ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3 (Lecture Notes in Networks and Systems, 285)

دانلود کتاب محاسبات هوشمند: مجموعه مقالات کنفرانس محاسباتی 2021، جلد 3 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 285)

Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3 (Lecture Notes in Networks and Systems, 285)

مشخصات کتاب

Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3 (Lecture Notes in Networks and Systems, 285)

ویرایش: 1st ed. 2021 
نویسندگان:   
سری:  
ISBN (شابک) : 3030801284, 9783030801281 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 1108 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 16 مگابایت 

قیمت کتاب (تومان) : 48,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3 (Lecture Notes in Networks and Systems, 285) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات هوشمند: مجموعه مقالات کنفرانس محاسباتی 2021، جلد 3 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 285) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات هوشمند: مجموعه مقالات کنفرانس محاسباتی 2021، جلد 3 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 285)

این کتاب مجموعه ای جامع از فصول با تمرکز بر حوزه های اصلی محاسبات و کاربردهای بعدی آنها در دنیای واقعی است. هر فصل مقاله ای است که در کنفرانس محاسباتی 2021 که در 15 تا 16 ژوئیه 2021 برگزار شد، ارائه شده است. Computing 2021 در مجموع 638 مورد ارسالی را به خود جلب کرد که تحت یک فرآیند بررسی همتایان دوسوکور قرار گرفتند. از این 638 مورد ارسالی، 235 مورد ارسالی برای درج در این کتاب انتخاب شده است. هدف این کنفرانس فراهم کردن بستری برای محققان با مشارکت های اساسی و مکانی برتر برای دست اندرکاران دانشگاهی و صنعتی برای به اشتراک گذاشتن ایده های جدید و تجربیات توسعه است. امیدواریم که خوانندگان این جلد را جالب و ارزشمند بدانند زیرا روش‌ها و تکنیک‌های هوشمندانه‌ای را برای حل مشکلات دنیای واقعی ارائه می‌کند. ما همچنین انتظار داریم که کنفرانس و انتشارات آن محرکی برای پیشرفت تحقیقات و فناوری مرتبط بیشتر در این موضوع مهم باشد.


توضیحاتی درمورد کتاب به خارجی

This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world. Each chapter is a paper presented at the Computing Conference 2021 held on 15-16 July 2021. Computing 2021 attracted a total of 638 submissions which underwent a double-blind peer review process. Of those 638 submissions, 235 submissions have been selected to be included in this book. The goal of this conference is to give a platform to researchers with fundamental contributions and to be a premier venue for academic and industry practitioners to share new ideas and development experiences. We hope that readers find this volume interesting and valuable as it provides the state-of-the-art intelligent methods and techniques for solving real-world problems. We also expect that the conference and its publications is a trigger for further related research and technology improvements in this important subject.



فهرست مطالب

Editor’s Preface
Contents
Feature Analysis for Aphasic or Abnormal Language Caused by Injury
	1 Introduction
	2 Related Work
	3 Methodology
	4 Experiments
		4.1 Data Set
		4.2 Further Experimental Details
		4.3 Preliminary Results
		4.4 Discussion of Results
	5 Conclusions
	References
Automatic Detection and Segmentation of Liver Tumors in Computed Tomography Images: Methods and Limitations
	1 Introduction
	2 Related Work
	3 Method
		3.1 Dataset
		3.2 Preprocessing
		3.3 Tumor Segmentation
		3.4 Performance Metrics
		3.5 Region Analysis and Performance Conditions
	4 Results and Analysis
	5 Discussion
	6 Conclusion
	References
HEMAYAH: A Proposed Mobile Application System for Tracking and Preventing COVID-19 Outbreaks in Saudi Arabia
	1 Introduction
	2 Proposed System
	3 System Implementation
		3.1 Different Users of the System
		3.2 The Database
	4 Conclusion and Future Work
	References
Data Security in Health Systems: Case of Cameroon
	1 Introduction
	2 State of the Art
	3 Data Security Model
		3.1 Local Security in Healthcare Systems
		3.2 Data Exchange Security
	4 Results, Analysis and Discussion
	5 Conclusion
	6 Future Work
	References
Predicting Levels of Depression and Anxiety in People with Neurodegenerative Memory Complaints Presenting with Confounding Symptoms
	1 Introduction
	2 Background
	3 Data
	4 Depression Score Prediction and Classification
		4.1 Pre-processing and Feature Selection
		4.2 Classification and Regression
	5 Results
	6 Conclusion
	References
Towards Collecting Big Data for Remote Photoplethysmography
	1 Introduction
		1.1 RPPG in the Wild
		1.2 Existing RPPG Datasets: Related Works
		1.3 Contributions
	2 Distributed Dataset
		2.1 DCC-Client-``Dual-Cam Collector" Mobile App
		2.2 DCC-SFEDU-Example Dataset
	3 Concerns and Limitations
		3.1 Video Synchronization
		3.2 Video Capturing Procedure
	4 Conclusion
	References
Towards Digital Twins Driven Breast Cancer Detection
	1 Introduction
	2 Research Background
		2.1 Digital Twin in Healthcare
		2.2 Breast Detection Using Thermography
		2.3 Factors Influencing Skin Temperature
		2.4 Focus of the Paper
	3 Proposed Methodology
		3.1 Physical Space
		3.2 Physical Layer
		3.3 Data Processing Layer
		3.4 Decision Layer
	4 Numerical Simulations of Dynamic Thermography
	5 Results and Discussion
	6 Conclusion
	References
Towards the Localisation of Lesions in Diabetic Retinopathy
	1 Introduction
	2 Data and Methodology
	3 Results
	4 Conclusions
	References
Framework for a DLT Based COVID-19 Passport
	1 Introduction
		1.1 Related Work
	2 Preliminaries
		2.1 Notation
		2.2 Entropy
	3 Iris Template Extraction
		3.1 Template Masking
		3.2 Conversion to Linear Vector
		3.3 Wrap-Up
	4 Locality-Sensitive Hashing
		4.1 Input Hiding
		4.2 Our Variant of SimHash
		4.3 Evaluation
	5 Blockchain
		5.1 Interface
	6 Our Framework
		6.1 Overview
		6.2 Formal Description
	7 Conclusions and Future Work
	References
Deep Learning Causal Attributions of Breast Cancer
	1 Introduction
	2 Relevant Works
	3 Methodology
		3.1 Restricted Boltzmann Machines for Dimensionality Reduction and Feature Extraction
		3.2 k-Means Cluster Analysis
	4 Data Pre-processing
	5 Experimental Settings
	6 Pattern Interpretations and Findings
	7 Concluding Remark and Future Work
	References
Effect of Adaptive Histogram Equalization of Orthopedic Radiograph Images on the Accuracy of Implant Delineation Using Active Contours
	1 Introduction
	2 Implant Segmentation on Radiographs
		2.1 Input Data
		2.2 Proposed Approach
		2.3 Space of Parameters
		2.4 Experimental Evaluation
	3 Conclusions
	References
Identification Diseases Using Apriori Algorithm on DevOps
	1 Introduction
	2 Problem Definition
	3 Background
		3.1 Traditional Model (Water Fall)
		3.2 Agile Model
		3.3 DevOps
		3.4 Water-Scrum-Fall (Mixture Traditional and Scrum)
		3.5 Hybrid v- Model: (Mix V –Model with Scrum)
	4 Related Work
	5 Proposed Model
		5.1 Dataset
		5.2 Approach of Hybrid DevOps Model
		5.3 The Procedure of Identify Frequent Diseases Application
	6 Results
	7 Conclusion
	8 Future Work
	References
IoT for Diabetics: A User Perspective
	1 Introduction
	2 Literature and Theoretical Background
		2.1 Internet of Things in Healthcare
		2.2 Patient Monitoring
		2.3 Continuous Glucose Monitoring
		2.4 Insulin Pumps
		2.5 IoT Privacy Concerns and Challenges
	3 Research Methodology
	4 Findings and Discussion
		4.1 Living with Diabetes
		4.2 Impact of IoT-Based Diabetes Devices
		4.3 Healthcare Facility Visits
		4.4 Privacy, Safety, and Security Concerns
	5 Conclusions and Future Research
	References
Case Study: UML Framework of Obesity Control Health Information System
	1 Introduction
	2 System Document Vision
	3 System Work Breakdown Structure
		3.1 Analysis of Requirements and Specifications:
		3.2 Designing Components of the Proposed System:
		3.3 Implementing the Proposed System:
		3.4 Testing and Debugging Proposed System:
		3.5 Deployment of the Proposed System:
	4 System Use Case
	5 System Preliminary Class Diagram
	6 System Activity Diagram
	7 System Design Database Schema
	8 System Preliminary Class Diagram
	9 Subsystem Architecture Design Diagram
	10 System Functional Requirements
	11 System Non-functional Requirements
	12 System Stakeholders
		12.1 Internal Stakeholders: Represent Direct Interaction with the System.
		12.2 External Stakeholders: Represent Non-direct Interaction with the System.
	13 System Information Collecting Techniques
	14 System User Goals
	15 System External, Temporal, and State Events
	16 System State Machine Diagram
	17 System Use Case Description
	18 System Sequence Diagram
	19 System Design Component Diagram
	20 System Deployment Diagram
	21 System Interaction Diagram
	22 Conclusion
	References
An IoT Based Epilepsy Monitoring Model
	1 Introduction
		1.1 Motivation
		1.2 Smart Healthcare Monitoring Approaches
	2 Related Work
		2.1 Sensors for Epilepsy
		2.2 Addressing the Gaps
	3 Experiment and Findings
		3.1 Preliminary Investigations
		3.2 Experiment Description
		3.3 Experiment Results
	4 Proposed IoT Based Epilepsy Monitoring Model
		4.1 PMP Framework
		4.2 Personalisation Elements
		4.3 PMP Framework Loop and Maintenance
		4.4 IoT Based Epilepsy Monitoring Model
		4.5 Cloud Platform
		4.6 Network Layer
	5 Evaluation
	6 Long Term Uses and Applicability in Other Domains
	7 Conclusion
	References
Biostatistics in Biomedicine and Informatics
	1 Introduction
	2 Background in Health Informatics
	3 Insights in Biostatistics
	4 Conclusion
	References
Neural Network Compression Framework for Fast Model Inference
	1 Introduction
	2 Related Work
	3 Framework Architecture
	4 Compression Methods Overview
		4.1 Quantization
		4.2 Binarization
		4.3 Sparsity
		4.4 Filter Pruning
	5 Results
	6 Conclusions
	References
Small-World Propensity in Developmental Dyslexia After Visual Training Intervention
	1 Intorduction
	2 Materials and Methods
		2.1 Participants
		2.2 Experimental Paradigm
		2.3 EEG Recording and Signal Pre-processing
		2.4 Functional Connectivity
		2.5 Small-World Propensity
		2.6 Statistical Analysis
	3 Results
		3.1 Behavioural Parameters
		3.2 Global Small-World Propensity Measures
	4 Constraints and Future Scope
	5 Conclusions
	References
An Assessment of Extreme Learning Machine Model for Estimation of Flow Variables in Curved Irrigation Channels
	1 Introduction
	2 Material and Methods
		2.1 Experimental Model
		2.2 Data Collection in Model Learning
		2.3 Extreme Learning Machine (ELM)
	3 Results and Discussions
	4 Conclusions
	References
Benchmarking of Fully Connected and Convolutional Neural Networks on Face Recognition: Case of Makeup and Occlusions
	1 Introduction
	2 Machine Learning Concepts
		2.1 Convolutional Neural Networks
		2.2 Fully Connected Neural Networks with Principal Component Analysis Features
	3 Data Set
	4 Experiments
		4.1 Methodology
		4.2 Parameters and Details
	5 Results
	6 Discussion and Future Work
	References
Wavelet Neural Network Model with Time-Frequency Analysis for Accurate Share Prices Prediction
	1 Introduction
	2 Methodology
		2.1 Data Decomposition by Wavelet Transforms
		2.2 Wavelet Neural Networks
		2.3 Gradient Descent Optimisation
	3 Prediction Model
	4 Results and Discussions
		4.1 Data
		4.2 Performance
	5 Conclusion
	References
A Hybrid Method for Training Convolutional Neural Networks
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Initial Population
		3.2 Evolution
	4 Experiments
		4.1 Experimental Setup
		4.2 CIFAR-10
		4.3 Results and Discussion
	5 Conclusion
	References
A Layered Framework for Dealing with Dilemmas in Artificial Intelligence Systems
	1 Introduction
	2 Exploring a Hypothetical Dilemma Case
	3 The “Felicity Conditions” and the Artificial Neural Network Approach
	4 Limitations of the Current Approaches and the Root Cause
	5 A New Layered Framework
	6 Benefits of the New Layered Framework
	7 Conclusion
	References
Improving Student Engagement and Active Learning with Embedded Automated Self-assessment Quizzes: Case Study in Computer System Architecture Design
	1 Introduction
	2 Digital Technologies for Active Learning
	3 Methodology
	4 Student Consultation
	5 Automated Self-assessment Quizzes Implementation
	6 Active Student Engagement and Performance
	7 Conclusion
	References
Cognitive Load of Ontology as a Means of Information Representation in the Educational Process
	1 Introduction
	2 State of Art and Background
		2.1 Cognitive Load in the Educational Process
		2.2 Knowledge Maps as a Means of Information Visual Representation
		2.3 Ontologies as a Means of Knowledge Representation
		2.4 Ontology Usage in the Educational Process
	3 Ontologies as a Means of Knowledge Representation in Educational Process
		3.1 Ontology: Basic Notions
		3.2 Ontology as a Means of Information Visual Representation
	4 Evaluation of Ontology Visual Perception
	5 Conclusions
	References
The Influence of Computer Games on High School Students (Adolescents)
	1 Introduction
	2 Impact of Computer Games
	3 Research
		3.1 Defining the Problem
		3.2 Research Goals and Hypothesis
		3.3 Type of Research, Sources, and Method of Data Collection
		3.4 Survey and Variables
		3.5 Expected Applicability of Results
	4 Research Results
	5 Interpretation of Results
	6 Conclusion
	References
Pedagogical Approaches in Computational Thinking-Integrated STEAM Learning Settings: A Literature Review
	1 Introduction
	2 Previous Studies
	3 Methodology
		3.1 Defining and Implementing the Search Query
		3.2 Defining Inclusion and Exclusion Criteria for the Review
		3.3 Selection of Articles for Full-Text Review
		3.4 Extracting Data Based on Research Questions
		3.5 Synthesizing and Classifying the Results
	4 Data Analysis, Results and Discussion
		4.1 Constructivist Pedagogy in CT-Integrated STEAM Learning
		4.2 Collaborative Learning Pedagogy in CT-Integrated STEAM Learning
		4.3 Reflective Learning Pedagogy in CT-Integrated STEAM Learning
		4.4 Inquiry-Based Learning STEAM in CT-Integrated STEAM Learning
		4.5 Mixed and Other Pedagogies in CT-Integrated STEAM Learning Setting
		4.6 Mixed and Other Pedagogies in CT-Integrated STEAM Learning Setting
		4.7 Teaching and Learning Activities Used in CT-Integrated STEAM Learning Settings
	5 Conclusions and Limitations
	References
Development of Anaglyph 3D Functionality for Cost-Effective Virtual Reality Anatomical Education
	1 Introduction
	2 Methods
	3 Results
		3.1 Anatomy and Medical Devices Anaglyph Scenes
		3.2 Education and Conferences
	4 Conclusion
	References
Augmented Reality in Virtual Classroom for Higher Education During COVID-19 Pandemic
	1 Introduction
	2 Related Work
	3 Proposed Architecture
		3.1 AR Module
		3.2 Learning Analytics Module
	4 Implementation
		4.1 Augmented Reality Module
		4.2 Learning Analytics Module
		4.3 Linear Regression
		4.4 K-Nearest Neighbors (KNN)
		4.5 K-Means Clustering
	5 Analysis
		5.1 Linear Regression
		5.2 KNN Algorithm
		5.3 K-Means Clustering
	6 Results
	7 Conclusion
	8 Discussions
	References
The Teaching and Learning of the Untyped Lambda Calculus Through Web-Based e-Learning Tools
	1 Introduction
	2 The Use of Web-Based Tools to Support Learning that Departs from the Habitual Pattern of Thinking (Reinforced Through Years of Schooling): The Case of Currying
	3 Basic Formal Concepts and the Main Theorem
		3.1 The Problem of Variable Capture
		3.2 The Curry-Feys Approach to Substitution
		3.3 -Reduction
		3.4 The Church-Rosser Theorem
	4 Web-Based E-Learning Applications for the -Calculus: Opening Opportunities for the Functional Approach
	5 The Lambda Viewer: A Tutorial
	6 Some Examples of -Terms Analyzed Through Teacher's Explanations on the Lambda Viewer's Output
	7 Conclusions
	References
Development and Design of a Library Information System Intended for Automation of Processes in Higher Education Institution
	1 Introduction
	2 Description and Structure of the System
	3 Description of Relationships with Other Information Systems in the University
	4 Subsystems and Modules of the System
	5 Conclusion
	References
Informally Teaching Black Youth STEM Concepts Virtually Using Artificial Intelligence and Machine Learning
	1 Introduction
	2 Theoretical Framework: Social Cognitive Career Theory
	3 Review of Literature
		3.1 Social Cognitive Theory
		3.2 Self-efficacy
		3.3 Ethnicity and Social Cognitive Theory
	4 Methodological Limitations
	5 Statement of the Problems
		5.1 Significance of the Study
		5.2 Research Questions
		5.3 Research Hypotheses
	6 Research Design
		6.1 Participants
		6.2 Population and Sample Size
		6.3 Program Description
		6.4 Instrumentation
	7 Data Collection and Analysis
	8 Findings and Conclusions
	9 Future Research
	References
Accrediting Artificial Intelligence Programs from the Omani and the International ABET Perspectives
	1 Introduction
	2 Objectives
	3 ABET-CAC versus Oman-OAAA
		3.1 Main Structure
		3.2 Adaptability to AI
		3.3 Accreditable Degrees
		3.4 Program Eligibility
		3.5 Accreditation Frequency
		3.6 Probation
		3.7 Tiered Accreditation
		3.8 Deferment
		3.9 Timeframe of the Accreditation Process
		3.10 Graduate Attributes
	4 Discussion
	5 Conclusions
	References
Embodied Learning: Capitalizing on Predictive Processing
	1 Introduction
		1.1 An Ecological Approach to Cognition
	2 Embodiment in Education
		2.1 Phenomenology to Neuroeducation
		2.2 Models of Reading Tasks
		2.3 Active Inference as a Model for Education
	3 Embodied Learning
		3.1 Capitalizing on Predictive Processing
	4 Conclusions and Recommendations
	5 Limitations and Future Scope
	References
Exploring the Darkness of Gamification: You Want It Darker?
	1 Introduction
	2 Background
		2.1 Gamification
		2.2 Dark Patterns and Gamification
	3 Literature Review
	4 Mapping Gamification
	5 Evaluation of Gamification
	6 Conclusion, Limitations and Future Work
	References
The Future of Information and Communication Technology Courses
	1 Introduction
		1.1 Background to the Study Reported on
		1.2 The Aim of the Study Reported on
		1.3 Outline of the Remainder of This Article
	2 Review of the Literature
		2.1 Assessment
		2.2 Programming
	3 Research Methodology
		3.1 Research Context
		3.2 Research Design
		3.3 Sample
		3.4 Instrument and Data Collection
		3.5 Validity and Reliability
	4 Discussion of Results
		4.1 General Comments Regarding the Online Examination
	5 Conclusions
	References
The Impact of Computer Games on Preschool Children’s Cognitive Skills
	1 Introduction and Research Focus
	2 Research Details and Methodology
		2.1 Defining Hypotheses
		2.2 Measuring Instrument
	3 Collected Data
	4 Analysis Regarding Hypothesis
	5 Conclusion
	References
Using STEM to Improve Computer Programming Teaching
	1 Introduction
	2 STEM: A Novel Approach
	3 Some Projects
		3.1 CanSat
		3.2 Apps for Good
		3.3 Astro Pi
	4 Results
	5 Conclusions
	References
Tips for Using Open Educational Resources to Reduce Textbook Costs in Computing and IT Courses
	1 Introduction
	2 Method of Approach
	3 Findings
		3.1 Utilize Trustable, Cost-Free Materials
		3.2 Provide Context, Perspective and Sequencing
		3.3 Have Students Find and Assess Sources
		3.4 Allow Students to Improve OER Use
		3.5 Seek Peer and Community Feedback
		3.6 Give Students a “Safe Zone” to Learn from Each Other
		3.7 Help Students Bridge the Gap to Practice
	4 Summary and Conclusions
	5 Recommendations
	References
Cross-Cultural Design of Simplified Facial Expressions
	1 Introduction
	2 Facial Gestures with the Fewest Numbers
		2.1 The Style
		2.2 Patterns of Facial Expression Classification
		2.3 Facial Expression Patterns Distributed in Mathematical Space
	3 A Result of Classification and Spatial Distribution of Facial Expressions
		3.1 Face Distribution in a Three-Dimensional Space
		3.2 Two Neutral Facial Expressions and Eight Facial Expressions
		3.3 Differences in Culture
	4 Discussion
		4.1 Relationship Between the Affective Sense Dimension and the Visual Variable Dimension
		4.2 Limitations of Facial Elements and Facial Expression Recognition
		4.3 Making Facial Expressions with a Tetrahedral Model
		4.4 Neutral Facial Expression Facial Expression with Neutral Facial Expression
	5 Concluding Remarks
	References
Misinformation and Its Stakeholders in Europe: A Web-Based Analysis
	1 Introduction
	2 Literature Review
		2.1 Misinformation and Disinformation Effects in Europe
		2.2 Webometrics Related Studies
		2.3 Anti-misinformation Stakeholders Inside and Outside Europe
	3 Methods
		3.1 Goals and Research Questions
		3.2 Data Collection
		3.3 Process and Assessment
	4 Results
	5 Discussion
	6 Conclusions
	References
Artificial Life: Investigations About a Universal Osmotic Paradigm (UOP)
	1 Introduction
	2 Osmotic Paradigm - Axioms
	3 Artificial Life
		3.1 Osmotic ``Forces''
		3.2 Brain Evolution
	4 Osmotic Manufacturing: The Role of Force
	5 Model in Witness
	6 Conclusion and Outlook
	References
Latency and Throughput Advantage of Leaf-Enforced Quality of Service in Software-Defined Networking for Large Traffic Flows
	1 Introduction
	2 Related Literature
		2.1 Software-Defined Networking and OpenFlow
		2.2 Quality of Service in SDN
		2.3 Class-Based Queueing
	3 Framework
		3.1 Conceptual Framework
		3.2 Theoretical Framework
	4 Methodology
	5 Results
	6 Conclusion
	References
The Impact of Online Social Networking (Social Media) on Interpersonal Communication and Relationships
	1 Introduction
	2 Literature Review
		2.1 The Use of Social Media for Networking
		2.2 The Effectiveness of Interpersonal Communication in Intimate Relationships
		2.3 Impact of Social Media in Intimate Relationships
		2.4 Uses and Gratification Theory and Social Media Activities
	3 Methods
	4 Results
		4.1 Demographics
		4.2 Social Media Usage
		4.3 The Impact of Social Media on Interpersonal Communication and Relationships
	5 Conclusion
	Appendix 1
	References
Embedded Piezoelectric Array for Measuring Relative Distributed Forces on Snow Skis
	1 Introduction
	2 Sensor Array Description
		2.1 Electronic Design
	3 Prototype Fabrication
	4 Testing, Limitations and Future Work
	References
Experimental Study of a Tethered Balloon Using 5G Antenna to Enhance Internet Connectivity
	1 Introduction
	2 Related Study
	3 Proposed Model
		3.1 ATG Propagation Model
		3.2 Structural Proposed Model
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production Systems
	1 Introduction
	2 Literature Review
		2.1 Anomaly Detection
		2.2 Incremental Learning
		2.3 The Dendritic Cell Algorithm
	3 Incremental Dendritic Cell Algorithm
	4 Experimental Setup and Results
		4.1 OPC UA Dataset
		4.2 KDD Cup99 Dataset
	5 Discussion
	6 Conclusions and Future Work
	References
Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers
	1 Introduction
		1.1 Related Works
		1.2 Our Contribution
		1.3 Outline of the Paper
	2 Preliminaries
		2.1 Description of TEA and RAIDEN
		2.2 Distinguishers
		2.3 Neural Networks
	3 Classical Distinguishers
		3.1 A Classical Generic Distinguisher
		3.2 A Classical Tailored Distinguisher
	4 Neural Network Based Distinguishers
		4.1 Time Distributed Distinguisher
		4.2 Convolutional Distinguisher
	5 Experimental Results and Comparisons
		5.1 Description of the Experiment
		5.2 Detailed Results
		5.3 Lowering the Training
		5.4 Further Experiments
		5.5 Limitations of NN Based Distinguishers
	6 Conclusion
	References
TFHE Parameter Setup for Effective and Error-Free Neural Network Prediction on Encrypted Data
	1 Introduction
	2 Fully Homomorphic Encryption and Neural Networks
		2.1 (W)TFHE Samples
		2.2 Bootstrapping
		2.3 Evaluation of a Neural Network on Encrypted Data
	3 WTFHE Parameter Setup for Error-Free Computations
		3.1 Overview of Error Propagation
		3.2 Precision Levels
		3.3 Test Vector Generation
		3.4 Key Switching: Employ, or Omit?
		3.5 Baby Parameters
	4 Conclusion
	References
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
	1 Introduction
	2 Distributed Ledger Technology
	3 Method
	4 Attacks on Distributed Ledgers and Corresponding Countermeasures
		4.1 Attacks on Distributed Ledgers
		4.2 Exploited Distributed Ledger Technology Characteristics
		4.3 Countermeasures for Identified Attacks on Distributed Ledgers
	5 Principal Findings and Conclusion
	References
An Analysis of Twitter Security and Privacy Using Memory Forensics
	1 Introduction
	2 Background
	3 Scope and Methodology
		3.1 Tools Used
		3.2 Methodology
	4 Experiments
		4.1 First Set of Experiment
		4.2 Second Set of Experiments
		4.3 Third Set of Experiments
	5 Conclusions
	6 Future Research
	References
A Security Requirement Engineering Case Study: Challenges and Lessons Learned
	1 Introduction
	2 Background
	3 Security Requirements Engineering
		3.1 SRE Concepts
		3.2 CompASRE
	4 Case Study: Applying CompASRE
		4.1 Grade Management System
		4.2 Phase 1: Context Establishment
		4.3 Phase 2: Goal Track
		4.4 Phase 3: Risk Track
	5 Results Discussion
		5.1 Challenges and Lessons Learned
		5.2 Suggested Improvements
	6 Conclusion and Future Works
	References
Towards Automated Surveillance: A Review of Intelligent Video Surveillance
	1 Introduction
	2 Related Works
	3 Methods
		3.1 Research Questions
		3.2 Search Strategy
		3.3 Selection of Relevant Works
	4 Results
		4.1 Importance of Intelligent Video Surveillance
		4.2 Analyzed Articles Publicity over the Years and Distribution over Data Bases
		4.3 The Most Common Research Areas Within the Field of Intelligent Video Surveillance
		4.4 State-of-the-Art for Solving Intelligent Video Surveillance Tasks
		4.5 State-of-the-Art Applications for Intelligent Video Surveillance
		4.6 State-of-the-Art Architectures for Intelligent Video Surveillance
		4.7 Video Surveillance Development Trends
	5 Discussion
	6 Conclusions
	References
Homicide Prediction Using Sequential Features from Graph Signal Processing
	1 Introduction
	2 Related Work
	3 Graph Signal Processing
		3.1 Boundary Detection
		3.2 The Strongest Edge Nodes
		3.3 DeepWalk
	4 Homicide Data
	5 Model
		5.1 GLoG for Bogota
	6 Validation
	7 Results
	8 Conclusions
	9 Discussion
		9.1 Ethical Statement
	References
Effectiveness and Adoption of NIST Managerial Practices for Cyber Resilience in Italy
	1 Introduction
	2 Theoretical Background
		2.1 Cybersecurity Risk and Resilience
		2.2 Cybersecurity Standards and Guidelines
	3 Research Aim and Methodology
		3.1 Data Collection and Analysis
	4 Findings
		4.1 Information Security Risk Treatment
		4.2 Management of Technical Vulnerabilities
		4.3 Learning from Information Security Incidents
		4.4 Policy on the Use of Cryptographic Controls
		4.5 Working in Secure Areas
		4.6 Change Management
		4.7 Event Logging
		4.8 Protection of Log Information
		4.9 Responsibilities and Procedures
		4.10 Information Security Awareness, Education and Training
		4.11 Disciplinary Process
		4.12 Nonconformities and Corrective Actions
		4.13 Learning from Information Security Incidents
		4.14 Communication
	5 Discussion and Conclusions
	References
Steganographic Method to Data Hiding in RGB Images Using Pixels Redistribution Combining Fractal-Based Coding and DWT
	1 Introduction
	2 Proposed Method
	3 Experimental Results
	4 Conclusion
	5 Future Work
	References
Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo Encoding
	1 Introduction
	2 Swain's Method
		2.1 Embedding Process of Swain's Method
		2.2 Extraction Process of Swain's Method
	3 Proposed Method
		3.1 Embedding Process
		3.2 Extraction Process
	4 Experiment and Analysis
		4.1 Experiment
		4.2 Analysis
	5 Conclusion
	References
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework
	1 Introduction
		1.1 QR Payments
		1.2 Location Attestation
	2 Background and Related Work
		2.1 ARM TrustZone and Trusted Execution Environment (TEE)
		2.2 TruZ-Droid
		2.3 Other Related Work
	3 Problem and Objectives
		3.1 Problem Statement
		3.2 Threat Model
	4 Solution Design
		4.1 Data Retrieval from Peripheral Devices
		4.2 Data Processing
		4.3 Transparency and Seamless Integration
	5 Implementation
	6 Evaluation and Analysis
		6.1 Mock Applications
		6.2 Modified Applications
		6.3 Evaluation Results
		6.4 Analysis
	7 Conclusions
	References
Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography
	1 Introduction
	2 Related Work
	3 Basic Concepts
	4 Dataset
	5 Methodology
	6 Model
	7 Results
	8 Conclusion
	References
A Response-Based Cryptography Engine in Distributed-Memory
	1 Introduction
	2 Background
		2.1 Terminology
		2.2 Response-Based Cryptography
	3 A Distributed-Memory Response-Based Cryptography Engine
		3.1 Key Iteration
		3.2 Optimized AES Encryption and 256-Bit Integers for RBC
		3.3 Aborting the Search Using Early Exit
	4 Implementation
	5 Experimental Evaluation
		5.1 Experimental Methodology
		5.2 Comparing Our Custom Implementations Vs. OpenSSL and GMP
		5.3 Performance Tuning of the Early Exit Iteration Parameter r
		5.4 Evaluation of Early Exit Strategies
		5.5 Time-to-Solution and Scalability
	6 Conclusions and Future Work
	References
Elliptic Curves of Nearly Prime Order
	1 Introduction
	2 Family of Elliptic Curves
	3 Algorithm
	4 Results
	5 Complexity
	6 Conclusion
	References
Assessing Small Institutions’ Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q)
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Findings
		4.1 Measurement Validity and Reliability
		4.2 Measurement Validity and Reliability
		4.3 Predictive Analyses
	5 Conclusion
	References
Construction of Differentially Private Empirical Distributions from a Low-Order Marginals Set Through Solving Linear Equations with l2 Regularization
	1 Introduction
		1.1 Background and Motivation
		1.2 Our Contributions
		1.3 Related Work
	2 CIPHER
		2.1 Preliminaries
		2.2 The CIPHER Procedure
		2.3 Example: CIPHER for the 3-Variable Case
	3 Experiments
		3.1 Experiment 1: Simulated Data
		3.2 Experiment 2: Qualitative Bankruptcy Data
	4 Discussion
	References
Secondary Use Prevention in Large-Scale Data Lakes
	1 Introduction
	2 Collection Purpose and Provenance
		2.1 Data Description (Structure and Properties)
		2.2 Purpose-Property Matching
		2.3 Compliance Policy
		2.4 Aggregation Limitations
		2.5 Legal Base
	3 Privacy and Access Control in Data Lakes
		3.1 Related Work
		3.2 Provenance-Purpose-Based ACM
	4 Conclusion
	References
Cybercrime in the Context of COVID-19
	1 Introduction
	2 The Problem of Covid-19 - Related Online Scams
	3 Factors Facilitating COVID-19 Online Scams
	4 The Scope of the Problem
	5 Information Privacy and COVID-19 Online Scams
	6 How COVID-19 Impacts on Cybercrime Spread
	7 Mechanisms of COVID-19 Online Scams
		7.1 Phishing Scams
		7.2 Online Fraud and Counterfeit Goods
		7.3 COVID-19 Misinformation
		7.4 Malicious Applications
		7.5 Vishing
		7.6 Ransomware
	8 Global Harmonization Quest: Legislative Approaches and Regulatory Strategies
		8.1 National and Regional Strategies: The European Approach
		8.2 Prosecution of Identity Theft Under the Federal Criminal Laws: American Approach
		8.3 Strategies Used Internationally: The Council of Europe Convention on Cybercrime
	9 COVID-19 Online Scams Prevention
		9.1 Financial and Personal Information Shouldn’t Be Shared Online
		9.2 Constantly Use Two-Factor Authentication
		9.3 Avoid Downloading Files and Clicking on Links from Unknown Sites
		9.4 Never Wire Money
	10 Conclusion
	References
Beware of Unknown Areas to Notify Adversaries: Detecting Dynamic Binary Instrumentation Runtimes with Low-Level Memory Scanning
	1 Introduction
	2 Preliminaries
		2.1 Dynamic Binary Instrumentation
		2.2 Artifacts from the Presence of the DBI Engine
	3 Analysis
		3.1 Hiding Artifacts
		3.2 DBI Properties as Attack Surfaces
		3.3 Time to Break
	4 Proposing a Detection Attack
		4.1 Flow
		4.2 Algorithm
		4.3 Discussion
	5 Related Work
	6 Conclusions
	References
Tamper Sensitive Ternary ReRAM-Based PUFs
	1 Introduction
	2 Background Information: PUFs and ReRAMs
		2.1 Ternary PUF-Based Cryptosystems
		2.2 ReRAM Technology
		2.3 Design of ReRAM-Based PUFs
	3 Design of Low Power PUFs with ReRAM
		3.1 Exploring ReRAM’s Physical Properties at Low Power
		3.2 Cryptographic Protocol with Low Power Ternary PUF
		3.3 Benchmarking ReRAM-Based PUFs
	4 ReRAM PUFs that are Sensitive to Tampering Activities
		4.1 Exploring ReRAM’s Reliability
		4.2 Cryptographic Protocol Sensitive to Tampering Activities
		4.3 Sensing Tampering Activities
	5 Conclusion and Future Work
	References
Locating the Perpetrator: Industry Perspectives of Cellebrite Education and Roles of GIS Data in Cybersecurity and Digital Forensics
	1 Introduction
	2 Review of Literature and Related Work
	3 GIS in Forensics Curriculums
		3.1 GIS in Wireless Security
		3.2 Secure Software Development
		3.3 GIS in Mobile Device Forensics
	4 Educational Perspectives: Course Surveys
		4.1 Learning Satisfaction
		4.2 Student Survey: Working in Teams
		4.3 Student Survey: Virtual Teams
		4.4 Student Survey: Class Overall
		4.5 Student Survey: Industry Certification
		4.6 Student Survey: Final Project
	5 Discussion and Future Work
	6 Conclusions
	7 IRB Approval
	References
Authentication Mechanisms and Classification: A Literature Survey
	1 Introduction
	2 Preliminary Research
	3 Review of the Different Authentication Mechanisms and Techniques
		3.1 Password
		3.2 PIN
		3.3 Image Recognition
		3.4 OTP (One-Time Password)
		3.5 Two-Factor Authentication (2FA) and MFA
		3.6 Certificate-Based
		3.7 Blockchain
		3.8 Suitable Authentication Techniques, Depending on the Age
		3.9 Authentication Techniques for People with Different Disabilities
	4 Classifications
	5 Results, Discussions and Conclusions
	References
ARCSECURE: Centralized Hub for Securing a Network of IoT Devices
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Detection of IOT Botnet Attacks
		3.2 Malware Detection and Mitigation
		3.3 DoS Detection and Mitigation Module
		3.4 Secure User Authentication
	4 Results and Discussions
	5 Conclusion
	References
Entropy Based Feature Pooling in Speech Command Classification
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Dataset
		3.2 Preprocessing and Audio Features
		3.3 Entropy Pooling
		3.4 Neural Network Topology
	4 Experimental Results and Discussion
	5 Conclusion
	References
Author Index




نظرات کاربران