You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First International Conference on Pattern Recognition and Machine Intelligence, PReMI 2005, held in Kolkata, India in December 2005. The 108 revised papers presented together with 6 keynote talks and 14 invited papers were carefully reviewed and selected from 250 submissions. The papers are organized in topical sections on clustering, feature selection and learning, classification, neural networks and applications, fuzzy logic and applications, optimization and representation, image processing and analysis, video processing and computer vision, image retrieval and data mining, bioinformatics application, Web intelligence and genetic algorithms, as well as rough sets, case-based reasoning and knowledge discovery.
This book constitutes the refereed proceedings of the 5th International Conference on Pattern Recognition and Machine Intelligence, PReMI 2013, held in Kolkata, India in December 2013. The 101 revised papers presented together with 9 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on pattern recognition; machine learning; image processing; speech and video processing; medical imaging; document image processing; soft computing; bioinformatics and computational biology; and social media mining.
This book examines the phenomenon of prime time soap operas on Indian television. An anthropological insight into social issues and practices of contemporary India through the television, this volume analyzes the production of soaps within India’s cultural fabric. It deconstructs themes and issues surrounding the "everyday" and the "middle class" through the fiction of the "popular". In its second edition, this still remains the only book to examine prime time soap operas on Indian television. Without in any way changing the central arguments of the first edition, it adds an essential introductory chapter tracking the tectonic shifts in the Indian "mediascape" over the past decade – incl...
The book takes a step-by-step approach to unfold the role of human resource analytics in human resource management (HRM) operative functions. The data-driven approach of the book helps the readers to relate human resource (HR) measures, predictions and prescriptions to HR issues such as controlling attrition, reducing HR cost, and improving workforce performance, among others. The outcomes of HR measures are further explored with visualization tools like Tableau and Power BI, revealing hidden patterns and interrelationships among variables. The book also covers the applications of machine learning tools in HR issues with relevant examples to derive critical and valuable insights to support HR strategies. Overall, this book demonstrates the usefulness of HR analytics in business managers’ ability to make data-driven workforce decisions.
The volume contains the papers presented at FICTA 2012: International Conference on Frontiers in Intelligent Computing: Theory and Applications held on December 22-23, 2012 in Bhubaneswar engineering College, Bhubaneswar, Odissa, India. It contains 86 papers contributed by authors from the globe. These research papers mainly focused on application of intelligent techniques which includes evolutionary computation techniques like genetic algorithm, particle swarm optimization techniques, teaching-learning based optimization etc for various engineering applications such as data mining, image processing, cloud computing, networking etc.
This book provides essential insights into a range of newly developed numerical optimization techniques with a view to solving real-world problems. Many of these problems can be modeled as nonlinear optimization problems, but due to their complex nature, it is not always possible to solve them using conventional optimization theory. Accordingly, the book discusses the design and applications of non-conventional numerical optimization techniques, including the design of benchmark functions and the implementation of these techniques to solve real-world optimization problems. The book’s twenty chapters examine various interesting research topics in this area, including: Pi fraction-based opti...
Utilizing a skill and ability-based competency approach can be used to develop both individuals and organizations. Whether the skills are developed through on-the-job training or trained through educational programs, to be proficient is to gain mastery in the defined area. These standards of proficiency separate the talented from those that have talent and utilize this talent. Competency-models, systematic integration, and application of competency-models are a focus in today’s work environment to remain competitive and to attract quality talent. Therefore, focusing on the identification of management skillsets and the alignment of competency-models with organizational goals to achieve int...
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.