LEADER 04253nam 22006255 450 001 9910254338003321 005 20200706164622.0 024 7 $a10.1007/978-981-10-3391-9 035 $a(CKB)3710000001095494 035 $a(DE-He213)978-981-10-3391-9 035 $a(MiAaPQ)EBC4821190 035 $a(PPN)199765111 035 $a(EXLCZ)993710000001095494 100 $a20170309d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Computing and Systems for Security $eVolume Four /$fedited by Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki 205 $a1st ed. 2017. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2017. 215 $a1 online resource (XI, 179 p. 66 illus.) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v568 311 $a981-10-3390-0 311 $a981-10-3391-9 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aA Review on Energy Efficient Resource Management Strategies for Cloud -- Modeling and Analysis of Enterprise Cloud Bus using a Petri Net Based Approach -- Service Provisioning in Cloud : A Systematic -- Flexible Neural Trees - Parallel Learning on HPC -- Software Energy Estimation to Improve Power Efficiency of Embedded System -- Ternary Quantum Circuit for Color Image Representation -- A graph theoretic approach for visualization of data set feature association -- A Novel Approach for Human Silhouette Extraction from Video Data -- Statistical Textural features for Text-line level Handwritten Indic Script Identification -- An Approach to Stroke-based Online Handwritten Bangla Character Recognition -- Functional Group Prediction of Un-annotated Protein by Exploiting its Neighborhood Analysis in Saccharomyces Cerevisiae. 330 $aThis book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca? Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v568 606 $aComputational intelligence 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aComputer security 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputational intelligence. 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aComputer security. 615 14$aComputational Intelligence. 615 24$aSignal, Image and Speech Processing. 615 24$aSystems and Data Security. 676 $a006.3 702 $aChaki$b Rituparna$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSaeed$b Khalid$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCortesi$b Agostino$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChaki$b Nabendu$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910254338003321 996 $aAdvanced Computing and Systems for Security$91539984 997 $aUNINA