دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2021
نویسندگان: Hyuncheol Kim (editor). Kuinam J. Kim (editor)
سری:
ISBN (شابک) : 981164117X, 9789811641176
ناشر: Springer
سال نشر: 2021
تعداد صفحات: 184
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 4 مگابایت
در صورت تبدیل فایل کتاب IT Convergence and Security: Proceedings of ICITCS 2021 (Lecture Notes in Electrical Engineering, 782) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب همگرایی و امنیت فناوری اطلاعات: مجموعه مقالات ICITCS 2021 (یادداشت های سخنرانی در مهندسی برق، 782) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مجموعه مقالات ICITCS 2021 است. هدف آن ارائه تصویری فوری از آخرین مسائلی است که در همگرایی و امنیت فناوری اطلاعات با آن مواجه میشوید. این کتاب به بررسی این موضوع می پردازد که چگونه همگرایی و امنیت فناوری اطلاعات هسته اصلی اکثر فعالیت های تحقیقاتی، صنعتی و تجاری فعلی است. موضوعات مطرح شده در این کتاب شامل یادگیری ماشینی و یادگیری عمیق، ارتباطات و پردازش سیگنال، بینایی کامپیوتر و برنامههای کاربردی، فناوری شبکه آینده، هوش مصنوعی و رباتیک، مهندسی نرمافزار و مهندسی دانش، شبکهها و برنامههای کاربردی خودروهای هوشمند، مراقبتهای بهداشتی و سلامتی، فناوری وب و برنامه ها، اینترنت اشیا، و امنیت و حریم خصوصی. از طریق این کتاب، خوانندگان درک درستی از استراتژیها و فنآوریهای اطلاعاتی فعلی در زمینه همگرایی و امنیت فناوری اطلاعات کسب میکنند. این کتاب برای محققان دانشگاهی، صنعتی، و سایر مؤسسات تحقیقاتی با تمرکز بر همگرایی و امنیت فناوری اطلاعات استفاده میشود.
This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.
Organizing Committee Preface Contents Machine Learning and Deep Learning An NMT-Based Approach to Translate Natural Language Questions to SPARQL Queries 1 Introduction 2 Related Works 2.1 Neural Machine Translation 2.2 SPARQL Generation Using NMT Models 3 Our Approach 3.1 Data Preprocessing 3.2 The SPARQL Generator 3.3 The Modification Phase 4 Experiments 4.1 Dataset and Evaluation 4.2 Hyperparameter Experimenting and Tuning 4.3 Results 5 Conclusion References Efficient Training Convolutional Neural Networks on Edge Devices with Gradient-Pruned Sign-Symmetric Feedback Alignment 1 Introduction 2 Related Work 3 Generic Back Propagation 4 EfficientGrad 4.1 Algorithm 4.2 Hardware 5 Evaluation 6 Conclusion References Design of the Prediction Model for Adolescents’ Stress Using Deep Learning 1 Introduction 2 Dataset and Basic Model 2.1 Overview of Dataset 2.2 Deep Learning Model 3 Reduction of Variables 3.1 The Decision of Feature Importance with kNN 3.2 Performance Evaluation 4 Conclusion References Security and Privacy The Effect of Sampling Methods on the CICIDS2017 Network Intrusion Data Set 1 Introduction 2 Literature Review 2.1 CICIDS2017 Data Set Overview 2.2 Sampling Techniques 3 Methodology 4 Results and Discussion 5 Conclusion and Future Work References The Gaps of Identity Management in Fulfilling Personal Data Protection Regulations’ Requirements and Research Opportunities 1 Introduction 2 Literature Review 2.1 Personal Data Protection Regulations 2.2 Identity Management (IdM) 3 Research Methodology 3.1 Data Collection 3.2 Mapping Identity Management Capabilities with Functional Requirements Criteria 3.3 Reliability and Validity 4 Results 4.1 What are the Functional Requirements of the Personal Data Protection Regulations? 4.2 What are the Existing Technological Capabilities of IdM that Can Support the Functional Requirements? 4.3 What are the Gaps of IdM in Fulfilling the Regulations’ Functional Requirements that Lead to Potential Research Opportunities? 5 Conclusion References Verifying MQV-Based Protocols Using ProVerif 1 Introduction 2 Protocols 2.1 MQV Protocol 2.2 FG IB-KA Protocol 2.3 He et al. CLAKA Protocol 3 ProVerif 4 Results and Discussions 5 Conclusion References A Study on Using Emojis in a Shoulder Surfing Resistant Authentication Method 1 Introduction 2 Literature Review 3 Methodology 3.1 Proposed Method Design 3.2 Authentication 3.3 User Test Study 4 Results 5 Conclusion References A Framework System Using Word Mover’s Distance Text Similarity Algorithm for Assessing Privacy Policy Compliance 1 Introduction 2 Literature Review 2.1 Personal Data Protection Regulations and Privacy Policy 2.2 Text Similarity and Word Embedding Techniques 2.3 Prior Research on Privacy Policy Analysis 3 Framework System and Methodology 3.1 Assessment System Main Procedure 3.2 Data Protection Requirements (DPR) Dictionary 3.3 Privacy Policy 3.4 Text Similarity Algorithm and Word Embedding Model 3.5 Text Similarity Accuracy Evaluation 4 Experimental Results 5 Analysis of Results and Limitations 6 Conclusion References A Novel Approach to Classify Vulnerabilities Based on Authenticated Measurements 1 Introduction 2 Proposed Procedure 3 Implementation of the Proposed Procedure 4 Analysis of Results 5 Conclusions and Future Works References Extension to CryptDB with Support for Arithmetic Expressions 1 Introduction 2 Encrypted Cloud Storage 2.1 Encryption and Storage at the Backend 2.2 Query Processing in the Encrypted Domain 3 Proposed Framework 3.1 Tweak CryptDB UDFs 3.2 Piped Architecture 3.3 Integrated Architecture 4 Concluding Remarks References Automated Model-Based Test Case Generation Using Uml Activity Diagram: A Review 1 Introduction 2 Literature Review 2.1 Model-Based Testing 2.2 Automated Test Case Generation 2.3 Related Works 3 Conclusion References Advanced Android Malware Detection Utilizing API Calls and Permissions 1 Introduction 2 Related Works 2.1 SAT 2.2 DAT 3 Our Approach 3.1 Data Collection Phase 3.2 Data Preprocessing and Vectorization 3.3 Utilized ML Classifier Performance 4 Experiment Results 4.1 Evaluation Measures 4.2 Tabulated Accuracy Results 4.3 High Accuracy Justification 5 Conclusions References Other Related Topics Exploring the Limitations Involved in Students’ Academic Use of Facebook 1 Introduction 2 Review 2.1 Facebook Use in Higher Education 2.2 Facebook's Educational Potential 3 Research Methodology 3.1 Research Design 3.2 Sampling 3.3 Data Analysis 4 Results: Descriptive Statistics of Current Facebook Use 4.1 Purposes of Use 4.2 Time Spent Engaging in Non-Academic Activities on Facebook 4.3 Time Spent Engaging in Academic Activities on Facebook 5 Results: The Reasons for Facebook's Limited Academic Use 5.1 Technology 5.2 Distraction 5.3 Content 5.4 Lack of Teacher Support 5.5 Security and Privacy 6 Conclusion and Recommendations References Future Network Technology Real Network Traffic Data with PCAP in a Software-Defined Networking Test Framework for Quality of Service Mechanisms 1 Introduction 2 Review of Related Literature 2.1 QoS Test SDN Framework 2.2 PCAP File Replay 2.3 Class-Based Queuing Algorithms 3 Framework 3.1 Framework Architecture 3.2 Theoretical Framework 3.3 Conceptual Framework 4 Methodology 4.1 Test Simulation Methdology 4.2 Framework Modification 5 Results and Discussion 6 Conclusion References Intelligent Vehicular Networking and Applications Application of Micro-frontends to Legal Search Engine Web Development 1 Introduction 2 Background 2.1 Microservices 2.2 Micro-frontends 3 Research Methodology 3.1 Website Team 3.2 Authentication Team 3.3 Search Team 3.4 Search Result Team 3.5 Document Team 4 Conclusion and Future Work References Blockchain and Cryptocurrency A Trust Model for Context-Aware E-Health Services 1 Introduction 2 Motivation/Justification 3 Related Works and Technologies 3.1 REK Trust Evaluation Model 3.2 Trust-Based Context-Aware Recommender Systems 3.3 A Context-Based Trust Management Model 3.4 Context-Aware Trust Model 3.5 Blockchain 4 Method 4.1 The Trust Model 5 Experimental System Implementation 6 Conclusion and Future Works References