• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Advanced computing and systems for security

پدید آورنده
/ Edited by Rituparna Chaki... [et al.].

موضوع
Computational intelligence -- Congresses.,Machine learning -- Congresses.,Computer security -- Congresses.,Computational intelligence, Machine learning, Computer security.

رده

کتابخانه
Central library and document university of Kurdistan

محل استقرار
استان: Kurdistan ـ شهر: Sanandaj

Central library and document university of Kurdistan

تماس با کتابخانه : 9-08733624006و 08733664600

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
9789811332494

NATIONAL BIBLIOGRAPHY NUMBER

Number
3714

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Advanced computing and systems for security
General Material Designation
[electronic resources]
First Statement of Responsibility
/ Edited by Rituparna Chaki... [et al.].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Singapore
Name of Publisher, Distributor, etc.
: Springe
Date of Publication, Distribution, etc.
, 2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
v.
Other Physical Details
: illustrations (some color), tables.

SERIES

Series Title
Advances in intelligent systems and computing, 897.

GENERAL NOTES

Text of Note
Editors: Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki.

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Intro; Preface; Contents; About the Editors; Security Systems; Enhancing Security in ROS; 1 Introduction; 2 Security Enhancements; 3 Technical Overview; 3.1 Robot Operating System; 3.2 SROS: Secure ROS; 4 Access Control Policy Generation; 4.1 Security Logging; 4.2 Policy Profile Syntax; 5 X.509 Certificate: Distribution Architecture; 5.1 User-Pull Architecture; 5.2 Server-Pull Architecture; 6 Related Work; 7 Conclusion; References; Byte Label Malware Classification Using Image Entropy; 1 Introduction; 2 Background; 2.1 Malware Analysis Techniques; 2.2 Texture Analysis of an Executable 2.3 Image Entropy in Malware Analysis3 Related Work; 4 Malware Classification Using Image Entropy; 4.1 Byte-to-Image Conversion; 4.2 Entropy Filter; 4.3 GIST Feature; 5 Experiments; 5.1 Dataset; 5.2 Experimental Result; 6 Conclusion; References; Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer; 1 Introduction; 1.1 Data Security and Privacy; 1.2 The Need for Privacy and Security in Big Data; 1.3 The Need for Light Weight Encryption; 1.4 Proposed Secure MapReduce (SMR) Model; 2 Related Work; 3 Proposed Work; 3.1 Overview; 3.2 Concept of Randomization 3.3 Perturbing the Data3.4 Hash Mapping; 3.5 Encryption; 3.6 Decryption; 3.7 Description of SMR Encryption Algorithm; 3.8 Application of Query on the Encrypted Data; 3.9 Description of SMR Decryption Algorithm; 4 Dataset Description; 4.1 Accessing the Twitter API; 4.2 Understanding Twitter Data; 4.3 Collecting Data; 5 Implementation and Results; 5.1 Encryption Side Implementation; 5.2 Decryption Side Implementation; 5.3 Results; 6 Conclusion and Future Work; References; IoT and Networks; Ambient Monitoring in Smart Home for Independent Living; 1 Introduction; 2 Literature Review 3 Proposed Framework of an Ambient Monitoring System3.1 SH Data Acquisition; 3.2 Monitoring System; 3.3 Tracking System; 4 Results and Discussion; 5 Conclusions; References; The Conceptual Approach of System for Automatic Vehicle Accident Detection and Searching for Life Signs of Casualties; 1 Introduction; 2 eCall System; 3 Authors' Approach; 4 Accident Detection; 5 Human Presence Detection; 6 Vital Signs; 6.1 Respiratory Rate; 6.2 Heart Rate; 7 Conclusions and Future Works; References; Disaster Management System Using Vehicular Ad Hoc Networks; 1 Introduction; 2 Related Works 3 Models and Design Goals3.1 System Model; 3.2 Design Requirements; 4 Proposed Solution: Disaster Management System; 5 Performance Analysis; 5.1 Probabilistic Analysis; 5.2 Simulation; 6 Conclusions; References; Pattern Recognition; A Computer-Aided Hybrid Framework for Early Diagnosis of Breast Cancer; 1 Introduction; 2 Proposed System; 2.1 Preprocessing; 2.2 Suspicious Regions Segmentation; 2.3 Feature Extraction; 2.4 Classifier Design; 3 Experimental Results and Discussion; 3.1 Database Collection; 3.2 Performance Assessment; 3.3 Classification; 4 Conclusion; References
0

SUMMARY OR ABSTRACT

Text of Note
The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

TOPICAL NAME USED AS SUBJECT

Entry Element
Computational intelligence -- Congresses.
Entry Element
Machine learning -- Congresses.
Entry Element
Computer security -- Congresses.

UNCONTROLLED SUBJECT TERMS

Subject Term
Computational intelligence, Machine learning, Computer security.

PERSONAL NAME - SECONDARY RESPONSIBILITY

Entry Element
Chaki, Rituparna,
Relator Code
Editor

ORIGINATING SOURCE

Country
ایران
Agency
Central Library of the Kurdistan University
Date of Transaction
20181015101400.0
Cataloguing Rules (Descriptive Conventions))
rda

e

BL
280328

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival