LEADER 05885nam 22007935 450 001 9910482999103321 005 20200701153457.0 010 $a981-15-1275-2 024 7 $a10.1007/978-981-15-1275-9 035 $a(CKB)5310000000016555 035 $a(MiAaPQ)EBC6231470 035 $a(DE-He213)978-981-15-1275-9 035 $a(PPN)248596535 035 $a(EXLCZ)995310000000016555 100 $a20200618d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Computational Intelligence and Communication Technology $eProceedings of CICT 2019 /$fedited by Xiao-Zhi Gao, Shailesh Tiwari, Munesh C. Trivedi, Krishn K. Mishra 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (558 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v1086 311 $a981-15-1274-4 327 $aPart 1: Intelligent Computational Science -- Chapter 1. Influence of Wind Speed on Solar PV Plant Power Production - Prediction Model Using Decision Based Artificial Neural Network -- Chapter 2. Prediction of Compressive Strength of Ultra-High Performance Concrete using SFS and ANN -- Chapter 3. Classification of Plant Based on Leaf Images -- Chapter 4. Controller Optimization for Boiler Turbine Using Simulated Annealing and Genetic Algorithm -- Chapter 5. Indian Language Identification for Short Text -- Chapter 6. Improved Whale Optimization Algorithm for Numerical Optimization -- Chapter 7. A Matrix Based Approach for Evaluation of Vocal Renditions in Hindustani Classical Music -- Chapter 8. Performance Analysis of ML Algorithms on Speech Emotion Recognition -- Chapter 9. EEPMS: Energy Efficient Path Planning for Mobile Sink in Wireless Sensor Networks: A Genetic Algorithm based Approach -- Chapter 10. Mining Public Opinion on Plastic Ban in India. Chapter 11. Whale Neuro-Fuzzy System for Intrusion Detection in Wireless Sensor Network -- Part 2: Advanced Security Techniques -- Chapter 12. The Threat Detection Framework for Securing Semantic Web Services based on XACML -- Chapter 13. Real-Time Detection of Fake Account in Twitter using Machine Learning Approach -- Chapter 14. DPLOOP: Detection & Prevention of Loopholes in Web Application Security -- Chapter 15. Security Enhancement using Modified AES and Diffie-Hellman Key Exchange -- Chapter 16. Detection of Advanced Linux Malware using Machine Learning -- Chapter 17. Host-Server based Malware Detection System for Android Platforms Using Machine Learning.-Chapter 18. Identification of Windows based Malware by Dynamic Analysis using Machine Learning Algorithm -- Chapter 19. Secure E-mail Communications through Cryptographic Techniques ? A Study -- Chapter 20. Current trends in Cryptography, Steganography and Metamorphic Cryptography: A survey. 330 $aThis book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2019) organized by ABES Engineering College, Ghaziabad, India, and held from February 22 to 23, 2019. It includes the latest advances and research findings in fields of computational science and communication such as communication & networking, web & informatics, hardware and software designs, distributed & parallel processing, advanced software engineering, advanced database management systems and bioinformatics. As such, it is of interest to research scholars, students, and engineers around the globe. . 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v1086 606 $aComputational intelligence 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aElectrical engineering 606 $aElectronic circuits 606 $aBioinformatics 606 $aDatabase management 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aComputational Biology/Bioinformatics$3https://scigraph.springernature.com/ontologies/product-market-codes/I23050 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 615 0$aComputational intelligence. 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aElectrical engineering. 615 0$aElectronic circuits. 615 0$aBioinformatics. 615 0$aDatabase management. 615 14$aComputational Intelligence. 615 24$aSignal, Image and Speech Processing. 615 24$aCommunications Engineering, Networks. 615 24$aCircuits and Systems. 615 24$aComputational Biology/Bioinformatics. 615 24$aDatabase Management. 676 $a006.3 702 $aGao$b Xiao-Zhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTiwari$b Shailesh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTrivedi$b Munesh C$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMishra$b Krishn K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910482999103321 996 $aAdvances in Computational Intelligence and Communication Technology$92848882 997 $aUNINA