000825018 000__ 05722cam\a2200553Ii\4500 000825018 001__ 825018 000825018 005__ 20230306144252.0 000825018 006__ m\\\\\o\\d\\\\\\\\ 000825018 007__ cr\cn\nnnunnun 000825018 008__ 171204s2018\\\\si\a\\\\o\\\\\101\0\eng\d 000825018 019__ $$a1017833288$$a1032269975 000825018 020__ $$a9789811056871$$q(electronic book) 000825018 020__ $$a9811056870$$q(electronic book) 000825018 020__ $$z9789811056864 000825018 0247_ $$a10.1007/978-981-10-5687-1$$2doi 000825018 035__ $$aSP(OCoLC)on1013879132 000825018 035__ $$aSP(OCoLC)1013879132$$z(OCoLC)1017833288$$z(OCoLC)1032269975 000825018 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dAZU$$dOCLCF$$dUAB$$dMERER$$dOCLCQ$$dU3W 000825018 049__ $$aISEA 000825018 050_4 $$aQA76.9.S63 000825018 08204 $$a006.3$$223 000825018 1112_ $$aSoCTA (Conference)$$n(1st :$$d2016 :$$cJaipur, India) 000825018 24510 $$aSoft computing :$$btheories and applications : proceedings of SoCTA 2016.$$nVolume 1 /$$cMillie Pant, Kanad Ray, Tarun K. Sharma, Sanyog Rawat, Anirban Bandyopadhyay, editors. 000825018 2463_ $$aSoCTA 2016 000825018 264_1 $$aSingapore :$$bSpringer,$$c[2018]. 000825018 300__ $$a1 online resource (xxii, 865 pages) :$$billustrations. 000825018 336__ $$atext$$btxt$$2rdacontent 000825018 337__ $$acomputer$$bc$$2rdamedia 000825018 338__ $$aonline resource$$bcr$$2rdacarrier 000825018 347__ $$atext file$$bPDF$$2rda 000825018 4901_ $$aAdvances in intelligent systems and computing,$$x2194-5357 ;$$v583 000825018 500__ $$aInternational conference proceedings. 000825018 500__ $$aIncludes author index. 000825018 5050_ $$aModified Critical-Path and Top-Level attributes (MCPTL) based Task Scheduling Algorithm in Parallel Computing -- Critical Path Problem for Scheduling using Genetic Algorithm -- A Robust Digital Image Watermarking Algorithm Using DWT and SVD -- A Novel and Secure Authentication Secret Key Generation Scheme Using Bilinear Self- Pairing Map Based on Elliptic Curve Cryptography -- Study and Comparatively Analysis of various Vulnerabilities occur in Google Chrome -- Secure Framework for Data Security in Cloud Computing -- An Improved Spider Monkey Optimization Algorithm -- Neural Network Based prediction of Productivity parameters -- Rigorous Data Analysis and Performance Evaluation of Indian Classical Raga Using RapidMiner -- EPQ Model with Product Stewardship Approach -- Loss and Cost Minimization with Enhancement of Voltage Profile of Distribution Systems Using a Modified Differential Evolution Technique -- Integration of GIS, Spatial Data Mining and Fuzzy Logic for Agricultural Intelligence -- Patient-specific Modeling for Pattern Identification in Clinical Events Using Data Mining Models and Evolutionary Computing -- Teaching Learning Based Optimization on Hadoop -- Analysis and Parameter Estimation of Micro Strip Circular Patch Antennas Using Artificial Neural Networks -- Vibrational Frequencies of Parallelogram Plate with Circular Variations in Thickness -- Study and Comparative Analysis of Various Image Spamming Techniques -- On Comparing Performance of Conventional Fuzzy System with Recurrent Fuzzy System -- Application of PSO Clustering for Selection of Chemical Interface Materials for Sensor Array Electronic Nose -- Panorama Generation using Feature based Mosaicing and Modified Graph-cut Blending -- Application of fuzzy multi-criteria approach to assess the water quality of river Ganges -- Efficient multiprocessor scheduling Using Water Cycle Algorithm. 000825018 506__ $$aAccess limited to authorized users. 000825018 520__ $$aThis book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Theories and Applications (SoCTA 2016), offering significant insights into soft computing for teachers and researchers and inspiring more and more researchers to work in the field of soft computing. The term soft computing represents an umbrella term for computational techniques like fuzzy logic, neural networks, and nature inspired algorithms. In the past few decades, there has been an exponential rise in the application of soft computing techniques for solving complex and intricate problems arising in different spheres of life. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. SoCTA is the first international conference being organized at Amity University Rajasthan (AUR), Jaipur. The objective of SoCTA 2016 is to provide a common platform to researchers, academicians, scientists, and industrialists working in the area of soft computing to share and exchange their views and ideas on the theory and application of soft computing techniques in multi-disciplinary areas. The aim of the conference is to bring together young and experienced researchers, academicians, scientists, and industrialists for the exchange of knowledge. SoCTA especially encourages the young researchers at the beginning of their career to participate in this conference and present their work on this platform. 000825018 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 4, 2017). 000825018 650_0 $$aSoft computing$$vCongresses. 000825018 7001_ $$aPant, Millie,$$d1979-$$eeditor. 000825018 7001_ $$aRay, Kanad,$$eeditor. 000825018 7001_ $$aSharma, Tarun K.$$eeditor. 000825018 7001_ $$aRawat, Sanyog,$$eeditor. 000825018 7001_ $$aBandyopadhyay, Anirban,$$eeditor. 000825018 77608 $$iPrint version: $$z9789811056864 000825018 830_0 $$aAdvances in intelligent systems and computing ;$$v583.$$x2194-5357 000825018 852__ $$bebk 000825018 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-5687-1$$zOnline Access$$91397441.1 000825018 909CO $$ooai:library.usi.edu:825018$$pGLOBAL_SET 000825018 980__ $$aEBOOK 000825018 980__ $$aBIB 000825018 982__ $$aEbook 000825018 983__ $$aOnline 000825018 994__ $$a92$$bISE