The Resource Advanced Computing and Systems for Security : Volume 2, edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, (electronic resource)

Advanced Computing and Systems for Security : Volume 2, edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, (electronic resource)

Label
Advanced Computing and Systems for Security : Volume 2
Title
Advanced Computing and Systems for Security
Title remainder
Volume 2
Statement of responsibility
edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering
Member of
Dewey number
620
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • a9Sjx_SatYo
  • IvepyjNEUmk
  • TCt95Q_I7tE
  • 4JsXtL-5U-c
Language note
English
LC call number
Q342
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Chaki, Rituparna.
  • Cortesi, Agostino.
  • Saeed, Khalid.
  • Chaki, Nabendu.
Series statement
Advances in Intelligent Systems and Computing,
Series volume
396
http://library.link/vocab/subjectName
  • Engineering
  • Computer security
  • Computational Intelligence
  • Signal, Image and Speech Processing
  • Systems and Data Security
Label
Advanced Computing and Systems for Security : Volume 2, edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Signal Processing: Chapter 1. Design and Development of Marathi Speech Interface System -- Chapter 2. Fusion-based noisy image segmentation method -- Chapter 3. An Approach for Automatic Indic Script Identification from Handwritten Document Images -- Chapter 4. Writer Verification on Bangla Handwritten Characters -- Chapter 5. Face Recognition in Video using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT) -- Chapter 6. Registration of Range Images using a novel technique of Centroid Alignment -- Software Engineering: Chapter 7. An investigation into effective test coverage -- Chapter 8. Resource Management in Native Languages using Dynamic Binary Instrumentation (PIN) -- Chapter 9. A Study on Software Risk Management Strategies and Mapping with SDLC -- Chapter 10. A New Service Discovery Approach for Community based Web -- Chapter 11. Data-flow Analysis-based Approach of Database Watermarking -- Networking and Cloud Computing: Chapter 12. A New Framework for Configuration Management and Compliance Checking towards Component Based Software Development -- Chapter 13. CAD Based Analysis of Power Distribution Network for SOC Design -- Algorithms: Chapter 14. A New Hybrid Mutual Exclusion Algorithm in Absence of Majority Consensus -- Chapter 15. A Comprehensive Sudoku Instance Generator -- Chapter 16. Impleme nting Software Transactional Memory using STM Haskell -- Chapter 17. Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming -- Chapter 18. An Algorithm to Solve 3D Guard Zone Computation Problem -- Chapter 19. Multi-step ahead Groundwater Level Time Series Forecasting using Gaussian Process Regression and ANFIS -- Chapter 20. Anomaly Detection and Three Anomalous Coins Problem
Dimensions
unknown
Edition
1st ed. 2016.
Extent
1 online resource (324 p.)
Form of item
online
Isbn
9788132226536
Media category
computer
Media type code
c
Other control number
10.1007/978-81-322-2653-6
Specific material designation
remote
System control number
  • (CKB)3710000000515957
  • (EBL)4098030
  • (SSID)ssj0001584540
  • (PQKBManifestationID)16265362
  • (PQKBTitleCode)TC0001584540
  • (PQKBWorkID)14865480
  • (PQKB)11657745
  • (DE-He213)978-81-322-2653-6
  • (MiAaPQ)EBC4098030
  • (EXLCZ)993710000000515957
Label
Advanced Computing and Systems for Security : Volume 2, edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Signal Processing: Chapter 1. Design and Development of Marathi Speech Interface System -- Chapter 2. Fusion-based noisy image segmentation method -- Chapter 3. An Approach for Automatic Indic Script Identification from Handwritten Document Images -- Chapter 4. Writer Verification on Bangla Handwritten Characters -- Chapter 5. Face Recognition in Video using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT) -- Chapter 6. Registration of Range Images using a novel technique of Centroid Alignment -- Software Engineering: Chapter 7. An investigation into effective test coverage -- Chapter 8. Resource Management in Native Languages using Dynamic Binary Instrumentation (PIN) -- Chapter 9. A Study on Software Risk Management Strategies and Mapping with SDLC -- Chapter 10. A New Service Discovery Approach for Community based Web -- Chapter 11. Data-flow Analysis-based Approach of Database Watermarking -- Networking and Cloud Computing: Chapter 12. A New Framework for Configuration Management and Compliance Checking towards Component Based Software Development -- Chapter 13. CAD Based Analysis of Power Distribution Network for SOC Design -- Algorithms: Chapter 14. A New Hybrid Mutual Exclusion Algorithm in Absence of Majority Consensus -- Chapter 15. A Comprehensive Sudoku Instance Generator -- Chapter 16. Impleme nting Software Transactional Memory using STM Haskell -- Chapter 17. Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming -- Chapter 18. An Algorithm to Solve 3D Guard Zone Computation Problem -- Chapter 19. Multi-step ahead Groundwater Level Time Series Forecasting using Gaussian Process Regression and ANFIS -- Chapter 20. Anomaly Detection and Three Anomalous Coins Problem
Dimensions
unknown
Edition
1st ed. 2016.
Extent
1 online resource (324 p.)
Form of item
online
Isbn
9788132226536
Media category
computer
Media type code
c
Other control number
10.1007/978-81-322-2653-6
Specific material designation
remote
System control number
  • (CKB)3710000000515957
  • (EBL)4098030
  • (SSID)ssj0001584540
  • (PQKBManifestationID)16265362
  • (PQKBTitleCode)TC0001584540
  • (PQKBWorkID)14865480
  • (PQKB)11657745
  • (DE-He213)978-81-322-2653-6
  • (MiAaPQ)EBC4098030
  • (EXLCZ)993710000000515957

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...