Computational intelligence, cyber security and computational models : models and techniques for intelligent systems and automation : third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings /: models and techniques for intelligent systems and automation : third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Computational intelligence, cyber security and computational models : models and techniques for intelligent systems and automation : third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings /: models and techniques for intelligent systems and automation : third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings. (2018)
- Main Title:
- Computational intelligence, cyber security and computational models : models and techniques for intelligent systems and automation : third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings
- Other Titles:
- ICC3 2017
- Further Information:
- Note: Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan (eds.).
- Editors:
- Ganapathi, Geetha
Subramaniam, Arumugam
Graña, Manuel
Balusamy, Suresh
Natarajan, Rajamanickam
Ramanathan, Periakaruppan - Other Names:
- International Conference on Computational Intelligence, Cyber Security, and Computational Models, 3rd
- Contents:
- A Short Review of Recent ELM Applications.- Critical Feature Selection and Critical Sampling for Data Mining.- From Recognition to Generation using Deep Learning: A Case Study with Video Generation.- Economic Dispatch Problem using Clustered Firefly.- Algorithm for Wind Thermal Power System.- A Novel and Efficient Multi-Hop Routing Algorithm for Manet.- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm.- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images.- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks.- Frequent Sequence Mining Approach to Video Compression.- Deep Learning based Audio Scene Classification.- Cyber Security.- Certain Challenges in Biometrics System Development.- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks.- Computational Models.- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears.- Violation Resolution in Distributed Stream Networks.- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience.- Hyers-Ulam Stability of Linear Differential Equations.- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure.- Mathematical Modelling andA Short Review of Recent ELM Applications.- Critical Feature Selection and Critical Sampling for Data Mining.- From Recognition to Generation using Deep Learning: A Case Study with Video Generation.- Economic Dispatch Problem using Clustered Firefly.- Algorithm for Wind Thermal Power System.- A Novel and Efficient Multi-Hop Routing Algorithm for Manet.- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm.- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images.- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks.- Frequent Sequence Mining Approach to Video Compression.- Deep Learning based Audio Scene Classification.- Cyber Security.- Certain Challenges in Biometrics System Development.- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks.- Computational Models.- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears.- Violation Resolution in Distributed Stream Networks.- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience.- Hyers-Ulam Stability of Linear Differential Equations.- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure.- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers.- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption.- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative.- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xii, 255 pages), illustrations
- Subjects:
- 006.3
Computer science
Computational intelligence -- Congresses
Computer security -- Congresses
Computers -- Intelligence (AI) & Semantics
Computers -- Computer Graphics
Computers -- Data Processing
Artificial intelligence
Image processing
Mathematical theory of computation
Computers -- Security -- General
Computer security
Data protection
Engineering
Artificial intelligence
Computer vision
Electronic books - Languages:
- English
- ISBNs:
- 9789811307164
9811307164 - Related ISBNs:
- 9789811307157
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 21, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.328813
- Ingest File:
- 01_270.xml