Krishnan, G. Sai Sundara
Computational Intelligence, Cyber Security and Computational Models
Part I. Keynote Address
1. The Robber Strikes Back
Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar, William B. Kinnersley, Dieter Mitsche, Paweł Prałat, Ladislav Stacho
2. Some Applications of Collective Learning
Balaraman Ravindran
3. Subconscious Social Computational Intelligence
M. Graña
4. Modeling Heavy Tails in Traffic Sources for Network Performance Evaluation
Vaidyanathan Ramaswami, Kaustubh Jain, Rittwik Jana, Vaneet Aggarwal
5. The Future of Access Control: Attributes, Automation, and Adaptation
Ravi Sandhu
6. Optimal Control for an
Rein D. Nobel, Adriaan A. N. Ridder
Part II. Computational Intelligence
7. A Novel Approach to Gene Selection of Leukemia Dataset Using Different Clustering Methods
P. Prasath, K. Perumal, K. Thangavel, R. Manavalan
8. A Study on Enhancing Network Stability in VANET with Energy Conservation of Roadside Infrastructures Using LPMA Agent
T. Karthikeyan, N. Sudha Bhuvaneswari
9. An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset
N. Karthikeyani Visalakshi, S. Parvathavarthini, K. Thangavel
10. ELM-Based Ensemble Classifier for Gas Sensor Array Drift Dataset
D. Arul Pon Daniel, K. Thangavel, R. Manavalan, R. Subash Chandra Boss
11. Hippocampus Atrophy Detection Using Hybrid Semantic Categorization
K. Selva Bhuvaneswari, P. Geetha
12. Hyper-Quadtree-Based K-Means Algorithm for Software Fault Prediction
Rakhi Sasidharan, Padmamala Sriram
13. Measurement of Volume of Urinary Bladder by Implementing Localizing Region-Based Active Contour Segmentation Method
B. Padmapriya, T. Kesavamurthi, B. Abinaya, P. Hemanthini
14. Improved Bijective-Soft-Set-Based Classification for Gene Expression Data
S. Udhaya Kumar, H. Hannah Inbarani, S. Senthil Kumar
15. Mammogram Image Classification Using Rough Neural Network
K. T. Rajakeerthana, C. Velayutham, K. Thangavel
16. Performance Assessment of Kernel-Based Clustering
Meena Tushir, Smriti Srivastava
17. Registration of Ultrasound Liver Images Using Mutual Information Technique
R. Suganya, R. Kirubakaran, S. Rajaram
18. Sentiment Mining Using SVM-Based Hybrid Classification Model
G. Vinodhini, R. M. Chandrasekaran
19. Shape Based Image Classification and Retrieval with Multiresolution Enhanced Orthogonal Polynomial Model
S. Sathiya Devi, R. Krishnamoorthi
20. Using Fuzzy Logic for Product Matching
K. Amshakala, R. Nedunchezhian
Part III. Cyber Security
21. A Novel Non-repudiate Scheme with Voice FeatureMarking
A. R. Remya, M. H. Supriya, A. Sreekumar
22. A Study of Spam Detection Algorithm on Social Media Networks
Jacob Soman Saini
23. Botnets: A Study and Analysis
G. Kirubavathi, R. Anitha
24. Comparative Study of Two- and Multi-Class-Classification-Based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set
Shina Sheen, R. Karthik, R. Anitha
25. CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network
A. Avelin Diana, V. Ragavinodhini, K. Sundarakantham, S. Mercy Shalinie
26. Interaction Coupling: A Modern Coupling Extractor
S. Gomathi, P. Edith Linda
27. Secure Multicasting Protocols in Wireless Mesh Networks—A Survey
Seetha Surlees, Sharmila Anand John Francis
Part IV. Computational Models
28. A New Reversible SMG Gate and Its Application for Designing Two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer-Based Systems
S. Manjula Gandhi, J. Devishree, S. Sathish Mohan
29. An Algorithm for Constructing Graceful Tree from an Arbitrary Tree
G. Sethuraman, P. Ragukumar
30. Characterization of Semi-open Subcomplexes in Abstract Cellular Complex
N. Vijaya, G. Sai Sundara Krishnan
31. Fluid Queue Driven by an
K. V. Vijayashree, A. Anjuka
32. Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack
Muthukrishnan Senthil Kumar, C. Veeramani
33. Hexagonal Prusa Grammar Model for Context-Free Hexagonal Picture Languages
T. Kamaraj, D. G. Thomas
34. Iso-Triangular Pictures and Recognizability
V. Devi Rajaselvi, T. Kalyani, D. G. Thomas
35. Job Block Scheduling with Dual Criteria and Sequence-Dependent Setup Time Involving Transportation Times
Deepak Gupta, Kewal Krishan Nailwal, Sameer Sharma
36. Modular Chromatic Number of
N. Paramaguru, R. Sampathkumar
37. Network Analysis of Biserial Queues Linked with a Flowshop Scheduling System
Seema Sharma, Deepak Gupta, Sameer Sharma
38. Solving Multi-Objective Linear Fractional Programming Problem - First Order Taylor's Series Approximation Approach
C. Veeramani, M. Sumathi
39. Voronoi Diagram-Based Geometric Approach for Social Network Analysis
Subu Surendran, D. Chitraprasad, M. R. Kaimal
Part V. Short Papers
40. Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data
E. N. Sathishkumar, K. Thangavel, A. Nishama
41. Modified Soft Rough set for Multiclass Classification
S. Senthilkumar, H. Hannah Inbarani, S. Udhayakumar
42. A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment
P. Deepan Babu, T. Amudha
43. A Multifactor Biometric Authentication for the Cloud
Shabana Ziyad, A. Kannammal
44. Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet
Pinchu Prabha, O. K. Sikha, M. Suchithra, K. P. Soman
Avainsanat: Engineering, Computational Intelligence, Systems and Data Security, Computational Mathematics and Numerical Analysis, Artificial Intelligence (incl. Robotics), Mathematical Applications in Computer Science
- Tekijä(t)
- Krishnan, G. Sai Sundara
- Anitha, R.
- Lekshmi, R. S.
- Kumar, M. Senthil
- Bonato, Anthony
- Graña, Manuel
- Julkaisija
- Springer
- Julkaisuvuosi
- 2014
- Kieli
- en
- Painos
- 2014
- Sarja
- Advances in Intelligent Systems and Computing
- Sivumäärä
- 15 sivua
- Kategoria
- Tekniikka, energia, liikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9788132216803