Coverart for item
The Resource Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013, edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña, (electronic resource)

Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013, edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña, (electronic resource)

Label
Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013
Title
Computational Intelligence, Cyber Security and Computational Models
Title remainder
Proceedings of ICC3, 2013
Statement of responsibility
edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models
Member of
Is Subseries of
Dewey number
004.0151
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • L51l7P0tmrI
  • W4Dpj0Hvv60
  • lj9RaimO8uM
  • qm1mJwP2n4Y
  • T3taNUn6enc
  • hGQwrKDdpO8
Language note
English
LC call number
Q342
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Krishnan, G. Sai Sundara.
  • Anitha, R.
  • Lekshmi, R. S.
  • Kumar, M. Senthil.
  • Bonato, Anthony.
  • Graña, Manuel.
Series statement
Advances in Intelligent Systems and Computing,
Series volume
246
http://library.link/vocab/subjectName
  • Computational intelligence
  • Computer security
  • Computer mathematics
  • Artificial intelligence
  • Computer science—Mathematics
  • Computational Intelligence
  • Systems and Data Security
  • Computational Mathematics and Numerical Analysis
  • Artificial Intelligence
  • Mathematical Applications in Computer Science
Label
Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013, edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Content category
text
Content type code
  • txt
Contents
The Robber Strikes Back -- Some Applications of Collective Learning -- Subconscious Social Computational Intelligence -- Modeling Heavy-tails in Traffic Sources for Network Performance Evaluation -- The Future of Access Control: Attributes, Automation and Adaptation -- Optimal Control for an MX/G/1/N + 1 Queue with two Service Modes -- A Novel Approach for Gene Selection of Leukemia Dataset Using Different Clustering Methods -- A Study on Enhancing Network Stability in Vanet with Energy Conservation of Road Side Infrastructures Using LPMA Agent -- An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset -- ELM based ensemble classifier for Gas Sensor Array Drift Dataset -- Hippocampus Atrophy Detection Using Hybrid Semantic Categorization -- Hyper Quadtree based K-means Algorithm for Software Fault Prediction -- Implementation of Localized Region based Active Contour Segmentation for Volume Measurement of Urinary Bladder Using Ultrasound Images -- Improved Bijective Soft Set based Classification for Gene Expression Data -- Mammogram Image Classification Using Rough Neural Network -- Performance Assessment of Kernel based Clustering -- Registration of Ultrasound Liver Images Using Mutual Information Technique -- Sentiment Mining Using SVM based Hybrid Classification Model -- Shape based Image Classification and Retrieval with Multi-resolution Enhanced Orthogonal Polynomials Model -- Using Fuzzy Logic for Product Matching -- A Novel Non-Repudiate Scheme with Voice Feature Marking.-A Study of Spam Detection algorithm on Social Media Networks -- Botnets: A Study and Analysis -- Comparative Study of two and Multi Class Classification based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set -- CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network -- Interaction Coupling: A Modern Coupling Extractor -- Secure Multicasting Protocols in Wireless Mesh Networks - A Survey -- A New Reversible SMG Gate and its Application for Designing two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer based Systems -- An Algorithm for Construction of Graceful Tree from an Arbitrary Tree -- Characterization of Semi-open Subcomplexes in Abstract Cellular Complex -- Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes -- Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack -- Hexagonal Prusa Grammar Model for Context Free Hexagonal Picture Languages -- Iso-Triangular Pictures and Recognisability -- Job Block Scheduling with Dual Criteria and Sequence Dependent Setup Time Involving Transportation Times -- Modular Chromatic Number of Cm Cn -- Network Analysis of Bi-Serial Queues Linked with a Flowshop Scheduling System -- Solving Multi-Objective Linear Fractional Programming Problem Using First Order -- Taylor’s Series Approximation -- Voronoi Diagram based Geometric Approach for Social Network Analysis -- Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data -- Modified Soft Rough Set for Multiclass Classification -- A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment -- A Multifactor Biometric Authentication for the Cloud -- Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet
Dimensions
unknown
Edition
1st ed. 2014.
Extent
1 online resource (401 p.)
Form of item
online
Isbn
9788132216803
Media category
computer
Media type code
  • c
Other control number
10.1007/978-81-322-1680-3
Specific material designation
remote
System control number
  • (CKB)3710000000075347
  • (EBL)1592557
  • (SSID)ssj0001066959
  • (PQKBManifestationID)11663263
  • (PQKBTitleCode)TC0001066959
  • (PQKBWorkID)11072688
  • (PQKB)10985147
  • (MiAaPQ)EBC1592557
  • (DE-He213)978-81-322-1680-3
  • (EXLCZ)993710000000075347
Label
Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013, edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Content category
text
Content type code
  • txt
Contents
The Robber Strikes Back -- Some Applications of Collective Learning -- Subconscious Social Computational Intelligence -- Modeling Heavy-tails in Traffic Sources for Network Performance Evaluation -- The Future of Access Control: Attributes, Automation and Adaptation -- Optimal Control for an MX/G/1/N + 1 Queue with two Service Modes -- A Novel Approach for Gene Selection of Leukemia Dataset Using Different Clustering Methods -- A Study on Enhancing Network Stability in Vanet with Energy Conservation of Road Side Infrastructures Using LPMA Agent -- An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset -- ELM based ensemble classifier for Gas Sensor Array Drift Dataset -- Hippocampus Atrophy Detection Using Hybrid Semantic Categorization -- Hyper Quadtree based K-means Algorithm for Software Fault Prediction -- Implementation of Localized Region based Active Contour Segmentation for Volume Measurement of Urinary Bladder Using Ultrasound Images -- Improved Bijective Soft Set based Classification for Gene Expression Data -- Mammogram Image Classification Using Rough Neural Network -- Performance Assessment of Kernel based Clustering -- Registration of Ultrasound Liver Images Using Mutual Information Technique -- Sentiment Mining Using SVM based Hybrid Classification Model -- Shape based Image Classification and Retrieval with Multi-resolution Enhanced Orthogonal Polynomials Model -- Using Fuzzy Logic for Product Matching -- A Novel Non-Repudiate Scheme with Voice Feature Marking.-A Study of Spam Detection algorithm on Social Media Networks -- Botnets: A Study and Analysis -- Comparative Study of two and Multi Class Classification based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set -- CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network -- Interaction Coupling: A Modern Coupling Extractor -- Secure Multicasting Protocols in Wireless Mesh Networks - A Survey -- A New Reversible SMG Gate and its Application for Designing two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer based Systems -- An Algorithm for Construction of Graceful Tree from an Arbitrary Tree -- Characterization of Semi-open Subcomplexes in Abstract Cellular Complex -- Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes -- Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack -- Hexagonal Prusa Grammar Model for Context Free Hexagonal Picture Languages -- Iso-Triangular Pictures and Recognisability -- Job Block Scheduling with Dual Criteria and Sequence Dependent Setup Time Involving Transportation Times -- Modular Chromatic Number of Cm Cn -- Network Analysis of Bi-Serial Queues Linked with a Flowshop Scheduling System -- Solving Multi-Objective Linear Fractional Programming Problem Using First Order -- Taylor’s Series Approximation -- Voronoi Diagram based Geometric Approach for Social Network Analysis -- Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data -- Modified Soft Rough Set for Multiclass Classification -- A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment -- A Multifactor Biometric Authentication for the Cloud -- Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet
Dimensions
unknown
Edition
1st ed. 2014.
Extent
1 online resource (401 p.)
Form of item
online
Isbn
9788132216803
Media category
computer
Media type code
  • c
Other control number
10.1007/978-81-322-1680-3
Specific material designation
remote
System control number
  • (CKB)3710000000075347
  • (EBL)1592557
  • (SSID)ssj0001066959
  • (PQKBManifestationID)11663263
  • (PQKBTitleCode)TC0001066959
  • (PQKBWorkID)11072688
  • (PQKB)10985147
  • (MiAaPQ)EBC1592557
  • (DE-He213)978-81-322-1680-3
  • (EXLCZ)993710000000075347

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...