• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications: Ficta 2016, Volume 2

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications: Ficta 2016, Volume 2

Paperback

Series: Advances in Intelligent Systems and Computing, Book 516

Technology & EngineeringGeneral ComputersGeneral Science

ISBN10: 981103155X
ISBN13: 9789811031557
Publisher: Springer
Published: Mar 3 2017
Pages: 685
Weight: 2.16
Height: 1.42 Width: 6.14 Depth: 9.21
Language: English

Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming.- Chapter 2. A Secured Digital Signature Using Conjugacy and DLP on Non-Commutative Group over Finite Field.- Chapter 3. Design of Visual Cryptography Scheme Using C(m, w) Combinations.- Chapter 4. Some Properties of Rough Sets on Fuzzy Approximation Spaces and Applications.- Chapter 5. Join Operations to Enhance Performance in Hadoop MapReduce Environment.- Chapter 6. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs.- Chapter 7. Visual Based Information Retrieval Using Voronoi Tree.- Chapter 8. EEG Based Oscitancy Classification System for Accidental Prevention.- Chapter 9. Low Power 14T Hybrid Full Adder Cell.- Chapter 10. A Combined System for Regionalization in Spatial Data Mining Based on Fuzzy C- Means Algorithm with Gravitational Search Algorithm.- Chapter 11. Adaptive Spatio-Temporal Filtering with Motion Estimation for Mixed Noise Removal and Contrast Enhancement in Video Sequence.- Chapter 12. Improved Dynamic Time Warping Based Approach for Activity Recognition.- Chapter 13. Design & Functional Verification of Axi2Ocp Bridge for Highly Optimized Bus Utilization and Closure Using Functional Coverage.- Chapter 14. STRIDE Based Analysis of the Chrome Browser Extensions API.- Chapter 15. Social and Temporal-Aware Personalized Recommendation for Best Spreaders on Information Sharing.- Chapter 16. Person Recognition Using Surf Features and Vola-Jones Algorithm.- Chapter 17. A Novel Representation for Classification of User Sentiments.- Chapter 18. Information Retrieval for Gujarati Language Using Cosine Similarity Based Vector Space Model.- Chapter 19. Design and Optimization of Fractal Antenna for UWB Application.- Chapter 20. Multi-objective IT Professionals' Utilization Problems Using Fuzzy Goal Programming.- Chapter 21. An Innovative Method for Load Balanced Clustering Problem for Wireless Sensor Network in Mobile Cloud Computing.- Chapter 22. BLDC Motor Drive with Power Factor Correction Using PWM Rectifier.- Chapter 23. A 3D Approach for Palm Leaf Character Recognition Using Histogram Computation and Distance Profile Features.- Chapter 24. Gradient Magnitude Based Watershed Segmentation for Brain Tumor Segmentation and Classification.- Chapter 25. A Novel Edge Based Chaotic Steganography Method Using Neural Network.- Chapter 26. PLoc-Euk: An Ensemble Classifier for Prediction of Eukaryotic Protein Sub-Cellular Localization.- Chapter 27. Feature Optimization to Recognize Telugu Handwritten Characters by Implementing DE and PSO Techniques.- Chapter 28. Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach.- Chapter 29. L-Slotted Microstrip Fed Monopole Antenna for Triple Band WLAN and WiMAX Applications.- Chapter 30. Modified Non Linear Diffusion Approach for Multiplicative Noise.- Chapter 31. Performance Analysis of Fully Depleted SOI Tapered Body Reduced Source (FD-SOI TBRS) MOSFET for Low Power Digital Applications.- Chapter 32. A Latest Comprehensive Study on Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII).- Chapter 33. Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO.- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature.- Chapter 36. A Study & Analysis of Different Brain Tumor Segmentation Techniques.- Chapter 37. Threshold Based Clustering Algorithm Analyzes Diabetic Mellitus.- Chapter 38. Automatic Classifi

1 different editions

Also available

Also in

General Computers