


default search action
FICTA 2016: Bhubaneswar, Odisa, India
- Suresh Chandra Satapathy

, Vikrant Bhateja, Siba K. Udgata
, Prasant Kumar Pattnaik
:
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications - FICTA 2016, Bhubaneswar, Odisa, India, Volume 1. Advances in Intelligent Systems and Computing 515, Springer 2017, ISBN 978-981-10-3152-6 - Chandni Dhamsania, Tushar Ratanpara:

Human Action Recognition Using Trajectory-Based Spatiotemporal Descriptors. 1-9 - Saumil C. Patel, Pragnesh K. Brahmbhatt:

Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel Blend. 11-19 - K. Sathyavikasini, M. S. Vijaya:

Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias Pattern. 21-29 - Ipsita Mondal, Subhra J. Sarkar:

Basic Arithmetic Coding Based Approach to Compress a Character String. 31-38 - Abhishek Bhattacharya, Radha Tamal Goswami:

Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection. 39-49 - Taqdir, Renu Dhir:

Feature Optimality-Based Semi-supervised Face Recognition Approach. 51-68 - Gurpreet Singh Saini

, Sanjay Kumar Dubey
, Sunil Kumar Bharti
:
Fuzzy-Based Algorithm for Resource Allocation. 69-77 - Diksha Malhotra, Poonam Saini:

Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN). 79-88 - Surbhi Malik, Poonam Saini, Sudesh Rani

:
Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing. 89-97 - Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman:

Accent Recognition System Using Deep Belief Networks for Telugu Speech Signals. 99-105 - B. Shravan Kumar, Vadlamani Ravi:

Text Document Classification with PCA and One-Class SVM. 107-115 - Anurag Bhatt

, Sanjay Kumar Dubey
, Ashutosh Kumar Bhatt, Manish Joshi
:
Data Mining Approach to Predict and Analyze the Cardiovascular Disease. 117-126 - Barnali Chaudhuri, R. K. Jana

, Pranab K. Dan:
A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational Time. 127-134 - Ankur Sharma, Gopal Krishna Nayak:

Efficient and Parallel Framework for Analyzing the Sentiment. 135-145 - Shrinivas D. Desai

, Mahalaxmi Bhille, Namrata D. Hiremath:
Content-Aware Video Retargeting by Seam Carving. 147-157 - K. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai:

Intelligence System Security Based on 3-D Image. 159-167 - Kanaka Raju Gariga

, A. Rama Mohan Reddy, N. Sambasiva Rao:
PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks. 169-179 - Suchismita Swain

, Kamalakanta Muduli
, Jitendra Narayan Biswal
, Sushanta Tripathy
, Tushar Kanti Panda:
Evaluation of Barriers of Health Care Waste Management in India - A Gray Relational Analysis Approach. 181-188 - Gadupudi Kalyani

, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah
:
Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business Collaboration. 189-197 - Namburu Swetha

, Panyam Narahari Sastry, Y. Rajasree Rao, G. Murali Divya Teja:
Performance Analysis of Compressed Sensing in Cognitive Radio Networks. 199-207 - S. Rashmi, Priyanka

, Sushila Maheshkar
:
Robust Multiple Composite Watermarking Using LSB Technique. 209-217 - Dadabada Pradeepkumar, Vadlamani Ravi:

FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression Splines. 219-227 - Namrata Vij, Jagjit Singh

:
Gray Scale Image Compression Using PSO with Guided Filter and DWT. 229-240 - Tanvi Prabhu Dessai, Okstynn Rodrigues, Sonia Fernandes:

Graph Partitioning Methods. 241-249 - Ishaani Priyadarshini, Jay Sarraf

:
Smart and Accountable Water Distribution for Rural Development. 251-258 - Subhra J. Sarkar, Nabendu Kumar Sarkar, Ipsita Mondal:

Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring Parameters. 259-266 - Prachi Khokhar, Debasish Jena

:
Color Image Visual Cryptography Scheme with Enhanced Security. 267-279 - Babita Panda

, Bhagabat Panda
, Prakash Kumar Hota
:
A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System. 281-290 - B. Madhu Kiran

, B. V. Sanker Ram:
Fault Mitigation in Five-Level Inverter-Fed Induction Motor Drive Using Redundant Cell. 291-301 - Debajyoti Mukhopadhyay

, Sourabh Saha, Rajdeep Rao, Anish Paranjpe:
A Web-of-Things-Based System to Remotely Configure Automated Systems Using a Conditional Programming Approach. 303-311 - Musheer Ahmad

, Hamed D. Al-Sharari:
On the Security of Chaos-Based Watermarking Scheme for Secure Communication. 313-321 - Chandni Saxena

, Mohammad Najmud Doja, Tanvir Ahmad
:
Neighborhood Topology to Discover Influential Nodes in a Complex Network. 323-332 - Neelotpal Chakraborty

, Sambit Mukherjee, Ashes Ranjan Naskar, Samir Malakar
, Ram Sarkar
, Mita Nasipuri:
Venn Diagram-Based Feature Ranking Technique for Key Term Extraction. 333-341 - Shilpi Barua, Samir Malakar

, Showmik Bhowmik
, Ram Sarkar
, Mita Nasipuri:
Bangla Handwritten City Name Recognition Using Gradient-Based Feature. 343-352 - Amreen Ahmad, Tanvir Ahmad

, Harsh Vijay:
Shortest Path Algorithms for Social Network Strengths. 353-361 - Narander Kumar

, Shivani Dubey:
Improvised Symbol Table Structure. 363-371 - Narander Kumar

, Jaishree:
Digital Watermarking Using Enhanced LSB Technique. 373-385 - Ujjwal Manikya Nath

, Chanchal Dey, Rajani K. Mudi
:
Fuzzy-Based Adaptive IMC-PI Controller for Real-Time Application on a Level Control Loop. 387-395 - Shalmoly Mondal

, Soumen Bag
:
Face Recognition Using PCA and Minimum Distance Classifier. 397-405 - Rajesh Kumar

, Smriti Srivastava
, J. R. P. Gupta:
A Soft Computing Approach for Modeling of Nonlinear Dynamical Systems. 407-415 - Sukalyan Goswami, Ajanta Das:

Optimization of Workload Scheduling in Computational Grid. 417-424 - Tamanna Jena

, Jnyana Ranjan Mohanty
:
Cloud Security and Jurisdiction: Need of the Hour. 425-433 - Sunanda Das, Sourav De

:
A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation. 435-443 - Smita Banerjee, Rajeev Chatterjee:

Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy Logic. 445-454 - Pattnaik Manjula

, Pattanaik Balachandra
:
A Study on Various Training Programmes and Their Effects Offered by the IT Firms. 455-463 - Ashima Rout, Anurupa Kar, Srinivas Sethi

:
Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network. 465-474 - Hisham M. Alsaghier, Shaik Shakeel Ahamad, Siba K. Udgata

, L. S. S. Reddy:
A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC). 475-483 - Sagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty

:
Cloud Based Malware Detection Technique. 485-495 - Jyostna Devi Bodapati

, Naralasetti Veeranjaneyulu:
Abnormal Network Traffic Detection Using Support Vector Data Description. 497-506 - Yedu C. Nair, S. Sachin Kumar

, K. P. Soman
:
Real-Time Automotive Engine Fault Detection and Analysis Using BigData Platforms. 507-514 - M. Suresh, T. S. Sirish, T. V. Subhashini, T. Daniel Prasanth:

Load Flow Analysis of Distribution System Using Artificial Neural Networks. 515-524 - K. Divyavarma, M. Remya, G. Deepa:

An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth. 525-532 - Deepak H. Sharma, C. A. Dhote, Manish M. Potey:

Implementing Anti-Malware as Security-as-a-Service from Cloud. 533-539 - Shibaprasad Sen

, Ram Sarkar
, Kaushik Roy, Naoto Hori
:
Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based Feature. 541-549 - T. G. Gregory Paul, T. Gireesh Kumar

:
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts. 551-559 - Kamaldeep Kaur

, Shilpi Jain:
Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code Smells. 561-572 - Somu Venkateswarlu, Balakrishna Kamesh Duvvuri

, J. K. R. Sastry, S. N. M. Sitara:
Snort Rule Detection for Countering in Network Attacks. 573-583 - Carynthia Kharkongor, T. Chithralekha, Reena Varghese:

Trust and Energy-Efficient Routing for Internet of Things - Energy Evaluation Model. 585-597 - Himadri Mukherjee, Chayan Halder

, Santanu Phadikar
, Kaushik Roy:
READ - A Bangla Phoneme Recognition System. 599-607 - Gopal Chaudhary

, Smriti Srivastava, Saurabh Bhardwaj
, Shefali Srivastava:
Information Fusion in Animal Biometric Identification. 609-617 - Paramita Dey

, Maitreyee Ganguly
, Priya Sengupta, Sarbani Roy
:
Small World Network Formation and Characterization of Sports Network. 619-627 - Yatindra Gaurav, Rajeev K. Chauhan

:
UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital Structure. 629-634 - Tulika Narang:

Finding Clusters of Data: Cluster Analysis in R. 635-640 - Sandipan Choudhuri, Nibaran Das, Mita Nasipuri:

A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimisation. 641-651 - Tathagata Bandyopadhyay

, Sreetama Mitra, Shyamali Mitra, Luís Miguel Rato
, Nibaran Das:
Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet Decomposition. 653-661 - Anjana Gosain, Kavita Sachdeva:

A Systematic Review on Materialized View Selection. 663-671 - Daljit Kaur, Parminder Kaur

:
SQLI Attacks: Current State and Mitigation in SDLC. 673-680 - Anjana Gosain, Rakhi Gupta:

Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional Model. 681-691 - Sowmya B. J., Chetan Shetty, D. Pradeep Kumar, K. G. Srinivasa

:
Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in Automobiles. 693-702 - Meenakhi Sahu, Hima Bindu Maringanti:

Cognitive Architectural Model for Solving Clustering Problem. 703-710 - Shamama Anwar

, G. Rajamohan:
Action Classification Based on Mutual Difference Score. 711-719 - Monalisa Ghosh, Gautam Sanyal:

Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product Reviews. 721-730 - Afreen Fatimah, Rahul Johari

:
BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network. 731-739 - Md. Khaja Mohiddin

, V. B. S. Srilatha Indra Dutt:
Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs. 741-751 - Anindya Mukherjee, Bavrabi Ghosh

:
An Automated Approach to Prevent Suicide in Metro Stations. 753-765 - A. U. Prem Sankar, Prabaharan Poornachandran

, Aravind Ashok, Manu R. Krishnan, P. Hrudya:
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths. 767-775 - P. P. Amritha, Rithu P. Ravi, M. Sethumadhavan

:
Active Steganalysis on SVD-Based Embedding Algorithm. 777-785 - Pawan Kumar Singh

, Supratim Das, Ram Sarkar
, Mita Nasipuri:
Handwritten Mixed-Script Recognition System: A Comprehensive Approach. 787-795 - Rajnish M. Rakholia, Jatinderkumar R. Saini

:
A Rule-Based Approach to Identify Stop Words for Gujarati Language. 797-806

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














