Yüklüyor…
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Theories...
Müşterek Yazar: | |
---|---|
Diğer Yazarlar: | , , , , |
Materyal Türü: | e-Kitap |
Dil: | İngilizce |
Baskı/Yayın Bilgisi: |
Singapore :
Springer Nature Singapore :
2018.
Imprint: Springer, |
Edisyon: | 1st ed. 2018. |
Seri Bilgileri: | Advances in Intelligent Systems and Computing,
584 |
Konular: | |
Online Erişim: | Full-text access |
İçindekiler:
- Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks
- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach
- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques
- Software Cost Estimation Using Artificial Neural Network
- A Three Layer Approach for Overlay Text Extraction in Video Stream
- Recognition of Noisy Numbers Using Neural Network
- Secure Group Authentication Scheme for LTE-Advanced
- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye
- Trigonometric Probability Tuning in Asynchronous Differential Evolution
- Analytical review on Image Compression using Fractal Image Coding
- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature
- Improved Clustering Algorithm for Wireless Sensor Network
- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil
- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays
- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study
- Threat Detection for Software Vulnerability using DE based Adaptive Approach
- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm
- Revisiting Requirements Analysis Techniques and Challenges
- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language
- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework
- Addressing Security concerns for Infrastructure of Cloud Computing.