


default search action
FICTA 2015: Durgapur, India
- Swagatam Das, Tandra Pal, Samarjit Kar, Suresh Chandra Satapathy, Jyotsna Kumar Mandal:

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2015, Durgapur, India, 16-18 November 2015. Advances in Intelligent Systems and Computing 404, Springer 2016, ISBN 978-81-322-2693-2
Special Session: Advances in Nature Inspired Algorithms for Engineering Optimization Problems
- Debanjan Konar

, Kalpana Sharma
, Sri Raj Pradhan, Sital Sharma:
An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Tasks in Multiprocessor System Using Hybrid Quantum-Inspired Genetic Algorithm. 3-11 - Pavani Bharathula, N. Mridula Menon:

Equitable Machine Learning Algorithms to Probe Over P2P Botnets. 13-21 - Sneha Shriya, R. S. Sharma, Saurav Sumit, Sonu Choudhary:

Directed Search-based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor Environment. 23-31
Bioinformatics and Computational Biology
- Sagnik Banerjee, Debjyoti Ghosh, Subhadip Basu, Mita Nasipuri:

JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP Classifiers. 35-42 - Arundhati Banerjee, Sujay Ray

:
Molecular Computing and Residual Binding Mode in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer Metastasis. 43-55 - K. A. Sumaira, A. Salim

, Vinod S. S. Chandra
:
SVM-Based Pre-microRNA Classifier Using Sequence, Structural, and Thermodynamic Parameters. 57-67 - Sumanta Ray

, Sinchani Chakraborty, Anirban Mukhopadhyay
:
DCoSpect: A Novel Differentially Coexpressed Gene Module Detection Algorithm Using Spectral Clustering. 69-77 - Mrityunjay Sarkar, Aurpan Majumder:

Intelligent Topological Differential Gene Networks. 79-93
Signal Processing
- Soumen Kanrar

:
Impact of Threshold to Identify Vocal Tract. 97-105 - Naveen Kumar, Neetu Sood:

Application of Compressed Sensing in Cognitive Radio. 107-117 - Priyanka G. Patil, Gajanan K. Birajdar

:
Compressed Sensing-Based NBI Mitigation in Ultra-WideBand Energy Detector. 119-128
Data Mining
- Yajnaseni Dash

, Sanjay Kumar Dubey, V. K. Patle
:
A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer Sensor. 131-140 - Subrata Datta, Subrata Bose:

Mining and Ranking Association Rules in Support, Confidence, Correlation, and Dissociation Framework. 141-152 - Sirisha G. N. V. G., Shashi M.:

Mining Closed Interesting Subspaces to Discover Conducive Living Environment of Migratory Animals. 153-166 - Kuldeep Singh

, Harish Kumar Shakya
, Bhaskar Biswas:
Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph. 167-177
Document Image Analysis
- Soumen Bag

, Glory Chawpatnaik:
A Modified Parallel Thinning Method for Handwritten Oriya Character Images. 181-189 - Chandra Subhash

, Sushila Maheshkar
, Srivastava Kislay:
Offline Signature Verification Using Artificial Neural Network. 191-200 - Shibaprasad Sen

, Ram Sarkar
, Kaushik Roy:
A Simple and Effective Technique for Online Handwritten Bangla Character Recognition. 201-209 - Sk Md Obaidullah

, Chayan Halder
, Nibaran Das, Kaushik Roy:
Visual Analytic-Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework. 211-219 - Chayan Halder

, Sk Md Obaidullah
, Kaushik Roy:
Offline Writer Identification from Isolated Characters Using Textural Features. 221-231 - Sk Md Obaidullah

, Chayan Halder
, Nibaran Das, Kaushik Roy:
PWDB_13: A Corpus of Word-Level Printed Document Images from Thirteen Official Indic Scripts. 233-242
Applications of Metaheuristic Optimization
- Dipayan Guha, Provas Kumar Roy, Subrata Banerjee:

Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint. 245-257 - Sneha Sultana, Santanu Roy, Provas Kumar Roy:

Optimal Allocation of Distributed Generator Using Chemical Reaction Optimization. 259-272 - Sara Sadat Babaie, Omid Mahdi Ebadati E.

, Tohid Firoozan:
A Novel Combined Approach of k-Means and Genetic Algorithm to Cluster Cultural Goods in Household Budget. 273-283 - Rohit Kumar Yadav, Haider Banka:

A PSO with Improved Initialization Operator for Solving Multiple Sequence Alignment Problems. 285-294 - Aditi Khanra, Manas Kumar Maiti

, Manoranjan Maiti:
Profit Maximization of TSP with Uncertain Parameters Through a Hybrid Algorithm. 295-314
Wireless Sensor and Ad-hoc Networks
- Shrikant V. Sonekar

, Manali M. Kshirsagar:
Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. 317-328 - S. Sasirekha, S. Swamynathan:

Service Provisioning Middleware for Wireless Sensor Network. 329-343 - Sonu Choudhary, R. S. Sharma, Sneha Shriya:

A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network. 345-354
Quantum Dot Cellular Automata
- Mili Ghosh

, Debarka Mukhopadhyay
, Paramartha Dutta
:
2-Dimensional 2-Dot 1-Electron Quantum Cellular Automata-Based Dynamic Memory Design. 357-365 - Neeraj Kumar Misra

, Subodh Wairya, Vinod Kumar Singh
:
Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata. 367-378 - Kakali Datta, Debarka Mukhopadhyay

, Paramartha Dutta
:
Design of a Logically Reversible Half Adder Using 2D 2-Dot 1-Electron QCA. 379-389
Fuzzy Sets and Systems
- Asma R. Shora, Mohd. Afshar Alam, Ranjit Biswas:

Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form. 393-404 - Sumonta Ghosh, Sujit Das

:
Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms. 405-412 - Debashish Malakar, Sulekha Gope, Sujit Das

:
Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making. 413-423 - Samir Maity

, Arindam Roy, Manoranjan Maiti:
Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-Fuzzy Coefficients. 425-440
Routing and Traffic Grooming
- Susmita Bandyopadhyay

, Arindam Kumar Chanda:
A Novel Multi-Criteria Multi-Agent-Based Routing Strategy Based on Tarantula Mating Behavior. 443-453 - Ajay Kumar Yadav, Sachin Tripathi:

A Tree Based Multicast Routing Protocol Using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks. 455-465 - Deepa Naik

, Soumyadeb Maity, Tanmay De:
Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks. 467-477
Authentication and Network Security
- Sunil Kumar Gautam, Hari Om:

Host-Based Intrusion Detection Using Statistical Approaches. 481-493 - Rajeev Kumar, Ruhul Amin

, Arijit Karati
, G. P. Biswas:
Secure Remote Login Scheme with Password and Smart Card Update Facilities. 495-505 - Keshav Prasad, Santosh Kumar

, Anuradha Negi, Aniket Mahanti
:
Generation and Risk Analysis of Network Attack Graph. 507-516 - Mohit Agrawal, R. Leela Velusamy

:
Unsupervised Spam Detection in Hyves Using SALSA. 517-526 - Sandip Roy, Santanu Chatterjee:

Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. 527-537 - Navaneeth Kumar Kanakarajan, Kandasamy Muniasamy:

Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection. 539-547
Text Processing
- Surabhi Jain, Louella Mesquita Colaco, Okstynn Rodrigues:

Sentiment Analysis with Modality Processing. 551-558 - Siddhi Barve, Shaba Desai, Razia Sardinha:

Query-Based Extractive Text Summarization for Sanskrit. 559-568 - Chandan Kumar Behera

, D. Lalitha Bhaskari:
Code Obfuscation by Using Floating Points and Conditional Statements. 569-578 - Sumit Jaiswal, Subhash Chandra Patel

, Ravi Shankar Singh
:
Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption. 579-585
Image Processing
- Ajay Kumar Mallick

, Priyanka, Sushila Maheshkar
:
Digital Image Watermarking Scheme Based on Visual Cryptography and SVD. 589-598 - K. Subhash Babu, K. K. Thyagharajan

, V. Ramachandran:
Compression of Hyper-Spectral Images and Its Performance Evaluation. 599-609 - Y. H. Sharath Kumar, V. Vinutha:

Hand Gesture Recognition for Sign Language: A Skeleton Approach. 611-623 - Lalit Maurya

, Prasant Kumar Mahapatra, Garima Saini:
Modified Cuckoo Search-Based Image Enhancement. 625-634 - Amiya Halder, Sayan Halder, Samrat Chakraborty:

A Novel Iterative Salt-and-Pepper Noise Removal Algorithm. 635-643
Intelligent System Planning
- V. Viji Rajendran

, Sankaranarayanan Swamynathan:
Queuing Model for Improving QoS in Cloud Service Discovery. 647-656 - Debasri Saha:

Adaptive Multilayer Routing for Incremental Design of an SoC. 657-665 - Mainak Bandyopadhyay

, Varun Singh:
Analyzing and Modeling Spatial Factors for Pre-decided Route Selection Behavior: A Case Study of Fire Emergency Vehicles of Allahabad City. 667-676 - Archana Sreekumar, V. Radhamani Pillay:

Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers: Evaluation. 677-689 - Satyendra Singh Chouhan

, Rajdeep Niyogi:
A Multiagent Planning Algorithm with Joint Actions. 691-699 - Williams Sureshkumar, Raghavan Rama

:
4-Directional Combinatorial Motion Planning Via Labeled Isotonic Array P System. 701-709 - D. V. N. Ananth, G. V. Nagesh Kumar

:
Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table-Based MPPT Algorithm to Overcome Wind and Grid Disturbances. 711-725

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














