Limit search to available items
Book Cover
E-book
Author International Conference on Mathematics and Computing (8th : 2022 : Vellore, India)

Title Mathematics and computing : ICMC 2022, Vellore, India, January 6-8 / B. Rushi Kumar, S. Ponnusamy, Debasis Giri, Bhavani Thuraisingham, Christopher W. Clifton, Barbara Carminati, editors
Published Singapore : Springer, 2022

Copies

Description 1 online resource (701 p.)
Series Springer Proceedings in Mathematics and Statistics ; v.415
Springer proceedings in mathematics & statistics ; v.415.
Contents Intro -- Contents -- Computer Science -- Color Multiscale Block-ZigZag LBP (CMB-ZZLBP): An Efficient and Discriminant Face Descriptor -- 1 Introduction -- 2 Related Works -- 3 Description of Descriptors -- 3.1 Multiscale Block-ZigZag LBP (MB-ZZLBP) -- 3.2 Color MB-ZZLBP (CMB-ZZLBP) -- 4 Experiments -- 4.1 Dataset Information -- 4.2 Feature Size Essentials with Respect to Evaluated Descriptors -- 4.3 Accuracy Analysis on Different Subsets -- 4.4 Accuracy Comparison with Literature Techniques -- 5 Conclusion and Future Prospect -- References
Effect of Noise in the Quantum Network Implementation of Cop and Robber Game -- 1 Introduction -- 2 Quantum Version of Cop and Robber Game -- 3 Noise Models -- 3.1 Amplitude Damping (AD) Noise Model -- 3.2 Phase Damping (PD) Noise Model -- 4 Calculation and Analysis of Fidelity -- 4.1 Effect of Amplitude Damping (AD) -- 4.2 Effect of Phase Damping (PD) -- 5 Conclusion -- References -- Study of Decoherence in Quantum Cournot Duopoly Game Using Modified EWL Scheme -- 1 Introduction -- 2 Quantum Cournot Duopoly Game with Decoherence -- 2.1 Decoherence in Channel 1 -- 2.2 Decoherence in Channel 2
3 Conclusion -- References -- A New Aggregation Operator for Single-Valued Triangular Neutrosophic Number in Decision-Making -- 1 Introduction -- 2 Preliminaries -- 3 SVTrN Generalized Ordered Weighted Harmonic Averaging Operator -- 4 MADM Problems with Neutrosophic Numbers -- 4.1 Numerical Example -- 5 Conclusion -- References -- Redundancy of Codes with Graph Constraints -- 1 Introduction -- 2 Linear Parity Check Codes with Graph Constraints -- 3 Fractional Graph Capacity -- References -- Tree Parity Machine-Based Symmetric Encryption: A Hybrid Approach -- 1 Introduction -- 1.1 Related Works
2 A Hybrid Method for Symmetric Encryption -- 2.1 Key Generation -- 3 Results, Training Time and Encryption Time -- 4 Security Analysis -- 4.1 NIST Statistical Test Results -- 4.2 Security Against Chosen Plaintext Attacks -- 4.3 Other Attacks -- 5 Comparison with Existing Works -- 6 Conclusion and Future Work -- References -- Metadata Analysis of Web Images for Source Authentication in Online Social Media -- 1 Introduction -- 1.1 State of the Art -- 2 Image Metadata -- 2.1 EXIF Metadata -- 2.2 IPTC Metadata -- 2.3 XMP Metadata -- 3 Experimental Validation -- 3.1 Date and Time -- 3.2 Copyright
3.3 GPS Coordinate -- 3.4 Contact Details -- 4 Proposed Solution -- 4.1 Watermark Insertion -- 4.2 Watermark Extraction -- 5 Result and Discussion -- 5.1 Limitation -- 6 Conclusion -- References -- A Computational Diffie-Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation -- 1 Introduction -- 2 Preliminaries -- 2.1 Insider Security for SCNINR -- 3 The New Construction -- 4 Security of the mathcalSCedl Scheme -- 4.1 On the Concrete Choice of the Set of Domain Parameters -- 5 Comparison with Other Schemes -- References
Summary This book comprises select peer-reviewed articles submitted for the proceedings of the International Conference on Mathematics and Computing (ICMC 2022), held by the School of Advanced Sciences, Vellore Institute of Technology, Vellore, India, in association with Ramanujan Mathematical Society, India, Cryptology Research Society of India and Society for Electronic Transactions and Security, India, from 68 January 2022. With an aim to identify the existing challenges in the areas of mathematics and computing, the book emphasizes the importance of establishing new methods and algorithms to address these challenges. The book includes topics on diverse applications of cryptology, network security, cyber security, block chain, IoT, mobile network, data analytics, applied algebra, mathematical analysis, mathematical modelling, fluid dynamics, fractional calculus, multi-optimization, integral equations, dynamical systems, numerical analysis and scientific computing. Divided into five major partsapplied algebra and analysis, fractional calculus and integral equations, mathematical modelling and fluid dynamics, numerical analysis, and computer science and applicationsthe book is a useful resource for students, researchers and faculty as well as practitioners
Notes kNN-SVM with Deep Features for COVID-19 Pneumonia Detection from Chest X-ray
Online resource; title from PDF title page (SpringerLink, viewed March 23, 2023)
Subject Computer science -- Mathematics -- Congresses
Computer science -- Mathematics
Informàtica.
Àlgebra lineal.
Anàlisi matemàtica.
Models matemàtics.
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Congressos.
Llibres electrònics.
Form Electronic book
Author Rushi Kumar, B
Ponnusamy, S. (Saminathan)
Giri, Debasis.
Thuraisingham, Bhavani M.
Clifton, Christopher Wade.
Carminati, Barbara.
ISBN 9789811993077
9811993076
Other Titles ICMC 2022