Applied Computation and Security Systems

Volume One

  • Rituparna Chaki
  • Khalid Saeed
  • Sankhayan Choudhury
  • Nabendu Chaki

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 304)

Table of contents

  1. Front Matter
    Pages i-x
  2. Pattern Recognition

    1. Front Matter
      Pages 1-1
    2. Joanna Kosior, Khalid Saeed, Mateusz Buczkowski
      Pages 3-23
    3. Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri, Consuelo Gonzalo-Martin
      Pages 25-35
    4. Anna Bartocha, Emil Saeed, Piotr Wachulec, Khalid Saeed
      Pages 37-48
    5. Piotr Wachulec, Emil Saeed, Anna Bartocha, Khalid Saeed
      Pages 49-56
  3. Imaging and Healthcare Applications

    1. Front Matter
      Pages 57-57
    2. Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri
      Pages 59-70
    3. Raka Kundu, Amlan Chakrabarti, Prasanna Lenka
      Pages 71-83
    4. Mateusz Buczkowski, Khalid Saeed, Jacek Tarasiuk, Sebastian Wroński, Joanna Kosior
      Pages 85-102
    5. Amit Kr Mandal, Anirban Sarkar, Nabendu Chaki
      Pages 103-121
  4. Wireless Sensor Networking

    1. Front Matter
      Pages 123-123
    2. Ritwik Banerjee, Chandan Kumar Bhattacharyya
      Pages 153-166
    3. Suparna DasGupta, Rituparna Chaki
      Pages 187-202
    4. R. K. Mishra, Nabendu Chaki, Sankhayan Choudhury
      Pages 203-212
  5. Back Matter
    Pages 213-213

About this book


This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.


Biometrics-based Authentication Data Mining Image Processing Techniques Next Generation Networking Remote Healthcare Service Engineering Soft Computing

Editors and affiliations

  • Rituparna Chaki
    • 1
  • Khalid Saeed
    • 2
  • Sankhayan Choudhury
    • 3
  • Nabendu Chaki
    • 4
  1. 1.A.K. Choudhury School of Information TechnologyUniversity of CalcuttaKolkataIndia
  2. 2.Faculty of Physics and Applied Computer SciencesAGH University of Science and TechnologyCracowPoland
  3. 3.Department of Computer Science & EnggUniversity of CalcuttaKolkataIndia
  4. 4.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia

Bibliographic information

  • DOI
  • Copyright Information Springer India 2015
  • Publisher Name Springer, New Delhi
  • eBook Packages Engineering Engineering (R0)
  • Print ISBN 978-81-322-1984-2
  • Online ISBN 978-81-322-1985-9
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365
  • Buy this book on publisher's site