000 04230nam a22005655i 4500
001 978-981-10-3409-1
003 DE-He213
005 20220801220938.0
007 cr nn 008mamaa
008 170309s2017 si | s |||| 0|eng d
020 _a9789811034091
_9978-981-10-3409-1
024 7 _a10.1007/978-981-10-3409-1
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aAdvanced Computing and Systems for Security
_h[electronic resource] :
_bVolume Three /
_cedited by Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki.
250 _a1st ed. 2017.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2017.
300 _aXIII, 197 p. 57 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v567
505 0 _aA heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
520 _aThis book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
650 0 _aComputational intelligence.
_97716
650 0 _aSignal processing.
_94052
650 0 _aData protection.
_97245
650 1 4 _aComputational Intelligence.
_97716
650 2 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aData and Information Security.
_931990
700 1 _aChaki, Rituparna.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_953265
700 1 _aSaeed, Khalid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_953266
700 1 _aCortesi, Agostino.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_953267
700 1 _aChaki, Nabendu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_953268
710 2 _aSpringerLink (Online service)
_953269
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811034084
776 0 8 _iPrinted edition:
_z9789811034107
830 0 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v567
_953270
856 4 0 _uhttps://doi.org/10.1007/978-981-10-3409-1
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c79117
_d79117