By Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
The e-book comprises the prolonged model of the works which were offered and mentioned within the moment foreign Doctoral Symposium on utilized Computation and safety structures (ACSS 2015) held in the course of could 23-25, 2015 in Kolkata, India. The symposium has been together prepared by way of the AGH college of technology & know-how, Cracow, Poland; Ca’ Foscari collage, Venice, Italy and collage of Calcutta, India. The booklet is split into volumes and provides dissertation works within the parts of photograph Processing, Biometrics-based Authentication, smooth Computing, information Mining, subsequent iteration Networking and community defense, distant Healthcare, Communications, Embedded platforms, software program Engineering and repair Engineering.
Read or Download Advanced Computing and Systems for Security: Volume 2 PDF
Best computing books
This e-book constitutes the refereed lawsuits of the ninth foreign convention on synthetic Intelligence and tender Computing, ICAISC 2008, held in Zakopane, Poland, in June 2008. The 116 revised contributed papers offered have been rigorously reviewed and chosen from 320 submissions. The papers are equipped in topical sections on neural networks and their functions, fuzzy platforms and their purposes, evolutionary algorithms and their purposes, type, rule discovery and clustering, photo research, speech and robotics, bioinformatics and clinical purposes, a number of difficulties of synthetic intelligence, and agent structures.
This ebook constitutes the refereed lawsuits of the eighth overseas convention on clever Computing, ICIC 2012, held in Huangshan, China, in July 2012. The eighty five revised complete papers awarded have been rigorously reviewed and chosen from 753 submissions. The papers are geared up in topical sections on neural networks, evolutionar studying and genetic algorithms, granular computing and tough units, biology encouraged computing and optimization, nature encouraged computing and optimization, cognitive technological know-how and computational neuroscience, wisdom discovery and information mining, quantum computing, computing device studying concept and techniques, healthcare informatics conception and techniques, biomedical informatics thought and strategies, advanced structures concept and strategies, clever computing in sign processing, clever computing in photograph processing, clever computing in robotics, clever computing in desktop imaginative and prescient, clever agent and net functions, certain consultation on advances in info defense 2012.
This booklet offers a number cloud computing protection demanding situations and promising resolution paths. the 1st chapters concentrate on useful concerns of cloud computing. In bankruptcy 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the present kingdom of perform, by means of the demanding situations of cryptographic key administration within the cloud.
This ebook constitutes the court cases of the twelfth foreign convention on disbursed Computing and web expertise, ICDCIT 2016, held in Bhubaneswar, India, in January 2016. The 6 complete papers, 7 brief papers and eleven poster papers provided during this quantity have been rigorously reviewed and chosen from 129 submissions.
- To the Cloud: Big Data in a Turbulent World
- Theoretical Aspects of Computing - ICTAC 2008: 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings
- Wired (February 2016)
- Computer and Computing Technologies in Agriculture II, Volume 2: The Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), October 18-20, 2008, Beijing, China
Additional info for Advanced Computing and Systems for Security: Volume 2
A system for handwritten script identiﬁcation from indian document. J. Pattern Recogn. Res. 8(1), 1–12 (2013) 2. : Script recognition—a review. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2142–2161 (2010) 3. : Identiﬁcation of different script lines from multi-script documents. Image Vis. Comput. 20(13-14), 945–954 (2002) 4. : Automatic script identiﬁcation from document images using cluster-based templates. IEEE Trans. Pattern Anal. Mach. Intell. 19, 176–181 (1997) 5. : Identiﬁcation of scripts of Indian languages by combining trainable classiﬁers.
Jain and Doermann proposed multi script writer identiﬁcation on English, Greek, and Arabic languages . In , Ghiasi and Safabakhsh presented text-independent writer identiﬁcation using codebook on English and Farsi handwriting database. Some writer identiﬁcation works can be found in [19, 20]. Djeddi et al. in  have proposed writer identiﬁcation on multiple languages like English and Greek using ICFHR 2012 Latin/Greek database. Recently, Halder et al.  have proposed writer identiﬁcation on Devanagari script.
Then using component labeling each component obtained after the ﬁrst stage is selected and mapped into the original gray scale image. Md. Obaidullah et al. obtained by applying a global binarization algorithm on each of these regions. This two-stage-based technique has advantage that the binarized image will be at least as good as if only global thresholding method would have been applied. After preprocessing feature extraction is carried out to generate multidimensional feature set. Following section discusses the major features used for the present work.