𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013

✍ Scribed by Anthony Bonato, Stephen Finbow, PrzemysΕ‚aw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel GraΓ±a (eds.)


Publisher
Springer India
Year
2014
Tongue
English
Leaves
401
Series
Advances in Intelligent Systems and Computing 246
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

✦ Table of Contents


Front Matter....Pages i-xv
Front Matter....Pages 1-1
The Robber Strikes Back....Pages 3-12
Some Applications of Collective Learning....Pages 13-14
Subconscious Social Computational Intelligence....Pages 15-21
Modeling Heavy Tails in Traffic Sources for Network Performance Evaluation....Pages 23-44
The Future of Access Control: Attributes, Automation, and Adaptation....Pages 45-45
Optimal Control for an M X /G/ 1 /N Β +Β 1 Queue with Two Service Modes....Pages 47-59
Front Matter....Pages 61-61
A Novel Approach to Gene Selection of Leukemia Dataset Using Different Clustering Methods....Pages 63-69
A Study on Enhancing Network Stability in VANET with Energy Conservation of Roadside Infrastructures Using LPMA Agent....Pages 71-77
An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset....Pages 79-87
ELM-Based Ensemble Classifier for Gas Sensor Array Drift Dataset....Pages 89-96
Hippocampus Atrophy Detection Using Hybrid Semantic Categorization....Pages 97-106
Hyper-Quadtree-Based K-Means Algorithm for Software Fault Prediction....Pages 107-118
Measurement of Volume of Urinary Bladder by Implementing Localizing Region-Based Active Contour Segmentation Method....Pages 119-125
Improved Bijective-Soft-Set-Based Classification for Gene Expression Data....Pages 127-132
Mammogram Image Classification Using Rough Neural Network....Pages 133-138
Performance Assessment of Kernel-Based Clustering....Pages 139-145
Registration of Ultrasound Liver Images Using Mutual Information Technique....Pages 147-153
Sentiment Mining Using SVM-Based Hybrid Classification Model....Pages 155-162
Shape Based Image Classification and Retrieval with Multiresolution Enhanced Orthogonal Polynomial Model....Pages 163-170
Using Fuzzy Logic for Product Matching....Pages 171-179
Front Matter....Pages 181-181
A Novel Non-repudiate Scheme with Voice FeatureMarking....Pages 183-194
A Study of Spam Detection Algorithm on Social Media Networks....Pages 195-202
Botnets: A Study and Analysis....Pages 203-214
Comparative Study of Two- and Multi-Class-Classification-Based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set....Pages 215-225
CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network....Pages 227-235
Interaction Coupling: A Modern Coupling Extractor....Pages 237-244
Secure Multicasting Protocols in Wireless Mesh Networksβ€”A Survey....Pages 245-256
Front Matter....Pages 257-257
A New Reversible SMG Gate and Its Application for Designing Two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer-Based Systems....Pages 259-266
An Algorithm for Constructing Graceful Tree from an Arbitrary Tree....Pages 267-273
Characterization of Semi-open Subcomplexes in Abstract Cellular Complex....Pages 275-283
Fluid Queue Driven by an M / M /1 Queue Subject to Catastrophes....Pages 285-291
Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack....Pages 293-303
Hexagonal Prusa Grammar Model for Context-Free Hexagonal Picture Languages....Pages 305-311
Iso-Triangular Pictures and Recognizability....Pages 313-319
Job Block Scheduling with Dual Criteria and Sequence-Dependent Setup Time Involving Transportation Times....Pages 321-329
Modular Chromatic Number of C m Β  β–‘ Β  C n ....Pages 331-338
Network Analysis of Biserial Queues Linked with a Flowshop Scheduling System....Pages 339-345
Solving Multi-Objective Linear Fractional Programming Problem - First Order Taylor's Series Approximation Approach....Pages 347-357
Voronoi Diagram-Based Geometric Approach for Social Network Analysis....Pages 359-369
Front Matter....Pages 371-371
Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data....Pages 373-378
Front Matter....Pages 371-371
Modified Soft Rough set for Multiclass Classification....Pages 379-384
A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment....Pages 385-393
A Multifactor Biometric Authentication for the Cloud....Pages 395-403
Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet....Pages 405-411
Back Matter....Pages 413-416

✦ Subjects


Computational Intelligence; Systems and Data Security; Computational Mathematics and Numerical Analysis; Artificial Intelligence (incl. Robotics); Mathematical Applications in Computer Science


πŸ“œ SIMILAR VOLUMES


Computational Intelligence, Cyber Securi
✍ Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, A πŸ“‚ Library πŸ“… 2016 πŸ› Springer Singapore 🌐 English

<p><p>This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the <i>International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015</i> organized by PSG College of Technology, Coimbatore, India durin

Computational Intelligence, Cyber Securi
✍ Geetha Ganapathi, Arumugam Subramaniam, Manuel GraΓ±a, Suresh Balusamy, Rajamanic πŸ“‚ Library πŸ“… 2018 πŸ› Springer Singapore 🌐 English

<p><p>This book constitutes the proceedings of the Third International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2017, which was held in Coimbatore, India, in December 2017. The 15 papers presented in this volume were carefully reviewed and selected fro

Cyber Security in Intelligent Computing
✍ Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sa πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco

Intelligent Computing, Communication and
✍ Lakhmi C. Jain, Srikanta Patnaik, Nikhil Ichalkaranje (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer India 🌐 English

<p>In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is

Intelligent Computing, Communication and
✍ Lakhmi C. Jain, Srikanta Patnaik, Nikhil Ichalkaranje (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer India 🌐 English

<p>In the history of mankind, three revolutions which impact the human life are tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the human society. Probably, intelligence revolution i

Computational Intelligence, Cyber Securi
✍ Suresh Balusamy, Alexander N. Dudin, Manuel GraΓ±a, A. Kaja Mohideen, N. K. Sreel πŸ“‚ Library πŸ“… 2020 πŸ› Springer Singapore;Springer 🌐 English

<p>This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. <br>The 9 papers presented in this volume were carefully reviewed and selected from