دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: João Manuel R. S. Tavares, Paramartha Dutta, Soumi Dutta, Debabrata Samanta سری: Lecture notes in networks and systems, Volume 291 ISBN (شابک) : 9789811642845, 9811642842 ناشر: Springer سال نشر: 2022 تعداد صفحات: [630] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 15 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش سایبری و بازیابی اطلاعات. مجموعه مقالات CIIR 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعهای از مقالات تحقیقاتی با کیفیت بالا را گردآوری میکند که در کنفرانس بینالمللی هوش سایبری و بازیابی اطلاعات (CIIR 2021)، که در مؤسسه مهندسی و مدیریت، کلکته، هند طی 20 تا 21 می 2021 برگزار شد، ارائه شده است. مقالات تحقیقاتی در زمینه حریم خصوصی و امنیت در فضای ابری، پیشگیری و بازیابی از دست دادن داده ها، شبکه های با کارایی بالا، امنیت شبکه و رمزنگاری، پردازش تصویر و سیگنال، سیستم های ایمنی مصنوعی، امنیت اطلاعات و شبکه، تکنیک ها و کاربردهای علم داده، داده ها انبارداری و داده کاوی، داده کاوی در محیط پویا، محاسبات عصبی مرتبه بالاتر، نظریه مجموعه های ناهموار و فازی، و تکنیک های محاسباتی الهام گرفته از طبیعت.
This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.
Preface Contents Editors and Contributors Cyber Intelligence DTNMA: Identifying Routing Attacks in Delay-Tolerant Network 1 Introduction 2 Key Challenges of Routing Attacks 3 Identification of Routing Attacks 3.1 Packet Dropping Attack 3.2 Black Hole Attack 3.3 Worm Hole Attack 3.4 Gray Hole Attack 3.5 Jelly Fish Attack 3.6 Tailgating Attack 3.7 Packet Misrouting Attack 3.8 Routing Information Falsification Attack 3.9 Acknowledgment Falsification Attack 3.10 Sleep Deprivation Attack 3.11 Identity Impersonation Attack 3.12 Lack of Cooperation Attack 3.13 Byzantine Attack 3.14 Flooding Attack 4 Conclusion and Future Work References Security Aspects for Mutation Testing in Mobile Applications 1 Introduction 2 Mobile Applications and Testing 3 Mutation Testing 3.1 Mutation Analysis of Android Applications 3.2 Crashes/Bugs in Android 4 Mutation Operators in Android 4.1 Based on Bug Taxonomy 4.2 Fail-On-Null 4.3 Orientation Lock 4.4 Based on APP-ELEMENTS 5 Mutation Test Results for Sample Program 6 Conclusion References Classification Framework for Fraud Detection Using Hidden Markov Model 1 Introduction 2 Literature Survey 3 Proposed System 4 Algorithms 5 Conclusion References A Review on Security Issues in Healthcare Cyber-Physical Systems 1 Introduction 2 Why Does Privacy Stand as a Major Factor in Healthcare? 3 MCPS and Vulnerabilities Explained 4 CPS in Health Care 4.1 Security Requirements in Case of Sensor Networks 5 State of Art 6 Possible Cyber Measures and Breaches in Healthcare 7 Comparative Study 8 Security Advancements Proposed 8.1 Strong Security Policies 8.2 Sensor Only Network 8.3 Future Scope 9 Conclusion References Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud 1 Introduction 1.1 Cloud Computing 2 Beaufort Cipher 2.1 Beaufort Cipher Algorithm 2.2 Demerits of Beaufort Cipher 2.3 Frequency Analysis of the Extended Beaufort Cipher Algorithm 3 Literature Survey 4 Implementation and Simulation 4.1 Importance of Simulation in the Cloud Environment 4.2 CloudSim 4.3 Implementation 5 Comparison with Other Methods 6 Conclusion References Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques 1 Introduction 2 Literature Review 3 Methodology 4 Implementation 4.1 Encryption 4.2 Decryption 5 Result 6 Conclusion References Pattern Recognition Virtual Keyboard Using Image Processing and Computer Vision 1 Introduction 2 Review Work 3 Result Analysis and Discussion 3.1 Masking 3.2 Image Feed Preprocessing 3.3 Threshold Binarization 3.4 Contour Generation 3.5 Finger-Pointer Detection 3.6 Keyboard Output and Workflow Model 4 Future Scope 5 Conclusion References Facial Expression Recognition Using Convoluted Neural Network (CNN) 1 Introduction 1.1 Background 2 Problem Statement 3 Tools and Libraries 4 Result Analysis and Discussion 5 Conclusion References Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognition 1 Introduction 2 Literature Review 3 Artificial Intelligence 3.1 Theory of Mind 3.2 Reactive Machines 3.3 Self Awareness 3.4 Limited Memory 4 Growth of Artificial Intelligence 5 Applications of Artificial Intelligence 5.1 Application of Artificial Intelligence in Finance 5.2 Application of Artificial Intelligence in Banking 5.3 Application of Artificial Intelligence in Healthcare Services 5.4 Application of Artificial Intelligence in Travel 5.5 Artificial Intelligence in Social Media 5.6 Security in Artificial Intelligence 6 Framework for Restaurant Using Artificial Intelligence and Facial Recognition 6.1 Tablet Device 6.2 Face Recognition 7 Conclusion References Extensive Feature Analysis and Baseline Model for Stance Detection Task 1 Introduction 2 Related Work 3 Methodology 3.1 Data Preparation 3.2 Vector Representation 3.3 Language Model Based Representations 3.4 Propose and Implement Alternative Features 3.5 Analysing Key Features 3.6 Train-Validate Split 3.7 Linear and Logistic Regression Implementation 3.8 Model Evaluation 3.9 Model Tuning and Enhancement 4 Results 4.1 Importance of Features 4.2 Final Baseline 5 Conclusion References A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithms 1 Introduction 2 Related Work 3 Proposed Work 3.1 Naïve Bayes Classifier 3.2 Logistic Regression 3.3 Support Vector Machine 3.4 k-Nearest Neighbor Algorithm (k-NN) 4 The Proposed Model 4.1 Data Description 4.2 Sentiment Analysis Component 4.3 Text Pre-processing 4.4 Abbreviation Processing 5 Programming Language and Simulator 6 Conclusion and Future Scope References The Survey on Handwritten Mathematical Expressions Recognition 1 Introduction 2 Motivation 3 Overview of Mathematical Symbols and Expression 4 Survey on Online and Offline Handwritten Mathematical Expressions 5 Conclusion References 13 Bangla Document Categorization Using Deep RNN Model with Attention Mechanism Abstract 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Document Classification Dataset 3.3 Data Preprocessing 3.4 Classification Model 4 Experimental Setup and Result Analysis 4.1 Result Analysis 4.2 Result Comparison 5 Conclusion References Bangla Handwritten Digit Recognition 1 Introduction 2 Literature Review 3 Methodology 4 Experimental Details 4.1 Data Collection 4.2 Dataset Preparation for Overall NumtaDB and Own Dataset 4.3 Dataset Preparation for Every Single Training Dataset 4.4 Feature Extraction and Classification Steps 4.5 Architecture of Model for Every Training Single Dataset 5 Result Analysis 6 Conclusion References Audio Watermarking in Linear Canonical Transform Domain Using Frequency-Dependent Clustering 1 Introduction 2 Related Work on Transform Domain Audio Watermarking 3 The Linear Canonical Transform: A Primer 3.1 Continuous Domain Transformation 3.2 Discrete Domain Transformation 4 Proposed Methodology 4.1 Watermark Embedding Stage 4.2 Watermark Detection Stage 5 Experimental Configuration and Simulation Parameters 6 Results 7 Conclusion References Secure Cloud Services Using Quantum-Blockchain Technology 1 Introduction 2 State-Of-The-Art 2.1 Research Gap 3 Proposed Framework 3.1 Significance of the Proposed Approach 3.2 Proposed Algorithm 4 Experimental Setup and Result 5 Conclusion References Information Retrieval Multi-label Classification: Detailed Analysis 1 Introduction 2 Multi-label Classification Techniques 3 Evaluation Metrics and Statistics 3.1 Bipartition Based Metrics 3.2 Ranking-Based Metrics 3.3 Label Based Metrics 4 Comparative Analysis of MLC Algorithms 5 Progress of Multi-Label Classification Techniques 6 Challenges 7 Conclusion References A Comparative Study on Sentiment Analysis Influencing Word Embedding Using SVM and KNN 1 Introduction 2 Literature Review 3 Methodology 3.1 Dataset 3.2 Feature Extraction 3.3 Classifier 4 Result and Analysis 5 Comparative Study 6 Conclusion References ML and GIS-Based Approaches to Flood Prediction: A Comparative Study 1 Introduction 2 Hydrological Modeling 3 Related Work 3.1 Predicting Flood Susceptibility Using Long Short-Term Memory (LSTM) Neural Network Model 3.2 Flood Prediction Using Support Vector Machines (SVM) 3.3 Artificial Neural Networks for Flood Susceptibility Mapping in Data-Scarce Urban Areas 3.4 Height Above the Nearest Drainage, a Hydrologically Relevant New Terrain Model 3.5 Flood Modeling of Mangalam River Using GIS and HEC-RAS 3.6 Application of ASTER DEM in Watershed Management as Flood Zonation Mapping in Koyna River of the Western Ghats 3.7 Terrain Analysis Enhancements to the Height Above Nearest Drainage Flood Inundation Mapping Method 3.8 Flood Risk Mapping Using GIS and Multi-criteria Analysis: A Greater Toronto Area Case 4 Analysis 5 The Proposed System 6 Conclusions References Implementation of Machine Learning in Lung Cancer Prediction and Prognosis: A Review 1 Introduction 2 Growth of Lung Cancer in Past Decade 3 Related Works 4 Comparative Analysis 5 Conclusion and Future Work References Fetching Information Through Crowdsourcing Within a Social Networking Site 1 Introduction 2 Related Work 3 Dataset 4 Problem Statement 5 Results and Discussion 6 Conclusion References Soil Nutrient Assessment and Crop Estimation with Machine Learning Method: A Survey 1 Introduction 2 Related Work 3 Methodology 3.1 Soil Fertility 3.2 Machine Learning Algorithm 4 Results 5 Discussion 6 Conclusion References COVID-19 Pandemic Diagnosis and Analysis Using Clinical Decision Support Systems 1 Introduction 2 Decision Support System in Healthcare 3 Literature Review 4 Challenges Faced During Pandemics 5 Decision Support System for COVID-19 Diagnosis 6 Results 7 Challenges and Opportunities of CDSS 8 Conclusion References Bengali Abstractive News Summarization Using Seq2Seq Learning with Attention 1 Introduction 2 Literature Review 3 System Architecture 4 Experimental Details 4.1 Dataset Creation 4.2 Data Preprocessing 4.3 Count Vocabulary 4.4 Word Embedding 4.5 Models 5 Result Analysis 6 Discussion 7 Conclusion References An Approach to Improve Searching Textual Data in Email Dataset 1 Introduction 2 Methods and Algorithms 2.1 K-Means Clustering Algorithm 2.2 Text Vectorization 2.3 TF-IDF Scores 3 Related Works 4 Experiment Methodology 5 Conclusions 6 Applications and Areas of Further Research References Analyze Cardiotocograph to Classify the Fetal Status Using Various Machine Learning Algorithms 1 Introduction 2 Literature Review 3 Experimental Setup 3.1 Dataset 3.2 Classification Techniques 3.3 Performance Measures 3.4 Implementation 4 Results 5 Conclusion References Predictive Analysis of the Recovery Rate from Coronavirus (COVID-19) 1 Introduction 2 Related Work 3 Experimental Data set 4 Proposed Methodologies 4.1 Predictive Analysis 5 Result and Analysis 5.1 Situational Analysis 5.2 Future Predictive Analysis 5.3 Evaluation of the Prediction Performance 6 Conclusion and Future Scope References Data Science and Data Analytics Deep Learning: An Application Perspective 1 Introduction 2 Deep Learning Architecture 2.1 Recurrent Neural Networks (RNN) 2.2 Convolutional Neural Networks 2.3 Characteristics of Deep Learning 3 Deep Learning Applications Review 4 Challenges Involved in Using Deep Learning 5 Conclusion and Future Scope References Detection of Weapons in Surveillance Scenes Using Masked R-CNN 1 Introduction 2 Related Works 3 Weapon Detection Framework 3.1 Backbone Network 3.2 Regional Proposal Network 3.3 Masked R-CNN 4 Results and Discussion 5 Conclusion References Deep Learning Approaches for Spatio-Temporal Clues Modelling 1 Introduction 1.1 Literature Review 2 Spatio-Temporal Feature 2.1 Spatial Domain 2.2 Temporal Domain 3 Feature Extracting Proposal Models and Methods 3.1 Two-Stream Approach 3.2 Hybrid Multimodel Approach 4 Results and Analysis 5 Conclusion References Covid-19—Analysis and Prediction—A Case Study Using Machine Learning 1 Introduction 2 Review Work 3 Methods and Algorithms Used 4 Result Analysis and Discussions 4.1 Origin of the Virus 4.2 Spread Out of the Virus 4.3 Lockdown: The Savior or, not! 4.4 Analysis of India 4.5 Prediction Model for India 5 Conclusion References A Feature Based Classification and Analysis of Hidden Markov Model in Speech Recognition 1 Introduction 2 Literature Review 3 Types and Applications 3.1 First Order HMM 3.2 Higher Order HMM 3.3 Hidden Semi Markov Model 3.4 Factorial HMM 3.5 Second Order HMM 3.6 Layered HMM 3.7 Autoregressive HMM 3.8 Hierarchal HMM 4 Distinguishedness of the Related Work 4.1 Comparative Study of the HMM Models 4.2 Featured Based Significancy of the Developed HMM Models 5 Conclusion References Intelligent Hand Cricket 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Data Set Creation 4 Experimental Results 4.1 Data Set 4.2 Evaluation Metrics 4.3 Performance Analysis 5 Conclusion References CNN Based Facial Expression Recognition System Using Deep Learning Approach 1 Introduction 2 Literature Review 3 Proposed CNN Model for Facial Expression Recognition 3.1 Convolutional Neural Network (CNN) 3.2 Facial Expression Recognition Dataset Specifications 3.3 Proposed CNN Model Architecture 4 Implementation of Proposed CNN Model 5 Experimental Results 6 Application Areas 7 Conclusion References CNN-Based Handwritten Mathematical Symbol Recognition Model 1 Introduction 2 Stages in the Recognition 3 Challenges 4 Literature Review and Related Work 5 Proposed Methodology 5.1 Dataset Depiction 5.2 Preprocessing 5.3 Segmentation 5.4 Classification 5.5 Training and Testing CNN Model 6 Conclusion References A Concise Review of Acute Myeloid Leukemia Recognition Using Machine Learning Techniques 1 Introduction 2 Review Methodology 2.1 Methodology 2.2 Results 3 Conclusion References A Novel Approach for Web Mining Taxonomy for High-Performance Computing 1 Introduction 2 Web Usage Mining 3 Background and Related Work 4 Methods of Parallelism 5 Proposed Work 6 Advantages of GA Over SOM 7 Conclusion References Advance Computing Performance Evaluation and Comparison of Various Personal Cloud Storage Services for Healthcare Images 1 Introduction 2 Literature Review 3 Experimental Setup 4 Results 5 Summary 6 Conclusion References An Approach of Trustworthy Supply Chain Management of Ventilator and PPE in COVID-19 Pandemic Through Blockchain Technology 1 Introduction 2 Background 2.1 COVID-19 Crisis and Supply Chain 2.2 Supply Chain Change Due to COVID-19 2.3 Blockchain Technology versus Medical Supply Chain 3 Proposed Blockchain-Based Tracking Solutions 3.1 Benefits of Blockchain-Based Solutions 4 Conclusion References The Practical Enactment of Robotics and Artificial Intelligence Technologies in E-Commerce 1 Introduction 2 Literature View 3 Marketing-Mix 4 Marketing Application Related and AI-Oriented 5 How Does Artificial Intelligence Act on e-commerce? 6 Growth of Artificial Intelligence (AI) in E-commerce Globally 7 Conclusion References Feasibility Study of Software Engineering Aspects of Bigdata Analytics Applications for Academicians 1 Introduction 2 Related Work 3 Research Method 3.1 Search Strategy 3.2 Selection Process 4 Result and Discussion 5 Research Outcome 5.1 Research Questions 5.2 Proposed Research Objectives 6 Conclusion and Future Work References Security Concerns in IoT Systems and Its Blockchain Solutions 1 Introduction 2 Internet of Things 2.1 Characteristics 2.2 Security and Privacy Issues in the Internet of Things (Research Gaps) 3 Blockchain Technology 3.1 Role of Cryptographic Hash 3.2 Characteristics of Blockchain 3.3 Concepts Involved in Blockchain 3.4 Probable Blockchain Solutions for the Internet of Things [Material and Methods] 4 Results and Discussion 5 Conclusion and Further Research Scopes References Real-Time Tracking System for Object Tracking Using Internet of Things (IoT) 1 Introduction 2 Literature Review 3 Objectives 4 Methodology 4.1 Collecting the Components for Real-Time Tracking System 4.2 Building the Device 4.3 Writing Business Logic Using Arduino Software (IDE) 4.4 Using API 4.5 Development of Web Portal and an Android Based Mobile App 4.6 Testing the Device 4.7 Web Application Deployment on Microsoft Azure/Amazon Web Service 5 Implementation Levels 6 Hardware Used and Circuit Diagram 7 Conclusion 8 Future Work References Empirical Analysis on Consensus Algorithms of Blockchain 1 Introduction 1.1 Working of Blockchain 2 Overview of Consensus Algorithms 3 Discussion on Performance Analysis of Considered Consensus Algorithms 4 Conclusion References City Traffic Speed Characterization Based on City Road Surface Quality 1 Introduction 2 Data Acquisition 3 Data Visualization 4 Methodology 5 Experimental Results 6 Related Works 7 Conclusion and Future Works References An Overview of Recent Trends in OCR Systems for Manuscripts 1 Introduction 1.1 Various Issues Encountered in OCR 2 Literature Studied 3 Detailed Working of OCR 4 Feature Extraction Techniques 5 Classification Techniques 6 Discussion and Analysis 7 Conclusion References Towards Integration of Blockchain and Machine Learning Technologies for Security in Smart Cities 1 Introduction 2 Literature Review 3 Background 3.1 Machine Learning 3.2 Blockchain 3.3 Integration of IoT, Machine Learning and Blockchain 4 A Use Case Scenario 5 Research Challenges 5.1 Storage 5.2 Privacy and Security 5.3 Implementation 5.4 Architecture 6 Conclusion References Computational Intelligence Intention to Purchase Online Luxury Watches Among Indian Consumers in the New Normal Mode 1 Introduction 2 Theoretical Framework AND Hypothesis 3 Methodology 3.1 Designing of Questionnaire 3.2 Methodology of Sampling 4 Results and Analysis 4.1 Encounters with the Purchasing of Luxury Goods 4.2 Test of Reliability 4.3 Factor Analysis Results 4.4 Value Function Dimension 4.5 Dimension of Experiential Value 4.6 Dimension of Symbolic Value 4.7 Dimension of Social Influence 4.8 Vanity Physical 4.9 Vanity Attainment 4.10 Value of Hedonism 4.11 Regression Analysis 5 Conclusions References Implementing Virtual Reality in Entertainment Industry 1 Introduction 1.1 Types of Virtual Reality 1.2 Virtual Reality in the Mainstream Industry 2 COVID-19 and Entertainment Industry 2.1 A Solution to Support Both the Sides 2.2 The Components of the System 3 Model for Implementing Virtual Reality 3.1 Prerequisite 3.2 Define the Bridge Device IP Configuration 3.3 Go to the End of the File and Add the Following: interface br0 3.4 Ensure Wireless Operation 3.5 Configure the Access Point Software 3.6 Cost of the Mechanism 4 Conclusion References Women in Information Technology: How Organizationally Committed They Are 1 Introduction 2 Literature Review 3 Research Methodology 4 Data Analysis and Discussion 4.1 Work Motivation 4.2 Role of Emotional Intelligence 4.3 Importance of Incentives 4.4 Impact of Psychological Well-being and Loneliness of the Female Employees during COVID-19. 4.5 Organizational Culture 4.6 Family Duties and Responsibilities 5 Implications 6 Limitations and Future Research References Comparative Analysis of Brain Tumor Segmentation with Fuzzy C-Means Using Multicore CPU and CUDA on GPU 1 Introduction 2 Background Works 3 Methodology 3.1 Single-Core CPU 3.2 Multicore CPU 3.3 GPU Processing 4 Conclusion References Survey on Podcasting to Improve Teaching Learning Process 1 Introduction 1.1 Podcast Definition 2 Literature Survey 2.1 Assessing Students 2.2 Impact on Teaching Practice 2.3 Lecturer Perceptions 3 Conclusion References Physiological Signals Based Anxiety Detection Using Ensemble Machine Learning 1 Introduction 2 Materials and Methods 2.1 Dataset Description and Processing 2.2 Predictive Model Selection 3 Results 4 Conclusion References A Survey on Master Data Management Techniques for Business Perspective 1 Introduction 2 Current State of Art 3 Observations 4 Conclusion References Reshaping Education Through Augmented Reality and Virtual Reality 1 Introduction 2 Augmented Reality (AR) 3 Virtual Reality 4 Augmented Reality and Virtual Reality: The Present Era 5 Role of Augmented Reality and Virtual Reality in Education 6 Virtual Reality and Augmented Reality: Future Ahead 7 Conclusion References Multiregional Segmentation of High-Grade Glioma Using Modified Deep UNET Model with Edge-Detected Multimodal MRI Images 1 Introduction 2 Related Work 3 Data Preparation 3.1 Data Preprocessing 4 Method 4.1 Feature Extraction with Edge Detection Method Using Sobel Operator 4.2 Auto-feature Extraction of Edge-Detected Images Using Modified Deep U-Shaped Net (md-UNET)based CNN Model 5 Experimentation and Results 6 Conclusion References Author Index