0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (17)
  • R2,500 - R5,000 (21)
  • R5,000 - R10,000 (12)
  • -
Status
Brand

Showing 1 - 25 of 50 matches in All Departments

Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2020 (Hardcover, 1st ed.... Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2020 (Hardcover, 1st ed. 2021)
Nabendu Chaki, Jerzy Pejas, Nagaraju Devarakonda, Ram Mohan Rao Kovvur
R6,952 Discovery Miles 69 520 Ships in 10 - 15 working days

This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes selected papers from the International Conference on Computational Intelligence and Data Engineering (ICCIDE 2020). It covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence and speech processing.

Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018): Sukhendu Kanrar, Nabendu Chaki,... Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications... Computer Networks & Communications (NetCom) - Proceedings of the Fourth International Conference on Networks & Communications (Hardcover, 1st ed. 2013)
Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R9,471 Discovery Miles 94 710 Ships in 10 - 15 working days

Computer Networks & Communications (NetCom) is the proceedings from the Fourth International Conference on Networks & Communications. This book covers theory, methodology and applications of computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings will feature peer-reviewed papers that illustrate research results, projects, surveys and industrial experiences that describe significant advances in the diverse areas of computer networks & communications.

Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics - ICACNI 2015, Volume 1... Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics - ICACNI 2015, Volume 1 (Hardcover, 1st ed. 2016)
Atulya Nagar, Durga Prasad Mohapatra, Nabendu Chaki
R5,569 Discovery Miles 55 690 Ships in 10 - 15 working days

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23-25, 2015.

Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018): Sajal K. Das, Nabendu Chaki Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018)
Sajal K. Das, Nabendu Chaki
R4,897 Discovery Miles 48 970 Ships in 12 - 17 working days

This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.

Intrusion Detection in Wireless Ad-Hoc Networks (Hardcover, New): Nabendu Chaki, Rituparna Chaki Intrusion Detection in Wireless Ad-Hoc Networks (Hardcover, New)
Nabendu Chaki, Rituparna Chaki
R2,770 Discovery Miles 27 700 Ships in 12 - 17 working days

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. Addresses architecture and organization issues Examines the different types of routing attacks for WANs Explains how to ensure Quality of Service in secure routing Considers honesty and trust-based IDS solutions Explores emerging trends in WAN security Describes the blackhole attack detection technique Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

Exploring Neural Networks with C# (Hardcover): Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki Exploring Neural Networks with C# (Hardcover)
Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki
R5,158 Discovery Miles 51 580 Ships in 12 - 17 working days

The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# presents the important properties of neural networks while keeping the complex mathematics to a minimum. Explaining how to build and use neural networks, it presents complicated information about neural networks structure, functioning, and learning in a manner that is easy to understand.Taking a "learn by doing" approach, the book is filled with illustrations to guide you through the mystery of neural networks. Examples of experiments are provided in the text to encourage individual research. Online access to C# programs is also provided to help you discover the properties of neural networks.Following the procedures and using the programs included with the book will allow you to learn how to work with neural networks and evaluate your progress. You can download the programs as both executable applications and C# source code from http://home.agh.edu.pl/~tad//index.php?page=programyandlang=en

Business Standard Compliance and Requirements Validation Using Goal Models (Hardcover, 1st ed. 2020): Novarun Deb, Nabendu Chaki Business Standard Compliance and Requirements Validation Using Goal Models (Hardcover, 1st ed. 2020)
Novarun Deb, Nabendu Chaki
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book discusses enterprise hierarchies, which view a target system with varying degrees of abstraction. These requirement refinement hierarchies can be represented by goal models. It is important to verify that such hierarchies capture the same set of rationales and intentions and are in mutual agreement with the requirements of the system being designed. The book also explores how hierarchies manifest themselves in the real world by undertaking a data mining exercise and observing the interactions within an enterprise. The inherent sequence-agnostic property of goal models prevents requirement analysts from performing compliance checks in this phase as compliance rules are generally embedded with temporal information. The studies discussed here seek to extract finite state models corresponding to goal models with the help of model transformation. The i*ToNuSMV tool implements one such algorithm to perform model checking on i* models. In turn, the AFSR framework provides a new goal model nomenclature that associates semantics with individual goals. It also provides a reconciliation machinery that detects entailment or consistency conflicts within goal models and suggests corrective measures to resolve such conflicts. The authors also discuss how the goal maintenance problem can be mapped to the state-space search problem, and how A* search can be used to identify an optimal goal model configuration that is free from all conflicts. In conclusion, the authors discuss how the proposed research frameworks can be extended and applied in new research directions. The GRL2APK framework presents an initiative to develop mobile applications from goal models using reusable code component repositories.

Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2020 (Paperback, 1st ed.... Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2020 (Paperback, 1st ed. 2021)
Nabendu Chaki, Jerzy Pejas, Nagaraju Devarakonda, Ram Mohan Rao Kovvur
R6,922 Discovery Miles 69 220 Ships in 10 - 15 working days

This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes selected papers from the International Conference on Computational Intelligence and Data Engineering (ICCIDE 2020). It covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence and speech processing.

Business Standard Compliance and Requirements Validation Using Goal Models (Paperback, 1st ed. 2020): Novarun Deb, Nabendu Chaki Business Standard Compliance and Requirements Validation Using Goal Models (Paperback, 1st ed. 2020)
Novarun Deb, Nabendu Chaki
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book discusses enterprise hierarchies, which view a target system with varying degrees of abstraction. These requirement refinement hierarchies can be represented by goal models. It is important to verify that such hierarchies capture the same set of rationales and intentions and are in mutual agreement with the requirements of the system being designed. The book also explores how hierarchies manifest themselves in the real world by undertaking a data mining exercise and observing the interactions within an enterprise. The inherent sequence-agnostic property of goal models prevents requirement analysts from performing compliance checks in this phase as compliance rules are generally embedded with temporal information. The studies discussed here seek to extract finite state models corresponding to goal models with the help of model transformation. The i*ToNuSMV tool implements one such algorithm to perform model checking on i* models. In turn, the AFSR framework provides a new goal model nomenclature that associates semantics with individual goals. It also provides a reconciliation machinery that detects entailment or consistency conflicts within goal models and suggests corrective measures to resolve such conflicts. The authors also discuss how the goal maintenance problem can be mapped to the state-space search problem, and how A* search can be used to identify an optimal goal model configuration that is free from all conflicts. In conclusion, the authors discuss how the proposed research frameworks can be extended and applied in new research directions. The GRL2APK framework presents an initiative to develop mobile applications from goal models using reusable code component repositories.

Advanced Computing and Systems for Security - Volume Eleven (Paperback, 1st ed. 2021): Rituparna Chaki, Agostino Cortesi,... Advanced Computing and Systems for Security - Volume Eleven (Paperback, 1st ed. 2021)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book features extended versions of selected papers that were presented and discussed at the 7th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2020) held in Kolkata, India on February 28-29, 2020. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.

Advanced Computing and Systems for Security - Volume Ten (Paperback, 1st ed. 2020): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Ten (Paperback, 1st ed. 2020)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12-13 March, 2019. Organized by the Departments of Computer Science & Engineering and A.K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.

Advanced Computing and Systems for Security - Volume Nine (Paperback, 1st ed. 2020): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Nine (Paperback, 1st ed. 2020)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12-13 March, 2019. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.

Algorithms and Applications - ALAP 2018 (Paperback, Softcover reprint of the original 1st ed. 2018): Sajal K. Das, Nabendu Chaki Algorithms and Applications - ALAP 2018 (Paperback, Softcover reprint of the original 1st ed. 2018)
Sajal K. Das, Nabendu Chaki
R4,948 Discovery Miles 49 480 Ships in 10 - 15 working days

This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.

Advanced Computing and Systems for Security - Volume Eight (Paperback, 1st ed. 2019): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Eight (Paperback, 1st ed. 2019)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Advanced Computing and Systems for Security - Volume Seven (Paperback, 1st ed. 2019): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Seven (Paperback, 1st ed. 2019)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Concurrency Control in Distributed System Using Mutual Exclusion (Paperback, Softcover reprint of the original 1st ed. 2018):... Concurrency Control in Distributed System Using Mutual Exclusion (Paperback, Softcover reprint of the original 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Advanced Computing and Systems for Security - Volume Six (Paperback, 1st ed. 2018): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Six (Paperback, 1st ed. 2018)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R3,013 Discovery Miles 30 130 Ships in 10 - 15 working days

This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Advanced Computing and Systems for Security - Volume Five (Paperback, 1st ed. 2018): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Five (Paperback, 1st ed. 2018)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R3,048 Discovery Miles 30 480 Ships in 10 - 15 working days

This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2017 (Paperback, 1st ed.... Proceedings of International Conference on Computational Intelligence and Data Engineering - ICCIDE 2017 (Paperback, 1st ed. 2018)
Nabendu Chaki, Agostino Cortesi, Nagaraju Devarakonda
R5,495 Discovery Miles 54 950 Ships in 10 - 15 working days

The book presents high quality research work in cutting edge technologies and most-happening areas of computational intelligence and data engineering. It contains selected papers presented at International Conference on Computational Intelligence and Data Engineering (ICCIDE 2017). The conference was conceived as a forum for presenting and exchanging ideas and results of the researchers from academia and industry onto a common platform and help them develop a comprehensive understanding of the challenges of technological advancements from different viewpoints. This book will help in fostering a healthy and vibrant relationship between academia and industry. The topics of the conference include, but are not limited to collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence, and speech processing.

Progress in Advanced Computing and Intelligent Engineering - Proceedings of ICACIE 2016, Volume 2 (Paperback, 1st ed. 2018):... Progress in Advanced Computing and Intelligent Engineering - Proceedings of ICACIE 2016, Volume 2 (Paperback, 1st ed. 2018)
Khalid Saeed, Nabendu Chaki, Bibudhendu Pati, Sambit Bakshi, Durga Prasad Mohapatra
R5,634 Discovery Miles 56 340 Ships in 10 - 15 working days

The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.

Exploring Image Binarization Techniques (Hardcover, 2014 ed.): Nabendu Chaki, Soharab Hossain Shaikh, Khalid Saeed Exploring Image Binarization Techniques (Hardcover, 2014 ed.)
Nabendu Chaki, Soharab Hossain Shaikh, Khalid Saeed
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The book focuses on an image processing technique known as binarization. It provides a comprehensive survey over existing binarization techniques for both document and graphic images. A number of evaluation techniques have been presented for quantitative comparison of different binarization methods. The book provides results obtained comparing a number of standard and widely used binarization algorithms using some standard evaluation metrics. The comparative results presented in tables and charts facilitates understanding the process. In addition to this, the book presents techniques for preparing a reference image which is very much important for quantitative evaluation of the binarization techniques. The results are produced taking image samples from standard image databases.

Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Four (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R1,968 Discovery Miles 19 680 Ships in 10 - 15 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017): Rituparna Chaki, Khalid Saeed, Agostino... Advanced Computing and Systems for Security - Volume Three (Paperback, 1st ed. 2017)
Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

Exploring Image Binarization Techniques (Paperback, Softcover reprint of the original 1st ed. 2014): Nabendu Chaki, Soharab... Exploring Image Binarization Techniques (Paperback, Softcover reprint of the original 1st ed. 2014)
Nabendu Chaki, Soharab Hossain Shaikh, Khalid Saeed
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

The book focuses on an image processing technique known as binarization. It provides a comprehensive survey over existing binarization techniques for both document and graphic images. A number of evaluation techniques have been presented for quantitative comparison of different binarization methods. The book provides results obtained comparing a number of standard and widely used binarization algorithms using some standard evaluation metrics. The comparative results presented in tables and charts facilitates understanding the process. In addition to this, the book presents techniques for preparing a reference image which is very much important for quantitative evaluation of the binarization techniques. The results are produced taking image samples from standard image databases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
CritiCare® Sterile Gauze Swabs (75 x 75…
R3 Discovery Miles 30
Microsoft Xbox Series X Console (1TB…
R14,999 Discovery Miles 149 990
Vital Baby® HYGIENE™ Super Soft Hand…
R45 Discovery Miles 450
Bostik Glue Stick (40g)
R52 Discovery Miles 520
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
RiotPWR™ Cloud Gaming Controller for iOS…
R2,099 R849 Discovery Miles 8 490
Nuovo All-In-One Car Seat (Black)
R3,599 R3,020 Discovery Miles 30 200
Moonology Diary 2025
Yasmin Boland Paperback R235 Discovery Miles 2 350
Fly Repellent ShooAway (Black)
 (6)
R299 R259 Discovery Miles 2 590

 

Partners