000 10428nam a22005055i 4500
001 978-81-322-2126-5
003 DE-He213
005 20200420221256.0
007 cr nn 008mamaa
008 141101s2015 ii | s |||| 0|eng d
020 _a9788132221265
_9978-81-322-2126-5
024 7 _a10.1007/978-81-322-2126-5
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
082 0 4 _a006.3
_223
245 1 0 _aArtificial Intelligence and Evolutionary Algorithms in Engineering Systems
_h[electronic resource] :
_bProceedings of ICAEES 2014, Volume 1 /
_cedited by L. Padma Suresh, Subhransu Sekhar Dash, Bijaya Ketan Panigrahi.
264 1 _aNew Delhi :
_bSpringer India :
_bImprint: Springer,
_c2015.
300 _aXVII, 862 p. 376 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent Systems and Computing,
_x2194-5357 ;
_v324
505 0 _a1. Improvement in Hungarian Algorithm for Assignment Problem -- 2. Vertex Cover Problem - Revised Approximation Algorithm -- 3. A Simple Control Strategy Technique for a Single Phase Bridgeless Active Rectifier with High Power Factor and Voltage Stabilization Using Partial Digital Implementation -- 4. Ensemble Neural Network Algorithm for Detecting Cardiac Arrhythmia -- 5. An Efficient Invasive Weed Optimization Algorithm for Distribution Feeder Reconfiguration and Loss Minimization -- 6. Implementation of Generative Crossover Operator in Genetic Algorithm to Solve Traveling Salesman Problem -- 7. A 4-bit 9KS/s Distortionless Successive Approximation ADC in 180nm CMOS Technology -- 8. EEG Based Automatic Detection of Drowsy State -- 9. WIDS-Real Time Intrusion Detection System Using Entrophical Approach -- 10. Optical Character Recognition for Alphanumerical Character Verification in video Frames -- 11. Modified-AODV Routing Protocol for Multi-Hop Cognitive Radio Ad Hoc Networks -- 12. Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network -- 13. PCA Based Feature Selection for MRI Image Retrieval System Using Texture Features -- 14. A Survey of Location Prediction Using Trajectory Mining -- 15. Survey on Router Policies providing Fairness and Service Differentiation favoring Real Time Data Transfers in Internet -- 16. Exploration of the Effect of Demographic and Clinical Confounding Variables on Results of Voxel-Based Morphometric Analysis in Schizophrenia -- 17. A Novel Method for Secure Image Steganography -- 18. Techniques for Enhancing the Performance of TCP in Wireless Networks -- 19. Analysis of Classification Models Using Image Statistics and Data Miner for Grade Prediction of Astrocytoma -- 20. Object Detection in Cluttered Environment Using 3D Map -- 21. Smart Energy Meter with Instant Billing and Payment -- 22. GA Based Compiler Parameter Set Tuning -- 23. An Intelligent Intrusion Detection System Using Average Manhattan Distance Based Decision Tree -- 24. Intelligent Medical Diagnosis System Using Weighted Genetic and New Weighted Fuzzy C-Means Clustering Algorithm -- 25. Security Analysis in Cloud Environment -- 26. A Bi-Level Clustering Analysis for Studying About The Sources of Vehicular Pollution In Chennai -- 27. Investigation of Fault Detection Techniques for an Industrial Pneumatic Actuator Using Neural Network-DAMADICS Case Study -- 28. Design of Portable Security System Using Face Recognition with Back-Propagation Algorithm and MATLAB -- 29. Model Based Control for Moisture in Paper Making Process -- 30. Elimination of Harmonics in Seven Level Cascaded Multilevel Inverter Using Particle Swarm Optimization Technique -- 31. Optimization and Quality of Service Protocols in VANETs : A Review -- 32. Object Detection Using Robust Image Features -- 33. Service Adaptive Fuzzy-Multi Criteria Based Intelligent Vertical Handover Decision Algorithm for Heterogeneous Wireless Networks -- 34. Automatic Traffic Classification Using Machine Learning Algorithm for Policy Based Routing in UMTS-WLAN Interworking -- 35. Sequential Decision Making Using Q Learning Algorithm for Diabetic Patients -- 36. Design of Quantum Cost and Delay Optimised Reversible Wallace Tree Multiplier Using Compressors -- 37. A Novel Authentication Framework for Hadoop -- 38. Fuzzy ART Based User Behavior Trust in Cloud Computing -- 39. Semi-supervised Learning Algorithm for Online Electricity Data Streams -- 40. An Efficient Continuous Speech recognition System for Dravidian Languages Using Support Vector Machine -- 41. Video Surveillance Tracking System Using LabVIEW and Matlab -- 42. Stroke Detection in Brain Using CT Images -- 43. Preemptive Appliances Scheduling in Smart Home Using Genetic Algorithm -- 44. Credible Secure Data Aggregation in Wireless Sensor Networks -- 45. Zumkeller Labeling Algorithms for Complete Bipartite Graphs and Wheel Graphs -- 46. An Unidentified Location-Based Efficient Routing Protocol in VANET -- 47. A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility -- 48. Stego with Color Cue -- 49. Analysis Secure Seed Based Sturdy OTP via Convenient Carry-On Device -- 50. A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme -- 51. Small World Particle Swarm Optimizer for Real World Optimization Problems -- 52. A Comparative Study of Feature Ranking Methods in Recognition of Handwritten Numerals -- 53. Performance Evaluation of Pet Image Reconstruction Using Radial Basis Function Networks -- 54. Clustering for Knowledgeable Web Mining -- 55. Effective Path Discovery Among Clusters for secure transmission of Data's in MANET -- 56. Quality of Service Analysis of AOMDV and AOMDV-MIMC Routing Protocols for Mobile Ad Hoc Networks -- 57. Particle Swarm Optimisation Based SONAR Image Enhancement for Underwater Target Detection -- 58. Intelligent Modeling and Optimization of ECM Process Parameters -- 59. An Effective Automation Testing Framework for OATS Tool -- 60. Multimodal Biometric Authentication System Based on Score Level Fusion of Palmprint and Finger Vein -- 61. Synergistic Clinical Trials with CAD Systems for the Early Detection of Lung Cancer -- 62. A Unified Framework for Network Bandwidth and Link Latency Detector Based on Cloud Computing -- 63. Development of Concatenative Syllable-Based Text to Speech Synthesis System for Tamil -- 64. Design of Low Power Blink Detector for Minimally Invasive Implantable Stimulator (SOC) Using 180nm Technology -- 65. Energy and Trust Based AODV for Quality of Service Affirmation in MANETs -- 66. Classification of Remote Sensing Image Based on Different Similarity Measures -- 67. A Start to Fail Frequency Technique for Detecting Hardware Trojan -- 68. A Novel Approach Based SUPM Method of Privacy Security Protocol in Near Field Communication Technology -- 69. Gabor Transform for the Time Frequency Localization of Impulse Faults in a Transformer -- 70. A Modified Priority Based Multi Scheduler (PBMS) for Optical Network -- 71. Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform -- 72. A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP -- 73. Identifying Sound of RPW in-situ from External Sources -- 74. VNS Based Heuristic for Identical Parallel Machine Scheduling Problem -- 75. Green Algorithm for Virtualized Cloud Systems to Optimize the Energy Consumption -- 76. S Transform for the Analysis of Impulse Faults in Transformer -- 77. Defensive Mechanism to Guard against Packet Droppers in Mobile Ad Hoc Network -- 78. Real Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm -- 79. Detection of Power Quality Disturbances Based on Adaptive Neural Net and Shannon Entropy Method -- 80. Texture Feature Extraction Using MGRLBP Method for Medical Image Classification -- 81. A Novel Light Weight Protocol for Address Assignment in Ad Hoc Networks Based on Filters -- 82. Structural Refinement: An Effective OCL-Based Testing Approach -- 83. Dynamic Architecture and Performance Analysis of Secure and Efficient Key Management Scheme in Multicast Network -- 84. Mining Undemanding and Intricate Patterns with Periodicity in Time Series Databases -- 85. Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud -- 86. Design of Fuzzy Logic Based pH Controller for High Pressure Rated Modified CSTR System -- 87. Level Control of Quadruple Tank Process with Finite Time Convergence Using Integral Terminal Sliding Mode Controller -- 88. An Enhanced Security Framework for a Cloud Application -- 89. Enhanced Role Based Access Control for Cloud Security -- 90. Model Predictive Controllers for Non-minimum Phase Quadruple Tank Process.
520 _a  The book is a collection of high-quality peer-reviewed research papers presented in Proceedings of International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014) held at Noorul Islam Centre for Higher Education, Kumaracoil, India. These research papers provide the latest developments in the broad area of use of artificial intelligence and evolutionary algorithms in engineering systems. The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
650 0 _aEngineering.
650 0 _aArtificial intelligence.
650 0 _aComputational intelligence.
650 1 4 _aEngineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aSignal, Image and Speech Processing.
700 1 _aSuresh, L. Padma.
_eeditor.
700 1 _aDash, Subhransu Sekhar.
_eeditor.
700 1 _aPanigrahi, Bijaya Ketan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9788132221258
830 0 _aAdvances in Intelligent Systems and Computing,
_x2194-5357 ;
_v324
856 4 0 _uhttp://dx.doi.org/10.1007/978-81-322-2126-5
912 _aZDB-2-ENG
942 _cEBK
999 _c52940
_d52940