Proceedings of 2nd International Conference on Intelligent Computing and Applications : ICICA 2015

Second International Conference on Intelligent Computing and Applications was the annual research conference aimed to bring together researchers around the world to exchange research results and address open issues in all aspects of Intelligent Computing and Applications. The main objective of the s...

Full description

Saved in:
Bibliographic Details
Corporate Author International Conference on Intelligent Computing and Applications Chennai, India
Other Authors Sundari, P. Deiva (Editor), Dash, Subhransu Sekhar (Editor), Das, Swagatam (Editor), Panigrahi, Bijaya Ketan (Editor)
Format Electronic eBook
LanguageEnglish
Published Singapore : Springer, [2016]
SeriesAdvances in intelligent systems and computing ; v. 467.
Subjects
Online AccessFull text
ISBN9789811016455
9789811016448
Physical Description1 online resource

Cover

Table of Contents:
  • Preface; Contents; About the Editors; 1 Time-Domain Analytical Modeling of Current-Mode Signaling Bundled Single-Wall Carbon Nanotube Interconnects; Abstract; 1 Introduction; 2 Model of Current Mode Signaling Interconnect System; 3 Analytical Model Formulation; 4 Results and Discussion; 4.1 Transient Analysis; 4.2 Propagation Delay Evaluation for CMS SWCNT Bundle and Copper Interconnects; 4.3 Performance Assessment with Variation in Diameter of Individual SWCNTs in a Bundle Interconnect; 5 Conclusion; References; 2 Stability Analysis of Carbon Nanotube Interconnects; Abstract; 1 Introduction.
  • 2 Interconnect Model3 Stability Analysis of SWB and MWB Interconnects; 4 Results and Discussion; 4.1 Stability Analysis; 4.2 Frequency Analysis; 4.3 Delay Analysis; 5 Conclusion; Appendix; References; 3 Multi-robot Assembling Along a Boundary of a Given Region in Presence of Opaque Line Obstacles; Abstract; 1 Introduction; 2 Problem Definition, Assumptions and Models; 3 Assembling Algorithm; 3.1 Algorithm ASSEMBLE; 4 Conclusion and Future Work; References; 4 An Approach to Identify Data Leakage in Secure Communication; Abstract; 1 Introduction; 2 Data Leakage Overview.
  • 2.1 Facebook Application3 Background Study; 4 Proposed Approach; 4.1 Handshake Mechanism; 4.2 Light Weight Cryptography (LWC); 4.3 Fake Objects; 4.4 Agent Guilt Model; 5 Results and Discussion; 6 Discussion and Future Work; References; 5 Quality of Service of Traffic Prediction Mechanism in WiMAX Network Using RBFNN and RSM; Abstract; 1 Introduction; 2 Problem Formulation; 3 Methodology; 3.1 Response Surface Methodology; 3.2 Radial Basis Function Neural Network; 3.2.1 Input Layer; 3.2.2 Hidden Layer; 3.2.3 Output Layer; 4 Results and Discussion; 4.1 Dataset Generation; 4.2 CBR Based Traffic.
  • 4.2.1 Response Surface Methodology4.2.2 Radial Basis Function Neural Network; 4.3 File Transfer Applications; 4.3.1 Response Surface Methodology; 4.3.2 Radial Basis Function Neural Network; 5 Conclusion; Acknowledgment; References; 6 Dissimilar Regulatory Actions Between Neurodegenerative Disease Pairs Through Probablistic Differential Correlation; Abstract; 1 Introduction; 2 Methodology; 2.1 Formation of Disease Pairs; 2.2 Disease Set Formation and LLR Calculation; 2.3 Evaluation of Maximally Differential Regulated Genes; 3 Results and Discussion; 4 Conclusion and Future Work; References.
  • 7 Multiobjective Ranked Selection of Differentially Expressed GenesAbstract; 1 Introduction; 2 Methodology; 2.1 Ranksum Test; 2.2 Activity Score (AS); 2.3 Gene Set Enrichment Analysis (GSEA); 2.4 TOP Based Analysis; 2.5 Non-dominated Gene Set; 2.6 Significant Non-dominated Gene Set; 3 Results; 3.1 Significant Non-dominated Gene Set; 3.1.1 Correlation; 3.1.2 Polynomial Regression; 3.1.3 Mutual Information; 3.1.4 DEGseq; 4 Discussion; 5 Conclusion and Future Work; References; 8 A Rule Based Approach for Connective in Malayalam Language; Abstract; 1 Introduction; 2 Related Work.