Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 1st edition by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato – Ebook PDF Instant Download/Delivery. 8132216792, 978-8132216797
Full download Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 1st Edition after payment
Product details:
ISBN 10: 8132216792
ISBN 13: 978-8132216797
Author: G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 1st Table of contents:
- The Robber Strikes Back
- Applications of Collective Learning
- Subconscious Social Computational Intelligence
- Modeling Heavy-Tails in Traffic Sources for Network Performance Evaluation
- The Future of Access Control: Attributes, Automation, and Adaptation
- Optimal Control for an MX/G/1/N+1 Queue with Two Service Modes
- Gene Selection of Leukemia Dataset Using Clustering Methods
- Enhancing Network Stability in VANET with Energy Conservation of Roadside Infrastructures Using LPMA Agent
- An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical Dataset
- ELM-Based Ensemble Classifier for Gas Sensor Array Drift Dataset
- Hippocampus Atrophy Detection Using Hybrid Semantic Categorization
- Hyper Quadtree-Based K-Means Algorithm for Software Fault Prediction
- Localized Region-Based Active Contour Segmentation for Urinary Bladder Volume Measurement Using Ultrasound Images
- Improved Bijective Soft Set-Based Classification for Gene Expression Data
- Mammogram Image Classification Using Rough Neural Network
- Performance Assessment of Kernel-Based Clustering
- Registration of Ultrasound Liver Images Using Mutual Information Technique
- Sentiment Mining Using SVM-Based Hybrid Classification Model
- Shape-Based Image Classification and Retrieval with Multi-Resolution Enhanced Orthogonal Polynomials Model
- Using Fuzzy Logic for Product Matching
- Non-Repudiation Scheme with Voice Feature Marking
- Spam Detection Algorithm on Social Media Networks: A Study
- Botnets: Study and Analysis
- Comparative Study of Two and Multi-Class Classification for Malicious Executables Detection Using Soft Computing Techniques
- CRHA: Efficient HA Revitalization to Sustain Binding Information of Home Agent in MIPv6 Network
- Interaction Coupling: A Modern Coupling Extractor
- Secure Multicasting Protocols in Wireless Mesh Networks: A Survey
- A New Reversible SMG Gate and Its Application for Two’s Complement Adder/Subtractor with Overflow Detection Logic in Quantum Computing Systems
- Algorithm for Constructing Graceful Trees from Arbitrary Trees
- Characterization of Semi-Open Subcomplexes in Abstract Cellular Complex
- Fluid Queue Driven by an M/M/1 Queue Subject to Catastrophes
- Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack
- Hexagonal Prusa Grammar Model for Context-Free Hexagonal Picture Languages
- Iso-Triangular Pictures and Recognizability
- Job Block Scheduling with Dual Criteria and Sequence-Dependent Setup Time Involving Transportation Times
- Modular Chromatic Number of Cm × Cn
- Network Analysis of Bi-Serial Queues Linked with a Flowshop Scheduling System
- Solving Multi-Objective Linear Fractional Programming Problem Using First Order Taylor Series Approximation
- Voronoi Diagram-Based Geometric Approach for Social Network Analysis
- Comparative Analysis of Discretization Methods for Gene Selection of Breast Cancer Gene Expression Data
- Modified Soft Rough Set for Multi-Class Classification
- Novel Genetic Algorithm for Effective Job Scheduling in Grid Environment
- Multi-Factor Biometric Authentication for the Cloud
- Accelerating DES Performance on GPU with a Visualization Tool in Microsoft Excel Spreadsheet
People also search for Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 1st:
international journal of computational intelligence systems
applied computational intelligence and soft computing
ieee computational intelligence magazine
studies in computational intelligence
unitedworld school of computational intelligence