دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [290, 1 ed.] نویسندگان: Samiksha Shukla, Aynur Unal, Joseph Varghese Kureethara, Durgesh Kumar Mishra, Dong Seog Han سری: Lecture Notes in Networks and Systems ISBN (شابک) : 9811644853, 9789811644856 ناشر: Springer سال نشر: 2021 تعداد صفحات: 503 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 16 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Data Science and Security: Proceedings of IDSCS 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب بهترین مقالات ارائه شده در کنفرانس بینالمللی علوم داده، محاسبات و امنیت (IDSCS-2021) را ارائه میکند که توسط دپارتمان علوم داده، CHRIST (که دانشگاه تلقی میشود)، پردیس پونا لاواسا، هند، در طول 16 تا 17 آوریل 2021 سازماندهی شده است، تحقیقاتی را که در حال حاضر در حوزههای امنیتی دادهها انجام میشود، انجام میدهد. هوش، یادگیری ماشین، بینایی کامپیوتر، طراحی الگوریتم ها، شبکه های کامپیوتری، داده کاوی، کلان داده، متن کاوی، نمایش دانش، محاسبات نرم، و رایانش ابری.
This book presents the best-selected papers presented at the International Conference on Data Science, Computation and Security (IDSCS-2021), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during April 16–17, 2021. The proceeding is targeting the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing, and cloud computing.
Preface Contents About the Editors Towards a Knowledge Centric Semantic Approach for Text Summarization 1 Introduction 2 Related Works 3 Proposed Architecture 4 Implementation 5 Performance Evaluation and Results 6 Conclusion References Detection of Abnormal Red Blood Cells Using Features Dependent on Morphology and Rotation 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Determine the ROI 3.2 Features Determination 4 Quality Assessment 5 Experimental Results 6 Conclusion 7 Future Scope References A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning 1 Introduction 2 Background 2.1 What is Privacy in Machine Learning 3 Classification of Machine Learning Attacks 3.1 Explicit Attack 3.2 Implicit Attack 4 Privacy-Preserving Mechanisms 4.1 Data Aggregation 4.2 Training Phase 4.3 Inference Phase 5 Privacy-Enhancing Execution Models and Environments 5.1 Federated Learning 5.2 Split Learning 5.3 Trusted Execution Environment 6 Comparative Analysis 7 Conclusion References Deep Learning Methods for Intrusion Detection System 1 Introduction 2 Related Work 3 Proposed Deep Learning Based Intrusion Detection System 4 System Implementation 4.1 Dataset 4.2 Data Preprocessing 4.3 Finding Optimal Parameters in DNN 4.4 Finding Optimal Parameters in CNN 4.5 Classification 5 Results 6 Conclusion References Adaptive Neuro Fuzzy Approach for Assessment of Learner’s Domain Knowledge 1 Introduction 2 Literature Review 3 Dataset Preparation and ANFIS Model Development 4 ANFIS Model: Testing and Validation 5 Conclusion References Comparison of Full Training and Transfer Learning in Deep Learning for Image Classification 1 Introduction 2 Literature Review 3 Method 3.1 Transfer Learning Approach 3.2 Full Training Approach 4 Results and Analysis 5 Conclusion References Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things 1 Introduction 2 IoMT and Security 2.1 IoMT Architecture 2.2 Security Attacks 2.3 Authentication 2.4 PUF 2.5 OAuth 2.0 3 Literature Review 4 Proposed Model 4.1 Proposed Architecture 4.2 Algorithm 4.3 Enrolment Phase 4.4 Authentication Phase 4.5 Data Transmission Phase 5 Analysis of the Proposed Scheme 5.1 Replay Attacks 5.2 Impersonation Attacks 5.3 Eavesdropping Attacks 5.4 Stolen Device 6 Conclusion References Sensitivity Analysis of a Multilayer Perceptron Network for Cervical Cancer Risk Classification 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset 3.2 Sensitivity Analysis 3.3 Algorithm 4 Results and Discussions 4.1 Number of Inputs and Accuracy 4.2 Number of Epochs and Accuracy 4.3 NNIHL and Accuracy 4.4 Performance Comparison 5 Conclusions References Data Encryption and Decryption Techniques Using Line Graphs 1 Introduction 2 Related Work 3 Proposed Algorithm 3.1 Encryption Algorithm 3.2 Decryption Algorithm 4 Encryption and Decryption of the Plaintext - `Crypto\' 4.1 Encryption 4.2 Decryption 5 Conclusion References Aerial Image Enhanced by Using Dark Channel Prior and Retinex Algorithms Based on HSV Color Space 1 Introduction 2 Proposed Method 2.1 DCP Algorithm 2.2 HSV Color Space 2.3 MSR Algorithm 2.4 The Combination of Enhancement Compounds 3 Determine the Quality Assessment 4 Result and Discussion 5 Conclusions References CARPM: Comparative Analysis of Routing Protocols in MANET 1 Introduction 2 Related Work 3 Comparative Analysis of Proposed Routing protocol with DSR and AODV and PA-DSR and GC-DSR 3.1 Proactive Routing Protocols 3.2 Reactive Routing Protocols 3.3 Hybrid Routing Protocols 4 Challenges or Drawbacks in DSR, AODV and ZRP 5 Proposed Green Corridor Protocol 5.1 Proposed Model Algorithm Pseudo-code 5.2 Results and Discussion 6 Conclusion References Content-Restricted Boltzmann Machines for Diet Recommendation 1 Introduction 2 Related Work 3 Methodology 4 Results and Discussions 5 Conclusion References PIREN: Prediction of Intermediary Readers’ Emotion from News-Articles 1 Introduction 2 Literature Survey and Related Works 3 Proposed Methodology 4 Implementation 5 Results and Performance Evaluation 6 Conclusion References Automated Organic Web Harvesting on Web Data for Analytics 1 Introduction 2 Literature Review 3 Overview of Web Scraping System 4 The Proposed System 5 Experiments and Results 6 Conclusion and Future Work References Convolutional Autoencoder Based Feature Extraction and KNN Classifier for Handwritten MODI Script Character Recognition 1 Introduction 2 Review of Literature 3 Methodology 3.1 Feature Extraction 3.2 Classification 4 Experimental Results 5 Conclusion References ODFWR: An Ontology Driven Framework for Web Service Recommendation 1 Introduction 2 Related Work 3 Proposed System Architecture 4 Implementation and Performance Evaluation 5 Conclusions References Smart Contract Security and Privacy Taxonomy, Tools, and Challenges 1 Introduction 2 Literature Review 3 Taxonomy for Smart Contract Vulnerabilities 4 Proposed Taxonomy for Blockchain Smart Contracts 4.1 OWASP Risk Rating Methodology 4.2 Proposed Taxonomy 5 Tools and Methods Used for the Testing 6 Open Challenges 6.1 Universal Taxonomy 6.2 AI-Based Security Tools 6.3 The Mechanism to Recall Smart Contract 6.4 Auditing Tool that can Support More than One Language 6.5 Strategy for Testing a Smart Contract 7 Future Work and Conclusion References Heteroskedasticity Analysis During Operational Data Processing of Radio Electronic Systems 1 Introduction 2 Literature Analysis and Problem Statement 3 Models of Diagnostic Variable in the Case of Heteroskedasticity 4 Method for Taking into Account Heteroskedasticity During Analysis of the Diagnostic Variable Trend 5 Conclusion References Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python 1 Introduction 2 Literature Review 3 Methodology for Analysing Genomic Data Using Python 3.1 Experimental Setup 4 Results and Discussion 5 Recent Findings in the Field of Genomics 6 Conclusions References Automatic Detection of Smoke in Videos Relying on Features Analysis Using RGB and HSV Colour Spaces 1 Introduction 2 Literature Review 3 Suggested Method 3.1 Cut the Video into Frames 3.2 Important Video Frame Determination 3.3 Smoke Detection Depending on the Features 4 Accuracy Meters 5 Result and Dissection 6 Conclusions References A Comparative Study of the Performance of Gait Recognition Using Gait Energy Image and Shannon’s Entropy Image with CNN 1 Introduction 2 Literature Survey 3 Gait and Gait Phases 4 Experiments and Results 5 Conclusion References OntoJudy: A Ontology Approach for Content-Based Judicial Recommendation Using Particle Swarm Optimisation and Structural Topic Modelling 1 Introduction 2 Related Work 3 Proposed System Architecture 4 Implementation 5 Results and Performance Evaluation 6 Conclusions References Classifying Emails into Spam or Ham Using ML Algorithms 1 Introduction 2 Related Works 2.1 Impact of Feature Selection Technique on Email Classification 2.2 A Hybrid Algorithm for Malicious Spam Detection in Email through Machine Learning 2.3 Study on the Effect of Preprocessing Methods for Spam Email Detection 2.4 Review Web Spam Detection Using Data Mining 2.5 Machine Learning-Based Spam Email Detection 3 Methodology 3.1 Naive Bayes 3.2 Support Vector Machine (SVMs) 3.3 Random Forest 3.4 Decision Tree 4 Experiment and Result Analysis 4.1 Dataset 5 Conclusion References Rice Yield Forecasting in West Bengal Using Hybrid Model 1 Introduction 2 Related Works 3 Methodology 3.1 Data Collection 3.2 ARIMA Model 3.3 ANN Model 3.4 Hybrid Model 3.5 Performance Metrics 4 Experiments 5 Conclusion and Future Work References An Inventory Model for Growing Items with Deterioration and Trade Credit 1 Introduction 2 Modal Formation, Notations and Assumptions 3 Analysis 4 Particular Case 5 Solution Procedure 6 Sensitivity Analysis 7 Conclusion References A Deep Learning Based Approach for Classification of News as Real or Fake 1 Introduction 2 Related Work 3 Proposed Methodology 4 Experiment Analysis 4.1 Data Pre-processing 4.2 Model Analysis 4.3 Experimental Result 5 Conclusion and Future Aspects References User Authentication with Graphical Passwords using Hybrid Images and Hash Function 1 Introduction 2 Literature Review 3 Proposed System 3.1 Algorithm 4 Working Example 4.1 Registration Process 4.2 Login Process 5 Security Analysis 6 Conclusion and Future Work References UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment 1 Introduction 2 Cyber Security Aspects 3 Cyber Threats Analysis and Assessment Algorithm 4 Cybersecurity Threats and Vulnerabilities Analysis and Assessment 5 Suggestions on Cyber Hazards Mitigation 6 Conclusions References Some New Results on Non-zero Component Graphs of Vector Spaces Over Finite Fields 1 Introduction 2 Distances in Non-zero Component Graphs 3 Connectivity in Non-zero Component Graphs 4 Domination in Non-zero Component Graphs 5 Conclusion References Multiple Approaches in Retail Analytics to Augment Revenues 1 Introduction 2 Literature Review 2.1 Retail Analytics: Driving Success in Retail Industry with Business Analytics 2.2 ECLAT Based Market Basket Analysis for Electronic Showroom 2.3 From Word Embeddings to Item Recommendation 3 Methodology 3.1 Business Understanding 3.2 Problem Statement 3.3 Data Understanding 3.4 Data Preparation 4 Model Building 4.1 Modelling 4.2 Evaluation 4.3 Deployment 5 Conclusion References Factors Influencing Online Shopping Behaviour: An Empirical Study of Bangalore 1 Introduction 2 Methodology 3 Conclusion References Smart Electricity and Consumer Management Using Hyperledger Fabric Technology 1 Introduction 2 Proof- of- Concept 3 Proposed Model 4 Implementation 4.1 First Network of Smart Electricity and Consumer Management 4.2 Client Application Deployment 5 Result on the Terminal 6 Conclusion References Early Prediction of Plant Disease Using AI Enabled IOT 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Leaf Image Acquisition 3.2 Preprocessing 3.3 Leaf Region Retrieval 3.4 Features Extraction 3.5 Classification 4 Conclusion References Feature Selection Based on Hall of Fame Strategy of Genetic Algorithm for Flow-Based IDS 1 Introduction 1.1 Hall of Fame Strategy in Genetic Algorithm 2 Literature Review 3 Proposed Model 4 Experimental Setup and Result Analysis 5 Conclusions References Consecutive Radio Labelling of Graphs 1 Introduction 2 Basic Results 3 Some Structural Properties 4 Consecutive Radio Labelling of the Join and the Cartesian Products 5 Conclusion References Blockchain-Enabled Midday Meal Monitoring System 1 Introduction 2 Related Works 3 Proposed Model 4 Implementation 4.1 Tools, Techniques, and Languages Used 5 Experimental Results 6 Conclusion and Future Scope References On Equitable Near Proper Coloring of Mycielski Graph of Graphs 1 Introduction 2 Equitable Near Proper Coloring of Mycielski Graph of Graphs 3 Conclusion References A Model of Daily Newspaper ATM Using PLC System 1 Introduction 2 Overview of Programming Logic Control 2.1 Central Processing Unit (CPU) 2.2 Input and Output Module 2.3 Power Supply 2.4 Programming Device 2.5 Working of PLC 3 Proposed Methodology 3.1 Coin Detection Module 3.2 Relay Unit Module 3.3 Newspaper Cassette Module 3.4 Buzzer Module 4 Expected Results and Approximate Cost 5 Conclusions References The Preservative Technology in the Inventory Model for the Deteriorating Items with Weibull Deterioration Rate 1 Introduction 2 Literature Review 3 Notations and Assumptions 3.1 Notations 3.2 Demand Function 3.3 Assumption 4 Analysis 5 Solution Procedure 5.1 Numerical Example 6 Sensitivity Analysis 7 Conclusion References Lifestyle Diseases Prevalent in Urban Slums of South India 1 Introduction 2 Methodology 2.1 Variables Used 2.2 Methods 3 Empirical Analysis 3.1 Results 4 Conclusion References Eccentric Graph of Join of Graphs 1 Introduction 2 Eccentric Graph of Join of Graphs 3 Conclusion References Differential Privacy in NoSQL Systems 1 Introduction 2 Related Work 2.1 Privacy 2.2 MongoDB 3 Techniques Used 3.1 Cluffering 3.2 Differential Privacy 3.3 Sensitivity 4 Methodology 4.1 Partition of Contributions 4.2 Bounding the Number of Contributed Partitions 4.3 Clamping Individual Contributions 4.4 Laplace Noise 4.5 Approach 5 Results 6 Comparison 7 Conclusion 8 Future Enhancements References Movie Success Prediction from Movie Trailer Engagement and Sentiment Analysis 1 Introduction 2 Related Work 3 Methodology 3.1 Proposed Methodology 3.2 Data Extraction 3.3 Pruning 3.4 Data Pre-processing 3.5 Feature Engineering 3.6 Classification Models 4 Experimental Results and Discussion 5 Conclusion References On the k-Forcing Number of Some DS-Graphs 1 Introduction 2 Preliminaries 3 New Results 4 Conclusion and Scope References Document Classification for Recommender Systems Using Graph Convolutional Networks 1 Introduction 2 Related Work 3 GCN Framework 4 Experimental Analysis 5 Results and Discussions 6 Conclusion References A Study on the Influence of Geometric Transformations on Image Classification: A Case Study 1 Introduction 2 Methodology 3 Results and Discussion 4 Conclusion References Asynchronous Method of Oracle: A Cost-Effective and Reliable Model for Cloud Migration Using Incremental Backups 1 Introduction 2 Existing Model 2.1 Complete Downtime Model 2.2 Primary and Standby Model 2.3 Bidirectional Data Update Model Using Goldengate. 3 Problem Definition 3.1 Cost-Effective 3.2 The Volume of Data 4 Proposed Methodology 5 Implementation 5.1 Analysis with Existing System 5.2 Implementation of Proposed System 6 Result Analysis and Discussions 6.1 Cost-Effective Advantage 6.2 The Advantage Over Data Volume 7 Conclusion References Analysis of Different Approach Used in Particle Swarm Optimization Variants: A Comparative Study 1 Literature survey 2 Introduction 3 PSO Algorithm 4 Existing State of the Art PSO Algorithm 4.1 Linearly Decreasing Weight Particle Swarm Optimization (LdwPSO): 4.2 Linear Decreasing Inertia PSO 4.3 QPSO (Quantum Based Particle Swarm Optimization) 4.4 BARE- BONESPSO (BBSPSO) 4.5 CbPSO (Cultural Based Particle Swarm Optimization) 5 Conclusion and Future Work References Identification of Offensive Content in Memes 1 Introduction 2 Related Works 3 Proposed Methodology 4 Experimental Analysis 4.1 Dataset Description 4.2 Model Analysis 4.3 Experimental Analysis 5 Conclusion and Future Prospects References Prediction of Depression in Young Adults Using Supervised Learning Algorithm 1 Introduction 2 Literature Review 3 Methodology 3.1 Proposed Model 3.2 Data Description 3.3 Data Pre-processing 3.4 Classification Algorithms 3.5 Feature Extraction 3.6 Evaluation Metrics 4 Results and Discussions 4.1 Precision, Recall, and F1 Score 4.2 Accuracy 4.3 AUC - ROC Curve 4.4 Binary Cross-Entropy Loss 4.5 Learning Curve 5 Conclusion References Analysis of Rule-Based Classifiers for IDS in IoT 1 Introduction 2 Literature Review 3 The Proposed IDS in IoT Using Feature Selection with Rule-Based Classifier 4 System Implementation and Result Analysis 5 Comparison with Traditional IDSs 6 Conclusion References Towards a Novel Strategic Scheme for Web Crawler Design Using Simulated Annealing and Semantic Techniques 1 Introduction 2 Related Works 3 Proposed Architecture 4 Implementation 5 Conclusion References Implementation Pathways of Smart Home by Exploiting Internet of Things (IoT) and Tensorflow 1 Introduction 1.1 Technological Know-How 2 State-of-the-Art 3 Methodology 3.1 Algorithm Steps 4 Result and Discussion 4.1 Node-RED Flow Execution 4.2 Node-RED Debug Message 4.3 Voice Assistance Operation 5 Conclusion and Future Work References