default search action
FICTA 2016: Bhubaneswar, Odisa, India
- Suresh Chandra Satapathy, Vikrant Bhateja, Siba K. Udgata, Prasant Kumar Pattnaik:
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications - FICTA 2016, Bhubaneswar, Odisa, India, Volume 1. Advances in Intelligent Systems and Computing 515, Springer 2017, ISBN 978-981-10-3152-6 - Chandni Dhamsania, Tushar Ratanpara:
Human Action Recognition Using Trajectory-Based Spatiotemporal Descriptors. 1-9 - Saumil C. Patel, Pragnesh K. Brahmbhatt:
Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend. 11-19 - K. Sathyavikasini, M. S. Vijaya:
Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern. 21-29 - Ipsita Mondal, Subhra J. Sarkar:
Basic Arithmetic Coding Based Approach to Compress a Character String. 31-38 - Abhishek Bhattacharya, Radha Tamal Goswami:
Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection. 39-49 - Taqdir, Renu Dhir:
Feature Optimality-Based Semi-supervised Face Recognition Approach. 51-68 - Gurpreet Singh Saini, Sanjay Kumar Dubey, Sunil Kumar Bharti:
Fuzzy-Based Algorithm for Resource Allocation. 69-77 - Diksha Malhotra, Poonam Saini:
Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN). 79-88 - Surbhi Malik, Poonam Saini, Sudesh Rani:
Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing. 89-97 - Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman:
Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals. 99-105 - B. Shravan Kumar, Vadlamani Ravi:
Text Document Classification with PCA and One-Class SVM. 107-115 - Anurag Bhatt, Sanjay Kumar Dubey, Ashutosh Kumar Bhatt, Manish Joshi:
Data Mining Approach to Predict and Analyze the Cardiovascular Disease. 117-126 - Barnali Chaudhuri, R. K. Jana, Pranab K. Dan:
A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time. 127-134 - Ankur Sharma, Gopal Krishna Nayak:
Efficient and Parallel Framework for Analyzing the Sentiment. 135-145 - Shrinivas D. Desai, Mahalaxmi Bhille, Namrata D. Hiremath:
Content-Aware Video Retargeting by Seam Carving. 147-157 - K. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai:
Intelligence System Security Based on 3-D Image. 159-167 - Kanaka Raju Gariga, A. Rama Mohan Reddy, N. Sambasiva Rao:
PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks. 169-179 - Suchismita Swain, Kamalakanta Muduli, Jitendra Narayan Biswal, Sushanta Tripathy, Tushar Kanti Panda:
Evaluation of Barriers of Health Care Waste Management in India - A Gray Relational Analysis Approach. 181-188 - Gadupudi Kalyani, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah:
Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration. 189-197 - Namburu Swetha, Panyam Narahari Sastry, Y. Rajasree Rao, G. Murali Divya Teja:
Performance Analysis of Compressed Sensing in Cognitive Radio Networks. 199-207 - S. Rashmi, Priyanka, Sushila Maheshkar:
Robust Multiple Composite Watermarking Using LSB Technique. 209-217 - Dadabada Pradeepkumar, Vadlamani Ravi:
FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines. 219-227 - Namrata Vij, Jagjit Singh:
Gray Scale Image Compression Using PSO with Guided Filter and DWT. 229-240 - Tanvi Prabhu Dessai, Okstynn Rodrigues, Sonia Fernandes:
Graph Partitioning Methods. 241-249 - Ishaani Priyadarshini, Jay Sarraf:
Smart and Accountable Water Distribution for Rural Development. 251-258 - Subhra J. Sarkar, Nabendu Kumar Sarkar, Ipsita Mondal:
Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring Parameters. 259-266 - Prachi Khokhar, Debasish Jena:
Color Image Visual Cryptography Scheme with Enhanced Security. 267-279 - Babita Panda, Bhagabat Panda, Prakash Kumar Hota:
A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System. 281-290 - B. Madhu Kiran, B. V. Sanker Ram:
Fault Mitigation in Five-Level Inverter-Fed Induction Motor Drive Using Redundant Cell. 291-301 - Debajyoti Mukhopadhyay, Sourabh Saha, Rajdeep Rao, Anish Paranjpe:
A Web-of-Things-Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach. 303-311 - Musheer Ahmad, Hamed D. Al-Sharari:
On the Security of Chaos-Based Watermarking Scheme for Secure Communication. 313-321 - Chandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad:
Neighborhood Topology to Discover Influential Nodes in a Complex Network. 323-332 - Neelotpal Chakraborty, Sambit Mukherjee, Ashes Ranjan Naskar, Samir Malakar, Ram Sarkar, Mita Nasipuri:
Venn Diagram-Based Feature Ranking Technique for Key Term Extraction. 333-341 - Shilpi Barua, Samir Malakar, Showmik Bhowmik, Ram Sarkar, Mita Nasipuri:
Bangla Handwritten City Name Recognition Using Gradient-Based Feature. 343-352 - Amreen Ahmad, Tanvir Ahmad, Harsh Vijay:
Shortest Path Algorithms for Social Network Strengths. 353-361 - Narander Kumar, Shivani Dubey:
Improvised Symbol Table Structure. 363-371 - Narander Kumar, Jaishree:
Digital Watermarking Using Enhanced LSB Technique. 373-385 - Ujjwal Manikya Nath, Chanchal Dey, Rajani K. Mudi:
Fuzzy-Based Adaptive IMC-PI Controller for Real-Time Application on a Level Control Loop. 387-395 - Shalmoly Mondal, Soumen Bag:
Face Recognition Using PCA and Minimum Distance Classifier. 397-405 - Rajesh Kumar, Smriti Srivastava, J. R. P. Gupta:
A Soft Computing Approach for Modeling of Nonlinear Dynamical Systems. 407-415 - Sukalyan Goswami, Ajanta Das:
Optimization of Workload Scheduling in Computational Grid. 417-424 - Tamanna Jena, Jnyana Ranjan Mohanty:
Cloud Security and Jurisdiction: Need of the Hour. 425-433 - Sunanda Das, Sourav De:
A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation. 435-443 - Smita Banerjee, Rajeev Chatterjee:
Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic. 445-454 - Pattnaik Manjula, Pattanaik Balachandra:
A Study on Various Training Programmes and Their Effects Offered by the IT Firms. 455-463 - Ashima Rout, Anurupa Kar, Srinivas Sethi:
Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network. 465-474 - Hisham M. Alsaghier, Shaik Shakeel Ahamad, Siba K. Udgata, L. S. S. Reddy:
A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC). 475-483 - Sagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty:
Cloud Based Malware Detection Technique. 485-495 - Jyostna Devi Bodapati, Naralasetti Veeranjaneyulu:
Abnormal Network Traffic Detection Using Support Vector Data Description. 497-506 - Yedu C. Nair, S. Sachin Kumar, K. P. Soman:
Real-Time Automotive Engine Fault Detection and Analysis Using BigData Platforms. 507-514 - M. Suresh, T. S. Sirish, T. V. Subhashini, T. Daniel Prasanth:
Load Flow Analysis of Distribution System Using Artificial Neural Networks. 515-524 - K. Divyavarma, M. Remya, G. Deepa:
An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth. 525-532 - Deepak H. Sharma, C. A. Dhote, Manish M. Potey:
Implementing Anti-Malware as Security-as-a-Service from Cloud. 533-539 - Shibaprasad Sen, Ram Sarkar, Kaushik Roy, Naoto Hori:
Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based Feature. 541-549 - T. G. Gregory Paul, T. Gireesh Kumar:
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts. 551-559 - Kamaldeep Kaur, Shilpi Jain:
Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells. 561-572 - Somu Venkateswarlu, D. B. K. Kamesh, J. K. R. Sastry, S. N. M. Sitara:
Snort Rule Detection for Countering in Network Attacks. 573-583 - Carynthia Kharkongor, T. Chithralekha, Reena Varghese:
Trust and Energy-Efficient Routing for Internet of Things - Energy Evaluation Model. 585-597 - Himadri Mukherjee, Chayan Halder, Santanu Phadikar, Kaushik Roy:
READ - A Bangla Phoneme Recognition System. 599-607 - Gopal Chaudhary, Smriti Srivastava, Saurabh Bhardwaj, Shefali Srivastava:
Information Fusion in Animal Biometric Identification. 609-617 - Paramita Dey, Maitreyee Ganguly, Priya Sengupta, Sarbani Roy:
Small World Network Formation and Characterization of Sports Network. 619-627 - Yatindra Gaurav, Rajeev K. Chauhan:
UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital Structure. 629-634 - Tulika Narang:
Finding Clusters of Data: Cluster Analysis in R. 635-640 - Sandipan Choudhuri, Nibaran Das, Mita Nasipuri:
A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimisation. 641-651 - Tathagata Bandyopadhyay, Sreetama Mitra, Shyamali Mitra, Luís Miguel Rato, Nibaran Das:
Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition. 653-661 - Anjana Gosain, Kavita Sachdeva:
A Systematic Review on Materialized View Selection. 663-671 - Daljit Kaur, Parminder Kaur:
SQLI Attacks: Current State and Mitigation in SDLC. 673-680 - Anjana Gosain, Rakhi Gupta:
Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional Model. 681-691 - Sowmya B. J., Chetan Shetty, D. Pradeep Kumar, K. G. Srinivasa:
Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles. 693-702 - Meenakhi Sahu, Hima Bindu Maringanti:
Cognitive Architectural Model for Solving Clustering Problem. 703-710 - Shamama Anwar, G. Rajamohan:
Action Classification Based on Mutual Difference Score. 711-719 - Monalisa Ghosh, Gautam Sanyal:
Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews. 721-730 - Afreen Fatimah, Rahul Johari:
BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network. 731-739 - Md. Khaja Mohiddin, V. B. S. Srilatha Indra Dutt:
Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs. 741-751 - Anindya Mukherjee, Bavrabi Ghosh:
An Automated Approach to Prevent Suicide in Metro Stations. 753-765 - A. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, Manu R. Krishnan, P. Hrudya:
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths. 767-775 - P. P. Amritha, Rithu P. Ravi, M. Sethumadhavan:
Active Steganalysis on SVD-Based Embedding Algorithm. 777-785 - Pawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri:
Handwritten Mixed-Script Recognition System: A Comprehensive Approach. 787-795 - Rajnish M. Rakholia, Jatinderkumar R. Saini:
A Rule-Based Approach to Identify Stop Words for Gujarati Language. 797-806
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.