Advances in Computational Intelligence and Communication Technology : proceedings of CICT 2019 / Xiao-Zhi Gao, Shailesh Tiwari, Munesh C. Trivedi, Krishn K. Mishra, editors.

This book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2019) organized by ABES Engineering College, Ghaziabad, India, and held from February 22 to 23, 2019. It includes the latest advances and research finding...

Full description

Saved in:
Bibliographic Details
Corporate Author: International Conference on Computational intelligence and Communication Technology Ghāziabād, India
Other Authors: Gao, Xiao-Zhi, 1972-, Tiwari, Shailesh, Trivedi, Munesh Chandra, 1981-, Mishra, Krishn K.
Format: eBook
Language:English
Published: Singapore : Springer, [2021]
Series:Advances in intelligent systems and computing ; 1086.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Part I. Intelligent Computational Science
  • Influence of Wind Speed on Solar PV Plant Power Production-Prediction Model Using Decision-Based Artificial Neural Network
  • Classification of Plant Based on Leaf Images
  • Controller Optimization for Boiler Turbine Using Simulated Annealing and Genetic Algorithm
  • Indian Language Identification for Short Text
  • Improved Whale Optimization Algorithm for Numerical Optimization
  • A Matrix-Based Approach for Evaluation of Vocal Renditions in Hindustani Classical Music
  • Performance Analysis of ML Algorithms on Speech Emotion Recognition
  • EEPMS: Energy Efficient Path Planning for Mobile Sink in Wireless Sensor Networks: A Genetic Algorithm-Based Approach
  • Mining Public Opinion on Plastic Ban in India
  • Whale Neuro-fuzzy System for Intrusion Detection in Wireless Sensor Network
  • Part II. Advanced Security Techniques
  • The Threat Detection Framework for Securing Semantic Web Services Based on XACML
  • Real-Time Detection of Fake Account in Twitter Using Machine-Learning Approach
  • DPLOOP: Detection and Prevention of Loopholes in Web Application Security
  • Security Enhancement Using Modified AES and Diffie-Hellman Key Exchange
  • Detection of Advanced Linux Malware Using Machine Learning
  • Host-Server-Based Malware Detection System for Android Platforms Using Machine Learning
  • Identification of Windows-Based Malware by Dynamic Analysis Using Machine Learning Algorithm
  • Secure E-mail Communications Through Cryptographic Techniques---A Study
  • Current Trends in Cryptography, Steganography, and Metamorphic Cryptography: A Survey
  • Part III. Web and Informatics
  • Enhancement in Algorithmic Design for Scalability Measurement of Web Application
  • A Survey on Internet of Things (IoT): Layer-Specific, Domain-Specific and Industry-Defined Architectures
  • A Comparative Study of Deployment Tools from IoT Perspective
  • A Perspective of Missing Value Imputation Approaches
  • Advanced Deadline-Sensitive Scheduling Approaches in Cloud Computing
  • A Survey of Text Mining Approaches, Techniques, and Tools on Discharge Summaries
  • Smart Environmental Monitoring Based on IoT: Architecture, Issues, and Challenges
  • Wideband Band-stop Filter for C-Band and S-Band Applications Using Finite Integration in Time-Domain Technique
  • A Two-Step Technique for Effective Scheduling in Cloud-Fog Computing Paradigm
  • Design of a Drag and Touch Multilingual Universal CAPTCHA Challenge
  • Using Gaussian Mixtures on Triphone Acoustic Modelling-Based Punjabi Continuous Speech Recognition
  • Domain of Competency of Classifiers on Overlapping Complexity of Datasets Using Multi-label Classification with Meta-Learning
  • Part IV. Intelligent Hardware
  • Comparative Analysis of FOPID and Classical Controller Performance for an Industrial MIMO Process
  • Reduced-Order Modeling of Transient Power Grid Network with Improved Basis POD
  • Role of IoT and Big Data Support in Healthcare
  • Compendious and Succinct Data Structures for Big Data
  • Neural Network Techniques in Medical Image Processing
  • A Detection Tool for Code Bad Smells in Java Source Code
  • Performance Comparison of Graphene Terahertz Antenna and Copper Terahertz Antenna
  • Part V. Computer Graphics and Vision
  • A Review of Various State of Art Eye Gaze Estimation Techniques
  • Gabor Filter and ICA-Based Facial Expression Recognition Using Two-Layered Hidden Markov Model
  • FPGA Implementation of Modified Clipping Method for Impulsive Noise Cancellation
  • Autonomous Cars: Technical Challenges and a Solution to Blind Spot
  • Upper Half Face Recognition Using Hidden Markov Model and Singular Value Decomposition Coefficients
  • Comparison of Different Metaheuristic Algorithms for Multilevel Non-local Means 2D Histogram Thresholding Segmentation.