Bhateja, Siba K. Udgata, Prasant Kumar Pattnaik, editors. 000781228 264_1 $$aSingapore :$$bSpringer,$$c[2017]. 000781228 264_4 $$cĀ©2017 000781228 300__ $$a1 online resource. 000781228 336__ $$atext$$btxt$$2rdacontent 000781228 337__ $$acomputer$$bc$$2rdamedia 000781228 338__ $$aonline resource$$bcr$$2rdacarrier 000781228 347__ $$atext file$$bPDF$$2rda 000781228 4901_ $$aAdvances in intelligent systems and computing ;$$v515 000781228 504__ $$aIncludes bibliographical references and index. 000781228 5050_ $$aChapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors -- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend -- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern -- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String -- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection -- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach -- Chapter 7. Fuzzy Based Algorithm for Resource Allocation -- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN) -- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing -- Chapter 10. Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals -- Chapter 11. Text Document Classification with PCA and One-Class SVM -- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease -- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time -- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment -- Chapter 15. Content Aware Video Retargeting by Seam Carving -- Chapter 16. Intelligence System Security Based on 3D Image -- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks -- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India ā€“ A Grey Relational Analysis Approach -- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration -- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks -- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique -- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines -- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT -- Chapter 24. Graph Partitioning Methods -- Chapter 25. Smart and Accountable Water Distribution for Rural Development -- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters -- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security -- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System -- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell -- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach -- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication -- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network -- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction -- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature -- Chapter 35. Shortest Path Algorithms for Social Network Strengths -- Chapter 36. Improvised Symbol Table Structure -- Chapter 37. Digital Watermarking Using Enhanced LSB Technique -- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop -- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier -- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems -- Chapter 41. Optimization of Workload Scheduling in Computational Grid -- Chapter 42. Cloud Security and Jurisdiction: Need of the Hour -- Chapter 43. A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation -- Chapter 44. Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic -- Chapter 45. A Study on Various Training Programmes and their Effects Offered by the IT Firms -- Chapter 46. Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC) -- Chapter 48. Cloud Based Malware Detection Technique -- Chapter 49. Abnormal Network Traffic Detection Using Support Vector Data Description -- Chapter 50. Real Time Automotive Engine Fault Detection and Analysis Using BigData Platforms -- Chapter 51. Load Flow Analysis of Distribution System by Using Artificial Neural Networks -- Chapter 52. An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth -- Chapter 53. Implementing Anti Malware as Security-as-a-Service from Cloud -- Chapter 54. Recognize Online Handwritten Bangla Characters Using Hausdorff Distance Based Feature -- Chapter 55. A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code-smells -- Chapter 57. Snort Rule Detection for Countering in Network Attacks -- Chapter 58. Trust and Energy Efficient Routing for Internet of Things ā€“ Energy Evaluation Model -- Chapter 59. READ -- A Bangla Phoneme Recognition System -- Chapter 60. Information Fusion in Animal Biometric Identification -- Chapter 61. Small World Network Formation and Characterization of Sports Network -- Chapter 62. UWB BPF with Notch Band for Satellite Communication using Pseudo Interdigital Structure -- Chapter 63. Finding Clusters of Data: Cluster Analysis in R -- Chapter 64. A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimization -- Chapter 65. Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition -- Chapter 66. A Systematic Review on Materialized View Selection -- Chapter 67. SQLI Attacks: Current State and Mitigation in SDLC -- Chapter 68. Theoretical Validation of Object Oriented Metrics for Data Warehouse Multidimensional Model -- Chapter 69. Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles -- Chapter 70. Cognitive Architectural Model for Solving Clustering Problem -- Chapter 71. Action Classification Based on Mutual Difference Score -- Chapter 72. Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews -- Chapter 73. BDN: Bio Degradable Node, Novel Approach for Routing in Delay Tolerant Network -- Chapter 74. Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs -- Chapter 75. An Automated Approach to Prevent Suicide in Metro Stations -- Chapter 76. B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths -- Chapter 77. Active Steganalysis on SVD Based Embedding Algorithm -- Chapter 78. Handwritten Mixed-Script Recognition System: A Comprehensive Approach -- Chapter 79. A Rule-Based Approach to Identify Stop Words for Gujarati Language. 000781228 506__ $$aAccess limited to authorized users. 000781228 520__ $$aThe book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 ā€“ 17 September 2016. The book presents theories, methodologies, new ideas, experiences and applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical and mechanical engineering. 000781228 588__ $$aVendor-supplied metadata. 000781228 650_0 $$aComputational intelligence$$vCongresses. 000781228 650_0 $$aArtificial intelligence$$vCongresses. 000781228 7001_ $$aSatapathy, Suresh Chandra,$$d1964-$$eeditor. 000781228 7001_ $$aBhateja, Vikrant,$$eeditor. 000781228 7001_ $$aUdgata, Siba K.,$$eeditor. 000781228 7001_ $$aPattnaik, Prasant Kumar,$$eeditor. 000781228 77608 $$iPrint version:$$z981103155X$$z9789811031557$$w(OCoLC)961001736 000781228 830_0 $$aAdvances in intelligent systems and computing ;$$v515. 000781228 85280 $$bebk$$hSpringerLink 000781228 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-3153-3$$zOnline Access$$91397441.1 000781228 909CO $$ooai:library.usi.edu:781228$$pGLOBAL_SET 000781228 980__ $$aEBOOK 000781228 980__ $$aBIB 000781228 982__ $$aEbook 000781228 983__ $$aOnline 000781228 994__ $$a92$$bISE