Springer, 2016. — 599.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.Volume 1 Part I Security Computer User Profiling Based on Keystroke Analysis Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73) On Preventing SQL Injection Attacks Securing Service in Remote Healthcare Part II Systems Biology Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network Liver Fibrosis Diagnosis Support System Using Machine Learning Methods Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules Part III Networking and Cloud Computing Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks The Design of Hierarchical Routing Protocol for Wireless Sensor Network Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks Part IV Data Analytics Context-Aware Graph-Based Visualized Clustering Approach (CAVCA) Materialized View Construction Using Linearizable Nonlinear RegressionVolume 2 Part I Signal Processing Design and Development of Marathi Speech Interface System Fusion-Based Noisy Image Segmentation Method An Approach for Automatic Indic Script Identification from Handwritten Document Images Writer Verification on Bangla Handwritten Characters Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT) Registration of Range Images Using a Novel Technique of Centroid Alignment Part II Software Engineering An Investigation into Effective Test Coverage Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN) A Study on Software Risk Management Strategies and Mapping with SDLC A New Service Discovery Approach for Community-Based Web Data-Flow Analysis-Based Approach of Database Watermarking A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development CAD-Based Analysis of Power Distribution Network for SOC Design Part III Algorithms A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus A Comprehensive Sudoku Instance Generator Implementing Software Transactional Memory Using STM Haskell Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming An Algorithm to Solve 3D Guard Zone Computation Problem Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS Anomaly Detection and Three Anomalous Coins Problem
Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.