000796258 000__ 05758cam\a2200553Ii\4500 000796258 001__ 796258 000796258 005__ 20230306143443.0 000796258 006__ m\\\\\o\\d\\\\\\\\ 000796258 007__ cr\cnunnnunuuu 000796258 008__ 170714s2017\\\\si\a\\\\ob\\\\101\0\eng\d 000796258 020__ $$a9789811031748$$q(electronic book) 000796258 020__ $$a9811031746$$q(electronic book) 000796258 020__ $$z9789811031731 000796258 035__ $$aSP(OCoLC)ocn993671599 000796258 035__ $$aSP(OCoLC)993671599 000796258 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dEBLCP$$dN$T$$dYDX$$dOCLCF$$dNJR$$dUAB 000796258 049__ $$aISEA 000796258 050_4 $$aQ334 000796258 08204 $$a006.3$$223 000796258 1112_ $$aInternational Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems$$d(2016 :$$cChennai, India) 000796258 24510 $$aArtificial Intelligence and Evolutionary Computations in Engineering Systems :$$bProceedings of ICAIECES 2016 /$$cSubhransu Sekhar Dash, K. Vijayakumar, Bijaya Ketan Panigrahi, Swagatam Das, editors. 000796258 2463_ $$aICAIECES 2016 000796258 264_1 $$aSingapore :$$bSpringer,$$c2017. 000796258 300__ $$a1 online resource (xv, 863 pages) :$$billustrations. 000796258 336__ $$atext$$btxt$$2rdacontent 000796258 337__ $$acomputer$$bc$$2rdamedia 000796258 338__ $$aonline resource$$bcr$$2rdacarrier 000796258 4901_ $$aAdvances in intelligent systems and computing,$$x2194-5357 ;$$vvolume 517 000796258 500__ $$aInternational conference proceedings. 000796258 504__ $$aIncludes bibliographical references and index. 000796258 5050_ $$aPreface; About the Book; Contents; About the Editors; 1 Social Media Sentiment Polarity Analysis: A Novel Approach to Promote Business Performance and Consumer Decision-Making; Abstract; 1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Data Collection; 3.2 Preprocessing; 3.3 Support Vector Machine; 3.4 K-Means; 4 Experiments and Results; 4.1 Datasets; 4.2 Results and Discussion; 5 Conclusion and Future Work; References; 2 Detection of Incongruent Firewall Rules and Flow Rules in SDN; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Algorithm 1: Matrix Mapper 000796258 5058_ $$a3.2 Description of Duo Lock Algorithm3.3 Transitive Adjacency Matrix (TA); 3.4 Algorithm 2: Duo Lock; 4 Conclusion; References; 3 An Attainment Upgrade in Audio Steganography; Abstract; 1 Introduction; 2 Related Work; 3 Problem Definition; 4 Proposed System; 4.1 Enhanced Hiding in Silence Interval; 4.2 RSA Algorithm with Three Prime Numbers; 5 Experimental Results; 5.1 Reformed RSA; 5.2 Enhance Hiding in Silence Interval; 6 Conclusion and Future Work; References; 4 A Comparative Study Between Hopfield Neural Network and A* Path Planning Algorithms for Mobile Robot; Abstract; 1 Introduction 000796258 5058_ $$a2 Problem Definition2.1 Hopfield Network; 2.1.1 Path Planning; 2.2 A* Algorithm; 2.2.1 Path Finding; 2.2.2 Algorithm for Static Maze; 3 Simulation; 3.1 A* Algorithm; 3.2 Hopfield Neural Network; 4 Results and Discussion; 4.1 Hopfield for Static Mazes; 4.2 A* for Static Mazes; 5 Conclusion; References; 5 Vanishing Point Based Lane Departure Warning Using Template-Based Detection and Tracking of Lane Markers; Abstract; 1 Introduction; 2 Literature Review; 3 Proposed Method; 3.1 Preprocessing; 3.2 Template Matching; 3.3 Lane Detection; 3.3.1 Straight Lane Detection; 3.3.2 Curved Lane Detection 000796258 5058_ $$a3.4 Lane Tracking3.5 Lane Departure Detection; 4 Results and Discussion; 5 Conclusion; References; 6 Destination Proposal System to Forecast Tourist Arrival Using Associative Classification; Abstract; 1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Data Collection; 3.2 Preprocessing; 3.3 Association Rule Generation: CARGBA; 3.3.1 CARGBA Rule Generator; 3.3.2 CARGBA Classifier Builder; 4 Conclusion; References; 7 Analyzing the Impact of Software Design Patterns in Data Mining Application; Abstract; 1 Introduction; 2 Related Work; 3 Data Mining Architecture with Design Pattern 000796258 5058_ $$a4 Impact of Design Patterns in Achieving the Quality Attributes of Data Mining Application5 Conclusion; Acknowledgments; References; 8 A Survey for Securing Online Payment Transaction Using Biometrics Authentication; Abstract; 1 Introduction; 2 Prior Research; 2.1 Multifactor Authentication; 2.2 Single Factor Authentication (Biometrics Features as a Standalone); 3 Related Work; 3.1 Biometrics or One-Time Password (OTP) in ATM; 3.2 Biometrics Face Recognition for ATM; 3.3 Biometrics Fingerprint for ATM; 3.4 Reliable Payment System in Nigeria 000796258 506__ $$aAccess limited to authorized users. 000796258 520__ $$aThe volume is a collection of high-quality peer-reviewed research papers presented in the International Conference on Artificial Intelligence and Evolutionary Computation in Engineering Systems (ICAIECES 2016) held at SRM University, Chennai, Tamilnadu, India. This conference is an international forum for industry professionals and researchers to deliberate and state their research findings, discuss the latest advancements and explore the future directions in the emerging areas of engineering and technology. The book presents original work and novel ideas, information, techniques and applications in the field of communication, computing and power technologies. 000796258 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 24, 2017). 000796258 650_0 $$aArtificial intelligence$$vCongresses. 000796258 650_0 $$aComputational intelligence$$vCongresses. 000796258 7001_ $$aDash, Subhransu Sekhar,$$eeditor. 000796258 7001_ $$aVijayakumar, K.,$$eeditor. 000796258 7001_ $$aPanigrahi, Bijaya Ketan,$$eeditor. 000796258 7001_ $$aDas, Swagatam,$$eeditor. 000796258 830_0 $$aAdvances in intelligent systems and computing ;$$v517. 000796258 852__ $$bebk 000796258 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-3174-8$$zOnline Access$$91397441.1 000796258 909CO $$ooai:library.usi.edu:796258$$pGLOBAL_SET 000796258 980__ $$aEBOOK 000796258 980__ $$aBIB 000796258 982__ $$aEbook 000796258 983__ $$aOnline 000796258 994__ $$a92$$bISE