Skip to main content
  • Conference proceedings
  • © 2014

Computational Intelligence, Cyber Security and Computational Models

Proceedings of ICC3, 2013

  • Provides information on recent research trends in areas of computational intelligence, cyber security, and computational models
  • Includes theories and applications to provide design, analysis, and model for key areas in computational intelligence, cyber security, and computational models
  • Includes comprehensive security analysis, assessment, and actions to protect critical infrastructures and sensitive information
  • Discusses efficient computational algorithms and vigorous tools for efficient implementation

Conference proceedings info: ICC3 2013.

Buy it now

Buying options

eBook USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (44 papers)

  1. Front Matter

    Pages i-xv
  2. Keynote Address

    1. Front Matter

      Pages 1-1
    2. The Robber Strikes Back

      • Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar, William B. Kinnersley, Dieter Mitsche et al.
      Pages 3-12
    3. Some Applications of Collective Learning

      • Balaraman Ravindran
      Pages 13-14
    4. Modeling Heavy Tails in Traffic Sources for Network Performance Evaluation

      • Vaidyanathan Ramaswami, Kaustubh Jain, Rittwik Jana, Vaneet Aggarwal
      Pages 23-44
    5. Optimal Control for an M X /G/1/N + 1 Queue with Two Service Modes

      • Rein D. Nobel, Adriaan A. N. Ridder
      Pages 47-59
  3. Computational Intelligence

    1. Front Matter

      Pages 61-61
    2. A Novel Approach to Gene Selection of Leukemia Dataset Using Different Clustering Methods

      • P. Prasath, K. Perumal, K. Thangavel, R. Manavalan
      Pages 63-69
    3. An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset

      • N. Karthikeyani Visalakshi, S. Parvathavarthini, K. Thangavel
      Pages 79-87
    4. ELM-Based Ensemble Classifier for Gas Sensor Array Drift Dataset

      • D. Arul Pon Daniel, K. Thangavel, R. Manavalan, R. Subash Chandra Boss
      Pages 89-96
    5. Hippocampus Atrophy Detection Using Hybrid Semantic Categorization

      • K. Selva Bhuvaneswari, P. Geetha
      Pages 97-106
    6. Hyper-Quadtree-Based K-Means Algorithm for Software Fault Prediction

      • Rakhi Sasidharan, Padmamala Sriram
      Pages 107-118
    7. Improved Bijective-Soft-Set-Based Classification for Gene Expression Data

      • S. Udhaya Kumar, H. Hannah Inbarani, S. Senthil Kumar
      Pages 127-132
    8. Mammogram Image Classification Using Rough Neural Network

      • K. T. Rajakeerthana, C. Velayutham, K. Thangavel
      Pages 133-138
    9. Performance Assessment of Kernel-Based Clustering

      • Meena Tushir, Smriti Srivastava
      Pages 139-145
    10. Registration of Ultrasound Liver Images Using Mutual Information Technique

      • R. Suganya, R. Kirubakaran, S. Rajaram
      Pages 147-153

About this book

This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

Editors and Affiliations

  • Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, India

    G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar

  • Department of Mathematics, Ryerson University, Toronto, Canada

    Anthony Bonato

  • University of Basque Country, Paseo Manuel De Lardizalbal 1, San Sebastian, Spain

    Manuel Graña

About the editors

G. Sai Sundara Krishnan is Associate Professor in the Department of Applied Mathematics & Computational Sciences at PSG College of Technology, Coimbatore, India. He has published 15 papers in reputed international journals and conferences and edited two international conference proceedings. Currently, he is supervising nine research scholars pursuing their PhD degrees. His areas of research interest include digital topology and soft sets.

R. Anitha is Associate Professor in the Department of Applied Mathematics and Computational Sciences at PSG College of Technology, Coimbatore, India. Her research interests include cryptography, computer security, algorithms and computational models. She has supervised more than 10 PhD scholars. She has published over 40 research papers in refereed journals and has served as an editor for many conferences and workshops. She has served as a PC member for several international conferences such as ICoAC 2011, ICISS 2013, and ADCOM 2013 and organized many research workshops and conferences. She served as the principal investigator (PSG College of Technology) of CDBR-SSE project sponsored by NTRO, and is currently the consultant to SETS for a research project sponsored by the Department of Atomic Energy, Government of India. She is a member of several professional bodies including CRSI, ISTE, and ACM.

R. S. Lekshmi is Associate Professor in the Department of Applied Mathematics & Computational Sciences at PSG College of Technology, Coimbatore, India. She has authored 10 publications and guided many students’ projects on graph theory and networks. She has organized several research workshops/seminars and was the Program Chair for the International Conference on Mathematical and Computational Models held at PSG College of Technology in 2011.

M. Senthil Kumar is Associate Professor, Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore,India. He is the recipient of a post doctoral fellowship from the Department of Nanobio Materials and Electronics, (WCU), Gwangju Institute of Science and Technology, Gwangju, Republic of Korea under the guidance of Prof. K. Sohraby, Curators’ Professor, School of Electrical Engineering, University of Missouri-Kansas City. He has over 14 years of teaching and research experience. He has a PhD in retrial queueing models from Anna University, Chennai, India. His achievements are recognized and included in the biographies of Marquis Who’s Who in the World 2013. His fields of interest include retrial queueing theory, data communication, and reliability engineering. He serves as a reviewer for several international journals and has also published his research in several international journals of repute.

Anthony Bonato is the Associate Dean, Students and Programs in the Yeates School of Graduate Studies at Ryerson University and Editor-in-Chief of the journal Internet Mathematics. He has authored over 90 publications with 40 co-authors on the topics of graph theory and complex networks. In 2011 and 2009, he was awarded Ryerson Faculty SRC Awards for excellence in research. In 2012, he was awarded an inaugural YSGS Outstanding Contribution to Graduate Education Award.

Manuel Graña is currently full professor at the Computer Science and Artificial Intelligence of the University of the Basque Country (UPV/EHU), in the Facultad de Informatica in San Sebastian. His interests include machine learning and pattern recognition medical image processing and computer aided diagnosis systems, mobile robot navigation, multi-agent systems with natural inspiration, social network innovations via computational intelligence. The development of lattice computing approaches in these domains is his principal research endeavor. He is member of MIR Labs, IEEE, and ACM. He has chaired three international conferences (IWANN 2007, HAI 2010, KES 2012). He has served as an editor of more than 10 books. He has been advisor to more than 20 successful doctoral students. He has coauthored over 100 papers in high-impact research journals.

Bibliographic Information

Buy it now

Buying options

eBook USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access