eBook Computational Intelligence, Cyber Security and Computational Models, 1st Edition

  • Published By:
  • ISBN-10: 8132216806
  • ISBN-13: 9788132216803
  • DDC: 006.3
  • Grade Level Range: College Freshman - College Senior
  • 416 Pages | eBook
  • Original Copyright 2014 | Published/Released June 2014
  • This publication's content originally published in print form: 2014
  • Price:  Sign in for price



This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

Table of Contents

Front Cover.
Editorial Board.
Other Frontmatter.
Title Page.
Copyright Page.
1: Keynote Address.
2: The Robber Strikes Back.
3: Some Applications of Collective Learning.
4: Subconscious Social Computational Intelligence.
5: Modeling Heavy Tails in Traffic Sources for Network Performance Evaluation.
6: The Future of Access Control: Attributes, Automation, and Adaptation.
7: Optimal Control for an MX/G/1/N + 1 Queue with Two Service Modes.
8: Computational Intelligence.
9: A Novel Approach to Gene Selection of Leukemia Dataset Using Different Clustering Methods.
10: A Study on Enhancing Network Stability in VANET with Energy Conservation of Roadside Infrastructures Using LPMA Agent.
11: An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset.
12: ELM-Based Ensemble Classifier for Gas Sensor Array Drift Dataset.
13: Hippocampus Atrophy Detection Using Hybrid Semantic Categorization.
14: Hyper-Quadtree-Based K-Means Algorithm for Software Fault Prediction.
15: Measurement of Volume of Urinary Bladder by Implementing Localizing Region-Based Active Contour Segmentation Method.
16: Improved Bijective-Soft-Set-Based Classification for Gene Expression Data.
17: Mammogram Image Classification Using Rough Neural Network.
18: Performance Assessment of Kernel-Based Clustering.
19: Registration of Ultrasound Liver Images Using Mutual Information Technique.
20: Sentiment Mining Using SVM-Based Hybrid Classification Model.
21: Shape Based Image Classification and Retrieval with Multiresolution Enhanced Orthogonal Polynomial Model.
22: Using Fuzzy Logic for Product Matching.
23: Cyber Security.
24: A Novel Non-repudiate Scheme with Voice Feature Marking.
25: A Study of Spam Detection Algorithm on Social Media Networks.
26: Botnets: A Study and Analysis.
27: Comparative Study of Two- and Multi-Class-Classification-Based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set.
28: CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network.
29: Interaction Coupling: A Modern Coupling Extractor.
30: Secure Multicasting Protocols in Wireless Mesh Networks—A Survey.
31: Computational Models.
32: A New Reversible SMG Gate and Its Application for Designing Two's Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer-Based Systems.
33: An Algorithm for Constructing Graceful Tree from an Arbitrary Tree.
34: Characterization of Semi-open Subcomplexes in Abstract Cellular Complex.
35: Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes.
36: Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack.
37: Hexagonal Prusa Grammar Model for Context-Free Hexagonal Picture Languages.
38: Iso-Triangular Pictures and Recognizability.
39: Job Block Scheduling with Dual Criteria and Sequence-Dependent Setup Time Involving Transportation Times.
40: Modular Chromatic Number of Cm □ Cn.
41: Network Analysis of Biserial Queues Linked with a Flowshop Scheduling System.
42: Solving Multi-Objective Linear Fractional Programming Problem—First Order Taylor's Series Approximation.
43: Voronoi Diagram-Based Geometric Approach for Social Network Analysis.
44: Short Papers.
45: Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data.
46: Modified Soft Rough set for Multiclass Classification.
47: A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment.
48: A Multifactor Biometric Authentication for the Cloud.
49: Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet.
About the Editors.
Author Index.