Computational intelligence, cyber se...
Senthilkumar, Muthukrishnan.

FindBook      Google Book      Amazon      博客來     
  • Computational intelligence, cyber security and computational models = proceedings of ICC3 2015 /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Computational intelligence, cyber security and computational models/ edited by Muthukrishnan Senthilkumar ... [et al.].
    其他題名: proceedings of ICC3 2015 /
    其他題名: ICC3 2015
    其他作者: Senthilkumar, Muthukrishnan.
    出版者: Singapore :Springer Singapore : : 2016.,
    面頁冊數: xvi, 586 p. :ill., digital ;24 cm.
    內容註: Part I_Keynote Address: 1. The game of Wall Cops and Robbers -- 2. Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition -- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique -- Chapter 3. Kernel Online Multi-task Learning -- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario -- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution -- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals -- Chapter 7. Suspicious Human Activity Detection in Classroom Examination -- Chapter 8. H ∞ State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach -- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References -- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain -- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set -- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques -- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services -- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach -- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays -- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms -- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features -- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission -- Chapter 19. An Efficient Approach for MapReduce Result Verification -- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System -- Chapter 23. Human Gait Recognition Using Fuzzy Logic -- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis -- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine -- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine -- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme -- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems -- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix -- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers -- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation -- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions -- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques -- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication -- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes -- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management -- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks -- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing -- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM) -- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping -- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model -- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection -- Chapter 44. Venus Flytrap Optimization -- Chapter 45. Zumkeller Cordial Labeling of Graphs -- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments -- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation -- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process -- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method.
    Contained By: Springer eBooks
    標題: Computational intelligence - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-981-10-0251-9
    ISBN: 9789811002519$q(electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9277215 電子資源 11.線上閱覽_V 電子書 EB Q342 .I61 2015 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入