Coverart for item
The Resource Advanced Computing and Systems for Security : Volume 2

Advanced Computing and Systems for Security : Volume 2

Label
Advanced Computing and Systems for Security : Volume 2
Title
Advanced Computing and Systems for Security
Title remainder
Volume 2
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advances in Intelligent Systems and Computing Ser.
Series volume
v.396
Advanced Computing and Systems for Security : Volume 2
Label
Advanced Computing and Systems for Security : Volume 2
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4098030
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Contents -- About the Editors -- Part I Signal Processing -- 1 Design and Development of Marathi Speech Interface System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Speech Recognition and Feature Extraction Techniques -- 3.1 Feature Extraction Techniques -- 3.1.1 Fusion-Based Feature Extraction Techniques -- 3.1.2 WDCC: Proposed Approach -- 4 Design of Marathi Speech Interface System -- 4.1 Database Design -- 4.2 Marathi Speech Activated Calculator (MSAC) -- 5 Experimental Analysis -- 5.1 Performance of the Marathi Speech Activated Calculator (MSAC) System -- 5.2 Training of MSAC System -- 5.3 Testing of MSAC System -- 5.4 Significance of MSAC -- 6 Conclusion -- References -- 2 Fusion-Based Noisy Image Segmentation Method -- Abstract -- 1 Introduction -- 2 Used Methods -- 2.1 Bilateral Filter -- 2.2 Canny--Deriche Edge Detector -- 2.3 Active Contours (Snakes) and Gradient Vector Flow (GVF) -- 2.4 Statistical Region Merging (SRM) and Multilevel Thresholding -- 3 The Proposed Methodology -- 4 Experimental Results and Interpretation -- 5 Evaluation and Comparison of Results -- Acknowledgements -- References -- 3 An Approach for Automatic Indic Script Identification from Handwritten Document Images -- Abstract -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preprocessing -- 2.2 Feature Extraction -- 3 Experimental Details -- 3.1 Dataset Development -- 3.2 Experimental Protocol -- 3.3 Evaluation Using Multiple Classifiers -- 3.4 Result and Analysis -- 3.5 Comparative Study -- 4 Conclusion and Future Scope -- References -- 4 Writer Verification on Bangla Handwritten Characters -- Abstract -- 1 Introduction -- 2 Brief Survey on Writer Verification/Identification -- 3 Method -- 4 Database and Preprocessing -- 5 Feature Extraction -- 5.1 MFFT (Modified Fast Fourier Transform) -- 5.2 MGLCM (Modified Gray Level Co-occurrence Matrix)
  • 5.3 MDCT (Modified Discrete Cosine Transform) -- 6 Verification -- 7 Results -- 7.1 Result of Writer Verification -- 7.2 Comparative Study -- 8 Conclusion -- Acknowledgments -- References -- 5 Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT) -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Face Detection -- 3.2 Interest Point Detection -- 3.3 Feature Descriptors -- 3.4 Descriptors Matching -- 4 Implementation and Results -- 5 Conclusion -- Acknowledgment -- References -- 6 Registration of Range Images Using a Novel Technique of Centroid Alignment -- Abstract -- 1 Introduction -- 2 Literature Survey on 3D Face Registration -- 3 Present Method -- 3.1 3D Face Registration -- 4 Comparative Analysis of the Present Approach with Other Methods Existing in the Literature -- 5 Conclusion and Future Scope of the Work -- Acknowledgement -- References -- Part II Software Engineering -- 7 An Investigation into Effective Test Coverage -- Abstract -- 1 Introduction -- 1.1 Definition-Use (Du-Paths) Path Coverage -- 1.2 Enhancement in Coverage on Path-Based Metric -- 1.3 Dependence Paths Coverages -- 2 Basic Concepts -- 2.1 Control Flow Graph -- 2.2 Definition-Use Graph -- 2.3 Concept Learning -- 2.4 Abstract Interpretation -- 2.5 Reliability of Networks -- 2.6 Acceptance Tests -- 2.7 Program Slicing -- 2.8 Complexity Metric -- 3 Desirables of the Test Metric -- 3.1 Set of Test Paths Included -- 3.2 Definition of Underlying Hypothesis and Structure -- 3.3 Extendability, Subsumption, Relation on Established Metric -- 3.4 Hypothesis Induced Per Path in the Tests Run, and/or Paths Induced Per Hypothesis -- 3.5 Compatibility with Specific Applications -- 4 Weyuker's Properties and Dependence Path Coverage Metric -- 5 Conclusion -- References
  • 8 Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN) -- Abstract -- 1 Introduction -- 1.1 Memory Leak -- 1.2 Dangling Pointer -- 2 Resource Management Techniques -- 2.1 Classical Resource Management -- 2.2 Resource Management for Native Language -- 3 Resource Management Using Dynamic Instrumentation -- 4 Implementation -- 5 Functional and Performance Testing -- 5.1 Correctness of GC Pintool -- 5.2 Performance of GC Pintool -- 6 Conclusion -- References -- 9 A Study on Software Risk Management Strategies and Mapping with SDLC -- Abstract -- 1 Introduction -- 2 Risk Management Models -- 3 Risks at Each Level of SDLC -- 4 Mapping of Models for Different Stages -- 5 Conclusions -- References -- 10 A New Service Discovery Approach for Community-Based Web -- Abstract -- 1 Introduction -- 2 Proposed Solution -- 2.1 Registry Organization -- 2.2 Defining the Community Schema -- 2.3 Organization of a Community -- 2.4 Membership Alteration and Threshold Adjustment -- 3 Illustration with an Example -- 4 Service Discovery Algorithm and Analysis -- 5 Conclusion -- References -- 11 Data-Flow Analysis-Based Approach of Database Watermarking -- Abstract -- 1 Introduction -- 1.1 Related Works -- 1.2 Motivations -- 1.3 Contributions -- 2 Running Example -- 3 Basic Concepts -- 4 Proposed Technique -- 4.1 Data-Flow Analysis -- 4.2 Watermarking of Invariant Parts -- 4.3 Watermarking of Applications Using Opaque Predicates -- 5 Complexity Analysis -- 6 Security Analysis -- 7 Experimental Results -- 8 Conclusions -- References -- 12 A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development -- Abstract -- 1 Introduction -- 2 Working Principle of Proposed Framework -- 2.1 Component Management -- 2.2 Configuration Management -- 2.3 Compliance Management
  • 3 Application of this Model in Smart Grid Architecture -- 4 Future Work and Conclusions -- 5 Acknowledgment -- References -- 13 CAD-Based Analysis of Power Distribution Network for SOC Design -- Abstract -- 1 Introduction -- 2 Proposed CAD-Based Design -- 2.1 Resistance Distribution Profile Generation in MATLAB -- 2.2 Generation of Circuits and SOC -- 2.3 Analysis in ASIC Platform -- 3 Resistance Distribution Profile -- 4 Benchmark Circuits and Associated CryptoCores -- 4.1 Data Encryption Standard (DES) -- 4.2 Advanced Encryption Standard (AES) -- 5 Analysis in ASIC Platform -- 6 Implementation and Results -- 7 Conclusion -- References -- Part III Algorithms -- 14 A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus -- Abstract -- 1 Motivation and Problem Definition -- 2 Review on Voting-Based ME Algorithms -- 3 The Proposed Hybrid Algorithm -- 4 Performance Analysis -- 4.1 Safety -- 4.2 Progress Condition -- 4.3 Correctness -- 4.4 Storage Requirement -- 4.5 Message Complexity -- 5 Simulation Result -- 5.1 Simulation Performance of the Proposed Algorithm with TB-DVA and RA -- 5.1.1 Time Complexity of the Proposed Algorithm as Compared to TB-DVA -- 5.1.2 Message Complexity of Proposed Algorithm as Compared to RA Algorithm -- 6 Conclusions -- References -- 15 A Comprehensive Sudoku Instance Generator -- Abstract -- 1 Introduction -- 1.1 Metrics of Difficulty Level -- 1.1.1 The Total Amount of Given Cells -- 1.1.2 The Lower Bound on the Number of Clues in Each Row, Column, and Minigrid -- 1.2 Uniqueness of Sudoku Instances -- 2 Generating a Sudoku Instance from a Solved Sudoku Puzzle -- 2.1 Randomized Selection of Cell Location -- 2.2 Sequential Selection of Cell Location -- 2.2.1 Wandering Along S (or Zigzag) Path -- 2.2.2 Wandering from Left to Right or the Reverse -- 2.2.3 Symmetrical Removal of Values from Rows
  • 2.2.4 Symmetrical Removal of Values from Columns -- 2.2.5 Symmetrical Removal of Values from Minigrids -- 2.3 Flowchart at a Glance for the Digging Hole Strategy -- 3 A New Scheme for Creating an Instance Based on Transformations of a Sudoku Puzzle -- 3.1 Digit Exchanging -- 3.2 Rotation -- 3.2.1 Rotation by 90 Degree -- 3.2.2 Rotation by 180 Degree -- 3.2.3 Flipping Vertical Rotation -- 3.2.4 Flipping Horizontal Rotation -- 3.3 Rows-in-a-Band Exchanging -- 3.4 Columns-in-a-Stack Exchanging -- 3.5 Band Exchanging -- 3.6 Stack Exchanging -- 3.7 A Combination of All Six Methods -- 3.8 A Graph Theoretic Technique to Compute the Number of Solutions for a Produced Sudoku Instance -- 4 Conclusion -- References -- 16 Implementing Software Transactional Memory Using STM Haskell -- Abstract -- 1 Introduction -- 2 Retrospection of an OFTM Solution Towards Abort Freedom -- 3 Implementing STM Using STM Haskell -- 3.1 Important System Variables -- 3.2 Implementation -- 4 Simulation Results -- 4.1 Case-I: Lower Average Execution Time -- 4.2 Case-II: Medium Average Execution Time -- 4.3 Case-III: Higher Average Execution Time -- 4.4 Productivity Improvement with Parallel Execution -- 4.5 Summary of Results -- 5 Conclusions -- References -- 17 Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Random Search Method -- 2.2 Box's Evolutionary Method -- 2.3 Hooke Jeeves' Method -- 2.4 Gradient Descent Method -- 2.5 Genetic Algorithm -- 3 Linear Fractional Programming -- 4 The Experiment -- 4.1 Random Search -- 4.2 Box Evolutionary Method -- 4.3 Hooke's Jeeves Pattern Search -- 4.4 Gradient Ascent Method (Cauchy's Method) -- 4.5 Genetic Algorithm -- 5 Result -- 6 Conclusion -- Acknowledgements -- Appendix -- References
  • 18 An Algorithm to Solve 3D Guard Zone Computation Problem
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9788132226536&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4384205'}
Extent
1 online resource (324 pages)
Form of item
online
Isbn
9788132226536
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...