Free shipping on orders over $99
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

FICTA 2016, Volume 1

by Vikrant BhatejaSatapathy Suresh Chandra Prasant Kumar Pattnaik and others
Paperback
Publication Date: 19/01/2017

Share This Book:

  $349.17
or 4 easy payments of $87.29 with
afterpay
This item qualifies your order for FREE DELIVERY

Chapter 1. Human Action Recognition Using Trajectory Based Spatio-Temporal Descriptors.- Chapter 2. Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend.- Chapter 3. Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern.- Chapter 4. Basic Arithmetic Coding Based Approach to Compress a Character String.- Chapter 5. Comparative Analysis of different Feature Ranking Techniques in Data Mining based Android Malware Detection.- Chapter 6. Feature Optimality Based Semi-Supervised Face Recognition Approach.- Chapter 7. Fuzzy Based Algorithm for Resource Allocation.- Chapter 8. Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN).- Chapter 9. Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing.- Chapter 10. Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals.- Chapter 11. Text Document Classification with PCA and One-Class SVM.- Chapter 12. Data Mining Approach to Predict and Analyze the Cardiovascular Disease.- Chapter 13. A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time.- Chapter 14. Efficient and Parallel Framework for Analyzing the Sentiment.- Chapter 15. Content Aware Video Retargeting by Seam Carving.- Chapter 16. Intelligence System Security Based on 3D Image.- Chapter 17. PDA-CS: Profile Distance Assessment Centric Cuckoo Search for Anomaly Based Intrusion Detection in High Speed Networks.- Chapter 18. Evaluation of Barriers of Health Care Waste Management in India - A Grey Relational Analysis Approach.- Chapter 19. Privacy Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration.- Chapter 20. Performance analysis of Compressed Sensing in Cognitive Radio Networks.- Chapter 21. Robust Multiple Composite Watermarking Using LSB Technique.- Chapter 22. FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines.- Chapter 23. Gray Scale Image Compression Using PSO with Guided Filter and DWT.- Chapter 24. Graph Partitioning Methods.- Chapter 25. Smart and Accountable Water Distribution for Rural Development.- Chapter 26. Adaptive Huffman Coding Based Approach to Reduce the Size of Power System Monitoring Parameters.- Chapter 27. Color Image Visual Cryptography Scheme with Enhanced Security.- Chapter 28. A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System.- Chapter 29. Fault Mitigation in Five-Level Inverter Fed Induction Motor Drive Using Redundant Cell.- Chapter 30. A Web-of-Things Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach.- Chapter 31. On the Security of Chaos Based Watermarking Scheme for Secure Communication.- Chapter 32. Neighborhood Topology to Discover Influential Nodes in a Complex Network.- Chapter 33. Venn Diagram Based Feature Ranking Technique for Key Term Extraction.- Chapter 34. Bangla Handwritten City Name Recognition Using Gradient Based Feature.- Chapter 35. Shortest Path Algorithms for Social Network Strengths.- Chapter 36. Improvised Symbol Table Structure.- Chapter 37. Digital Watermarking Using Enhanced LSB Technique.- Chapter 38. Fuzzy-based Adaptive IMC-PI Controller for Real-time Application on a Level Control Loop.- Chapter 39. Face Recognition Using PCA and Minimum Distance Classifier.- Chapter 40. A Soft Computing Approach for Modeling of Non Linear Dynamical Systems.- Chapter 41. Optimization of Workload Scheduling in Computational Grid.- Chapter 42. Cloud Security and Jurisdiction: Nee

ISBN:
9789811031526
9789811031526
Category:
Technology: general issues
Format:
Paperback
Publication Date:
19-01-2017
Language:
English
Publisher:
Springer
Country of origin:
United States
Dimensions (mm):
235x155mm
Weight:
12.39kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications.