Advanced Computing and Systems for Security: Volume 2 by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu

By Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki

The e-book comprises the prolonged model of the works which were offered and mentioned within the moment foreign Doctoral Symposium on utilized Computation and safety structures (ACSS 2015) held in the course of could 23-25, 2015 in Kolkata, India. The symposium has been together prepared by way of the AGH college of technology & know-how, Cracow, Poland; Ca’ Foscari collage, Venice, Italy and collage of Calcutta, India. The booklet is split into volumes and provides dissertation works within the parts of photograph Processing, Biometrics-based Authentication, smooth Computing, information Mining, subsequent iteration Networking and community defense, distant Healthcare, Communications, Embedded platforms, software program Engineering and repair Engineering.

Show description

Read or Download Advanced Computing and Systems for Security: Volume 2 PDF

Best computing books

Artificial Intelligence and Soft Computing – ICAISC 2008: 9th International Conference Zakopane, Poland, June 22-26, 2008 Proceedings

This e-book constitutes the refereed lawsuits of the ninth foreign convention on synthetic Intelligence and tender Computing, ICAISC 2008, held in Zakopane, Poland, in June 2008. The 116 revised contributed papers offered have been rigorously reviewed and chosen from 320 submissions. The papers are equipped in topical sections on neural networks and their functions, fuzzy platforms and their purposes, evolutionary algorithms and their purposes, type, rule discovery and clustering, photo research, speech and robotics, bioinformatics and clinical purposes, a number of difficulties of synthetic intelligence, and agent structures.

Intelligent Computing Theories and Applications: 8th International Conference, ICIC 2012, Huangshan, China, July 25-29, 2012. Proceedings

This ebook constitutes the refereed lawsuits of the eighth overseas convention on clever Computing, ICIC 2012, held in Huangshan, China, in July 2012. The eighty five revised complete papers awarded have been rigorously reviewed and chosen from 753 submissions. The papers are geared up in topical sections on neural networks, evolutionar studying and genetic algorithms, granular computing and tough units, biology encouraged computing and optimization, nature encouraged computing and optimization, cognitive technological know-how and computational neuroscience, wisdom discovery and information mining, quantum computing, computing device studying concept and techniques, healthcare informatics conception and techniques, biomedical informatics thought and strategies, advanced structures concept and strategies, clever computing in sign processing, clever computing in photograph processing, clever computing in robotics, clever computing in desktop imaginative and prescient, clever agent and net functions, certain consultation on advances in info defense 2012.

Secure Cloud Computing

This booklet offers a number cloud computing protection demanding situations and promising resolution paths. the 1st chapters concentrate on useful concerns of cloud computing. In bankruptcy 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the present kingdom of perform, by means of the demanding situations of cryptographic key administration within the cloud.

Distributed Computing and Internet Technology: 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings

This ebook constitutes the court cases of the twelfth foreign convention on disbursed Computing and web expertise, ICDCIT 2016, held in Bhubaneswar, India, in January 2016. The 6 complete papers, 7 brief papers and eleven poster papers provided during this quantity have been rigorously reviewed and chosen from 129 submissions.

Additional info for Advanced Computing and Systems for Security: Volume 2

Example text

A system for handwritten script identification from indian document. J. Pattern Recogn. Res. 8(1), 1–12 (2013) 2. : Script recognition—a review. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2142–2161 (2010) 3. : Identification of different script lines from multi-script documents. Image Vis. Comput. 20(13-14), 945–954 (2002) 4. : Automatic script identification from document images using cluster-based templates. IEEE Trans. Pattern Anal. Mach. Intell. 19, 176–181 (1997) 5. : Identification of scripts of Indian languages by combining trainable classifiers.

Jain and Doermann proposed multi script writer identification on English, Greek, and Arabic languages [17]. In [18], Ghiasi and Safabakhsh presented text-independent writer identification using codebook on English and Farsi handwriting database. Some writer identification works can be found in [19, 20]. Djeddi et al. in [21] have proposed writer identification on multiple languages like English and Greek using ICFHR 2012 Latin/Greek database. Recently, Halder et al. [22] have proposed writer identification on Devanagari script.

Then using component labeling each component obtained after the first stage is selected and mapped into the original gray scale image. Md. Obaidullah et al. obtained by applying a global binarization algorithm on each of these regions. This two-stage-based technique has advantage that the binarized image will be at least as good as if only global thresholding method would have been applied. After preprocessing feature extraction is carried out to generate multidimensional feature set. Following section discusses the major features used for the present work.

Download PDF sample

Rated 4.23 of 5 – based on 45 votes

Related posts