Artificial Intelligence and Evolutionary Computations in Engineering Systems : Proceedings of ICAIECES 2016

The volume is a collection of high-quality peer-reviewed research papers presented in the International Conference on Artificial Intelligence and Evolutionary Computation in Engineering Systems (ICAIECES 2016) held at SRM University, Chennai, Tamilnadu, India. This conference is an international for...

Full description

Saved in:
Bibliographic Details
Corporate Author International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems Chennai, India
Other Authors Dash, Subhransu Sekhar (Editor), Vijayakumar, K. (Editor), Panigrahi, Bijaya Ketan (Editor), Das, Swagatam (Editor)
Format Electronic eBook
LanguageEnglish
Published Singapore : Springer, 2017.
SeriesAdvances in intelligent systems and computing ; 517.
Subjects
Online AccessFull text
ISBN9789811031748
9789811031731
ISSN2194-5357 ;
Physical Description1 online resource (xv, 863 pages) : illustrations (some color)

Cover

Table of Contents:
  • Preface; About the Book; Contents; About the Editors; 1 Social Media Sentiment Polarity Analysis: A Novel Approach to Promote Business Performance and Consumer Decision-Making; Abstract; 1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Data Collection; 3.2 Preprocessing; 3.3 Support Vector Machine; 3.4 K-Means; 4 Experiments and Results; 4.1 Datasets; 4.2 Results and Discussion; 5 Conclusion and Future Work; References; 2 Detection of Incongruent Firewall Rules and Flow Rules in SDN; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Algorithm 1: Matrix Mapper.
  • 3.2 Description of Duo Lock Algorithm3.3 Transitive Adjacency Matrix (TA); 3.4 Algorithm 2: Duo Lock; 4 Conclusion; References; 3 An Attainment Upgrade in Audio Steganography; Abstract; 1 Introduction; 2 Related Work; 3 Problem Definition; 4 Proposed System; 4.1 Enhanced Hiding in Silence Interval; 4.2 RSA Algorithm with Three Prime Numbers; 5 Experimental Results; 5.1 Reformed RSA; 5.2 Enhance Hiding in Silence Interval; 6 Conclusion and Future Work; References; 4 A Comparative Study Between Hopfield Neural Network and A* Path Planning Algorithms for Mobile Robot; Abstract; 1 Introduction.
  • 2 Problem Definition2.1 Hopfield Network; 2.1.1 Path Planning; 2.2 A* Algorithm; 2.2.1 Path Finding; 2.2.2 Algorithm for Static Maze; 3 Simulation; 3.1 A* Algorithm; 3.2 Hopfield Neural Network; 4 Results and Discussion; 4.1 Hopfield for Static Mazes; 4.2 A* for Static Mazes; 5 Conclusion; References; 5 Vanishing Point Based Lane Departure Warning Using Template-Based Detection and Tracking of Lane Markers; Abstract; 1 Introduction; 2 Literature Review; 3 Proposed Method; 3.1 Preprocessing; 3.2 Template Matching; 3.3 Lane Detection; 3.3.1 Straight Lane Detection; 3.3.2 Curved Lane Detection.
  • 3.4 Lane Tracking3.5 Lane Departure Detection; 4 Results and Discussion; 5 Conclusion; References; 6 Destination Proposal System to Forecast Tourist Arrival Using Associative Classification; Abstract; 1 Introduction; 2 Literature Review; 3 Methodology; 3.1 Data Collection; 3.2 Preprocessing; 3.3 Association Rule Generation: CARGBA; 3.3.1 CARGBA Rule Generator; 3.3.2 CARGBA Classifier Builder; 4 Conclusion; References; 7 Analyzing the Impact of Software Design Patterns in Data Mining Application; Abstract; 1 Introduction; 2 Related Work; 3 Data Mining Architecture with Design Pattern.
  • 4 Impact of Design Patterns in Achieving the Quality Attributes of Data Mining Application5 Conclusion; Acknowledgments; References; 8 A Survey for Securing Online Payment Transaction Using Biometrics Authentication; Abstract; 1 Introduction; 2 Prior Research; 2.1 Multifactor Authentication; 2.2 Single Factor Authentication (Biometrics Features as a Standalone); 3 Related Work; 3.1 Biometrics or One-Time Password (OTP) in ATM; 3.2 Biometrics Face Recognition for ATM; 3.3 Biometrics Fingerprint for ATM; 3.4 Reliable Payment System in Nigeria.