Logo - springer
Slogan - springer

Engineering - Computational Intelligence and Complexity | Computational Intelligence, Cyber Security and Computational Models - Proceedings of ICC3, 2013

Computational Intelligence, Cyber Security and Computational Models

Proceedings of ICC3, 2013

Krishnan, G.S.S., Anitha, R., Lekshmi, R.S., Kumar, M.S., Bonato, A., Graña, M. (Eds.)

2014, XV, 416 p. 125 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$319.00

(net) price for USA

ISBN 978-81-322-1680-3

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$399.00

(net) price for USA

ISBN 978-81-322-1679-7

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Provides information on recent research trends in areas of computational intelligence, cyber security, and computational models
  • Includes theories and applications to provide design, analysis, and model for key areas in computational intelligence, cyber security, and computational models
  • Includes comprehensive security analysis, assessment, and actions to protect critical infrastructures and sensitive information
  • Discusses efficient computational algorithms and vigorous tools for efficient implementation

This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

Content Level » Research

Keywords » Bio-Inspired Computing - Cloud Computing - Cloud Security - Combinatorial Optimization - Computational Intelligence - Cyber Security - Digital Topology - ICC3 - Neural Networks

Related subjects » Artificial Intelligence - Computational Intelligence and Complexity - Computational Science & Engineering - Security and Cryptology

Table of contents 

The Robber Strikes Back.- Some Applications of Collective Learning.- Subconscious Social Computational Intelligence.- Modeling Heavy-tails in Traffic Sources for Network Performance Evaluation.- The Future of Access Control: Attributes, Automation and Adaptation.- Optimal Control for an MX/G/1/N + 1 Queue with two Service Modes.- A Novel Approach for Gene Selection of Leukemia Dataset Using Different Clustering Methods.- A Study on Enhancing Network Stability in Vanet with Energy Conservation of Road Side Infrastructures Using LPMA Agent.- An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset.- ELM based Ensemble Classifier for Gas Sensor Array Drift Dataset.- Hippocampus Atrophy Detection Using Hybrid Semantic Categorization.- Hyper Quadtree based K-means Algorithm for Software Fault Prediction.- Implementation of Localized Region based Active Contour Segmentation for Volume Measurement of Urinary Bladder Using Ultrasound Images.- Improved Bijective Soft Set based Classification for Gene Expression Data.- Mammogram Image Classification Using Rough Neural Network.- Performance Assessment of Kernel based Clustering.- Registration of Ultrasound Liver Images Using Mutual Information Technique.- Sentiment Mining Using SVM based Hybrid Classification Model.- Shape based Image Classification and Retrieval with Multi-resolution Enhanced Orthogonal Polynomials Model.- Using Fuzzy Logic for Product Matching.- A Novel Non-Repudiate Scheme with Voice Feature Marking.-A Study of Spam Detection algorithm on Social Media Networks.- Botnets: A Study and Analysis.- Comparative Study of two and Multi Class Classification based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set.- CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network.- Interaction Coupling: A Modern Coupling Extractor.- Secure Multicasting Protocols in Wireless Mesh Networks - A Survey.- A New Reversible SMG Gate and its Application for Designing two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer based Systems.- An Algorithm for Construction of Graceful Tree from an Arbitrary Tree.- Characterization of Semi-open Subcomplexes in Abstract Cellular Complex.- Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes.- Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack.- Hexagonal Prusa Grammar Model for Context Free Hexagonal Picture Languages.- Iso-Triangular Pictures and Recognisability.- Job Block Scheduling with Dual Criteria and Sequence Dependent Setup Time Involving Transportation Times.- Modular Chromatic Number of Cm ” Cn.- Network Analysis of Bi-Serial Queues Linked with a Flowshop Scheduling System.- Solving Multi-Objective Linear Fractional Programming Problem Using First Order.- Taylor’s Series Approximation.- Voronoi Diagram based Geometric Approach for Social Network Analysis.- Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data.- Modified Soft Rough Set for Multiclass Classification.- A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment.- A Multifactor Biometric Authentication for the Cloud.- Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computational Intelligence.