E-Book, Englisch, Band 412, 586 Seiten, eBook
Senthilkumar / Ramasamy / Sheen Computational Intelligence, Cyber Security and Computational Models
1. Auflage 2016
ISBN: 978-981-10-0251-9
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Proceedings of ICC3 2015
E-Book, Englisch, Band 412, 586 Seiten, eBook
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-981-10-0251-9
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Part I_Keynote Address:1. The game of Wall Cops and Robbers.- 2. Smartphone Applications, Malware and Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information and Networks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition.- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-task Learning.- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario.- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution.- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals.- Chapter 7. Suspicious Human Activity Detection in Classroom Examination.- Chapter 8.H 8 State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach.- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References.- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain.- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set.- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques.- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services.- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach.- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays.- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms.- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features.- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission.- Chapter 19. An Efficient Approach for MapReduce Result Verification.- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding.- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease.- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System.- Chapter 23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis.- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine.- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security:Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme.- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems.- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix.- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques.- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing.- Part IV_Computational Models:Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM).- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping.- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection.- Chapter 44. Venus Flytrap Optimization.- Chapter 45. Zumkeller Cordial Labeling of Graphs.- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method.