ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

دانلود کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2018، جلد 3

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

مشخصات کتاب

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

ویرایش: [1st ed.] 
نویسندگان: , , , ,   
سری: Advances in Intelligent Systems and Computing 814 
ISBN (شابک) : 9789811315008, 9789811315015 
ناشر: Springer Singapore 
سال نشر: 2019 
تعداد صفحات: XXX, 889
[872] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 40 Mb 

قیمت کتاب (تومان) : 51,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2018، جلد 3 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2018، جلد 3



این کتاب شامل مقالات تحقیقاتی ارائه شده در کنفرانس بین المللی فناوری های نوظهور در داده کاوی و امنیت اطلاعات (IEMIS 2018) است که در دانشگاه مهندسی و مدیریت، کلکته، هند، در 23 تا 25 فوریه 2018 برگزار شد. این شامل تحقیقات با کیفیت بالا توسط دانشگاهیان و متخصصان صنعتی در زمینه محاسبات و ارتباطات، از جمله مقالات کامل، مقالات تحقیقاتی در حال انجام، مطالعات موردی مربوط به تمام زمینه‌های داده کاوی، یادگیری ماشین، اینترنت اشیا و امنیت اطلاعات است. .


توضیحاتی درمورد کتاب به خارجی

The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research by academics and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security.



فهرست مطالب

Front Matter ....Pages i-xxx
Front Matter ....Pages 1-1
Proposed Memory Allocation Algorithm for NUMA-Based Soft Real-Time Operating System (Vatsalkumar Shah, Apurva Shah)....Pages 3-11
Mathematical Modeling of QoS-Aware Fog Computing Architecture for IoT Services (Prasenjit Maiti, Jaya Shukla, Bibhudatta Sahoo, Ashok Kumar Turuk)....Pages 13-21
Analysis of Attention Level of Human Body in Different Forms (Ankit Anand, Lala Shakti Swarup Ray, Ramesh K. Sahoo, Srinivas Sethi)....Pages 23-32
Analytical Survey on Standards of Internet of Things Framework and Platforms (Sumanta Kuila, Namrata Dhanda, Subhankar Joardar, Sarmistha Neogy)....Pages 33-44
GIS-Based Model for Optimal Collection and Transportation System for Solid Waste in Allahabad City (Shailendra Chaudhary, Chaitanya Nidhi, Nek Ram Rawal)....Pages 45-65
Higher Order Low-Pass Filter Using Single Current Differencing Buffered Amplifier (Mourina Ghosh, Bal Chand Nagar, Vishal Tiwari)....Pages 67-77
Design of Voice-Controlled Smart Wheelchair for Physically Challenged Persons (Khagendra Joshi, Rakesh Ranjan, Erukonda Sravya, Mirza Nemath Ali Baig)....Pages 79-91
Distance-Based IoT Surveillance Alert System (Sivakumar Premkumar, T. S. Arthi)....Pages 93-107
A Predictive Resource Management Technique in Grid (Sukalyan Goswami, Ajanta Das, Kuntal Mukherjee)....Pages 109-118
Ontology-Based Information Retrieval System for University: Methods and Reasoning (Mohammad Aman Ullah, Syed Akhter Hossain)....Pages 119-128
Methodology to Secure Agricultural Data in IoT (L. Vidyashree, B. M. Suresha)....Pages 129-139
Docker Containers Versus Virtual Machine-Based Virtualization (Anuj Kumar Yadav, M. L. Garg, Ritika)....Pages 141-150
Social IoT-Enabled Emergency Event Detection Framework Using Geo-Tagged Microblogs and Crowdsourced Photographs (Anbalagan Bhuvaneswari, Chinnaiah Valliyammai)....Pages 151-162
Front Matter ....Pages 163-163
Cryptanalysis of a Chaotic Key-Based Image Encryption Scheme (Pratyusa Mukherjee, Krishnendu Rarhi, Abhishek Mishra, Abhishek Bhattacharya)....Pages 165-173
Image Steganography Using Edge Detection by Kirsch Operator and Flexible Replacement Technique (Barnali Gupta Banik, Manish Kumar Poddar, Samir Kumar Bandyopadhyay)....Pages 175-187
Blind RGB Image Steganography Using Discrete Cosine Transformation (Emlon Ghosh, Diptasree Debnath, Barnali Gupta Banik)....Pages 189-201
Logistic Map-Based Image Steganography Scheme Using Combined LSB and PVD for Security Enhancement (Shiv Prasad, Arup Kumar Pal)....Pages 203-214
Blind Digital Image Watermarking for Copyright Protection Based on Hadamard Transform (Sanjida Sharmin, Md. Khaliluzzaman, Md. Mahiuddin, Abdullahil Kafi)....Pages 215-225
Front Matter ....Pages 227-227
An Analysis of Various Techniques for Leaf Disease Prediction (P. Niveditha, H. L. Gururaj, V. Janhavi)....Pages 229-239
Image Compression Using VQ for Lossy Compression (Rishav Chatterjee, Alenrex Maity, Rajdeep Chatterjee)....Pages 241-246
Oil Spill Detection Using Image Processing Technique: An Occupational Safety Perspective of a Steel Plant (Anima Pramanik, Sobhan Sarkar, J. Maiti)....Pages 247-257
Blood Vessel Extraction from Fundus Image (Abheek Ray, Ayantika Chakraborty, Dipankar Roy, Barun Sengupta, Mainak Biswas)....Pages 259-268
Wavelet and Pyramid Histogram Features for Image-Based Leaf Detection (Al Amin Neaz Ahmed, H. M. Fazlul Haque, Abdur Rahman, Md. Susam Ashraf, Swakkhar Shatabda)....Pages 269-278
A Comparative Analysis on Currency Recognition Systems for iCu₹e and an Improved Grab-Cut for Android Devices (Vishwas Raval, Apurva Shah)....Pages 279-286
A Memory-Efficient Image Compression Method Using DWT Applied to Histogram-Based Block Optimization (Amiya Halder, Aritra Kundu, Apurba Sarkar, Kanik Palodhi)....Pages 287-295
Forensic Image Reconstruction Based on Efficient Morphological Operational Model (Sajib Bhawal, Mehnaz Tabassum)....Pages 297-307
Classification of Geographical Features from Satellite Imagery (Md. Haidar Sharif, Sahin Uyaver, Md. Haris Uddin Sharif, Ibrahim Furkan Ince, Zaid Zerdo)....Pages 309-321
Automated Detection of Glaucoma Using Image Processing Techniques (Mishkin Khunger, Tanupriya Choudhury, Suresh Chandra Satapathy, Kuo-Chang Ting)....Pages 323-335
DWT and DCT-Based Compressed Image Transmission Over AWGN Using C-QAM (Md. Khaliluzzaman, Shahela Pervin, Umme Moon Ima, Deepak Kumar Chy)....Pages 337-351
Detection and Identification of Downy Mildew Diseased Leaf of Cucurbita Pepo (Pumpkin) Using Digital Image Processing (Prabira Kumar Sethy, Ansuman Bisoi, Gyana Ranjana Panigrahi, Santi Kumari Behera)....Pages 353-363
A Survey on Rice Plant Disease Identification Using Image Processing and Data Mining Techniques (Tanmoy Bera, Ankur Das, Jaya Sil, Asit K. Das)....Pages 365-376
A Survey on Comparison Analysis Between EEG Signal and MRI for Brain Stroke Detection (Snehashish Bhattacharjee, Sujata Ghatak, Soumi Dutta, Biswajoy Chatterjee, Mousumi Gupta)....Pages 377-382
Front Matter ....Pages 383-383
Enhancing Call Center Operations Through Semantic Voice Analysis (Charitha Samaranayaka, Saminda Premaratne)....Pages 385-395
Integration of Wit API with Python Coded Terminal Bot (Sanyam Jain, Shivani Sharma, Ravi Tomar)....Pages 397-406
An Approach of Splitting Upsarg and Pratyay of Sanskrit Word Using Paninian Framework of Sanskrit Grammar (Bhavin Panchal, Abhijitsinh Parmar, Sadik Dholitar)....Pages 407-415
Collaborative Ranking-Based Text Summarization Using a Metaheuristic Approach (Pradeepika Verma, Hari Om)....Pages 417-426
Chemical Reaction Optimization Algorithm for Word Detection Using Pictorial Structure (C. M. Khaled Saifullah, Md. Rafiqul Islam, Md. Riaz Mahmud)....Pages 427-440
Sentiment Prediction Based on Lexical Analysis Using Deep Learning (S. M. Mazharul Hoque Chowdhury, Sheikh Abujar, Mohd. Saifuzzaman, Priyanka Ghosh, Syed Akhter Hossain)....Pages 441-449
An Efficient Sentiment Mining Approach on Social Media Networks ( Al-Amin, Md. Amirul Islam, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee)....Pages 451-461
A Crowdsource-Based Approach for Preparing Bangla POS Tagged Corpus (Shamim Ehsan, Sadia Tasnim Swarna, Sabir Ismail)....Pages 463-473
A Study of Feature Extraction Techniques for Sentiment Analysis (M. Avinash, E. Sivasankar)....Pages 475-486
Sentence-Based Topic Modeling Using Lexical Analysis (Shahinur Rahman, Sheikh Abujar, S. M. Mazharul Hoque Chowdhury, Mohd. Saifuzzaman, Syed Akhter Hossain)....Pages 487-494
Anatomy of Preprocessing of Big Data for Monolingual Corpora Paraphrase Extraction: Source Language Sentence Selection (Vivek Kumar, Abhishek Verma, Namita Mittal, Sergey V. Gromov)....Pages 495-505
Parallel Frequent Pattern Mining on Natural Language-Based Social Media Data (Shubhangi Chaturvedi, Sri Khetwat Saritha)....Pages 507-517
Front Matter ....Pages 519-519
Adaptive Smart Antenna Using Microstrip Array for Cellular Network (Anwesha Halder, Anupama Senapati, Jibendu Sekhar Roy)....Pages 521-529
Social Energy-Based Techniques in Delay-Tolerant Network (Pushkar Jagtap, Lalit Kulkarni)....Pages 531-538
The Cryptographic Properties of Feistel Network-Based Quasigroups (Tajender Kumar, Sugata Gangopadhyay)....Pages 539-549
Studies of Optimization of Throughput: Combining Receiver Diversity in Hybrid ARQ Scheme Over Fading Channel (Mayuri Kundu, Swarnendu K. Chakraborty)....Pages 551-558
Gray Hole and Cooperative Attack Prevention Protocol for MANETs (Sandeep S. Musale, Sandeep L. Dhende, S. D. Shirbahadurkar, Anand S. Najan)....Pages 559-566
Threat Intelligence Analysis of Onion Websites Using Sublinks and Keywords (Tarun Trivedi, Vinod Parihar, Manas Khatua, B. M. Mehtre)....Pages 567-578
Controllability of Network: Identification of Controller Genes in a Gene–Gene Interaction Network (Anjan Kumar Payra, Anupam Ghosh, Pabitra Mitra)....Pages 579-588
Analysing MPLS Performance by SDN (Snehal Patil, Mansi S. Subhedar)....Pages 589-598
Serving New Interest in Named Data Network (Tanusree Chatterjee, Pritam Banerjee)....Pages 599-609
A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT (Akanksha Jain, Sweta Jain)....Pages 611-620
Reduction of Web Latency: An Integrated Proxy Prefetch-Cache System Framework (Sirshendu Sekhar Ghosh, Moujhuri Patra, Aruna Jain)....Pages 621-633
Disease Prediction on the Basis of SNPs (Jyotiprakash Panigrahi, Bhabani Shankar Prasad Mishra, Satya Ranjan Dash)....Pages 635-643
Temporal Signature Mining for Network Intrusion Detection Using TEMR (Tanjila Mawla, Sharmishtha Dutta, Md. Forhad Rabbi)....Pages 645-655
High-Capacity Downlink for Millimeter Wave Communication Network Architecture (Abdullah Al-Mamun Bulbul, Md. Tariq Hasan, Mohammad Ismat Kadir, Md. Mahbub Hossain, Abdullah Al Nahid, Md. Nazmul Hasan)....Pages 657-666
Front Matter ....Pages 667-667
Review on Intrigue Used for Caching of Information in View of Information Density in Wireless Ad Hoc Network (Saleha I. Saudagar, Sonika A. Chorey, Gayatri A. Jagnade)....Pages 669-678
Secure Encryption in Wireless Body Sensor Networks (A. Sivasangari, Suvam Bhowal, R. Subhashini)....Pages 679-686
An Effective Privacy-Preserving Reputation Scheme for Mobile Crowdsensing (Bayan Hashr Alamri, Muhammad Mostafa Monowar, Suhair Alshehri)....Pages 687-698
Quantum PSO Algorithm for Clustering in Wireless Sensor Networks to Improve Network Lifetime (P. Kanchan, D. Pushparaj Shetty)....Pages 699-713
Secure Remote Patient Monitoring with Location-Based Services (Mainak Sen, Gautam Mahapatra)....Pages 715-726
Implementation of Mobility-Assisted Uncertainty Reduction Based on MCR-O Scheme in MANET (K. Pushpalatha, G. Karthikeyan, S. Umarani)....Pages 727-742
IoT-Based Robot with Wireless and Voice Recognition Mode (Md. Amirul Islam, Nishat Halim Sharif, Md. Shahriar Parvez Tameem, S. M. Mazharul Hoque Chowdhury, Moriom Chowdhury Kumu, Md. Fokhray Hossain)....Pages 743-752
Development of Joint Intelligent Millimeter wave Sensing and Communication (M. Chakraborty, B. Maji, D. Kandar)....Pages 753-760
Wi-Fi Optimization Using Parabolic Reflector and Blocking Materials in Intrusion Detection Systems (Sumanta Kumar Deb, Ankan Bhowmik, Biswajit Maity, Abhijit Sarkar, Amitava Chattopadhyay)....Pages 761-771
Lifetime and Transport Delay Optimization in Presence of Delay in WSN (Bhushan Jichkar, Deepak Mehetre, S. Emalda Roslin)....Pages 773-789
Types of Sensor and Their Applications, Advantages, and Disadvantages (Manish Pandey, Gaurav Mishra)....Pages 791-804
Mamdani and Sugeno Fuzzy Inference Systems’ Comparison for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks (Alka Chaudhary)....Pages 805-811
Front Matter ....Pages 813-813
A Novel Transfer Learning-Based Missing Value Imputation on Discipline Diverse Real Test Datasets—A Comparative Study with Different Machine Learning Algorithms (Jit Gupta, Sayak Paul, Anupam Ghosh)....Pages 815-826
Machine Learning in Astronomy: A Case Study in Quasar-Star Classification (Mohammed Viquar, Suryoday Basak, Ariruna Dasgupta, Surbhi Agrawal, Snehanshu Saha)....Pages 827-836
A Supervised Method to Find the Relevance of Extracted Keywords Using Deep Learning Approaches (Rajesh Kumar, Gopichand Agnihotram, Pandurang Naik, Suyog Trivedi)....Pages 837-847
An Efficient Traffic Sign Recognition Approach Using a Novel Deep Neural Network Selection Architecture (Sourajit Saha, Md. Saiful Islam, Md. Asif Bin Khaled, Suraiya Tairin)....Pages 849-862
Kohonen’s Self-organizing Map Optimizing Prediction of Gene Dependency for Cancer Mediating Biomarkers (Partho Mallick, Oindrila Ghosh, Priyanka Seth, Anupam Ghosh)....Pages 863-870
Key Feature Extraction and Machine Learning-Based Automatic Text Summarization (Vivek K. Verma, Anju Yadav, Tarun Jain)....Pages 871-877
Prediction of Gold Price Movement Using Geopolitical Risk as a Factor (Debanjan Banerjee, Arijit Ghosal, Imon Mukherjee)....Pages 879-886
Back Matter ....Pages 887-889




نظرات کاربران