000 | 07563nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-81-322-2734-2 | ||
003 | DE-He213 | ||
005 | 20220801221346.0 | ||
007 | cr nn 008mamaa | ||
008 | 151208s2016 ii | s |||| 0|eng d | ||
020 |
_a9788132227342 _9978-81-322-2734-2 |
||
024 | 7 |
_a10.1007/978-81-322-2734-2 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aComputational Intelligence in Data Mining—Volume 1 _h[electronic resource] : _bProceedings of the International Conference on CIDM, 5-6 December 2015 / _cedited by Himansu Sekhar Behera, Durga Prasad Mohapatra. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aNew Delhi : _bSpringer India : _bImprint: Springer, _c2016. |
|
300 |
_aXXIII, 494 p. 205 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v410 |
|
505 | 0 | _aChapter 1. A Novel Approach for Biometric Authentication System Using Ear, 2D Face and 3D Face Modalities -- Chapter 2. An Optimal Policy with Quadratic Demand, Time-Varying Quadratic Holding Cost and Partial Backlogging -- Chapter 3. A Novel Approach for Order Reduction of High Order Discrete Time Systems Using Modified Routh Approximation Method via w-Domain -- Chapter 4. Pose Invariant Face Recognition for New Born: Machine Learning Approach -- Chapter 5. Implementation of Data Analytics for MongoDB Using Trigger Utility -- Chapter 6. Heart Disease Prediction Using k-Nearest Neighbour Classifier Based on Handwritten Text -- Chapter 7. Optimizing a Higher Order Neural Network through Teaching Learning Based Optimization Algorithm -- Chapter 8. Deploying a Social Web Graph over a Semantic Web Framework -- Chapter 9. Detecting and Analysing Invariant Groups in Complex Networks -- Chapter 10. Automatic Mucosa Detection in Video Capsule Endoscopy with Adaptive Thresholding -- Chapter 11. Optimization Approach for Feature Selection and Classification with Support Vector Machine -- Chapter 12. Design and Development of Controller Software for MAS Receiver Using Socket Programming -- Chapter 13. Inference of Replanting in Forest Fire Affected Land Using Data Mining Technique -- Chapter 14. A New Approach on Color Image Encryption Using Arnold 4D Cat Map -- Chapter 15. Neutrosophic Logic Based New Methodology to Handle Indeterminacy Data for Taking Accurate Decision -- Chapter 16. Prognostication of Student’s Performance: An Hierarchical Clustering Strategy for Educational Dataset -- Chapter 17. Design and Implementation ACO Based Edge Detection on the Fusion of Hue and PCA -- Chapter 18. Effective Sentimental Analysis & Opinion Mining of Web Reviews Using Rule Based Classifiers -- Chapter 19. Trigonometric Fourier Approximation of the Conjugate Series of a Function of Generalized Lipchitz Class by Product Summability -- Chapter 20. Optimal Energy Efficient Path Selection Using Venus Flytrap Optimization Algorithm in MANET -- Chapter 21. Bi-clustering Using Venus Flytrap Optimization Algorithm -- Chapter 22. Analytical Structure of a Fuzzy Logic Controller for Software Development Effort Estimation -- Chapter 23. Malayalam Spell Checker Using N-Gram Method -- Chapter 24. Sample Classification Based on Gene Subset Selection -- Chapter 25. A Multi Criteria Document Clustering Approach Using Genetic Algorithm -- Chapter 26. Positive and Negative Association Rule Mining Using Correlation Threshold and Dual Confidence Approach -- Chapter 27. Extractive Text Summarization Using Lexical Association and Graph Based Text Analysis -- Chapter 28. Design of Linear Phase FIR Band Stop Filter Using Fusion Based DEPSO Algorithm -- Chapter 29. A Survey on Face Detection and Person Re-identification -- Chapter 30. Machine Translation of Telugu Singular Pronoun Inflections to Sanskrit -- Chapter 31. Tweet Analyzer: Identifying Interesting Tweets Based on the Polarity of Tweets -- Chapter 32. Face-Tracking to Detect Dynamic Target in Wireless Sensor Networks -- Chapter 33. Abnormal Gait Detection Using Lean and Ramp Angle Features -- Chapter 34. Fuzzy Logic and AHP-based Ranking of Cloud Service Providers -- Chapter 35. Classification of Tabla Strokes Using Neural Network -- Chapter 36. Automatic Headline Generation for News Article -- Chapter 37. Identifying Natural Communities in Social Networks Using Modularity Coupled with Self Organizing Maps -- Chapter 38. A Low Complexity FLANN Architecture for Forecasting Stock Time Series Data Training with Meta-Heuristic Firefly Algorithm -- Chapter 39. A Novel Scheduling Algorithm for Cloud Computing Environment -- Chapter 40. PSO Based Tuning of a Integral and Proportional Integral Controller for a Closed Loop Stand-alone Multi Wind Energy System -- Chapter 41. Statistically Validating Intrusion Detection Framework against Selected DoS Attacks in Ad Hoc Networks: An NS-2 Simulation Study -- Chapter 42. Fourier Features for the Recognition of Ancient Kannada Text -- Chapter 43. A Spelling Mistake Correction (SMC) Model for Resolving Real-word Error -- Chapter 44. Differential Evolution Based Tuning of Proportional Integral Controller for Modular Multilevel Converter STATCOM -- Chapter 45. Designing of DPA Resistant Circuit Using Secure Differential Logic Gates -- Chapter 46. Efficient Algorithm for Web Search Query Reformulation Using Genetic Algorithm -- Chapter 47. Throughput of a Network Shared by TCP Reno and TCP Vegas in Static Multi-hop Wireless Network -- Chapter 48. A Pronunciation Rule-based Speech Synthesis Technique for Odia Numerals. | |
520 | _aThe book is a collection of high-quality peer-reviewed research papers presented in the Second International Conference on Computational Intelligence in Data Mining (ICCIDM 2015) held at Bhubaneswar, Odisha, India during 5 – 6 December 2015. The two-volume Proceedings address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics. | ||
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _955581 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aBehera, Himansu Sekhar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _955582 |
|
700 | 1 |
_aMohapatra, Durga Prasad. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _955583 |
|
710 | 2 |
_aSpringerLink (Online service) _955584 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9788132227328 |
776 | 0 | 8 |
_iPrinted edition: _z9788132227335 |
830 | 0 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v410 _955585 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-81-322-2734-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c79584 _d79584 |