Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2

Published on: 2014-10-31
Page Count: 805 pages
Print Type: BOOK
Maturity Rating: NOT_MATURE
Language: en
Embeddable: Yes
PDF Available: Yes
EPUB Available: No
ISBN-13: 9783319120126
ISBN-10: 3319120123
Volume 2 Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal. [5]. Xiang Wang, Qiang Zhang [6], demonstrated RSA algorithm using public-key cryptography DNA sequence as keys. This paper focuses on generating ...

Related books - Readers Also Liked

Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2

Volume 2 Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal. [5]. Xiang Wang, Qiang Zhang [6], demonstrated RSA algorithm using public-key cryptography DNA sequence as keys. This paper focuses on generating ...

Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013

... face space, its vector into the face space describe the importance of each of those features in the face. The face is expressed in the face space by its eigenface coefficients (or weights), Can handle a large input vector, facial image ...

Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)

... (ROI). Many techniques have been proposed in literature for quality ... used as an objective evaluation index for edge maps of synthetic images ... most important information in any image. The reliability of reconstruction estimation ...

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

... password recover facility to the registered user. Fig. 2 Forgot password recovery process Fig. 3 Smart card revocation process 2.5 Smart Card Revocation. Secure Remote Login Scheme ... 499 2.4 Forgot Password Recover Process.

Intelligent Data Engineering and Analytics: Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023)

... Twofish Algorithm Twofish is a symmetric tablet cipher , this is for AES state organization of ideals and skill ... Encryption Private Key of Two Fish Key RSA algorithm Cipher text of two fish key Fig . 42.1 Block diagram of proposed ...

Intelligent Data Engineering and Analytics: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021)

... fluentin3months.com/learn-a-song/ 3. Karimi, S., Scholer, F., Turpin, A.: Machine transliteration survey. ACM Comput. Surv. 43(3) 2011. https://doi.org/10.1145/1922649.1922654 4. Antony, P., Soman, K..: Machine transliteration for ...

Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 1

... Bao Le Nguyen, Nhu Gia Nguyen, Dac-Nhuong Le. Intuition-Based Autonomous Vehicle System ..................... 89 ... Hung Le, and Thi-Thu-Huyen Tran A Proposal of Expert System Using Deep Learning Neural Networks and Fuzzy Rules for ...

Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 2

... Nguyen, Nhu Gia Nguyen, Dac-Nhuong Le. Contents. Digital Signature Algorithms Based on Hidden Discrete Logarithm ... Hieu Minh Nguyen A Research for Reconstructing 3D Object by Using an RGB-D Camera ...

Intelligent Computing in Smart Grid and Electrical Vehicles: International Conference on Life System Modeling and Simulation, LSMS 2014 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2014, Shanghai, China, September 2014, Proceedings, Part III

... HP heater in, coal pulverizing system in, fuel mode selection, circulating ... simulator, V-DPU in APS needs control strategy to realize its logical ... virtual DCS appeared in 1960s. It is a combination between simulation technology and ...

Informatics, Networking and Intelligent Computing: Proceedings of the 2014 International Conference on Informatics, Networking and Intelligent Computing (INIC 2014), 16-17 November 2014, Shenzhen, China

... Nepf, 2002, Nezu & Onitsuka, 2001, Finnigan, 2000) which develop into roller vortices which dominate the turbulent kinetic energy budget (Nepf ... standard drag equation (Equation 1). F CAu D D F C F fA 1 22C (1) This equation relates the ...

Evolution in Computational Intelligence: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021)

... Cancer. World Health Organization. https://www.who.int/health-topics/cancer#tab=tab_1. Accessed July 06, 2020 2. Tschandl, P., Rosendahl, C., Kittler, H.: Data descriptor: The HAM10000 dataset, a large collection of multi-source ...

Evolution in Computational Intelligence: Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022)

... CVoter survey January UP assembly election 2022 opinion polls vote share seat sharing KBM BJP SP BSP Congress (2022 Jan 29). Retrieved 17 Apr 2022 from https://tinyurl. com/2p8swu64 Chapter 30 Open - World Machine Learning for Unknown ...

Bắc Giang thế và lực mới trong thế kỷ XXI

... điền , đổi thửa , tạo điều kiện cơ giới hoá sản xuất , đồng thời thực hiện ... hành tiết kiệm chi tiêu , tập trung ngân sách hỗ trợ cho việc khôi phục và ... văn hoá thể thao , giáo dục , đào tạo ... nhằm cung cấp nguồn lao động có chất ...

Advances in Computing Science – ASIAN 2002: Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster Computing: 7th Asian Computing Science Conference, Hanoi, Vietnam, December 4-6, 2002, Proceedings

7th Asian Computing Science Conference, Hanoi, Vietnam, December 4-6, 2002 ... Computer Science and Electronics, Kyushu Institute of Technology, Iizuka ... Internet should provide Quality of Service(QoS) required by each traffic as ...

Intelligent Computing and Optimization: Proceedings of the 3rd International Conference on Intelligent Computing and Optimization 2020 (ICO 2020)

... bootstrap/dist/css/bootstrap. css' from package.json. Users can play around ... cheat sheet. class App extends Component { componentWillMount() { this ... 4. The result command-line from Fig. 3. Laboratory-Scale Implementation of Ethereum ...

Web Information Systems Engineering – WISE 2014 Workshops: 15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers

... Facebook Login and the Graph API. The Facebook Login allows our application to link the Facebook user account ... free, open-source ontology editor and a framework written in Java that ... free, open-source Java framework that provides all the ...

Intelligent Computing and Internet of Things: First International Conference on Intelligent Manufacturing and Internet of Things and 5th International Conference on Computing for Sustainable Energy and Environment, IMIOT and ICSEE 2018, Chongqing, China, September 21-23, 2018, Proceedings, Part II

First International Conference on Intelligent Manufacturing and Internet of Things and 5th International Conference on ... Weiqi I-257 Liu, Wen I-484, I-494 Liu, Xiaohui III-173 Liu, Xiaojun I-22 Liu, Xuan III-201 Liu, Ying I-363, II-99 ...

Life System Modeling and Intelligent Computing: International Conference on Life System Modeling and Simulation, LSMS 2010, and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2010, Wuxi, China, September 17-20, 2010, Proceedings, Part II

... neighbor classification. IEEE Trans. Pattern Anal. Machine Intell. 24(9), 1281–1285 (2002) 7. Karl, S.N., Truong, Q.N.: An Adaptable k-Nearest Neighbors Algorithm for MMSE Image Interpolation. IEEE Trans. Image Processing. 18(9), 1976 ...

Advanced Intelligent Computing Theories and Applications - With Aspects of Theoretical and Methodological Issues: Third International Conference on Intelligent Computing, ICIC 2007 Qingdao, China, August 21-24, 2007 Proceedings

... default level that enterprises could accept ruin probability [8]. The desired total loss amount is the maximum economic impact that an enterprise asks for. EP percentile shows default probability or value at risk. The probability ...

Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence: Fourth International Conference on Intelligent Computing, ICIC 2008 Shanghai, China, September 15-18, 2008, Proceedings

... ihxy xy q tG t β= (1) where α and β are constants. According to the conductance based integrate-and-fire model [20-21], neuron N1 is governed by the following equations. 1_ ( , ) 1_ (,) , () 1 () (). N exx y N ex xy x y dg t g t G t dt ...

Advanced Intelligent Computing. Theories and Applications: 6th International Conference on Intelligent Computing, Changsha, China, August 18-21, 2010. Proceedings

... definition of SSD, classification of SSD and typical SSD list. For the definition and classification of SSD are the preparation for typical SSD list and even database. Our defects ... character of web applications, the defects list is usually ...

Advanced Intelligent Computing Theories and Applications: 6th International Conference on Intelligent Computing, ICIC 2010, Changsha, China, August 18-21, 2010, Proceedings

... Formato, R.A.: Central Force Optimisation: A New Gradient-Like Metaheuristic for Multidimensional Search and Optimisation. Int. J. Bio-Inspired Computation 1, 217–238 (2009) 4. Formato, R.A.: Central Force Optimization: A New ...

Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence: Fourth International Conference on Intelligent Computing, ICIC 2008 Shanghai, China, September 15-18, 2008, Proceedings

... excitatory synapse without delay and through inhibitory synapse with an axonal delay ∆t. Similarly, the neuron Nr(x, y) is also connected to N2(x, y) through excitatory synapse with an axonal delay∆t and through ceptor Nr(x ...

Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), Wuhan, China, December 24-25, 2014

... abstractions in C++ are extremely general because they are symbolic. For the programming using C++, the abstraction is the modelling process, during which the symbols in C++ are used to describe the system ... C++ programming language.

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.