Computational Intelligence in Data Mining-Volume 1: Proceedings Of The International Conference On Cidm, 5-6 December 20: Proceedings Of The Internati by Himansu Sekhar BeheraComputational Intelligence in Data Mining-Volume 1: Proceedings Of The International Conference On Cidm, 5-6 December 20: Proceedings Of The Internati by Himansu Sekhar Behera

Computational Intelligence in Data Mining-Volume 1: Proceedings Of The International Conference On…

byHimansu Sekhar BeheraEditorDurga Prasad Mohapatra

Paperback | December 9, 2015

Pricing and Purchase Info

$283.91 online 
$344.95 list price save 17%
Earn 1,420 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The book is a collection of high-quality peer-reviewed research papers presented in the Second International Conference on Computational Intelligence in Data Mining (ICCIDM 2015) held at Bhubaneswar, Odisha, India during 5 - 6 December 2015. The two-volume Proceedings address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.
Prof. Himansu Sekhar Behera is working as an Associate Professor in the Department of Computer Science Engineering & Information Technology, Veer Surendra Sai University of Technology (VSSUT) - An Unitary Technical University, Established by Govt. of Odisha, Burla, Odisha. He has received M.Tech in Computer Science & Engineering fr...
Loading
Title:Computational Intelligence in Data Mining-Volume 1: Proceedings Of The International Conference On…Format:PaperbackDimensions:494 pagesPublished:December 9, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:8132227328

ISBN - 13:9788132227328

Look for similar items by category:

Reviews

Table of Contents

Chapter 1. A Novel Approach for BiometricAuthentication System Using Ear, 2D Face and 3D Face Modalities.- Chapter 2.An Optimal Policy with Quadratic Demand,Time-Varying Quadratic Holding Cost and Partial Backlogging.- Chapter 3.A Novel Approach for Order Reduction of High Order DiscreteTime Systems Using Modified Routh Approximation Method via w-Domain.- Chapter 4.Pose Invariant Face Recognition for New Born:Machine Learning Approach.- Chapter5. Implementationof Data Analytics for MongoDB Using Trigger Utility.- Chapter 6.Heart Disease Prediction Using k-Nearest NeighbourClassifier Based on Handwritten Text .- Chapter 7. Optimizing a Higher Order Neural Network throughTeaching Learning Based Optimization Algorithm.- Chapter 8. Deploying a Social Web Graph over a Semantic WebFramework.- Chapter 9. Detectingand Analysing Invariant Groups in Complex Networks.- Chapter 10.Automatic Mucosa Detection in Video CapsuleEndoscopy with Adaptive Thresholding.- Chapter 11. Optimization Approach for Feature Selection andClassification with Support Vector Machine.- Chapter 12. Design and Development of Controller Software for MASReceiver Using Socket Programming.- Chapter13. Inference ofReplanting in Forest Fire Affected Land Using Data Mining Technique.- Chapter 14.A New Approach on Color Image Encryption UsingArnold 4D Cat Map.- Chapter 15. NeutrosophicLogic Based New Methodology to Handle Indeterminacy Data for Taking AccurateDecision.- Chapter 16. Prognosticationof Student's Performance: An Hierarchical Clustering Strategy for EducationalDataset.- Chapter 17. Design andImplementation ACO Based Edge Detection on the Fusion of Hue and PCA.- Chapter 18.Effective Sentimental Analysis & Opinion Miningof Web Reviews Using Rule Based Classifiers.- Chapter 19. Trigonometric Fourier Approximation of the ConjugateSeries of a Function of Generalized Lipchitz Class by Product Summability.- Chapter 20.Optimal Energy Efficient Path Selection Using VenusFlytrap Optimization Algorithm in MANET.- Chapter 21. Bi-clustering Using Venus Flytrap OptimizationAlgorithm.- Chapter 22. AnalyticalStructure of a Fuzzy Logic Controller for Software Development EffortEstimation.- Chapter 23. MalayalamSpell Checker Using N-Gram Method.- Chapter24. Sample ClassificationBased on Gene Subset Selection.- Chapter25. A MultiCriteria Document Clustering Approach Using Genetic Algorithm.- Chapter 26.Positive and Negative Association Rule Mining UsingCorrelation Threshold and Dual Confidence Approach.- Chapter 27.Extractive Text Summarization Using Lexical Associationand Graph Based Text Analysis.- Chapter28. Design ofLinear Phase FIR Band Stop Filter Using Fusion Based DEPSO Algorithm.- Chapter 29.A Survey on Face Detection and Person Re-identification.-Chapter 30. MachineTranslation of Telugu Singular Pronoun Inflections to Sanskrit.- Chapter 31.Tweet Analyzer: Identifying Interesting Tweets Basedon the Polarity of Tweets.- Chapter32. Face-Trackingto Detect Dynamic Target in Wireless Sensor Networks.- Chapter 33.Abnormal Gait Detection Using Lean and Ramp Angle Features.-Chapter 34. FuzzyLogic and AHP-based Ranking of Cloud Service Providers.- Chapter 35.Classification of Tabla Strokes Using NeuralNetwork.- Chapter 36. AutomaticHeadline Generation for News Article.- Chapter 37. Identifying Natural Communities in Social Networks UsingModularity Coupled with Self Organizing Maps.- Chapter 38. A Low ComplexityFLANN Architecture for Forecasting Stock Time Series Data Training withMeta-Heuristic Firefly Algorithm.- Chapter39. A Novel SchedulingAlgorithm for Cloud Computing Environment.- Chapter 40. PSO Based Tuning of a Integral and Proportional IntegralController for a Closed Loop Stand-alone Multi Wind Energy System.- Chapter 41.Statistically Validating Intrusion DetectionFramework against Selected DoS Attacks in Ad Hoc Networks: An NS-2 SimulationStudy.- Chapter 42. FourierFeatures for the Recognition of Ancient Kannada Text.- Chapter 43.A Spelling Mistake Correction (SMC) Model for ResolvingReal-word Error.- Chapter 44. DifferentialEvolution Based Tuning of Proportional Integral Controller for ModularMultilevel Converter STATCOM.- Chapter45. Designingof DPA Resistant Circuit Using Secure Differential Logic Gates.- Chapter 46.Efficient Algorithm for Web Search QueryReformulation Using Genetic Algorithm.- Chapter 47. Throughput of a Network Shared by TCP Reno and TCPVegas in Static Multi-hop Wireless Network.- Chapter 48. A Pronunciation Rule-based Speech SynthesisTechnique for Odia Numerals.