ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Data Science and Security: Proceedings of IDSCS 2021

دانلود کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2021

Data Science and Security: Proceedings of IDSCS 2021

مشخصات کتاب

Data Science and Security: Proceedings of IDSCS 2021

ویرایش: [290, 1 ed.] 
نویسندگان: , , , ,   
سری: Lecture Notes in Networks and Systems 
ISBN (شابک) : 9811644853, 9789811644856 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 503 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 16 Mb 

قیمت کتاب (تومان) : 32,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Data Science and Security: Proceedings of IDSCS 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2021



این کتاب بهترین مقالات ارائه شده در کنفرانس بین‌المللی علوم داده، محاسبات و امنیت (IDSCS-2021) را ارائه می‌کند که توسط دپارتمان علوم داده، CHRIST (که دانشگاه تلقی می‌شود)، پردیس پونا لاواسا، هند، در طول 16 تا 17 آوریل 2021 سازمان‌دهی شده است، تحقیقاتی را که در حال حاضر در حوزه‌های امنیتی داده‌ها انجام می‌شود، انجام می‌دهد. هوش، یادگیری ماشین، بینایی کامپیوتر، طراحی الگوریتم ها، شبکه های کامپیوتری، داده کاوی، کلان داده، متن کاوی، نمایش دانش، محاسبات نرم، و رایانش ابری.



توضیحاتی درمورد کتاب به خارجی

This book presents the best-selected papers presented at the International Conference on Data Science, Computation and Security (IDSCS-2021), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during April 16–17, 2021. The proceeding is targeting the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing, and cloud computing.




فهرست مطالب

Preface
Contents
About the Editors
Towards a Knowledge Centric Semantic Approach for Text Summarization
	1 Introduction
	2 Related Works
	3 Proposed Architecture
	4 Implementation
	5 Performance Evaluation and Results
	6 Conclusion
	References
Detection of Abnormal Red Blood Cells Using Features Dependent on Morphology and Rotation
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Determine the ROI
		3.2 Features Determination
	4 Quality Assessment
	5 Experimental Results
	6 Conclusion
	7 Future Scope
	References
A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning
	1 Introduction
	2 Background
		2.1 What is Privacy in Machine Learning
	3 Classification of Machine Learning Attacks
		3.1 Explicit Attack
		3.2 Implicit Attack
	4 Privacy-Preserving Mechanisms
		4.1 Data Aggregation
		4.2 Training Phase
		4.3 Inference Phase
	5 Privacy-Enhancing Execution Models and Environments
		5.1 Federated Learning
		5.2 Split Learning
		5.3 Trusted Execution Environment
	6 Comparative Analysis
	7 Conclusion
	References
Deep Learning Methods for Intrusion Detection System
	1 Introduction
	2 Related Work
	3 Proposed Deep Learning Based Intrusion Detection System
	4 System Implementation
		4.1 Dataset
		4.2 Data Preprocessing
		4.3 Finding Optimal Parameters in DNN
		4.4 Finding Optimal Parameters in CNN
		4.5 Classification
	5 Results
	6 Conclusion
	References
Adaptive Neuro Fuzzy Approach for Assessment of Learner’s Domain Knowledge
	1 Introduction
	2 Literature Review
	3 Dataset Preparation and ANFIS Model Development
	4 ANFIS Model: Testing and Validation
	5 Conclusion
	References
Comparison of Full Training and Transfer Learning in Deep Learning for Image Classification
	1 Introduction
	2 Literature Review
	3 Method
		3.1 Transfer Learning Approach
		3.2 Full Training Approach
	4 Results and Analysis
	5 Conclusion
	References
Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things
	1 Introduction
	2 IoMT and Security
		2.1 IoMT Architecture
		2.2 Security Attacks
		2.3 Authentication
		2.4 PUF
		2.5 OAuth 2.0
	3 Literature Review
	4 Proposed Model
		4.1 Proposed Architecture
		4.2 Algorithm
		4.3 Enrolment Phase
		4.4 Authentication Phase
		4.5 Data Transmission Phase
	5 Analysis of the Proposed Scheme
		5.1 Replay Attacks
		5.2 Impersonation Attacks
		5.3 Eavesdropping Attacks
		5.4 Stolen Device
	6 Conclusion
	References
Sensitivity Analysis of a Multilayer Perceptron Network for Cervical Cancer Risk Classification
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Dataset
		3.2 Sensitivity Analysis
		3.3 Algorithm
	4 Results and Discussions
		4.1 Number of Inputs and Accuracy
		4.2 Number of Epochs and Accuracy
		4.3 NNIHL and Accuracy
		4.4 Performance Comparison
	5 Conclusions
	References
Data Encryption and Decryption Techniques Using Line Graphs
	1 Introduction
	2 Related Work
	3 Proposed Algorithm
		3.1 Encryption Algorithm
		3.2 Decryption Algorithm
	4 Encryption and Decryption of the Plaintext - `Crypto\'
		4.1 Encryption
		4.2 Decryption
	5 Conclusion
	References
Aerial Image Enhanced by Using Dark Channel Prior and Retinex Algorithms Based on HSV Color Space
	1 Introduction
	2 Proposed Method
		2.1 DCP Algorithm
		2.2 HSV Color Space
		2.3 MSR Algorithm
		2.4 The Combination of Enhancement Compounds
	3 Determine the Quality Assessment
	4 Result and Discussion
	5 Conclusions
	References
CARPM: Comparative Analysis of Routing Protocols in MANET
	1 Introduction
	2 Related Work
	3 Comparative Analysis of Proposed Routing protocol with DSR and AODV and PA-DSR and GC-DSR
		3.1 Proactive Routing Protocols
		3.2 Reactive Routing Protocols
		3.3 Hybrid Routing Protocols
	4 Challenges or Drawbacks in DSR, AODV and ZRP
	5 Proposed Green Corridor Protocol
		5.1 Proposed Model Algorithm Pseudo-code
		5.2 Results and Discussion
	6 Conclusion
	References
Content-Restricted Boltzmann Machines for Diet Recommendation
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results and Discussions
	5 Conclusion
	References
PIREN: Prediction of Intermediary Readers’ Emotion from News-Articles
	1 Introduction
	2 Literature Survey and Related Works
	3 Proposed Methodology
	4 Implementation
	5 Results and Performance Evaluation
	6 Conclusion
	References
Automated Organic Web Harvesting on Web Data for Analytics
	1 Introduction
	2 Literature Review
	3 Overview of Web Scraping System
	4 The Proposed System
	5 Experiments and Results
	6 Conclusion and Future Work
	References
Convolutional Autoencoder Based Feature Extraction and KNN Classifier for Handwritten MODI Script Character Recognition
	1 Introduction
	2 Review of Literature
	3 Methodology
		3.1 Feature Extraction
		3.2 Classification
	4 Experimental Results
	5 Conclusion
	References
ODFWR: An Ontology Driven Framework for Web Service Recommendation
	1 Introduction
	2 Related Work
	3 Proposed System Architecture
	4 Implementation and Performance Evaluation
	5 Conclusions
	References
Smart Contract Security and Privacy Taxonomy, Tools, and Challenges
	1 Introduction
	2 Literature Review
	3 Taxonomy for Smart Contract Vulnerabilities
	4 Proposed Taxonomy for Blockchain Smart Contracts
		4.1 OWASP Risk Rating Methodology
		4.2 Proposed Taxonomy
	5 Tools and Methods Used for the Testing
	6 Open Challenges
		6.1 Universal Taxonomy
		6.2 AI-Based Security Tools
		6.3 The Mechanism to Recall Smart Contract
		6.4 Auditing Tool that can Support More than One Language
		6.5 Strategy for Testing a Smart Contract
	7 Future Work and Conclusion
	References
Heteroskedasticity Analysis During Operational Data Processing of Radio Electronic Systems
	1 Introduction
	2 Literature Analysis and Problem Statement
	3 Models of Diagnostic Variable in the Case of Heteroskedasticity
	4 Method for Taking into Account Heteroskedasticity During Analysis of the Diagnostic Variable Trend
	5 Conclusion
	References
Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python
	1 Introduction
	2 Literature Review
	3 Methodology for Analysing Genomic Data Using Python
		3.1 Experimental Setup
	4 Results and Discussion
	5 Recent Findings in the Field of Genomics
	6 Conclusions
	References
Automatic Detection of Smoke in Videos Relying on Features Analysis Using RGB and HSV Colour Spaces
	1 Introduction
	2 Literature Review
	3 Suggested Method
		3.1 Cut the Video into Frames
		3.2 Important Video Frame Determination
		3.3 Smoke Detection Depending on the Features
	4 Accuracy Meters
	5 Result and Dissection
	6 Conclusions
	References
A Comparative Study of the Performance of Gait Recognition Using Gait Energy Image and Shannon’s Entropy Image with CNN
	1 Introduction
	2 Literature Survey
	3 Gait and Gait Phases
	4 Experiments and Results
	5 Conclusion
	References
OntoJudy: A Ontology Approach for Content-Based Judicial Recommendation Using Particle Swarm Optimisation and Structural Topic Modelling
	1 Introduction
	2 Related Work
	3 Proposed System Architecture
	4 Implementation
	5 Results and Performance Evaluation
	6 Conclusions
	References
Classifying Emails into Spam or Ham Using ML Algorithms
	1 Introduction
	2 Related Works
		2.1 Impact of Feature Selection Technique on Email Classification
		2.2 A Hybrid Algorithm for Malicious Spam Detection in Email through Machine Learning
		2.3 Study on the Effect of Preprocessing Methods for Spam Email Detection
		2.4 Review Web Spam Detection Using Data Mining
		2.5 Machine Learning-Based Spam Email Detection
	3 Methodology
		3.1 Naive Bayes
		3.2 Support Vector Machine (SVMs)
		3.3 Random Forest
		3.4 Decision Tree
	4 Experiment and Result Analysis
		4.1 Dataset
	5 Conclusion
	References
Rice Yield Forecasting in West Bengal Using Hybrid Model
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Data Collection
		3.2 ARIMA Model
		3.3 ANN Model
		3.4 Hybrid Model
		3.5 Performance Metrics
	4 Experiments
	5 Conclusion and Future Work
	References
An Inventory Model for Growing Items with Deterioration and Trade Credit
	1 Introduction
	2 Modal Formation, Notations and Assumptions
	3 Analysis
	4 Particular Case
	5 Solution Procedure
	6 Sensitivity Analysis
	7 Conclusion
	References
A Deep Learning Based Approach for Classification of News as Real or Fake
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Experiment Analysis
		4.1 Data Pre-processing
		4.2 Model Analysis
		4.3 Experimental Result
	5 Conclusion and Future Aspects
	References
User Authentication with Graphical Passwords using Hybrid Images and Hash Function
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 Algorithm
	4 Working Example
		4.1 Registration Process
		4.2 Login Process
	5 Security Analysis
	6 Conclusion and Future Work
	References
UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment
	1 Introduction
	2 Cyber Security Aspects
	3 Cyber Threats Analysis and Assessment Algorithm
	4 Cybersecurity Threats and Vulnerabilities Analysis and Assessment
	5 Suggestions on Cyber Hazards Mitigation
	6 Conclusions
	References
Some New Results on Non-zero Component Graphs of Vector Spaces Over Finite Fields
	1 Introduction
	2 Distances in Non-zero Component Graphs
	3 Connectivity in Non-zero Component Graphs
	4 Domination in Non-zero Component Graphs
	5 Conclusion
	References
Multiple Approaches in Retail Analytics to Augment Revenues
	1 Introduction
	2 Literature Review
		2.1 Retail Analytics: Driving Success in Retail Industry with Business Analytics
		2.2 ECLAT Based Market Basket Analysis for Electronic Showroom
		2.3 From Word Embeddings to Item Recommendation
	3 Methodology
		3.1 Business Understanding
		3.2 Problem Statement
		3.3 Data Understanding
		3.4 Data Preparation
	4 Model Building
		4.1 Modelling
		4.2 Evaluation
		4.3 Deployment
	5 Conclusion
	References
Factors Influencing Online Shopping Behaviour: An Empirical Study of Bangalore
	1 Introduction
	2 Methodology
	3 Conclusion
	References
Smart Electricity and Consumer Management Using Hyperledger Fabric Technology
	1 Introduction
	2 Proof- of- Concept
	3 Proposed Model
	4 Implementation
		4.1 First Network of Smart Electricity and Consumer Management
		4.2 Client Application Deployment
	5 Result on the Terminal
	6 Conclusion
	References
Early Prediction of Plant Disease Using AI Enabled IOT
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Leaf Image Acquisition
		3.2 Preprocessing
		3.3 Leaf Region Retrieval
		3.4 Features Extraction
		3.5 Classification
	4 Conclusion
	References
Feature Selection Based on Hall of Fame Strategy of Genetic Algorithm for Flow-Based IDS
	1 Introduction
		1.1 Hall of Fame Strategy in Genetic Algorithm
	2 Literature Review
	3 Proposed Model
	4 Experimental Setup and Result Analysis
	5 Conclusions
	References
Consecutive Radio Labelling of Graphs
	1 Introduction
	2 Basic Results
	3 Some Structural Properties
	4 Consecutive Radio Labelling of the Join and the Cartesian Products
	5 Conclusion
	References
Blockchain-Enabled Midday Meal Monitoring System
	1 Introduction
	2 Related Works
	3 Proposed Model
	4 Implementation
		4.1 Tools, Techniques, and Languages Used
	5 Experimental Results
	6 Conclusion and Future Scope
	References
On Equitable Near Proper Coloring of Mycielski Graph of Graphs
	1 Introduction
	2 Equitable Near Proper Coloring of Mycielski Graph of Graphs
	3 Conclusion
	References
A Model of Daily Newspaper ATM Using PLC System
	1 Introduction
	2 Overview of Programming Logic Control
		2.1 Central Processing Unit (CPU)
		2.2 Input and Output Module
		2.3 Power Supply
		2.4 Programming Device
		2.5 Working of PLC
	3 Proposed Methodology
		3.1 Coin Detection Module
		3.2 Relay Unit Module
		3.3 Newspaper Cassette Module
		3.4 Buzzer Module
	4 Expected Results and Approximate Cost
	5 Conclusions
	References
The Preservative Technology in the Inventory Model for the Deteriorating Items with Weibull Deterioration Rate
	1 Introduction
	2 Literature Review
	3 Notations and Assumptions
		3.1 Notations
		3.2 Demand Function
		3.3 Assumption
	4 Analysis
	5 Solution Procedure
		5.1 Numerical Example
	6 Sensitivity Analysis
	7 Conclusion
	References
Lifestyle Diseases Prevalent in Urban Slums of South India
	1 Introduction
	2 Methodology
		2.1 Variables Used
		2.2 Methods
	3 Empirical Analysis
		3.1 Results
	4 Conclusion
	References
Eccentric Graph of Join of Graphs
	1 Introduction
	2 Eccentric Graph of Join of Graphs
	3 Conclusion
	References
Differential Privacy in NoSQL Systems
	1 Introduction
	2 Related Work
		2.1 Privacy
		2.2 MongoDB
	3 Techniques Used
		3.1 Cluffering
		3.2 Differential Privacy
		3.3 Sensitivity
	4 Methodology
		4.1 Partition of Contributions
		4.2 Bounding the Number of Contributed Partitions
		4.3 Clamping Individual Contributions
		4.4 Laplace Noise
		4.5 Approach
	5 Results
	6 Comparison
	7 Conclusion
	8 Future Enhancements
	References
Movie Success Prediction from Movie Trailer Engagement and Sentiment Analysis
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Proposed Methodology
		3.2 Data Extraction
		3.3 Pruning
		3.4 Data Pre-processing
		3.5 Feature Engineering
		3.6 Classification Models
	4 Experimental Results and Discussion
	5 Conclusion
	References
On the k-Forcing Number of Some DS-Graphs
	1 Introduction
	2 Preliminaries
	3 New Results
	4 Conclusion and Scope
	References
Document Classification for Recommender Systems Using Graph Convolutional Networks
	1 Introduction
	2 Related Work
	3 GCN Framework
	4 Experimental Analysis
	5 Results and Discussions
	6 Conclusion
	References
A Study on the Influence of Geometric Transformations on Image Classification: A Case Study
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
Asynchronous Method of Oracle: A Cost-Effective and Reliable Model for Cloud Migration Using Incremental Backups
	1 Introduction
	2 Existing Model
		2.1 Complete Downtime Model
		2.2 Primary and Standby Model
		2.3 Bidirectional Data Update Model Using Goldengate.
	3 Problem Definition
		3.1 Cost-Effective
		3.2 The Volume of Data
	4 Proposed Methodology
	5 Implementation
		5.1 Analysis with Existing System
		5.2 Implementation of Proposed System
	6 Result Analysis and Discussions
		6.1 Cost-Effective Advantage
		6.2 The Advantage Over Data Volume
	7 Conclusion
	References
Analysis of Different Approach Used in Particle Swarm Optimization Variants: A Comparative Study
	1 Literature survey
	2 Introduction
	3 PSO Algorithm
	4 Existing State of the Art PSO Algorithm
		4.1 Linearly Decreasing Weight Particle Swarm Optimization (LdwPSO):
		4.2 Linear Decreasing Inertia PSO
		4.3 QPSO (Quantum Based Particle Swarm Optimization)
		4.4 BARE- BONESPSO (BBSPSO)
		4.5 CbPSO (Cultural Based Particle Swarm Optimization)
	5 Conclusion and Future Work
	References
Identification of Offensive Content in Memes
	1 Introduction
	2 Related Works
	3 Proposed Methodology
	4 Experimental Analysis
		4.1 Dataset Description
		4.2 Model Analysis
		4.3 Experimental Analysis
	5 Conclusion and Future Prospects
	References
Prediction of Depression in Young Adults Using Supervised Learning Algorithm
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Proposed Model
		3.2 Data Description
		3.3 Data Pre-processing
		3.4 Classification Algorithms
		3.5 Feature Extraction
		3.6 Evaluation Metrics
	4 Results and Discussions
		4.1 Precision, Recall, and F1 Score
		4.2 Accuracy
		4.3 AUC - ROC Curve
		4.4 Binary Cross-Entropy Loss
		4.5 Learning Curve
	5 Conclusion
	References
Analysis of Rule-Based Classifiers for IDS in IoT
	1 Introduction
	2 Literature Review
	3 The Proposed IDS in IoT Using Feature Selection with Rule-Based Classifier
	4 System Implementation and Result Analysis
	5 Comparison with Traditional IDSs
	6 Conclusion
	References
Towards a Novel Strategic Scheme for Web Crawler Design Using Simulated Annealing and Semantic Techniques
	1 Introduction
	2 Related Works
	3 Proposed Architecture
	4 Implementation
	5 Conclusion
	References
Implementation Pathways of Smart Home by Exploiting Internet of Things (IoT) and Tensorflow
	1 Introduction
		1.1 Technological Know-How
	2 State-of-the-Art
	3 Methodology
		3.1 Algorithm Steps
	4 Result and Discussion
		4.1 Node-RED Flow Execution
		4.2 Node-RED Debug Message
		4.3 Voice Assistance Operation
	5 Conclusion and Future Work
	References




نظرات کاربران