Applied computation and security systems: 1
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Delhi [u.a.]
Springer
2015
|
Schriftenreihe: | Advances in intelligent systems and computing
304 |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9788132219859 |
DOI: | 10.1007/978-81-322-1985-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 cc4500 | ||
---|---|---|---|
001 | BV042209109 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 141126s2015 |||| o||u| ||||||eng d | ||
020 | |a 9788132219859 |c Online |9 978-81-322-1985-9 | ||
024 | 7 | |a 10.1007/978-81-322-1985-9 |2 doi | |
035 | |a (OCoLC)900641616 | ||
035 | |a (DE-599)BVBBV042209109 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-Aug4 |a DE-1043 |a DE-1046 |a DE-859 |a DE-92 |a DE-898 |a DE-863 |a DE-862 |a DE-573 |a DE-B768 |a DE-861 |a DE-706 | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
245 | 1 | 0 | |a Applied computation and security systems |n 1 |c Rituparna Chaki ..., eds. |
264 | 1 | |a New Delhi [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in intelligent systems and computing |v 304 | |
490 | 0 | |a Advances in intelligent systems and computing |v ... | |
700 | 1 | |a Chaki, Rituparna |4 edt | |
773 | 0 | 8 | |w (DE-604)BV042209079 |g 1 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-81-322-1984-2 |
830 | 0 | |a Advances in intelligent systems and computing |v 304 |w (DE-604)BV040889154 |9 304 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-81-322-1985-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027647844 | ||
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1985-9 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 541360 |
---|---|
_version_ | 1806179182566178816 |
adam_text | APPLIED COMPUTATION AND SECURITY SYSTEMS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PATTERN RECOGNITION: AN ALGORITHM FOR HUMAN LIP FEATURE EXTRACTION
FEATURE SELECTION USING PARTICLE SWARM OPTIMIZATION FOR THERMAL FACE
RECOGNITION
ALGORITHM FOR RETINA RECOGNITION
AN ALGORITHM FOR HUMAN IRIS RECOGNITION
IMAGING AND HEALTHCARE APPLICATIONS: AN AUTOMATIC NON-INVASIVE SYSTEM
FOR DIAGNOSIS OF TUBERCULOSIS
AUTOMATED VERTEBRA SEGMENTATION FROM CT IMAGES FOR COMPUTATION OF
LUMBOLUMBAR ANGLE
AN APPROACH FOR MICRO TOMOGRAPHY OBTAINED MEDICAL IMAGE SEGMENTATION
FLEXIBLE CLOUD ARCHITECTURE FOR HEALTHCARE APPLICATIONS
WIRELESS SENSOR NETWORKING: AN OVERLAY COGNITIVE RADIO MODEL EXPLOITING
THE POLARIZATION DIVERSITY AND RELAY COOPERATION
EFFECT OF SOURCE SELECTION, DEPLOYMENT PATTERN AND FORWARDING TECHNIQUE
ON LIFETIME OF DATA AGGREGATING MULTI-SINK WIRELESS SENSOR NETWORK
POWER OPTIMIZED REAL TIME COMMUNICATION THROUGH THE MOBILE SINK IN WSNS
PERFORMANCE OF INCREMENTAL REDUNDANCY BASED DATA TRANSMISSION IN
RANDOMLY DEPLOYED WIRELESS SENSOR NETWORK
TRUST BASED ROUTING FOR VEHICULAR AD HOC NETWORK
STUDY ON HANDOVER MECHANISM IN CELLULAR NETWORK: AN EXPERIMENTAL
APPROACH
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
APPLIED COMPUTATION AND SECURITY SYSTEMS
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONTAINS THE EXTENDED VERSION OF THE WORKS THAT HAVE BEEN
PRESENTED AND DISCUSSED IN THE FIRST INTERNATIONAL DOCTORAL SYMPOSIUM ON
APPLIED COMPUTATION AND SECURITY SYSTEMS (ACSS 2014) HELD DURING APRIL
18-20, 2014 IN KOLKATA, INDIA. THE SYMPOSIUM HAS BEEN JOINTLY ORGANIZED
BY THE AGH UNIVERSITY OF SCIENCE & TECHNOLOGY, CRACOW, POLAND AND
UNIVERSITY OF CALCUTTA, INDIA. THE VOLUME I OF THIS DOUBLE-VOLUME BOOK
CONTAINS FOURTEEN HIGH QUALITY BOOK CHAPTERS IN THREE DIFFERENT
PARTS.PART 1IS ONPATTERN RECOGNITIONAND IT PRESENTS FOUR
CHAPTERS.PART 2IS ONIMAGING AND HEALTHCARE APPLICATIONSCONTAINS
FOUR MORE BOOK CHAPTERS. THEPART 3OF THIS VOLUME IS ONWIRELESS
SENSOR NETWORKINGAND IT INCLUDES AS MANY AS SIX CHAPTERS. VOLUME II OF
THE BOOK HAS THREEPARTS PRESENTING A TOTAL OF ELEVEN CHAPTERS IN
IT.PART 4 CONSISTS OF FIVE EXCELLENT CHAPTERS ONSOFTWARE
ENGINEERINGRANGING FROM CLOUD SERVICE DESIGN TO TRANSACTIONAL
MEMORY.PART 5IN VOLUME II IS ONCRYPTOGRAPHYWITH TWO BOOK
CHAPTERS IN IT.PART 6OF THIS VOLUME IS ONCOMPUTER AIDED
DESIGNWITH FOUR CHAPTERS IN IT. WE STRONGLY BELIEVE THAT THE TWENTY
FIVE CHAPTERS IN THESE TWO VOLUMES OF APPLIED COMPUTATION AND SECURITY
SYSTEMS WILL BE APPRECIATED BY ALL ITS READERS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chaki, Rituparna |
author2_role | edt |
author2_variant | r c rc |
author_facet | Chaki, Rituparna |
building | Verbundindex |
bvnumber | BV042209109 |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)900641616 (DE-599)BVBBV042209109 |
discipline | Informatik |
doi_str_mv | 10.1007/978-81-322-1985-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03089nmm a2200541 cc4500</leader><controlfield tag="001">BV042209109</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141126s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788132219859</subfield><subfield code="c">Online</subfield><subfield code="9">978-81-322-1985-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-81-322-1985-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900641616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042209109</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied computation and security systems</subfield><subfield code="n">1</subfield><subfield code="c">Rituparna Chaki ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">304</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">...</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Rituparna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV042209079</subfield><subfield code="g">1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-81-322-1984-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">304</subfield><subfield code="w">(DE-604)BV040889154</subfield><subfield code="9">304</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027647844</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1985-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042209109 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:04:56Z |
institution | BVB |
isbn | 9788132219859 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027647844 |
oclc_num | 900641616 |
open_access_boolean | |
owner | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
owner_facet | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Advances in intelligent systems and computing |
series2 | Advances in intelligent systems and computing |
spellingShingle | Applied computation and security systems Advances in intelligent systems and computing |
title | Applied computation and security systems |
title_auth | Applied computation and security systems |
title_exact_search | Applied computation and security systems |
title_full | Applied computation and security systems 1 Rituparna Chaki ..., eds. |
title_fullStr | Applied computation and security systems 1 Rituparna Chaki ..., eds. |
title_full_unstemmed | Applied computation and security systems 1 Rituparna Chaki ..., eds. |
title_short | Applied computation and security systems |
title_sort | applied computation and security systems |
url | https://doi.org/10.1007/978-81-322-1985-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027647844&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042209079 (DE-604)BV040889154 |
work_keys_str_mv | AT chakirituparna appliedcomputationandsecuritysystems1 |