Soft computing : theories and applications : proceedings of SoCTA 2016. Volume 2 / Millie Pant, Kanad Ray, Tarun K. Sharma, Sanyog Rawat, Anirban Bandyopadhyay, editors.
This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Theories...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , , , |
Other title: | SoCTA 2016. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Singapore :
Springer,
[2018]
|
Series: | Advances in intelligent systems and computing ;
584. |
Subjects: |
Table of Contents:
- Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks
- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach
- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques
- Software Cost Estimation Using Artificial Neural Network
- A Three Layer Approach for Overlay Text Extraction in Video Stream
- Recognition of Noisy Numbers Using Neural Network
- Secure Group Authentication Scheme for LTE-Advanced
- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye
- Trigonometric Probability Tuning in Asynchronous Differential Evolution
- Analytical review on Image Compression using Fractal Image Coding
- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body’s peripheral temperature
- Improved Clustering Algorithm for Wireless Sensor Network
- Fuzzy based probabilistic ecological risk assessment approach: A case study of heavy metal contaminated soil
- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays
- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study
- Threat Detection for Software Vulnerability using DE based Adaptive Approach
- Methods to choose the ‘Best-fit’ Patch in Patch-Based Texture Synthesis Algorithm
- Revisiting Requirements Analysis Techniques and Challenges
- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language
- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework
- Addressing Security concerns for Infrastructure of Cloud Computing.