000 | 04230nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-10-3409-1 | ||
003 | DE-He213 | ||
005 | 20220801220938.0 | ||
007 | cr nn 008mamaa | ||
008 | 170309s2017 si | s |||| 0|eng d | ||
020 |
_a9789811034091 _9978-981-10-3409-1 |
||
024 | 7 |
_a10.1007/978-981-10-3409-1 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aAdvanced Computing and Systems for Security _h[electronic resource] : _bVolume Three / _cedited by Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2017. |
|
300 |
_aXIII, 197 p. 57 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v567 |
|
505 | 0 | _aA heuristic framework for priority based nurse scheduling -- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process -- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk -- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory -- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle -- Association Based Multi-Attribute Analysis to Construct Materialized View -- A new Method for Key Author Analysis in Research Professionals' Collaboration Network -- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features -- Analysis of eavesdropping in QKD with Qutrit photon states -- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme -- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability. | |
520 | _aThis book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India. | ||
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aChaki, Rituparna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _953265 |
|
700 | 1 |
_aSaeed, Khalid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _953266 |
|
700 | 1 |
_aCortesi, Agostino. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _953267 |
|
700 | 1 |
_aChaki, Nabendu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _953268 |
|
710 | 2 |
_aSpringerLink (Online service) _953269 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811034084 |
776 | 0 | 8 |
_iPrinted edition: _z9789811034107 |
830 | 0 |
_aAdvances in Intelligent Systems and Computing, _x2194-5365 ; _v567 _953270 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-3409-1 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c79117 _d79117 |