Восстановить пароль
FAQ по входу

Chaki R., Cortesi A., Saeed K., Chaki Т. (eds.) Advanced Computing and Systems for Security

  • Файл формата pdf
  • размером 14,66 МБ
  • Добавлен пользователем
  • Отредактирован
Chaki R., Cortesi A., Saeed K., Chaki Т. (eds.) Advanced Computing and Systems for Security
Springer, 2016. — 599.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
Volume 1
Part I Security
Computer User Profiling Based on Keystroke Analysis
Heart-Based Biometrics and Possible Use of Heart Rate
Variability in Biometric Recognition Systems
Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73)
On Preventing SQL Injection Attacks
Securing Service in Remote Healthcare
Part II Systems Biology
Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid
Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network
Liver Fibrosis Diagnosis Support System Using Machine Learning Methods
Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks
Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment
A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules
Part III Networking and Cloud Computing
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment
KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks
The Design of Hierarchical Routing Protocol for Wireless Sensor Network
Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks
Part IV Data Analytics
Context-Aware Graph-Based Visualized Clustering Approach (CAVCA)
Materialized View Construction Using Linearizable Nonlinear Regression
Volume 2
Part I Signal Processing
Design and Development of Marathi Speech Interface System
Fusion-Based Noisy Image Segmentation Method
An Approach for Automatic Indic Script Identification from Handwritten Document Images
Writer Verification on Bangla Handwritten Characters
Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT)
Registration of Range Images Using a Novel Technique of Centroid Alignment
Part II Software Engineering
An Investigation into Effective Test Coverage
Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN)
A Study on Software Risk Management Strategies and Mapping with SDLC
A New Service Discovery Approach for Community-Based Web
Data-Flow Analysis-Based Approach of Database Watermarking
A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development
CAD-Based Analysis of Power Distribution Network for SOC Design
Part III Algorithms
A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus
A Comprehensive Sudoku Instance Generator
Implementing Software Transactional Memory Using STM Haskell
Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming
An Algorithm to Solve 3D Guard Zone Computation Problem
Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS
Anomaly Detection and Three Anomalous Coins Problem
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация