Two-volume edition. — Springer, 2014. — 431 p. — ISBN: 978-81-322-1984-2, 978-81-322-1987-3.
The First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) took place during Apr 18-20, 2014 in Kolkata, India. This symposium is aimed to facilitate the Ph.D. students to present and discuss their research work leading towards high-quality dissertation. This symposium will provide a friendly and supportive environment for doctoral students to present and discuss their work both with their peers and with a panel of distinguished experts. ACSS Doctoral Symposium allowed researchers working in different fields of computer science such as Image processing, Remote Healthcare, Biometrics, Pattern Recognition, Embedded Systems, Data Mining, Software Engineering, Networking, and Network Security. The symposium evolved as a joint venture between two collaborative universities: the University of Calcutta, India, and the AGH University of Science and Technology, Poland.
The program committee members of ACSS 2014 were instrumental in disseminating the objectives of the symposium among the scholars and faculty members in a very short time. This resulted in a large number of submissions from Ph.D. scholars from India and abroad. These papers underwent a minute and detailed blind-review process with voluntary participation of the committee members and external expert reviewers. The metrics for reviewing the papers had been mainly the novelty of the contributions, technical content, organization, and clarity in presentation. The entire process of initial paper submission, review, and acceptance were done electronically. The hard work done by the Organizing and Technical Program Committees led to a superb technical program for the symposium. The ACSS 2014 resulted in high-impact and highly interactive presentations by the doctoral students.
The Technical Program Committee for the symposium has selected only 25 papers for publication out of a total 70 submissions. Session chairs were entrusted with the responsibility of submitting feedbacks for improvements of the papers presented. The symposium proceeding has been organized as a collection of papers, which were presented and then modified as per reviewer’s and session chair’s comments. This has helped the scholars to further improve their contributions.
Volume One.
Pattern Recognition.An Algorithm for Extracting Feature from Human Lips.
Feature Selection using Particle Swarm Optimization for Thermal Face Recognition.
Retinal Feature Extraction with the Influence of Its Diseases on the Results.
Iris Feature Extraction with the Influence of Its Diseases on the Results.
Imaging and Healthcare Applications.An Automatic Non-invasive System for Diagnosis of Tuberculosis.
Automated Vertebral Segmentation from CT Images for Computation of Lumbolumbar Angle.
An Approach for Micro-Tomography Obtained Medical Image Segmentation.
Flexible Cloud Architecture for Healthcare Applications.
Wireless Sensor Networking.An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperation.
Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Data Aggregating Multi-sink Wireless Sensor Network.
Power Optimized Real Time Communication Through the Mobile Sink in WSNs.
Performance of Incremental Redundancy-Based Data Transmission in Randomly Deployed Wireless Sensor Network.
Trust-Based Routing for Vehicular Ad Hoc Network.
Study on Handover Mechanism in Cellular Network: An Experimental Approach.
Volume Two.
Software Engineering.Non-functional Property Aware Brokerage Approach for Cloud Service Discovery.
A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration.
Service Insurance: A New Approach in Cloud Brokerage.
Using Semiformal and Formal Methods in Software Design: An Integrated Approach for Intelligent Learning Management System.
A Lightweight Implementation of Obstruction-Free Software Transactional Memory.
Cryptography.Multiplicative Polynomial Inverse Over GF(7
3): Crisis of EEA and Its Solution.
A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle.
Computer Aided Design.An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated Annealing.
An Efficient Algorithm for Reducing Wire Length in Three-Layer Channel Routing.
A New Move Toward Parallel Assay Operations in a Restricted Sized Chip in Digital Microfluidics.
A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area.