Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 by Muthukrishnan SenthilkumarComputational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 by Muthukrishnan Senthilkumar

Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

byMuthukrishnan SenthilkumarEditorVijayalakshmi Ramasamy, Shina Sheen

Paperback | January 27, 2016

Pricing and Purchase Info


Earn 1,933 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This bookaims at promoting high-quality research by researchers and practitioners fromacademia and industry at the InternationalConference on Computational Intelligence, Cyber Security, and ComputationalModels ICC3 2015 organized by PSG College of Technology, Coimbatore, Indiaduring December 17 - 19, 2015. This book enriches with innovations in broadareas of research like computational modeling, computational intelligence andcyber security. These emerging inter disciplinary research areas have helped tosolve multifaceted problems and gained lot of attention in recent years. Thisencompasses theory and applications, to provide design, analysis and modelingof the aforementioned key areas.

Muthukrishnan Senthilkumar is an Associate Professor, Department of Applied Mathematics and Computational Sciences, PSG College of Technology. He has got Post Doctoral Fellowship from Department of Nanobio Materials and Electronics, (WCU), Gwangju Institute of Science and Technology (GIST), Gwangju, Republic of Korea. He is also a ...
Title:Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Format:PaperbackDimensions:586 pagesPublished:January 27, 2016Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:9811002509

ISBN - 13:9789811002502

Look for similar items by category:


Table of Contents

Part I_Keynote Address: 1. The game of Wall Cops and Robbers.-2. Smartphone Applications, Malwareand Data Theft.- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation.- 4. Generating a Standardized Upper Ontology for Security of Information andNetworks.- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCCfeatures for Speaker Recognition.- Chapter 2. Single-pixel Based DoubleRandom-Phase Encoding Technique.- Chapter 3. Kernel Online Multi-taskLearning.- Chapter 4. Performance Evaluation of SentimentClassification Using Query Strategies in a Pool Based Active Learning Scenario.-Chapter 5. An Enhanced Image Watermarking Scheme Using Blockswith Homogeneous Feature Distribution.- Chapter6. Performance Analysis of ApEn asa Feature Extraction Technique and Time Delay Neural Networks, Multi-layerPerceptron as Post Classifiers for the Classification of Epilepsy Risk Levelsfrom EEG Signals.- Chapter 7.Suspicious Human Activity Detection inClassroom Examination.- Chapter 8. H ?  StateEstimation of Discrete Time Delayed Neural Networks with Multiple Missing MeasurementsUsing Second Order Reciprocal Convex Approach.- Chapter 9. A FuzzyMethodology for Clustering Text Documents with Uncertain Spatial References.- Chapter10. A Novel Feature Extraction Algorithm fromFingerprint Image in Wavelet Domain.- Chapter 11. Motorimagery Classification Based on Variable Precision Multigranulation Rough Set.-Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using EvolutionaryTechniques.- Chapter 13. A Two Phase Approach for Efficient Clusteringof Web Services.- Chapter 14. Elimination of Redundant Association Rules- An Efficient Linear Approach.- Chapter 15. Clustering Techniques fromSignificance Analysis of Microarrays.- Chapter 16. Breast RegionExtraction and Pectoral Removal by Pixel Constancy Constraint approach inMammograms.- Chapter 17. Bridging the Semantic Gap in Image Search viaVisual Semantic Descriptors by Integrating Text and Visual Features.- Chapter18. Adaptive Equalization Algorithm for Electrocardiogram SignalTransmission.- Chapter 19. An Efficient Approach for MapReduceResult Verification.- Chapter 20. Improving Lifetime of Memory Devices Using EvolutionaryComputing Based Error Correction Coding.- Chapter 21. Comparison ofMachine Learning Techniques for the Identification of the Stages of Parkinson'sDisease.- Chapter 22. Security Constrained Unit Commitment Problem EmployingArtificial Computational Intelligence for Wind-thermal Power System.- Chapter23. Human Gait Recognition Using Fuzzy Logic.- Chapter 24. Detectionand Diagnosis of Dilated and Hypertrophic Cardiomyopathy by EchocardiogramSequences Analysis.- Chapter 25. An Elitist Genetic Algorithm BasedExtreme Learning Machine.- Chapter 26.Formulation and Enhancement of User AdaptiveAccess to the Learning Resources in E-Learning Using Fuzzy Inference Engine.- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-serverAuthenticated Key Agreement Scheme.- Chapter28. Extended Game Theoretic Dirichlet Based Collaborative IntrusionDetection Systems.- Chapter 29.Implementation of ECDSA Using Sponge Based Hash Function.- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based onPerfect Reconstruction of White Pixels and Additional Basis Matrix.-Chapter 31. Hash Based Two Gateway Payment Protocol EnsuringAccountability with Dynamic ID-verifier for Digital Goods Providers.- Chapter 32. DecryptingShared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation.- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Schemewith XOR and OR Decryptions.- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography andSteganography Techniques.- Chapter 35. Kout of N Secret Sharing Scheme with Steganography and Authentication.- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation inMilitary Based Mobile Ad-hoc Networks Using Stereotypes.- Chapter37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group KeyManagement.- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity ofData in Mobile Ad-hoc Networks.- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storagein Cloud Computing.- Part IV_Computational Models: Chapter 40. A Study on BuildingSeamless Communication Among Vehicles in Vanet Using the Integrated AgentCommunication Model (IACM).- Chapter 41.A Hybrid Approach for Data Hidingthrough Chaos Theory and Reversible Integer Mapping.-Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model.- Chapter 43. An Effective Toolfor optimizing the Number of Test Paths in Data Flow Testing for AnomalyDetection.- Chapter 44. Venus FlytrapOptimization.- Chapter 45.Zumkeller CordialLabeling of Graphs.- Chapter46. Cuckoo BasedResource Allocation for Mobile Cloud Environments.- Chapter 47. Transient Analysisof an M/M/c Queue Subject to Multiple Exponential Vacation.- Chapter 48. Fractional Filter BasedInternal Model Controller for Nonlinear Process.- Chapter 49. A Novel Method forSolving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using DominanceProperty and Oddment Method.