Coverart for item
The Resource Applied Computation and Security Systems : Volume Two

Applied Computation and Security Systems : Volume Two

Label
Applied Computation and Security Systems : Volume Two
Title
Applied Computation and Security Systems
Title remainder
Volume Two
Creator
Contributor
Subject
Language
eng
Summary
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts.?Part 1?is on?Pattern Recognition?and it presents four chapters.?Part 2?is on?Imaging and Healthcare Applications?contains four more book chapters. The?Part 3?of this volume is on?Wireless Sensor Networking?and it includes as many as six chapters.Volume II of the book has three?Parts presenting a total of eleven chapters in it.?Part 4 consists of five excellent chapters on?Software Engineering?ranging from cloud service design to transactional memory.?Part 5?in Volume II is on?Cryptography?with two book chapters in it.?Part 6?of this volume is on?Computer Aided Design?with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advances in Intelligent Systems and Computing Ser.
Series volume
v.305
Applied Computation and Security Systems : Volume Two
Label
Applied Computation and Security Systems : Volume Two
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=1802567
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Contents -- About the Editors -- Part ISoftware Engineering -- 1 Non-functional Property Aware Brokerage Approach for Cloud Service Discovery -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Work -- 3{u2026}Proposed Solution -- 3.1 The Proposed Meta-Model -- 3.2 Description of the Framework -- 3.3 Service Discovery Algorithm -- 4{u2026}Illustration with Example -- 5{u2026}Conclusion -- References -- 2 A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration -- Abstract -- 1{u2026}Introduction -- 2{u2026}Background -- 2.1 Discrete Wavelet Transform -- 3{u2026}Proposed Scheme -- 3.1 Watermark Preparation -- 3.1.1 Block Mapping Address Generation Algorithm -- 3.2 Watermark Generation -- 3.3 Watermark Embedding -- 3.4 Watermark Extraction: Tamper Detection, Localization, and Restoration -- 4{u2026}Experimental Results -- 4.1 Imperceptibility of Watermark -- 4.2 Payload -- 4.3 Performance Against Tampering -- 4.4 Comparative Study -- 5{u2026}Conclusion -- References -- 3 Service Insurance: A New Approach in Cloud Brokerage -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Work -- 3{u2026}Proposed Work -- 3.1 Component Description of the Framework -- 3.2 Workflow of the Framework -- 4{u2026}Risk Analysis -- 4.1 Causes Behind Risk Identification -- 4.2 Service Life Cycle and Risks -- 4.3 Service Governance and Related Risks -- 4.4 Service Development and Risks -- 4.5 Service Release and Communication and Related Risks -- 4.6 Service Offering and Risks -- 5{u2026}Risk Modeling -- 6{u2026}Conclusion -- References -- 4 Using Semiformal and Formal Methods in Software Design: An Integrated Approach for Intelligent Learning Management System -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Work -- 3{u2026}Proposed Framework -- 4{u2026}The Case Study -- 5{u2026}Requirement Specification -- 6{u2026}Design Model -- 6.1 Consistency Rules -- 6.2 Use Case Diagram -- 6.3 Activity Diagram -- 6.4 Class Diagram
  • 6.5 Sequence Diagram -- 6.6 VDM-SL Specification -- 7{u2026}Design Verification -- 7.1 Verifying Continuity -- 7.2 Verifying Requirement -- 8{u2026}Conclusions -- References -- 5 A Lightweight Implementation of Obstruction-Free Software Transactional Memory -- Abstract -- 1{u2026}Introduction -- 2{u2026}Software Transactional Memory and Progress Condition -- 3{u2026}Scope of the Work -- 4{u2026}Simulation of the Proposed Lightweight OFTM -- 4.1 Definitions -- 4.2 Assumptions -- 4.3 Algorithm -- 5{u2026}Performance Evaluation by Experiments -- 5.1 Plan for Experimental Verification -- 5.2 Experimental Results -- 6{u2026}Concluding Remarks -- References -- Part IICryptography -- 6 Multiplicative Polynomial Inverse Over GF(73): Crisis of EEA and Its Solution -- Abstract -- 1{u2026}Introduction -- 2{u2026}EEA and Multiplicative Inverse in GF(28) and GF(73) -- 2.1 The EEA with Examples and Its Computational Algorithm -- 2.1.1 Computational Algorithm to Find S and T -- 2.2 Successful Application of EEA to Find Multiplicative Inverse Over GF(28) -- 2.3 Successful Application of EEA to Find Multiplicative Inverse Over GF(73) -- 2.4 Unsuccessful Application of EEA to Find Multiplicative Inverse Over GF(73) -- 2.5 Comparative Study of Success and Failures of EEA Over GF(28) and GF(73) -- 3{u2026}Proposed Algebraic Method and Multiplicative Inverse Over GF(73) -- 3.1 Algebraic Method to Find the Multiplicative Inverse Over GF(73) -- 3.2 Multiplicative Inverse of 2x + 4 in GF(73) by Using the Algebraic Method -- 3.3 Multiplicative Inverse of 2x2 + 5x + 3 in GF(73) by Using the Algebraic Method -- 4{u2026}Computational Algorithm -- 5{u2026}Results, Discussion, and Future Scopes -- 6{u2026}Conclusion -- Acknowledgments -- References -- 7 A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle -- Abstract -- 1{u2026}Introduction -- 1.1 Biometric System Vulnerabilities -- 1.1.1 Intrinsic Limitations -- 1.1.2 Adversary Attacks
  • 2{u2026}Introduction to Sudoku -- 3{u2026}Existing Biometric Template Encryption Scheme -- 4{u2026}Biometric Template Encryption Scheme Using Sudoku -- 4.1 Biometric Template Decryption Technique -- 4.2 The Designed Sudoku Solving Algorithm -- 5{u2026}Experimental Results: Analysis and Discussion -- 5.1 Computation Time -- 5.2 Robustness -- 5.3 More Number of Keys -- 6{u2026}Conclusion -- References -- Part IIIComputer Aided Design -- 8 An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated Annealing -- Abstract -- 1{u2026}Introduction -- 2{u2026}Background of ESOP-Based Synthesis -- 2.1 Reversible Logic and Reversible Gates -- 2.2 ESOP-Based Synthesis Techniques -- 3{u2026}Theoretical Framework for the Work -- 3.1 Cube Transformation Rules -- 4{u2026}The Proposed Synthesis Approach -- 4.1 Cube Transformation Using Simulated Annealing -- 4.2 Cube to Reversible Gate Mapping -- 5{u2026}Experimental Results -- 6{u2026}Conclusion -- References -- 9 An Efficient Algorithm for Reducing Wire Length in Three-Layer Channel Routing -- Abstract -- 1{u2026}Introduction -- 2{u2026}Formulation of the Problem and the Proposed Algorithm -- 3{u2026}Experimental Results and Performance of Our Algorithm -- 4{u2026}Conclusion -- References -- 10 A New Move Toward Parallel Assay Operations in a Restricted Sized Chip in Digital Microfluidics -- Abstract -- 1{u2026}Introduction -- 2{u2026}Preliminaries and Inherent Constraints -- 2.1 Preliminaries -- 2.2 Constraints in Performing Bioassay Operations -- 2.3 Various Fundamental Operations on DMFB -- 2.4 Strengths and Limitations of DMFB -- 3{u2026}A Brief Literature Survey on DMFB -- 3.1 Direct Addressing Pin Configuration -- 3.2 Array-Based Partitioning -- 3.3 Cross-referencing -- 3.4 Broadcasting -- 4{u2026}A 15 x 15 Array and Its Working Principle -- 4.1 The Existing Bioassay -- 4.2 A Modification Over the 15 x 15 Array -- 4.3 Requirements and Objectives Toward Parallelism
  • 5{u2026}A New Algorithm for Parallel Bioassay Operations -- 5.1 An Algorithm for Pin Assignment -- 5.2 Working of the Chip -- 5.3 An Example Run of Assay Operations in Parallel -- 5.4 Experimental Results -- 6{u2026}Conclusion -- References -- 11 A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area -- Abstract -- 1{u2026}Introduction -- 2{u2026}Literature Survey -- 3{u2026}Formulation of the Problem and the Algorithm -- 3.1 Phase-I of the Algorithm -- 3.2 Phase-II of the Algorithm -- 3.3 Algorithm at a Glance -- 4{u2026}Complexity Analysis -- 5{u2026}Applications and Conclusion -- References -- Author Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9788132219880&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4382842'}
Edition
1st ed.
Extent
1 online resource (214 pages)
Form of item
online
Isbn
9788132219880
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...