語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced Computing and Systems for S...
~
Cortesi, Agostino.
Advanced Computing and Systems for Security = Volume 1 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advanced Computing and Systems for Security/ edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki.
其他題名:
Volume 1 /
其他作者:
Chaki, Rituparna.
面頁冊數:
X, 278 p. 85 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational intelligence. -
電子資源:
https://doi.org/10.1007/978-81-322-2650-5
ISBN:
9788132226505
Advanced Computing and Systems for Security = Volume 1 /
Advanced Computing and Systems for Security
Volume 1 /[electronic resource] :edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki. - 1st ed. 2016. - X, 278 p. 85 illus. in color.online resource. - Advances in Intelligent Systems and Computing,3952194-5357 ;. - Advances in Intelligent Systems and Computing,335.
Security: Chapter 1. Computer User Profiling Based on Keystroke Analysis -- Chapter 2. Heart Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems -- Chapter 3. Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses over Galois Field GF(73) -- Chapter 4. On Preventing SQL Injection Attacks -- Chapter 5. Secure Data Retrieval Service in Remote Healthcare -- Systems Biology: Chapter 6. Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid -- Chapter 7. Detection of Diabetic Retinopathy Using the Wavelet Transform and Feed Forward Neural Network -- Chapter 8. Liver Fibrosis Diagnosis Support System Using Machine Learning Methods -- Chapter 9. Light-Weighted DNA Based Cryptographic Mechanism against Chosen Cipher Text Attacks -- Chapter 10. Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment -- Chapter 11. A Comparative Analysis of Image Segmentation Techniques Towards Automatic Risk Prediction of Solitary Pulmonary Nodules -- Networking and Cloud Computing: Chapter 12. SAFE-CLOUD: Secure and Usable Authentication FramEwork for CLOUD Environment -- Chapter 13. KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks -- Chapter 14. The Design of Hierarchical Routing Protocol for Wireless Sensor Network -- Chapter 15. Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks -- Chapter 16. Context-Aware Graph Based Visualized Clustering Approach (CAVCA) -- Chapter 17. Materialized View Construction Using Linearizable Non-Linear Regression.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
ISBN: 9788132226505
Standard No.: 10.1007/978-81-322-2650-5doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Advanced Computing and Systems for Security = Volume 1 /
LDR
:03760nam a22003975i 4500
001
981487
003
DE-He213
005
20200706082909.0
007
cr nn 008mamaa
008
201211s2016 ii | s |||| 0|eng d
020
$a
9788132226505
$9
978-81-322-2650-5
024
7
$a
10.1007/978-81-322-2650-5
$2
doi
035
$a
978-81-322-2650-5
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Advanced Computing and Systems for Security
$h
[electronic resource] :
$b
Volume 1 /
$c
edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki.
250
$a
1st ed. 2016.
264
1
$a
New Delhi :
$b
Springer India :
$b
Imprint: Springer,
$c
2016.
300
$a
X, 278 p. 85 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
395
505
0
$a
Security: Chapter 1. Computer User Profiling Based on Keystroke Analysis -- Chapter 2. Heart Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems -- Chapter 3. Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses over Galois Field GF(73) -- Chapter 4. On Preventing SQL Injection Attacks -- Chapter 5. Secure Data Retrieval Service in Remote Healthcare -- Systems Biology: Chapter 6. Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid -- Chapter 7. Detection of Diabetic Retinopathy Using the Wavelet Transform and Feed Forward Neural Network -- Chapter 8. Liver Fibrosis Diagnosis Support System Using Machine Learning Methods -- Chapter 9. Light-Weighted DNA Based Cryptographic Mechanism against Chosen Cipher Text Attacks -- Chapter 10. Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment -- Chapter 11. A Comparative Analysis of Image Segmentation Techniques Towards Automatic Risk Prediction of Solitary Pulmonary Nodules -- Networking and Cloud Computing: Chapter 12. SAFE-CLOUD: Secure and Usable Authentication FramEwork for CLOUD Environment -- Chapter 13. KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks -- Chapter 14. The Design of Hierarchical Routing Protocol for Wireless Sensor Network -- Chapter 15. Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks -- Chapter 16. Context-Aware Graph Based Visualized Clustering Approach (CAVCA) -- Chapter 17. Materialized View Construction Using Linearizable Non-Linear Regression.
520
$a
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Signal processing.
$3
561459
650
0
$a
Image processing.
$3
557495
650
0
$a
Speech processing systems.
$3
564428
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Signal, Image and Speech Processing.
$3
670837
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Chaki, Rituparna.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1062510
700
1
$a
Cortesi, Agostino.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
815160
700
1
$a
Saeed, Khalid.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
669995
700
1
$a
Chaki, Nabendu.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
815159
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9788132226482
776
0 8
$i
Printed edition:
$z
9788132226499
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-81-322-2650-5
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入