Coverart for item
The Resource Applied Computation and Security Systems : Volume One

Applied Computation and Security Systems : Volume One

Label
Applied Computation and Security Systems : Volume One
Title
Applied Computation and Security Systems
Title remainder
Volume One
Creator
Contributor
Subject
Language
eng
Summary
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different Parts.?Part 1?is on Pattern Recognition and it presents four chapters.?Part 2?is on Imaging and Healthcare Applications contains four more book chapters. The?Part 3?of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three?Parts presenting a total of eleven chapters in it.?Part 4?consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory.?Part 5?in Volume II is on Cryptography with two book chapters in it.?Part?6?of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Advances in Intelligent Systems and Computing Ser.
Series volume
v.304
Applied Computation and Security Systems : Volume One
Label
Applied Computation and Security Systems : Volume One
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=1802632
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Contents -- About the Editors -- Part IPattern Recognition -- 1 An Algorithm for Extracting Feature from Human Lips -- Abstract -- 1{u2026}Introduction and State of the Art -- 2{u2026}Algorithm -- 2.1 Image Database -- 2.2 Face Extraction -- 2.3 Mouth Extraction -- 2.4 Feature Extraction -- 2.5 Classification -- 3{u2026}Experiments and Results -- 4{u2026}Conclusions -- Acknowledgment -- References -- 2 Feature Selection using Particle Swarm Optimization for Thermal Face Recognition -- Abstract -- 1{u2026}Introduction -- 2{u2026}Proposed Method -- 2.1 Preprocessing -- 2.2 Extraction of Features -- 2.3 Feature Selection -- 3{u2026}Experiment and Results -- 3.1 Comparison with Other Methods -- 4{u2026}Conclusions -- Acknowledgments -- References -- 3 Retinal Feature Extraction with the Influence of Its Diseases on the Results -- Abstract -- 1{u2026}Introduction -- 2{u2026}Proposed Methodology -- 2.1 Preprocessing -- 2.2 Mask Creation -- 2.3 Vessels Segmentation -- 2.4 Thinning -- 2.5 Minutiae Extraction -- 2.6 Feature Vector Creation -- 3{u2026}Experimental Results -- 4{u2026}Result Analysis and Conclusions -- Acknowledgments -- References -- 4 Iris Feature Extraction with the Influence of Its Diseases on the Results -- Abstract -- 1{u2026}Introduction -- 2{u2026}Proposed Methodology -- 2.1 Preprocessing -- 2.2 Pupil Localization -- 2.3 Finding Eyelid and Eyelashes -- 2.4 Finding Reflections -- 2.5 Mask Creation -- 2.6 Finding Iris and Pupil Radius -- 2.7 Iris Normalization -- 2.8 Features Vector Extraction -- 2.9 Feature Vectors Comparison -- Acknowledgment -- References -- Part IIImaging and Healthcare Applications -- 5 An Automatic Non-invasive System for Diagnosis of Tuberculosis -- Abstract -- 1{u2026}Introduction -- 2{u2026}The System -- 2.1 Image Acquisition -- 2.2 Image Enhancement -- 2.3 Information Extraction -- 2.4 Segmentation -- 2.4.1 Remove the Noise Contours -- 2.5 Detection and Classification
  • 3{u2026}Simulation and Results -- 4{u2026}Conclusion -- Acknowledgments -- References -- 6 Automated Vertebral Segmentation from CT Images for Computation of Lumbolumbar Angle -- Abstract -- 1{u2026}Introduction -- 2{u2026}Proposed Method -- 2.1 Image Denoising -- 2.2 Vertebral Segmentation -- 2.2.1 Graph Cut -- 2.2.2 Automated Selection of Source -- 2.3 Extraction of Vertebral Body and End Plates of Vertebrae -- 2.4 Lumbolumbar Angle Computation -- 3{u2026}Results and Discussion -- 4{u2026}Conclusion -- References -- 7 An Approach for Micro-Tomography Obtained Medical Image Segmentation -- Abstract -- 1{u2026}Introduction -- 2{u2026}State of the Art -- 2.1 Some Existing Approaches Applied to Our Sample Image -- 3{u2026}Used Methods -- 3.1 Bilateral Filter -- 3.2 Canny-Deriche Edge Detector -- 4{u2026}The Proposed Methodology -- 5{u2026}Experimental Results and Interpretation -- Acknowledgments -- References -- 8 Flexible Cloud Architecture for Healthcare Applications -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Works -- 3{u2026}Scope of the Work -- 4{u2026}Flexible Cloud Architecture for Healthcare Applications -- 5{u2026}Analysis of FCAHCA Using UML -- 5.1 Use Case Representation of FCAHCA -- 5.2 Interaction Among Different Components of FCAHCA -- 6{u2026}Illustration of FCAHCA -- 7{u2026}Conclusion -- References -- Part IIIWireless Sensor Networking -- 9 An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperation -- Abstract -- 1{u2026}Introduction -- 2{u2026}A 2 x 2 Cognitive Radio Model Using Orthogonal Polarization -- 3{u2026}Proposed Scheme for Interference Mitigation for a 2 x 2 Cognitive Radio -- 4{u2026}Modeling for Imperfect CSI and Analysis for Average Symbol Error Probability and Outage Probability -- 5{u2026}Simulations and Discussion -- 6{u2026}Conclusions -- Acknowledgments -- References
  • 10 Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Data Aggregating Multi-sink Wireless Sensor Network -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Works -- 3{u2026}Proposed Scheme -- 4{u2026}Results -- 4.1 Effect of Source Selection -- 4.2 Effect of Deployment Pattern -- 4.3 Effect of Forwarding Technique -- 4.4 Effect of Packet Size -- 5{u2026}Conclusion -- References -- 11 Power Optimized Real Time Communication Through the Mobile Sink in WSNs -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Works -- 3{u2026}Network Model -- 4{u2026}Problem Definition -- 5{u2026}Proposed Protocol Architecture -- 5.1 Primary Setup Phase for Cluster Formation, CH Selection, and Schedule Creation -- 5.2 Regular Setup Phase for Selecting CHs at Non-Initial Round -- 5.3 Steady Phase for Real- and Non-Real-Time Communication -- 5.4 Algorithm and Pseudo Codes (Partial) -- 6{u2026}Performance Analysis and Simulation -- 6.1 Energy Efficiency of the Protocol -- 6.2 Traffic Delay Comparison for Real-Time Communication -- 7{u2026}Conclusion -- References -- 12 Performance of Incremental Redundancy-Based Data Transmission in Randomly Deployed Wireless Sensor Network -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Works -- 3{u2026}Network Model and Problem Description -- 3.1 Network Architecture -- 3.2 Routing Protocol -- 3.3 MAC Protocol -- 3.4 Channel Model -- 3.5 Transmission Schemes -- 3.6 Connectivity -- 3.7 BER at the End of a Multihop Route -- 3.8 Optimal Common Transmit Power for Random Networks -- 3.9 Algorithm for IR Scheme -- 3.10 Energy Model -- 4{u2026}Simulation Model -- 5{u2026}Simulation Results -- 6{u2026}Conclusion -- References -- 13 Trust-Based Routing for Vehicular Ad Hoc Network -- Abstract -- 1{u2026}Introduction -- 2{u2026}Related Works -- 3{u2026}Trust-Based Routing Protocol for Vehicular Ad Hoc Networks -- 3.1 Registration Procedure -- 3.2 Communication Procedure -- 4{u2026}Performance Analysis -- 5{u2026}Conclusions
  • References -- 14 Study on Handover Mechanism in Cellular Network: An Experimental Approach -- Abstract -- 1{u2026}Introduction -- 2{u2026}State-of-the-Art Review -- 3{u2026}Simulation -- 3.1 Impact of redundant base station to lower the call drop -- 3.2 Impact of Resource Provisioning on Throughput -- 3.3 Impact of Specific Signaling Schedules on Handover -- 4{u2026}Conclusions -- References -- Author Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9788132219859&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4382848'}
Edition
1st ed.
Extent
1 online resource (217 pages)
Form of item
online
Isbn
9788132219859
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...