×







We sell 100% Genuine & New Books only!

Computational Intelligence Cyber Security and Computational Models Proceedings of ICC3 2015 at Meripustak

Computational Intelligence Cyber Security and Computational Models Proceedings of ICC3 2015 by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy , Springer

Books from same Author: Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 59032.00/- [ 7.00% off ]

    Seller Price: ₹ 54899.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

General Information  
Author(s)Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy
PublisherSpringer
ISBN9789811002502
Pages586
BindingPaperback
LanguageEnglish
Publish YearJanuary 2016

Description

Springer Computational Intelligence Cyber Security and Computational Models Proceedings of ICC3 2015 by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy

This book_x000D_aims at promoting high-quality research by researchers and practitioners from_x000D_academia and industry at the International_x000D_Conference on Computational Intelligence, Cyber Security, and Computational_x000D_Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India_x000D_during December 17 - 19, 2015. This book enriches with innovations in broad_x000D_areas of research like computational modeling, computational intelligence and_x000D_cyber security. These emerging inter disciplinary research areas have helped to_x000D_solve multifaceted problems and gained lot of attention in recent years. This_x000D_encompasses theory and applications, to provide design, analysis and modeling_x000D_of the aforementioned key areas._x000D_ Table of contents : - _x000D_ Part I_Keynote Address: 1. The game of Wall Cops and Robbers.-_x000D_ 2. Smartphone Applications, Malware_x000D_ and Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information and_x000D_ Networks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC_x000D_ features for Speaker Recognition.- Chapter 2. Single-pixel Based Double_x000D_ Random-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-task_x000D_ Learning.- Chapter 4. Performance Evaluation of Sentiment_x000D_ Classification Using Query Strategies in a Pool Based Active Learning Scenario.-_x000D_ Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks_x000D_ with Homogeneous Feature Distribution.- Chapter_x000D_ 6. Performance Analysis of ApEn as_x000D_ a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer_x000D_ Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels_x000D_ from EEG Signals.- Chapter 7._x000D_ Suspicious Human Activity Detection in_x000D_ Classroom Examination.- Chapter 8. H _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ _x000D_ State_x000D_ Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements_x000D_ Using Second Order Reciprocal Convex Approach.- Chapter 9. A Fuzzy_x000D_ Methodology for Clustering Text Documents with Uncertain Spatial References.- Chapter_x000D_ 10. A Novel Feature Extraction Algorithm from_x000D_ Fingerprint Image in Wavelet Domain.- Chapter 11. Motor_x000D_ imagery Classification Based on Variable Precision Multigranulation Rough Set.-_x000D_ Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary_x000D_ Techniques.- Chapter 13. A Two Phase Approach for Efficient Clustering_x000D_ of Web Services.- Chapter 14. Elimination of Redundant Association Rules_x000D_ - An Efficient Linear Approach.- Chapter 15. Clustering Techniques from_x000D_ Significance Analysis of Microarrays.- Chapter 16. Breast Region_x000D_ Extraction and Pectoral Removal by Pixel Constancy Constraint approach in_x000D_ Mammograms.- Chapter 17. Bridging the Semantic Gap in Image Search via_x000D_ Visual Semantic Descriptors by Integrating Text and Visual Features.- Chapter_x000D_ 18. Adaptive Equalization Algorithm for Electrocardiogram Signal_x000D_ Transmission.- Chapter 19. An Efficient Approach for MapReduce_x000D_ Result Verification.- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary_x000D_ Computing Based Error Correction Coding.- Chapter 21. Comparison of_x000D_ Machine Learning Techniques for the Identification of the Stages of Parkinson's_x000D_ Disease.- Chapter 22. Security Constrained Unit Commitment Problem Employing_x000D_ Artificial Computational Intelligence for Wind-thermal Power System.- Chapter_x000D_ 23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detection_x000D_ and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram_x000D_ Sequences Analysis.- Chapter 25. An Elitist Genetic Algorithm Based_x000D_ Extreme Learning Machine.- Chapter 26._x000D_ Formulation and Enhancement of User Adaptive_x000D_ Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server_x000D_ Authenticated Key Agreement Scheme.- Chapter_x000D_ 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion_x000D_ Detection Systems.- Chapter 29._x000D_ Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on_x000D_ Perfect Reconstruction of White Pixels and Additional Basis Matrix.-_x000D_ Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring_x000D_ Accountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. Decrypting_x000D_ Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme_x000D_ with XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and_x000D_ Steganography Techniques.- Chapter 35. K_x000D_ out of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in_x000D_ Military Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter_x000D_ 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key_x000D_ Management.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of_x000D_ Data in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage_x000D_ in Cloud Computing.- Part IV_Computational Models: Chapter 40. A Study on Building_x000D_ Seamless Communication Among Vehicles in Vanet Using the Integrated Agent_x000D_ Communication Model (IACM).- Chapter 41._x000D_ A Hybrid Approach for Data Hiding_x000D_ through Chaos Theory and Reversible Integer Mapping.-_x000D_ Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Tool_x000D_ for optimizing the Number of Test Paths in Data Flow Testing for Anomaly_x000D_ Detection.- Chapter 44. Venus Flytrap_x000D_ Optimization.- Chapter 45._x000D_ Zumkeller Cordial_x000D_ Labeling of Graphs.- Chapter_x000D_ 46. Cuckoo Based_x000D_ Resource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysis_x000D_ of an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter Based_x000D_ Internal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method for_x000D_ Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance_x000D_ Property and Oddment Method._x000D_



Book Successfully Added To Your Cart