


default search action
SocProS 2013: Roorkee, India
- Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bansal:

Proceedings of the Third International Conference on Soft Computing for Problem Solving - SocProS 2013, Volume 1, Greater Noida Extension Centre, IIT Roorkee, India, December 26-28, 2013. Advances in Intelligent Systems and Computing 258, Springer 2014, ISBN 978-81-322-1770-1 - Anil Kumar

, Shyam P. Agrawal:
Computational Study of Blood Flow Through Elastic Arteries with Porous Effects. 1-10 - G. Giftson Samuel

, C. Christober Asir Rajan:
A Modified Shuffled Frog Leaping Algorithm for Long-Term Generation Maintenance Scheduling. 11-24 - Neil Buckley, Atulya K. Nagar

, S. Arumugam
:
Key-Based Steganographic Textual Secret Sharing for Confidential Messaging. 25-34 - Neil Buckley, Atulya K. Nagar

, S. Arumugam
:
AnimVSS: Frame-Based Visual Secret Sharing. 35-44 - Hepzibah A. Christinal

, Ainhoa Berciano
, Daniel Díaz-Pernil, Miguel Angel Gutiérrez-Naranjo
:
Searching Partially Bounded Regions with P Systems. 45-54 - V. K. Tayal

, J. S. Lather, Piyush Sharma
, Sanjay Kumar Sinha
:
Power System Stability Enhancement Using Fuzzy Logic Based Power System Stabilizer. 55-68 - A. Manju

, Madhav J. Nigam:
An Improved Quantum Inspired Firefly Algorithm with Interpolation Operator. 69-84 - M. Geethanjali

, M. Anju Alias, T. Karpaga Senthil Pandy:
Discrete Wavelet Transform Based Fault Detection and Classification in a Static Synchronous Series Compensated Transmission System. 85-94 - K. Joshil Raj, S. Sivasathya:

SVM and Random Forest Classification of Satellite Image with NDVI as an Additional Attribute to the Dataset. 95-107 - Himakshi, Harsh Kumar Verma, Ravindra Kumar Singh

, Charan Kamaljit Singh:
Bi-directional Pixel-Value Differencing Approach for Steganography. 109-120 - Rohit Rastogi

, Saumya Agarwal, Palak Sharma, Uarvarshi Kaul, Shilpi Jain:
Unsupervised Classification of Mixed Data Type of Attributes Using Genetic Algorithm (Numeric, Categorical, Ordinal, Binary, Ratio-Scaled). 121-131 - Deepshikha Bhargava

, Sameer Saxena
:
RoHeMaSys: Medical Revolution with Design and Development of Humanoid for Supporting Healthcare. 133-142 - Kedar Nath Das

, Raghav Prasad Parouha:
Synergy of Differential Evolution and Particle Swarm Optimization. 143-160 - Vrince Vimal

, Sanjeev Maheshwari:
Energy Management Routing in Wireless Sensor Networks. 161-168 - Rashmi Rani

, Roshan Lal:
Axially Symmetric Vibrations of Circular Sandwich Plates of Linearly Varying Thickness. 169-181 - Parvaneh Mansouri, Babak Asady, Neelima Gupta:

Solve Shortest Paths Problem by Using Artificial Bee Colony Algorithm. 183-191 - Arunesh Kumar Singh, D. K. Chaturvedi

, Jitendra Singh:
Speed Control of Three Phase Induction Motor Drive Using Soft Computing Technique. 193-201 - Rashi Agarwal

:
Edge Detection in Images Using Modified Bit-Planes Sobel Operator. 203-210 - Darpan Anand

, Manu Pratap Singh
, Manish Gupta:
Application of Rule Based Fuzzy Inference System in Predicting the Quality and Quantity of Potato Crop Yield in Agra. 211-223 - Dipti Singh

, Seema Agrawal, Nidhi Singh:
A Novel Variant of Self-Organizing Migrating Algorithm for Global Optimization. 225-233 - Chandan Singh, Dhananjay Yadav

:
User Ranking by Monitoring Eye Gaze Using Eye Tracker. 235-246 - N. Chandrakant:

Invalidating Security Compromised Nodes by Releasing its Energy in MANETs. 247-257 - N. Chandrakant:

Administrating MANETs Via Brain Computer Interface. 259-265 - D. K. Chaturvedi

, Mayank Pratap Singh:
Parameter Estimation and Soft Computing Techniques. 267-279 - Vineet Kumar, K. P. S. Rana, Amit Kumar, Richa Sharma, Puneet Mishra

, Sreejith S. Nair:
Development of a Genetic Algorithm Toolkit in LabVIEW. 281-296 - K. V. Santhosh, Binoy Krishna Roy:

A Soft Calibration Technique for Thermistor Using Support Vector Machine. 297-306 - Chiranjib Sur

, Anupam Shukla
:
Discrete Cuckoo Search Optimization Algorithm for Combinatorial Optimization of Vehicle Route in Graph Based Road Network. 307-320 - Ravitashaw Bathla, Shubham Jain, Rajeev Singh:

Introducing a Novel Parameter in Generation of Course Timetable with Genetic Algorithm. 321-332 - Saifullah Khalid, Bharti Dwivedi:

Application of AI Techniques in Implementing Shunt APF in Aircraft Supply System. 333-341 - Sunil Kumar Jauhar

, Millie Pant, Aakash Deep:
Differential Evolution for Supplier Selection Problem: A DEA Based Approach. 343-353 - Tushar Bhardwaj, Tarun Kumar Sharma

, Manu Ram Pandit:
Social Engineering Prevention by Detecting Malicious URLs Using Artificial Bee Colony Algorithm. 355-363 - Sakshi Dhall, Saibal K. Pal, Kapil Sharma

:
New Lightweight Conditional Encryption Schemes for Multimedia. 365-377 - Richa Sharma, K. P. S. Rana, Vineet Kumar:

Comparative Study of Controller Optimization Techniques for a Robotic Manipulator. 379-393 - Garima Singh, Kusum Deep

:
Hybridization of P Systems and Particle Swarm Optimization for Function Optimization. 395-401 - Manoj Diwakar

, Pratibha Sharma, Sandip Swarnakar
, Pardeep Kumar
:
Image Security Using Cellular Automata Rules. 403-412 - Musrrat Ali

, Chang Wook Ahn
, Millie Pant:
Cuckoo Search Algorithm for the Selection of Optimal Scaling Factors in Image Watermarking. 413-425 - Remica Aggarwal:

Identifying and Prioritizing Human Capital Measurement Indicators for Personnel Selection Using Fuzzy MADM. 427-439 - Abha Mittal, Gayatri Devi, P. K. S. Chauhan:

Application of ANN to Predict Liquefaction Potential of Soil Deposits for Chandigarh Region, India. 441-450 - Kavita Khanna

, Navin Rajpal:
Survey of Curve and Surface Reconstruction Algorithms from a Set of Unorganized Points. 451-458 - Kavita Khanna

, Navin Rajpal:
Reconstruction of Noisy Bezier Curves Using Artificial Neural Networks. 459-466 - Sandeep Kumar Mogha

, Shiv Prasad Yadav, S. P. Singh:
SBM-DEA Model Based Efficiency Assessment of Public Sector Hospitals in Uttarakhand, India. 467-480 - V. Devi Rajaselvi, T. Kalyani, V. Rajkumar Dare, D. Gnanaraj Thomas:

Recognizability of Triangular Picture Languages by Triangular Wang Automata. 481-493 - Satya Narayan Singh, Om Prakash Dubey

, Kusum Deep
, Ajay Prasad:
Role of Information Technology in Financial Inclusion. 495-502 - Riccardo Alberti, Atulya K. Nagar

:
Harmony Search Based Algorithm for Complete Information Equilibrium in Infinite Game. 503-511 - Monit Kapoor

, Manish Prateek
:
A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc Network. 513-524 - Gabriel Lellouch, Amit Kumar Mishra:

Multi-carrier Based Radar Signal Optimization Using Genetic Algorithm. 525-534 - Gourav Gupta, Amit Kumar, M. K. Sharma:

Additive and Multiplicative Inverse of Generalized Fuzzy Numbers with Different Left Heights and Right Heights. 535-538 - Praneesh Gupta, Prasanna Raghaw Mishra:

Cryptanalysis of "A New Method of Cryptography Using Laplace Transform". 539-546 - S. N. Deepa, G. Sudha:

A Design of Longitudinal Control of an Aircraft Using a Fuzzy Logic Based PID Controller. 547-559 - Amit Kumar Sharma, Prabhjeet Kaur, Sanjay Kumar Anand:

Evaluation of Content Based Spam Filtering Using Data Mining Approach Applied on Text and Image Corpus. 561-577 - Bhawya Kumar, Rahul Vijay, Pankaj Shukla:

Comparison of Lattice Form Based and Direct Form Based Complex Adaptive Notch Filter. 579-588 - Lida Abdi, Sattar Hashemi

:
An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced Data. 589-600 - Minakshi Gogoi, Dhruba Kumar Bhattacharyya

:
Fusion of Fingerprint and Iris Biometrics Using Binary Ant Colony Optimization. 601-613 - Alok Kumar Prusty, Bibhudatta Sahoo

:
Efficient Resource Allocation Strategies for Video on Demand Services. 615-627 - Anupam Yadav

, Kusum Deep
:
A Novel Co-swarm Gravitational Search Algorithm for Constrained Optimization. 629-640 - Anupam Khanna, Narinder Kaur:

An Analytical Investigation on Thermally Induced Vibrations of Non-homogeneous Tapered Rectangular Plate. 641-652 - Arvind Kumar Shukla

, C. K. Jha, Vimal Kumar Mishra:
Building of a Competent Mobility Model for Ad Hoc Wireless Networks. 653-666 - Kamna Ashu

, Sanoj Kumar, Kanika Chawla:
Single Axis Position Control of a Precision Gimbal. 667-675 - Jitendra Agrawal, Shikha Agrawal

, Shilpy Kaur, Sanjeev Kumar Sharma
:
An Investigation of Fuzzy PSO and Fuzzy SVD Based RBF Neural Network for Multi-label Classification. 677-687 - Hrishikesh Dewan, Raksha B. Nayak, V. Susheela Devi:

A Peer-to-Peer Single Objective Particle Swarm Optimizer. 689-708 - Arpit Jain

, Shikha Agrawal
, Jitendra Agrawal, Sanjeev Kumar Sharma
:
F-FDRPSO: A Novel Approach Based on Hybridization of Fuzzy C-means and FDRPSO for Gene Clustering. 709-719 - Lakshmi Kanth Munganda, Alok Singh

:
Metaheuristic Approaches for Multiprocessor Scheduling. 721-731 - Shivi Agarwal:

Fuzzy Slack Based Measure of Data Envelopment Analysis: A Possibility Approach. 733-740 - G. S. Raghavendra, N. Prasanna Kumar:

Application of Ant Algorithm Variants to Single Track Railway Scheduling Problem. 741-753 - N. Prabhu, Manoj K. Arora, R. Balasubramanian, Kapil Gupta:

An ICA Mixture Model Based Approach for Sub-pixel Classification of Hyperspectral Data. 755-765 - Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Shekhar Verma

, Rajendra Singh Kushwah
:
Network Connectivity in VANETs. 767-775 - Harcharan Singh Pabla, Sukhdeep Singh, Niyati Gupta, Palak Makhija, Prabhjot Kaur, Gurpal Singh:

Proposal and Survey of Various Data Mining Aspects in Mobile Computing Environment. 777-784 - Divyesh Patel, Tanuja Srivastava

:
Ant Colony Optimization Model for Discrete Tomography Problems. 785-792 - Divya Sahgal

, Manoranjan Parida:
Object Recognition Using Gabor Wavelet Features with Various Classification Techniques. 793-804 - Manish Kant Dubey, Ram Ratan, Neelam Verma, Pramod Kumar Saxena:

Cryptanalytic Attacks and Countermeasures on RSA. 805-819 - Ram Ratan:

Applications of Genetic Algorithms in Cryptology. 821-831 - K. S. Gayathri

, Susan Elias, S. Shivashankar:
An Ontology and Pattern Clustering Approach for Activity Recognition in Smart Environments. 833-843 - Prem Kumar Singh

, Aswani Kumar Cherukuri:
A Note on Constructing Fuzzy Homomorphism Map for a Given Fuzzy Formal Context. 845-855 - Amrita Bhattacharjee, Bipul Syam Purkayastha:

Application of Ratio Property in Searching of M-Ambiguous Words and Its Generalization. 857-865 - S. R. Singh

, Anuradha:
Two Storage Inventory Model for Deteriorating Items Under Fuzzy Environment. 867-879 - Deepika Rani, T. R. Gulati:

Fuzzy Optimal Solution of Interval-Valued Fuzzy Transportation Problems. 881-888 - Ankit Vidyarthi

, Namita Mittal
:
Comparative Study for Brain Tumor Classification on MR/CT Images. 889-897 - Raghavendra Mishra

:
Anonymous Remote User Authentication and Key Agreement for Cloud Computing. 899-913 - Mohd. Zuhair

, Sonia Thomas
, Anup Kumar Keshri, Rakesh Kumar Sinha
, Kirat Pal, Dhrubes Biswas:
Automatic Identification of an Epileptic Spike Pattern in an EEG Signals Using ANN. 915-923

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














