Description
Springer Computational Intelligence Cyber Security and Computational Models Proceedings of ICC3 2015 by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy
This book_x000D_aims at promoting high-quality research by researchers and practitioners from_x000D_academia and industry at the International_x000D_Conference on Computational Intelligence, Cyber Security, and Computational_x000D_Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India_x000D_during December 17 - 19, 2015. This book enriches with innovations in broad_x000D_areas of research like computational modeling, computational intelligence and_x000D_cyber security. These emerging inter disciplinary research areas have helped to_x000D_solve multifaceted problems and gained lot of attention in recent years. This_x000D_encompasses theory and applications, to provide design, analysis and modeling_x000D_of the aforementioned key areas._x000D_ Table of contents : - _x000D_
Part I_Keynote Address: 1. The game of Wall Cops and Robbers.-_x000D_
2. Smartphone Applications, Malware_x000D_
and Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information and_x000D_
Networks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC_x000D_
features for Speaker Recognition.- Chapter 2. Single-pixel Based Double_x000D_
Random-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-task_x000D_
Learning.- Chapter 4. Performance Evaluation of Sentiment_x000D_
Classification Using Query Strategies in a Pool Based Active Learning Scenario.-_x000D_
Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks_x000D_
with Homogeneous Feature Distribution.- Chapter_x000D_
6. Performance Analysis of ApEn as_x000D_
a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer_x000D_
Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels_x000D_
from EEG Signals.- Chapter 7._x000D_
Suspicious Human Activity Detection in_x000D_
Classroom Examination.- Chapter 8. H _x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
_x000D_
State_x000D_
Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements_x000D_
Using Second Order Reciprocal Convex Approach.- Chapter 9. A Fuzzy_x000D_
Methodology for Clustering Text Documents with Uncertain Spatial References.- Chapter_x000D_
10. A Novel Feature Extraction Algorithm from_x000D_
Fingerprint Image in Wavelet Domain.- Chapter 11. Motor_x000D_
imagery Classification Based on Variable Precision Multigranulation Rough Set.-_x000D_
Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary_x000D_
Techniques.- Chapter 13. A Two Phase Approach for Efficient Clustering_x000D_
of Web Services.- Chapter 14. Elimination of Redundant Association Rules_x000D_
- An Efficient Linear Approach.- Chapter 15. Clustering Techniques from_x000D_
Significance Analysis of Microarrays.- Chapter 16. Breast Region_x000D_
Extraction and Pectoral Removal by Pixel Constancy Constraint approach in_x000D_
Mammograms.- Chapter 17. Bridging the Semantic Gap in Image Search via_x000D_
Visual Semantic Descriptors by Integrating Text and Visual Features.- Chapter_x000D_
18. Adaptive Equalization Algorithm for Electrocardiogram Signal_x000D_
Transmission.- Chapter 19. An Efficient Approach for MapReduce_x000D_
Result Verification.- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary_x000D_
Computing Based Error Correction Coding.- Chapter 21. Comparison of_x000D_
Machine Learning Techniques for the Identification of the Stages of Parkinson's_x000D_
Disease.- Chapter 22. Security Constrained Unit Commitment Problem Employing_x000D_
Artificial Computational Intelligence for Wind-thermal Power System.- Chapter_x000D_
23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detection_x000D_
and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram_x000D_
Sequences Analysis.- Chapter 25. An Elitist Genetic Algorithm Based_x000D_
Extreme Learning Machine.- Chapter 26._x000D_
Formulation and Enhancement of User Adaptive_x000D_
Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server_x000D_
Authenticated Key Agreement Scheme.- Chapter_x000D_
28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion_x000D_
Detection Systems.- Chapter 29._x000D_
Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on_x000D_
Perfect Reconstruction of White Pixels and Additional Basis Matrix.-_x000D_
Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring_x000D_
Accountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. Decrypting_x000D_
Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme_x000D_
with XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and_x000D_
Steganography Techniques.- Chapter 35. K_x000D_
out of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in_x000D_
Military Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter_x000D_
37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key_x000D_
Management.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of_x000D_
Data in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage_x000D_
in Cloud Computing.- Part IV_Computational Models: Chapter 40. A Study on Building_x000D_
Seamless Communication Among Vehicles in Vanet Using the Integrated Agent_x000D_
Communication Model (IACM).- Chapter 41._x000D_
A Hybrid Approach for Data Hiding_x000D_
through Chaos Theory and Reversible Integer Mapping.-_x000D_
Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Tool_x000D_
for optimizing the Number of Test Paths in Data Flow Testing for Anomaly_x000D_
Detection.- Chapter 44. Venus Flytrap_x000D_
Optimization.- Chapter 45._x000D_
Zumkeller Cordial_x000D_
Labeling of Graphs.- Chapter_x000D_
46. Cuckoo Based_x000D_
Resource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysis_x000D_
of an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter Based_x000D_
Internal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method for_x000D_
Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance_x000D_
Property and Oddment Method._x000D_