Advanced Computing and Systems for Security: Volume 2

Advanced Computing and Systems for Security: Volume 2: 396 (Advances in Intelligent Systems and Computing, 396)
25 Nov. 2015
Author: Rituparna Chaki (Editor), Agostino Cortesi (Editor), Khalid Saeed (Editor), Nabendu Chaki (Editor)
Publisher ‏ : ‎ Springer; 1st ed. 2016 edition (25 Nov. 2015)
Language ‏ : ‎ English
Paperback ‏ : ‎ 334 pages
ISBN-10 ‏ : ‎ 8132226518
ISBN-13 ‏ : ‎ 9788132226512

Book Description
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Front Matter….Pages i-xii
Front Matter….Pages 1-1
Design and Development of Marathi Speech Interface System….Pages 3-20
Fusion-Based Noisy Image Segmentation Method….Pages 21-35
An Approach for Automatic Indic Script Identification from Handwritten Document Images….Pages 37-51
Writer Verification on Bangla Handwritten Characters….Pages 53-68
Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT)….Pages 69-80
Registration of Range Images Using a Novel Technique of Centroid Alignment….Pages 81-89
Front Matter….Pages 91-91
An Investigation into Effective Test Coverage….Pages 93-106
Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN)….Pages 107-119
A Study on Software Risk Management Strategies and Mapping with SDLC….Pages 121-138
A New Service Discovery Approach for Community-Based Web….Pages 139-151
Data-Flow Analysis-Based Approach of Database Watermarking….Pages 153-171
A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development….Pages 173-188
CAD-Based Analysis of Power Distribution Network for SOC Design….Pages 189-198
Front Matter….Pages 199-199
A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus….Pages 201-214
A Comprehensive Sudoku Instance Generator….Pages 215-233
Implementing Software Transactional Memory Using STM Haskell….Pages 235-248
Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming….Pages 249-270
An Algorithm to Solve 3D Guard Zone Computation Problem….Pages 271-288
Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS….Pages 289-302
Anomaly Detection and Three Anomalous Coins Problem….Pages 303-320
Back Matter….Pages 321-322

下载地址阅读全文需1积分,请先!或 捐 助 获取权限!
赞(0) 觉得文章有用就打赏一下
未经允许不得转载:finelybook » Advanced Computing and Systems for Security: Volume 2