Computational Intelligence, Cyber Security and Computational Models
Home > Computing and Information Technology > Computer security > Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)

Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)

|
     0     
5
4
3
2
1




International Edition


About the Book

This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

Table of Contents:
Part I_Keynote Address: 1. The game of Wall Cops and Robbers.- 2. Smartphone Applications, Malware and Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information and Networks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition.- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-task Learning.- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario.- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution.- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals.- Chapter 7. Suspicious Human Activity Detection in Classroom Examination.- Chapter 8. H ∞  State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach.- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References.- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain.- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set.- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques.- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services.- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach.- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays.- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms.- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features.- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission.- Chapter 19. An Efficient Approach for MapReduce Result Verification.- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding.- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease.- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System.- Chapter 23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis.- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine.- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme.- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems.- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix.- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques.- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing.- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM).- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping.- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection.- Chapter 44. Venus Flytrap Optimization.- Chapter 45. Zumkeller Cordial Labeling of Graphs.- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method.


Best Sellers


Product Details
  • ISBN-13: 9789811002502
  • Publisher: Springer Verlag, Singapore
  • Publisher Imprint: Springer Verlag, Singapore
  • Height: 235 mm
  • No of Pages: 586
  • Returnable: Y
  • Sub Title: Proceedings of ICC3 2015
  • ISBN-10: 9811002509
  • Publisher Date: 27 Jan 2016
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Series Title: 412 Advances in Intelligent Systems and Computing
  • Width: 155 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

     0     
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
     0     
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)
    Springer Verlag, Singapore -
    Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015(412 Advances in Intelligent Systems and Computing)

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals

      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!