Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 / edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten.

This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Senthilkumar, Muthukrishnan (Editor), Ramasamy, Vijayalakshmi (Editor), Sheen, Shina (Editor), Veeramani, C. (Editor), Bonato, Anthony (Editor), Batten, Lynn (Editor)
Format: eBook
Language:English
Published: Singapore : Springer Singapore : Imprint: Springer, 2016.
Edition:1st ed. 2016.
Series:Advances in Intelligent Systems and Computing, 412
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3259898
003 MWH
005 20191022001613.0
007 cr nn 008mamaa
008 151218s2016 si | s |||| 0|eng d
020 |a 9789811002519 
024 7 |a 10.1007/978-981-10-0251-9  |2 doi 
035 |a (DE-He213)978-981-10-0251-9 
050 4 |a E-Book 
072 7 |a UYQ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
245 1 0 |a Computational Intelligence, Cyber Security and Computational Models  |h [electronic resource] :  |b Proceedings of ICC3 2015 /  |c edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten. 
250 |a 1st ed. 2016. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2016. 
300 |a XVI, 586 p. 224 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Intelligent Systems and Computing,  |x 2194-5357 ;  |v 412 
490 1 |a Springer eBook Collection 
505 0 |a Part I_Keynote Address: 1. The game of Wall Cops and Robbers -- 2. Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition -- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique -- Chapter 3. Kernel Online Multi-task Learning -- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario -- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution -- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals -- Chapter 7. Suspicious Human Activity Detection in Classroom Examination -- Chapter 8. H ∞ State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach -- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References -- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain -- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set -- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques -- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services -- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach -- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays -- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms -- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features -- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission -- Chapter 19. An Efficient Approach for MapReduce Result Verification -- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System -- Chapter 23. Human Gait Recognition Using Fuzzy Logic -- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis -- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine -- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine -- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme -- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems -- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix -- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers -- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation -- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions -- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques -- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication -- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes -- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management -- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks -- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing -- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM) -- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping -- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model -- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection -- Chapter 44. Venus Flytrap Optimization -- Chapter 45. Zumkeller Cordial Labeling of Graphs -- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments -- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation -- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process -- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method. 
520 |a This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computational intelligence. 
650 0 |a Computer security. 
650 0 |a Computer science—Mathematics. 
650 0 |a Computer mathematics. 
650 0 |a Artificial intelligence. 
690 |a Electronic resources (E-books) 
700 1 |a Senthilkumar, Muthukrishnan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ramasamy, Vijayalakshmi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sheen, Shina.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Veeramani, C.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Bonato, Anthony.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Batten, Lynn.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Advances in Intelligent Systems and Computing,  |x 2194-5357 ;  |v 412 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-981-10-0251-9  |3 Click to view e-book  |t 0 
907 |a .b32598981  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g si   |h 0  |i 1 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i2173060x  |z 02-26-20 
999 f f |i 4736b636-72c2-5c97-b411-d060a4ddbe96  |s 49326fad-3d9f-5fec-ac11-cf89c061bc75  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File