


default search action
18th ISDA 2018: Vellore, India
- Ajith Abraham, Aswani Kumar Cherukuri, Patricia Melin, Niketa Gandhi:

Intelligent Systems Design and Applications - 18th International Conference on Intelligent Systems Design and Applications, ISDA 2018, Vellore, India, December 6-8, 2018, Volume 1. Advances in Intelligent Systems and Computing 940, Springer 2020, ISBN 978-3-030-16656-4 - Derrick Beckedahl, Andreas Nel, Nelishia Pillay:

A Study of Multi-space Search Optimization. 1-9 - Lokeswari Venkataramana, Shomona Gracia Jacob, S. Saraswathi, R. Athilakshmi

:
Clinical Decision Support System for Neuro-Degenerative Disorders: An Optimal Feature Selective Classifier and Identification of Predictor Markers. 10-20 - Anderson Francisco de Oliveira, Maria do Carmo Nicoletti:

Favoring the k-Means Algorithm with Initialization Methods. 21-31 - Suhas B. Shirol

, S. Ramakrishna, Rajashekar B. Shettar
:
A Novel Design and Implementation of 8-Bit and 16-Bit Hybrid ALU. 32-42 - Sunita Meena, Shivani Kapur, Vipin C. Dhobal, Subhrat Kr. Sethi:

Authentication Scheme Using Sparse Matrix in Cloud Computing. 43-52 - C. M. Naveen Kumar

, G. Shivakumar
:
A Thermal Imaging Based Classification of Affective States Using Multiclass SVM. 53-63 - Prerna Kapoor, Prem Kumar Singh

:
Multidimensional Crime Dataset Analysis. 64-72 - R. Preethi, M. Sughasiny:

AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network. 73-86 - J. Mathew, Ajay Kumara M. A.:

API Call Based Malware Detection Approach Using Recurrent Neural Network - LSTM. 87-99 - Suvarna Kishorkumar Kadam

, Vinay G. Vaidya:
Review and Analysis of Zero, One and Few Shot Learning Approaches. 100-112 - M. Arun Siddharth, R. Padmanaban

, R. Vaira Vignesh
:
Simulation of Friction Stir Welding of Aluminium Alloy AA5052 - Tailor Welded Blanks. 113-122 - Thanh D. Nguyen

:
Information Systems Success: Extending the Theoretical Model from IT Business Value Perspective. 123-137 - Houyem Heni, Faïez Gargouri

:
Towards an Automatic Detection of Sensitive Information in Mongo Database. 138-146 - Valtteri Kujala, Raija Halonen

:
Business Growth Using Open Source e-Commerce and ERP in Small Business. 147-158 - Amita A. Shinde

, Amol D. Rahulkar, Chetankumar Y. Patil:
Directional Multiscale Feature Extraction for Biomedical Image Indexing and Retrieval Using Contourlet Transform. 159-169 - Emna Bouzid Smida, Sonia Gaied Fantar, Habib Youssef:

Link Quality and QoE Aware Predictive Vertical Handoff Mechanism for Video Streaming in Urban VANET. 170-181 - Ishan Chawla

, Vikram Chopra, Ashish Singla:
Performance Comparison of PID and ANFIS Controller for Stabilization of x and x-y Inverted Pendulums. 182-192 - R. Arjun

, K. R. Suprabha
:
Modeling Hybrid Indicators for Stock Index Prediction. 193-202 - Namrata Singh

:
XOR Encryption Techniques of Video Steganography: A Comparative Analysis. 203-214 - Thanh D. Nguyen

, Thy Q. L. Nguyen, Thi V. Nguyen, Tung D. Tran:
Intention to Use M-Banking: The Role of E-WOM. 215-229 - Miguel Pfitscher, Daniel Welfer, Marco Antônio De Souza Leite Cuadros, Daniel Fernando Tello Gamarra

:
Activity Gesture Recognition on Kinect Sensor Using Convolutional Neural Networks and FastDTW for the MSRC-12 Dataset. 230-239 - Subhranshu Sekhar Pati, Aurobindo Behera

, Tapas Kumar Panigrahi
:
Plug in Electric Vehicle-Wind Integrated Multi-area Automatic Generation Control Tuned by Intelligent Water Drops Algorithm. 240-250 - Swati P. Madhe, Amol D. Rahulkar, Raghunath S. Holambe:

Design of Time-Frequency Localized Filter Bank Using Modified Particle Swarm Optimization. 251-261 - Fuzail Khan, Sandeep Sharma:

Development of Low-Cost Real-Time Driver Drowsiness Detection System Using Eye Centre Tracking and Dynamic Thresholding. 262-271 - N. K. Adhish, R. Rajesh, T. M. Thasleema

:
A Hybrid Entropy Based Method Using Gaussian Kernel for Retinal Blood Vessel Segmentation. 272-279 - R. Radha, Amit Kumar Tyagi

, K. Kathiravan, G. Staflin Betzy:
Precision Crop Protection Using Wireless Sensor Network. 280-290 - Rathan Kumar Veeraballi, Muni Sankar Nagugari, Chandra Sekhara Rao Annavarapu, Eswar Varma Gownipuram:

Deep Learning Based Approach for Classification and Detection of Papaya Leaf Diseases. 291-302 - Chuanlin Liu, Amit Yadav, Asif Khan, Jing Zou, Weizhen Hu:

Three-Materials Image Recover from Value Range Projection Data. 303-314 - Malika Ben Khalifa

, Zied Elouedi
, Eric Lefèvre
:
Multiple Criteria Fake Reviews Detection Using Belief Function Theory. 315-324 - Shreyal Gajare, Shilpa Sonawani:

Improved Logistic Regression Approach in Feature Selection for EHR. 325-334 - Midhula Vijayan

, R. Mohan:
Background Modeling Using Deep-Variational Autoencoder. 335-344 - M. Gobinath

, S. Malathi:
Sewage Sludge Removal Method Through Arm-Axis by Machine Robot. 345-353 - Sarra Saied, Zied Elouedi

:
K-Nearest Neighbors Under Possibility Framework with Optimizing Parameters. 354-364 - D. Saravanakumar, M. Ramasubba Reddy

:
A Visual Spelling System Using SSVEP Based Hybrid Brain Computer Interface with Video-Oculography. 365-375 - Souvik Kundu, Srividhya Karthikeyan, A. Karthikeyan:

QBEECH: Multi-hop Clustering of Cognitive Based Sensor Nodes in the Administration of Queen Nodes. 376-385 - Pallavi Ahire, Jibi Abraham:

Perceive Core Logical Blocks of a C Program Automatically for Source Code Transformations. 386-400 - Ashish Kumar, Jagadeesh Kakarla, Muzzammil Hussain:

Asymmetric Key Cryptosystem and Digital Signature Algorithm Built on Discrete Logarithm Problem (DLP). 401-410 - Sabuzima Nayak

, Ripon Patgiri
:
A Study on Big Cancer Data. 411-423 - Pramod D. Ganjewar, Selvaraj Barani, Sanjeev J. Wagh

, Santosh S. Sonavane:
Food Monitoring Using Adaptive Naïve Bayes Prediction in IoT. 424-434 - Keqin Chen

, Kun Zhu
, Yixin Meng
, Amit Yadav, Asif Khan:
Mixed Credit Scoring Model of Logistic Regression and Evidence Weight in the Background of Big Data. 435-443 - Afsana Ahsan Jeny

, Masum Shah Junayed
, Syeda Tanjila Atik
, Sazzad Mahamd:
A Model for Identifying Historical Landmarks of Bangladesh from Image Content Using a Depth-Wise Convolutional Neural Network. 444-454 - Rachit Bhalla

, N. Jeyanthi
:
M2U2: Multifactor Mobile Based Unique User Authentication Mechanism. 455-464 - S. Aravindkumar, P. Varalakshmi, M. Hemalatha:

Generation of Image Caption Using CNN-LSTM Based Approach. 465-474 - Lidia Bononi Paiva Tomaz

, Rita Maria da Silva Julia
:
ADABA: An Algorithm to Improve the Parallel Search in Competitive Agents. 475-485 - Gillala Rekha, Amit Kumar Tyagi, Vuyyuru Krishna Reddy

:
A Novel Approach to Solve Class Imbalance Problem Using Noise Filter Method. 486-496 - Shridhar Sanshi, C. D. Jaidhar:

Mobility Aware Routing Protocol Based on DIO Message for Low Power and Lossy Networks. 497-508 - Omran Al-Shamma

, Mohammed Abdulraheem Fadhel
, Rabab Alaa Hameed
, Laith Alzubaidi
, Jinglan Zhang:
Boosting Convolutional Neural Networks Performance Based on FPGA Accelerator. 509-517 - Mohammed Abdulraheem Fadhel

, Omran Al-Shamma
, Sameer Razzaq Oleiwi
, Bahaa Hussein Taher
, Laith Alzubaidi
:
Real-Time PCG Diagnosis Using FPGA. 518-529 - Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma

, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. 530-539 - Minakshi N. Vharkte, Vijaya B. Musande:

A Novel Method for Retrieval of Remote Sensing Image Using Wavelet Transform and HOG. 540-549 - Laith Alzubaidi

, Omran Al-Shamma
, Mohammed A. Fadhel
, Laith Farhan
, Jinglan Zhang:
Classification of Red Blood Cells in Sickle Cell Anemia Using Deep Convolutional Neural Network. 550-559 - Laith Alzubaidi

, Mohammed A. Fadhel
, Omran Al-Shamma
, Jinglan Zhang:
Robust and Efficient Approach to Diagnose Sickle Cell Anemia in Blood. 560-570 - Madhu Kumari, V. B. Singh

:
An Improved Classifier Based on Entropy and Deep Learning for Bug Priority Prediction. 571-580 - K. Sundar Srinivas, M. N. L. Kalyani, N. Mounika, Ch. Aruna Kumari:

Turbo Coded STBC MIMO OFDM with DWT Based I/Q Balancing System. 581-589 - Raoudha Saida, Yessine Hadj Kacem, Mohammed S. BenSaleh, Mohamed Abid:

A UML/MARTE Based Design Pattern for a Wireless Sensor Node. 590-599 - Soumi Banerjee

, Anita Patil:
ECC Based Encryption Algorithm for Lightweight Cryptography. 600-609 - S. Radhika

, Arumugam Chandrasekar
:
Reduced Complexity Affine Projection Algorithm Based on Variable Projection Order and Multiple Sub Filter Approach. 610-619 - J. Divya Udayan

, Anupama K. Ingale, R. Hemalatha:
A Prototype Model of Hand Assistive System Useful for Hearing Impaired. 620-628 - Taoufik Ben Abdallah, Radhouane Guermazi

, Mohamed Hammami
:
Towards Micro-expression Recognition Through Pyramid of Uniform Temporal Local Binary Pattern Features. 629-640 - Pranav Kumar Singh

, Manish Kumar Dash, Paritosh Mittal, Sunit Kumar Nandi, Sukumar Nandi
:
Misbehavior Detection in C-ITS Using Deep Learning Approach. 641-652 - Mubin Shoukat Tamboli, Rajesh S. Prasad:

Authorship Identification with Multi Sequence Word Selection Method. 653-661 - Bhabesh Chanduka, Tushaar Gangavarapu

, C. D. Jaidhar:
A Single Program Multiple Data Algorithm for Feature Selection. 662-672 - Rohit Mishra

, Santosh Kumar Barnwal, Shrikant Malviya
, Prasoon Mishra, Uma Shanker Tiwary
:
Prosodic Feature Selection of Personality Traits for Job Interview Performance. 673-682 - S. Saranyadevi, R. Murugeswari, S. Bathrinath, M. S. Sabitha:

Hybrid Association Rule Miner Using Probabilistic Context-Free Grammar and Ant Colony Optimization for Rainfall Prediction. 683-695 - Islam Elleuch, Achraf Makni, Rafik Bouaziz

:
Design of an Intelligent Cooperative Road Hazard Detection Persistent System. 696-707 - R. Jothi

:
Clustering Time-Series Data Generated by Smart Devices for Human Activity Recognition. 708-716 - Suman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar, Abhinav Sirohi:

A Priority-Based Ranking Approach for Maximizing the Earned Benefit in an Incentivized Social Network. 717-726 - Ganesh R. Padalkar, Madhuri Bhushan Khambete

:
Analysis of Basic-SegNet Architecture with Variations in Training Options. 727-735 - M. Abhayadev, T. Santha:

CRIST900: A Fully-Labeled Natural Image Dataset for Multi-Operator Content Aware Image Retargeting. 736-748 - Samuel-Soma M. Ajibade

, Nor Bahiah Ahmad, Siti Mariyam Shamsuddin:
A Data Mining Approach to Predict Academic Performance of Students Using Ensemble Techniques. 749-760 - André L. S. Souza

, Jonatas B. C. Chagas, Puca Huachi Vaz Penna, Marcone J. F. Souza
:
A Late Acceptance Hill-Climbing Heuristic Algorithm for the Double Vehicle Routing Problem with Multiple Stacks and Heterogeneous Demand. 761-771 - Toshihiro Yoshizumi, Tomoo Sumida, Yasunori Shiono, Mitsuhiro Namekawa, Kensei Tsuchida:

Evaluation of Advanced Analysis Method for Human Relationship Using Fuzzy Theory. 772-782 - Taisuke Hori, Mitsuhiro Namekawa, Syuya Kanagawa:

Analysis of Overhead View Images at Intersection Using Machine Learning. 783-791 - Vaskar Deka

, Shikhar Kumar Sarma
:
A New Design Prospective for User Specific Intelligent Control of Devices in a Smart Environment. 792-802 - Lucas Zanco Ladeira, Valdir Amancio Pereira Junior, Raphael Zanon Rodrigues, Leonardo Castro Botega

:
Crime Information Improvement for Situation Awareness Based on Data Mining. 803-812 - Jayaram Hariharakrishnan, N. Bhalaji

:
A Novel Approach Towards Enhancing the Performance of Trust Based RPL Protocol in Internet of Things. 813-822 - Nimmi Sharma, Elizabeth Rufus

, Vinod Karar, Shashi Poddar
:
Fractional Order Extended Kalman Filter for Attitude Estimation. 823-832 - Amanda Kelly D'costa, K. P. Raksha, D. R. Vasanthi

:
Implementation of Robust Solid State Drive Controller Using LZ77 Compression and SHA-1 Encryption Technique. 833-843 - Nishat Tasnim, Md. Romyull Islam

, Shaon Bhatta Shuvo
:
A Convolution Neural Network Based Classification Approach for Recognizing Traditional Foods of Bangladesh from Food Images. 844-852 - Adarsh Kumar, Alok Aggarwal

:
An Efficient Outlier Detection Mechanism for RFID-Sensor Integrated MANET. 853-863 - Aruna Kumari Chirapangi, G. M. G. Madhuri, Praveen Kitti Burri

, Naga Lakshmi Kalyani Movva:
Design of Low Power SAR ADC with Two Different DAC Structure and Two Different SAR Logic Designs and Their Comparisons. 864-874 - Abhishek Teli, A. Amith, K. Bhanu Kaushik, K. Gopala Krishna Vasanth, B. J. Sowmya, S. Seema:

Efficient Decision Support System on Agrometeorological Data. 875-890 - Manjunath K. Vanahalli

, Nagamma Patil:
Distributed Mining of Significant Frequent Colossal Closed Itemsets from Long Biological Dataset. 891-902 - Vyom Unadkat, Sneh Gajiwala, Prachi Doshi, Mitchell D'silva:

Intelligent System for Weather Prediction. 903-911 - Mateus Boiani

, Gabriel Dominico, Rafael Stubs Parpinelli:
A GPU-Based jDE Algorithm Applied to Continuous Unconstrained Optimization. 912-922 - Bheemappa Halavar

, Basavaraj Talawar:
OP3DBFT: A Power and Performance Optimal 3D BFT NoC Architecture. 923-933 - Adarsh Kumar, Alok Aggarwal

:
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs. 934-944 - R. Gautham Sundar Ram, Nitin Chaturvedi, Sumeet Saurav, Sanjay Singh:

An FPGA Based Hardware Accelerator for Classification of Handwritten Digits. 945-954 - El Mostafa Bourhim

, Abdelghani Cherkaoui:
Selection of Optimal Game Engine by Using AHP Approach for Virtual Reality Fire Safety Training. 955-966 - Ujjwal Pasupulety

, C. D. Adwaith, Suraj Hegde, Nagamma Patil:
Feature Selection Using Fast Ensemble Learning for Network Intrusion Detection. 967-977 - Vasanthi Satyananda, K. V. Narayanaswamy, Karibasappa:

An Embedded System for Watershed Based Hard Exudate Extraction. 978-987 - Vasanthi Satyananda, K. V. Narayanaswamy, Karibasappa:

Detection of Exudates from Fundus Images. 988-997 - Rishu Arora

:
Intuitionistic Fuzzy Soft Aggregation Operator Based on Einstein Norms and Its Applications in Decision-Making. 998-1008 - Nancy

:
Parametric Similarity Measures on Linguistic Single-Valued Neutrosophic Sets with Application to Decision-Making Problems. 1009-1019 - Karama Abdelhedi, Nadia Bouassida:

An SOA Design Patterns Recommendation System Based on Ontology. 1020-1030 - Rakesh Kumar Ambhati, G. Selva Kumar, Y. Shashikant Chaudhari, Valluri Sarimela:

Framework for Intelligent Software Defined Networking for Wired and Wireless Networks. 1031-1039 - Jeel Sukhadiya, Yashi Suba, Mitchell D'silva:

Devanagari Character Classification Using Capsule Network. 1040-1049 - Aruna Gawade, Narendra Shekokar

:
Lightweight Cipher Using GRP Bit Permutation and Tweak. 1050-1059 - Krunal Randive

, R. Mohan:
A State-of-Art Review on Automatic Video Annotation Techniques. 1060-1069 - R. Nagakrishnan, A. Revathi

:
A Robust Speech Encryption System Based on DNA Addition and Chaotic Maps. 1070-1080 - Roshani Talmale, Nirupama Bhat Mundukur

, Nita Thakare:
Efficient Energy Attentive and Fault Recognition Mechanism in Distributed Wireless Sensor Networks: A Review. 1081-1092 - Zinah Mohsin Arkah

, Laith Alzubaidi
, Ammar A. Ali, Ahmed Talib Abdulameer:
Digital Color Documents Authentication Using QR Code Based on Digital Watermarking. 1093-1101 - Aditya Shinde, Purva Raut

:
Comparative Study of Regression Models and Deep Learning Models for Insurance Cost Prediction. 1102-1111 - Raghunathan Krishankumar

, S. Shyam, R. P. Nethra, S. Srivatsa, K. S. Ravichandran:
Extending Borda Rule Under q-rung Orthopair Fuzzy Set for Multi-attribute Group Decision-Making. 1112-1122 - S. M. Vadivel

, A. H. Sequeira
:
A Novel Approach for Operational Performance Based Mail Sorting Facility Layout Selection Using Grey Relational Analysis: A Case on India Speed Post Service Industry. 1123-1132 - Sanasam Chanu Inunganbi

, Prakash Choudhary
:
Recognition of Handwritten Meitei Mayek and English Alphabets Using Combination of Spatial Features. 1133-1142 - Gabriel Dominico, Mateus Boiani

, Rafael Stubs Parpinelli:
A Self-adaptive Differential Evolution with Local Search Applied to Multimodal Optimization. 1143-1153

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














