Applied Computation and Security Systems

Volume Two

  • Rituparna Chaki
  • Khalid Saeed
  • Sankhayan Choudhury
  • Nabendu Chaki

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 305)

Table of contents

  1. Front Matter
    Pages i-x
  2. Software Engineering

    1. Front Matter
      Pages 1-1
    2. Adrija Bhattacharya, Sankhayan Choudhury
      Pages 3-15
    3. Sukalyan Som, Sarbani Palit, Kashinath Dey, Dipabali Sarkar, Jayeeta Sarkar, Kheyali Sarkar
      Pages 17-37
    4. Adrija Bhattacharya, Sankhayan Choudhury
      Pages 39-52
    5. Ankita Saha, Atrayee Chatterjee, Nabanita Pal, Ammlan Ghosh, Nabendu Chaki
      Pages 67-84
  3. Cryptography

    1. Front Matter
      Pages 85-85
    2. J. K. M. Sadique Uz Zaman, Ranjan Ghosh
      Pages 87-107
    3. Arnab Kumar Maji, Rajat Kumar Pal
      Pages 109-128
  4. Computer Aided Design

    1. Front Matter
      Pages 129-129
    2. Kamalika Datta, Alhaad Gokhale, Indranil Sengupta, Hafizur Rahaman
      Pages 131-144
    3. Debasis Dhal, Arpan Chakrabarty, Piyali Datta, Rajat Kumar Pal
      Pages 157-182
    4. Ranjan Mehera, Arpan Chakrabarty, Piyali Datta, Rajat Kumar Pal
      Pages 183-209
  5. Back Matter
    Pages 211-211

About this book


This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters.

Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.


Biometrics-based Authentication Data Mining Image Processing Techniques Next Generation Networking Remote Healthcare Service Engineering Soft Computing

Editors and affiliations

  • Rituparna Chaki
    • 1
  • Khalid Saeed
    • 2
  • Sankhayan Choudhury
    • 3
  • Nabendu Chaki
    • 4
  1. 1.A.K. Choudhury School of Information TechnologyUniversity of CalcuttaKolkataIndia
  2. 2.Faculty of Physics and Applied Computer ScienceAGH University of Science and TechnologyCracowPoland
  3. 3.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia
  4. 4.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia

Bibliographic information

  • DOI
  • Copyright Information Springer India 2015
  • Publisher Name Springer, New Delhi
  • eBook Packages Engineering Engineering (R0)
  • Print ISBN 978-81-322-1987-3
  • Online ISBN 978-81-322-1988-0
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365
  • Buy this book on publisher's site