Computational Intelligence, Cyber Security and Computational Models (Record no. 93777)

000 -LEADER
fixed length control field 06245nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-81-322-1680-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220082526.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131126s2014 ii | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788132216803
-- 978-81-322-1680-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-81-322-1680-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q342
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM004000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Krishnan, G. Sai Sundara.
Relator term editor.
245 10 - TITLE STATEMENT
Title Computational Intelligence, Cyber Security and Computational Models
Medium [electronic resource] :
Remainder of title Proceedings of ICC3, 2013 /
Statement of responsibility, etc edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña.
264 #1 -
-- New Delhi :
-- Springer India :
-- Imprint: Springer,
-- 2014.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 416 p. 125 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Advances in Intelligent Systems and Computing,
International Standard Serial Number 2194-5357 ;
Volume number/sequential designation 246
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The Robber Strikes Back -- Some Applications of Collective Learning -- Subconscious Social Computational Intelligence -- Modeling Heavy-tails in Traffic Sources for Network Performance Evaluation -- The Future of Access Control: Attributes, Automation and Adaptation -- Optimal Control for an MX/G/1/N + 1 Queue with two Service Modes -- A Novel Approach for Gene Selection of Leukemia Dataset Using Different Clustering Methods -- A Study on Enhancing Network Stability in Vanet with Energy Conservation of Road Side Infrastructures Using LPMA Agent -- An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset -- ELM based ensemble classifier for Gas Sensor Array Drift Dataset -- Hippocampus Atrophy Detection Using Hybrid Semantic Categorization -- Hyper Quadtree based K-means Algorithm for Software Fault Prediction -- Implementation of Localized Region based Active Contour Segmentation for Volume Measurement of Urinary Bladder Using Ultrasound Images -- Improved Bijective Soft Set based Classification for Gene Expression Data -- Mammogram Image Classification Using Rough Neural Network -- Performance Assessment of Kernel based Clustering -- Registration of Ultrasound Liver Images Using Mutual Information Technique -- Sentiment Mining Using SVM based Hybrid Classification Model -- Shape based Image Classification and Retrieval with Multi-resolution Enhanced Orthogonal Polynomials Model -- Using Fuzzy Logic for Product Matching -- A Novel Non-Repudiate Scheme with Voice Feature Marking.-A Study of Spam Detection algorithm on Social Media Networks -- Botnets: A Study and Analysis -- Comparative Study of two and Multi Class Classification based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set -- CRHA: An Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network -- Interaction Coupling: A Modern Coupling Extractor -- Secure Multicasting Protocols in Wireless Mesh Networks - A Survey -- A New Reversible SMG Gate and its Application for Designing two’s Complement Adder/Subtractor with Overflow Detection Logic for Quantum Computer based Systems -- An Algorithm for Construction of Graceful Tree from an Arbitrary Tree -- Characterization of Semi-open Subcomplexes in Abstract Cellular Complex -- Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes -- Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack -- Hexagonal Prusa Grammar Model for Context Free Hexagonal Picture Languages -- Iso-Triangular Pictures and Recognisability -- Job Block Scheduling with Dual Criteria and Sequence Dependent Setup Time Involving Transportation Times -- Modular Chromatic Number of Cm Cn -- Network Analysis of Bi-Serial Queues Linked with a Flowshop Scheduling System -- Solving Multi-Objective Linear Fractional Programming Problem Using First Order -- Taylor’s Series Approximation -- Voronoi Diagram based Geometric Approach for Social Network Analysis -- Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data -- Modified Soft Rough Set for Multiclass Classification -- A Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment -- A Multifactor Biometric Authentication for the Cloud -- Accelerating the Performance of DES on GPU and a Visualization Tool in Microsoft Excel Spreadsheet.
520 ## - SUMMARY, ETC.
Summary, etc This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
General subdivision Mathematics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Mathematics and Numerical Analysis.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mathematical Applications in Computer Science.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Anitha, R.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lekshmi, R. S.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, M. Senthil.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bonato, Anthony.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Graña, Manuel.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9788132216797
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in Intelligent Systems and Computing,
-- 2194-5357 ;
Volume number/sequential designation 246
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-81-322-1680-3
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue