Mathematics and computing. 4 conf., ICMC 2018, India, Revised selected papers
โ Scribed by Ghosh D (ed.)
- Publisher
- Springer
- Year
- 2018
- Tongue
- English
- Leaves
- 338
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Message from the General Chairs......Page 6
Message from the Program Chairs......Page 7
Preface......Page 8
Organization......Page 10
Contents......Page 15
Security and Coding Theory......Page 18
1 Introduction......Page 19
2.1 Basics of Cellular Automata......Page 20
2.2 Cryptographic Terms and Primitives......Page 21
2.3 Meier and Staffelbach Attack (MS Attack)......Page 22
3.2 Cryptographic Properties of Non-linear Rules......Page 23
3.3 Vulnerability Against MS Attack......Page 24
4 M-NHCA with Multiple Nonlinearity Injections......Page 25
4.2 Diffusion and Randomness Properties......Page 26
4.3 Resistance Against MS Attack......Page 27
4.4 Comparison with Rule 30 CA......Page 29
References......Page 30
1 Introduction......Page 32
2.1 Steganography Kha:Kam,Mai:Bak......Page 33
2.3 Hexagonal Tiles and Scenarios......Page 34
2.4 Hexagonal Finite Interactive System (HFIS)......Page 35
3.1 Context Sensitive Classes/States (CSC/CSS) Replacement Technique......Page 36
3.3 Implementation of Context Sensitive Steganography......Page 38
References......Page 41
1 Introduction......Page 43
3 Proposed Method......Page 44
3.2 Extraction Phase......Page 46
4 Experimental Results and Comparisons......Page 47
6 Conclusion......Page 50
References......Page 51
1 Introduction......Page 52
2 Non Binary Repeated Burst Error Correcting Linear Codes......Page 54
4 Generalization of the Parity Check Matrix for (5k, k; b, q, m) Linear Codes for All Values of q......Page 55
5 Discussion......Page 56
References......Page 57
1 Introduction......Page 58
2 Some Preliminary Results......Page 60
3 Settling the Unsolved Cases in Theorems 1 and 2......Page 61
4 A New Proof of Theorems 1 and 2......Page 65
References......Page 66
Computing......Page 67
1 Introduction......Page 68
2 Related Work......Page 69
3 Proposed Work......Page 70
4 Experimental Results......Page 72
References......Page 74
1 Introduction......Page 76
2.2 Data Representation......Page 78
2.3 Feature Extraction......Page 80
3.2 Feature Selection......Page 83
3.3 Recognition Performance......Page 84
4 Conclusion......Page 85
References......Page 86
1 Introduction......Page 89
1.2 Scene Analysis......Page 90
2.1 Framework......Page 92
3 Comparative Study......Page 93
References......Page 97
1.1 Background......Page 99
1.2 Literature Review......Page 100
1.3 Major Contribution......Page 101
2 Dual-Tree Complex Wavelet Transforms (DT-CWT)......Page 102
3 Proposed CBIR Scheme......Page 103
4 Results and Performance Analysis......Page 106
4.2 Time Performance Analysis......Page 107
4.3 Retrieval Performance Analysis......Page 108
4.4 Performance Comparison......Page 109
References......Page 110
1 Introduction......Page 112
2 Preliminaries and Related Results......Page 113
3 All Pairs Approximate Parameterized String Matching......Page 115
4 Experimental Results......Page 120
References......Page 122
1 Introduction......Page 125
2 Preliminaries......Page 126
3 Construction of Any Spanning Tree of Gn from a Spanning Tree of Gn......Page 128
References......Page 132
1 Introduction......Page 133
2.1 Neural Networks......Page 135
2.2 Convolutional Neural Networks......Page 136
2.3 Deep Generative Model......Page 137
3 Deep Learning Based Melanoma Detection......Page 138
3.1 Datasets......Page 139
3.2 Performance Metrics......Page 140
3.3 Performance of Recent Deep Learning Methods for Melanoma Detection......Page 141
4 Conclusion......Page 143
References......Page 144
Applied Mathematics......Page 148
1 Introduction......Page 149
3 Cosine Similarity Measure for PFSs......Page 150
5.1 Proof......Page 151
7 Practical Applications......Page 152
8 Comparison with Other Methods......Page 153
References......Page 154
1 Introduction......Page 155
2.1 Positivity and Boundedness......Page 156
2.2 Equilibrium Points, Reproduction Number and Local Stability......Page 157
3 Numerical Results and Discussion......Page 159
References......Page 161
1 Introduction......Page 163
2.2 Yager's (bib:38) Ranking Index......Page 165
2.4 Defuzzification Method of CNTFN [De and Mahata (bib:13)]......Page 166
3.2 Notations......Page 167
5 Formulation of the Fuzzy Mathematical Model......Page 168
6 Implication of Cloudy Fuzzy Environment in Inventory Process......Page 169
7 Numerical Example-1......Page 170
8 Discussion on Tables1 and 2......Page 171
10 Discussion on Sensitivity Analysis Table3......Page 172
12 Discussion on Figs.4 and 5......Page 173
13 Conclusion......Page 174
References......Page 175
1 Introduction......Page 178
2 Boundedness and Permanence......Page 179
3 Global Attractivity and Almost Periodicity......Page 180
4 Numerical Example......Page 183
5 Concluding Remarks......Page 185
References......Page 186
1 Introduction......Page 188
2 Mathematical Formulation......Page 189
3 Method of Solution......Page 191
4 Asymptotic Expansion......Page 195
5 Numerical Results......Page 196
6 Conclusion......Page 198
References......Page 199
1 Introduction......Page 200
2.1 Upper Semi-frames......Page 202
2.2 Lower Semi-frames......Page 203
3 Semi-frames in Banach Spaces......Page 204
4 Fusion Semi-frames......Page 205
5 Conclusion......Page 206
References......Page 207
1 Introduction......Page 208
2 Diamond Tile Self-assembly System......Page 209
3 Complexity of Diamond Self-assembly......Page 211
References......Page 218
1 Introduction......Page 219
2 Exponential Spline Method......Page 220
3 Stability Analysis......Page 223
4 Numerical Results......Page 224
References......Page 229
1 Introduction......Page 230
2.1 A Smooth Regression Technique......Page 231
2.2 The Extension Principle and Same Points......Page 232
3 Proposed Technique on Fuzzy Regression......Page 234
4 Algorithm......Page 235
5 Illustrative Example......Page 236
References......Page 238
1 Introduction......Page 239
2 Equilibrium Patterns......Page 244
3 Global Stability for Dead Zone Model......Page 246
4 Future Work......Page 253
5 Discussion......Page 254
References......Page 255
Pure Mathematics......Page 257
1 Introduction......Page 258
2.1 Bohr's Phenomenon for a Class of Subordinations......Page 260
2.3 Bohr inequality for p-Symmetric Analytic Functions......Page 262
2.4 Powered Bohr Inequality......Page 264
2.5 Improved Bohr's Inequality for Locally Univalent Harmonic Mappings......Page 265
References......Page 268
1 Introduction......Page 270
2 Analysis of the Differential Transform Method (DTM)......Page 271
3 The Fractional Differential Transform Method (FDTM)......Page 272
4 Analytical Solution of Abel Integral Equation......Page 273
6 Illustrative Examples......Page 275
7 Conclusion......Page 279
References......Page 280
1 Introduction......Page 281
2 Preliminaries......Page 282
3 L-fuzzy Closure Spaces and L-fuzzy Approximation Spaces......Page 285
4 Conclusion......Page 289
References......Page 290
1 Introduction and Preliminaries......Page 291
2 Main Results......Page 292
References......Page 297
1 Introduction......Page 299
2 Methodology......Page 301
3 Experimental Results......Page 303
References......Page 307
1 Introduction and Preliminaries......Page 309
2 Kinds of -Statistical Convergence for Functions in RTNS......Page 313
2.1 Pointwise -Statistical Convergence in RTNS......Page 314
2.2 Uniformly -Statistical Convergence in RTNS......Page 317
References......Page 320
1 Introduction......Page 322
2 Basic Equations and Problem Formulation......Page 325
3 Uniqueness of Solution......Page 327
4 Alternative Formulation of Mixed Problem......Page 329
5 Variational Theorem......Page 331
6 Reciprocity Theorem......Page 332
References......Page 335
Author Index......Page 338
๐ SIMILAR VOLUMES
<p>This book discusses recent advances and research in applied mathematics, statistics and their applications in computing. It features papers presented at the fourth conference in the series organized at the Indian Institute of Technology (Banaras Hindu University), Varanasi, India, on 9 โ 11 Janua
<p><p>This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical
<p><p>This book discusses recent developments and contemporary research in mathematics, statistics and their applications in computing. All contributing authors are eminent academicians, scientists, researchers and scholars in their respective fields, hailing from around the world. This is the secon
<p>This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in top