000839258 000__ 06054cam\a2200601Ii\4500 000839258 001__ 839258 000839258 005__ 20230306144719.0 000839258 006__ m\\\\\o\\d\\\\\\\\ 000839258 007__ cr\un\nnnunnun 000839258 008__ 180516s2018\\\\si\\\\\\o\\\\\101\0\eng\d 000839258 019__ $$a1036105459$$a1037006137$$a1040612287 000839258 020__ $$a9789811081804$$q(electronic book) 000839258 020__ $$a9811081808$$q(electronic book) 000839258 020__ $$z9789811081798 000839258 020__ $$z9811081794 000839258 0247_ $$a10.1007/978-981-10-8180-4$$2doi 000839258 035__ $$aSP(OCoLC)on1035762858 000839258 035__ $$aSP(OCoLC)1035762858$$z(OCoLC)1036105459$$z(OCoLC)1037006137$$z(OCoLC)1040612287 000839258 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dEBLCP$$dYDX$$dAZU$$dUAB$$dOCLCF$$dOCLCQ 000839258 049__ $$aISEA 000839258 050_4 $$aQA76.9.A25 000839258 08204 $$a005.8$$223 000839258 24500 $$aAdvanced computing and systems for security.$$nVolume Five /$$cRituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors. 000839258 264_1 $$aSingapore :$$bSpringer,$$c2018. 000839258 300__ $$a1 online resource. 000839258 336__ $$atext$$btxt$$2rdacontent 000839258 337__ $$acomputer$$bc$$2rdamedia 000839258 338__ $$aonline resource$$bcr$$2rdacarrier 000839258 347__ $$atext file$$bPDF$$2rda 000839258 4901_ $$aAdvances in intelligent systems and computing ;$$vvolume 666 000839258 500__ $$aIncludes author index. 000839258 5050_ $$aIntro; Preface; Contents; About the Editors; Biometrics; Hand Biometric Verification with Hand Image-Based CAPTCHA; 1 Introduction; 2 HandCaptcha Processing and Verification Scheme; 3 Hand Image Normalization and Feature Definition; 4 Experimental Description; 5 Conclusion; References; New Approach to Smartwatch in Human Recognition; 1 Introduction; 2 Related Work; 3 Data Acquisition; 4 Previous Algorithm; 5 The Modified Algorithm; 6 Conclusions; 7 Further Work; References; Retina Tomography and Optical Coherence Tomography in Eye Diagnostic System; 1 Introduction; 2 Proposed Methodology 000839258 5058_ $$a2.1 Retina Color Image Processing Algorithm2.2 Optical Coherence Tomography Processing Algorithm; 3 Comparison with Other Solutions; 4 Conclusions; References; Typing Signature Classification Model for User Identity Verification; 1 Introduction; 2 Literature Survey; 3 Research Gap Analysis; 3.1 Problem Statement; 3.2 Scope of Work; 4 Proposed Model; 4.1 Typing Signature Classification Model; 5 Performance Analysis; 5.1 Analysis of the Collected Data; 5.2 Discussion; 6 Conclusions; Appendix; References; Image Processing 000839258 5058_ $$aA Novel Technique for Contrast Enhancement of Chest X-Ray Images Based on Bio-Inspired Meta-Heuristics1 Introduction; 2 Related Work; 3 Data Description; 3.1 Sample Size Calculation; 3.2 Description of the Chest X-Ray Images; 3.3 Annotation Process; 3.4 Database Access Procedure; 4 Methodology; 4.1 Transformation Function; 4.2 Objective Function; 4.3 Particle Swarm Optimization; 5 Results and Discussion; 5.1 Dataset; 5.2 Result of Annotation Process; 5.3 Evaluation Metrics; 6 Conclusion; 7 Conflict of Interest and Ethical Issues; References 000839258 5058_ $$aUltrasound Medical Image Deblurring and Denoising Method Using Variational Model on CUDA1 Introduction; 2 The Proposed Algorithm; 3 Numerical Approximation Scheme; 4 Implementation of CUDA-Based Parallel Algorithm; 5 Experimental Analysis; 5.1 Performance Analysis; 5.2 Result Analysis; 6 Conclusion; References; Line, Word, and Character Segmentation from Bangla Handwritten Text-A Precursor Toward Bangla HOCR; 1 Introduction; 2 Overview of the Study; 3 Methodology; 3.1 Segmentation; 4 Results; 4.1 Performance of Line Segmentation; 4.2 Performance of Word Segmentation 000839258 5058_ $$a4.3 Performance of Zone and Character Segmentation4.4 Error Analysis; 5 Conclusion; References; Heterogeneous Face Matching Using ZigZag Pattern of Local Extremum Logarithm Difference: ZZPLELD; 1 Introduction; 2 Proposed Work; 2.1 Local Extremum Logarithm Difference Based Image Representation; 2.2 Local Zigzag Binary Pattern for ZZPLELD generation; 2.3 Similarity Measure; 3 Experimental Results; 3.1 Rank-1 Recognition Results on Extended Yale B Database; 3.2 Rank-1 Recognition Results on Viewed Sketch Databases; 3.3 Rank-1 Recognition Results on NIR-VIS CASIA-HFB Database; 4 Conclusion 000839258 506__ $$aAccess limited to authorized users. 000839258 520__ $$aThis book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems. 000839258 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 18, 2018). 000839258 650_0 $$aComputer security$$vCongresses. 000839258 650_0 $$aComputers$$xAccess control$$vCongresses. 000839258 650_0 $$aComputer science$$vCongresses. 000839258 7001_ $$aChaki, Rituparna,$$eeditor. 000839258 7001_ $$aCortesi, Agostino,$$d1963-$$eeditor. 000839258 7001_ $$aSaeed, Khalid$$c(Computer scientist),$$eeditor. 000839258 7001_ $$aChaki, Nabendu,$$eeditor. 000839258 7112_ $$aInternational Doctoral Symposium on Applied Computation and Security Systems$$n(4th :$$d2017 :$$cPatna, India) 000839258 77608 $$iPrint version: $$z9811081794$$z9789811081798$$w(OCoLC)1017589549 000839258 830_0 $$aAdvances in intelligent systems and computing ;$$v666. 000839258 852__ $$bebk 000839258 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-8180-4$$zOnline Access$$91397441.1 000839258 909CO $$ooai:library.usi.edu:839258$$pGLOBAL_SET 000839258 980__ $$aEBOOK 000839258 980__ $$aBIB 000839258 982__ $$aEbook 000839258 983__ $$aOnline 000839258 994__ $$a92$$bISE