دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Dharm Singh Jat
سری:
ISBN (شابک) : 9789811553080, 9789811553097
ناشر:
سال نشر:
تعداد صفحات: 319
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 9 مگابایت
در صورت تبدیل فایل کتاب Data Science and Security: Proceedings of IDSCS 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Contents Editors and Contributors An Approach to Predict Potential Edges in Online Social Networks 1 Introduction 2 Related History 2.1 Feature Extraction Techniques 3 Classification and Classification Models 3.1 The Model Proposed 3.2 Experimental Setup 4 Result and Discussion 5 Conclusion References A Novel Approach to Human–Computer Interaction Using Hand Gesture Recognition 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Data Collection 3.2 Data Preprocessing and Training of the Model 4 Implementation 4.1 Mobile Application 4.2 Node.js Server 4.3 Python Client 5 Approaches to Classifying Sensor Data 6 Model Performance 7 Conclusions References Insider Threat Detection Based on Anomalous Behavior of User for Cybersecurity 1 Introduction 1.1 Insiders and Insider Threat 1.2 Anomalous Behavior of User 2 Related Work 3 Methodology 4 Data Processing and Algorithm Analysis 4.1 Data Processing 4.2 Software Requirement 4.3 Undirected Bipartite Graph Analysis 4.4 Temporal Data Analysis 4.5 Model with Logon and Logoff Features for the Implementation of the Anomaly Detection Algorithm 4.6 Risk Control Model with Logon and Logoff Data 5 Conclusion and Future Work References A Comparative Study of Text Mining Algorithms for Anomaly Detection in Online Social Networks 1 Introduction 2 Related Work 3 Supervised Machine Learning Approaches 3.1 Support Vector Machine (SVM) 3.2 Rocchio Algorithm 3.3 Decision Trees 3.4 K-Nearest Neighbour (KNN) 4 Results and Discussions 5 Conclusion References Internet of Things (IoT) Security Threats on Physical Layer Security 1 Introduction 2 Literature Review 3 Threat Analysis 4 Proposed Works 4.1 Secure Channel Analysis 5 Result Analysis 6 Conclusion References Data Mining Models Applied in Prediction of IVF Success Rates: An Overview 1 Introduction 2 Data Mining Approaches of IVF Data Analytics 2.1 Traditional Models (Medical Oriented) 2.2 Statistical and Regression-Based Models 2.3 Computational Algorithms Based Models 2.4 Hybrid Algorithm-Based Models 3 Conclusion References TreeXP—An Instantiation of XPattern Framework 1 Introduction 2 XPattern—A Pattern-Based Clustering Framework 3 The PathXP Algorithm—An Instance of XPattern Framework 4 CRXTree Creation—A Novel XML Structure Representation 5 Proposed Method—TreeXP 6 Example 7 Empirical Evaluation 7.1 Dataset 7.2 Precision 8 Conclusion and Future Works References Recommendation of Food Items for Thyroid Patients Using Content-Based KNN Method 1 Introduction 2 Related Work 3 Proposed Framework 3.1 Generate a Food Preference Weight Vector Using TF–IDF Method 3.2 Generate a Rating Value for Food Items Using KNN Similarity Score 4 Experimental Setup 5 Conclusion References Survey on DNS-Specific Security Issues and Solution Approaches 1 Introduction 2 DNS and Security Threats Related to DNS 2.1 DNS Cache Poisoning Attack 2.2 DOS/DDOS Attack 2.3 Spoofing 2.4 Phishing 2.5 Identity Theft 2.6 Forgery 2.7 Eavesdropping 2.8 Packet Sniffing 2.9 Tampering 2.10 Man-in-the-Middle Attack 3 Solution to DNS Security Threats 3.1 DNSSEC (DNS Security Extension) 3.2 SSL Certificates 3.3 Extended Validation Certificate 4 Benefits of DNSSEC and SSL 4.1 Forgery 4.2 Tampering 4.3 Cache Poisoning Attack 4.4 Eavesdropping 5 Conclusion References Algorithms for the Metric Dimension of a Simple Graph 1 Introduction 2 Metric Dimension and k-Metric Dimension 2.1 Metric Dimension of a Path and Cycle 2.2 Metric Basis of a General Graph 2.3 Algorithm 1: To Find k Such that the Graph G Is k-Metric Dimensional 2.4 Illustration of the Algorithm 2.5 Algorithm 2: Greedy Algorithm to Find the Metric Basis 2.6 Illustration of Algorithm 2 3 Data Structures for Graph Representation 3.1 Distinguish Set of a Vertex vk 3.2 Notation 4 Breadth-First Search 4.1 Algorithm 3: Find the BFS Tree with Partition of Vertices 4.2 Algorithm 4: To Find the Dimension and Metric Basis of a Graph References A Deep Learning Approach in Early Prediction of Lungs Cancer from the 2D Image Scan with Gini Index 1 Introduction 2 Literature Survey 3 Methodology 4 Results 5 Conclusion References A Survey on Guiding Customer Purchasing Patterns in Modern Consumerism Scenario in India 1 Introduction 2 Related Work 2.1 Online Shopping Carts/E-Commerce 2.2 Digital Shopping Using NFC 2.3 Easy Shopping Using Barcodes 2.4 QR Code (Quick Response Code) 3 Existing System 4 Proposed System 5 Design and Implementation 6 Results 7 Conclusion and Future Work References Diabetic Retinopathy Detection Using Convolutional Neural Network—A Study 1 Introduction 2 Related Works 3 CNN Models for Diabetic Retinopathy Detection 3.1 CNN Model 1—Deep CNN-Based DR Detection 3.2 CNN Model 2—A CNN Model for DR Detection 4 Experiments 5 Discussion 6 Conclusion References ALOSI: Aspect-Level Opinion Spam Identification 1 Introduction 1.1 Sentiment Analysis 1.2 Aspect-Level Sentiment Analysis 1.3 Spam Detection 2 Methodology and Workflow 3 Conclusion References Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Reducing the Dimension with the Use of AABC 3.2 Detection of Anomalous Lung Cells with the Aid of FFBNN-AABC 3.3 FFBNN-AABC ALGORITHM 3.4 Initial Phase 4 Performance Analysis 5 Conclusion References A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques 1 Introduction 1.1 Our Contributions in This Paper Are as Follows 1.2 Coverage, Subject 2 Related Works 2.1 Issues in Current Algorithms 3 Proposed Algorithm 3.1 Idea 3.2 Algorithm 3.3 Discussion 4 Results 5 Conclusion References Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM) 1 Introduction 2 Literature Survey 3 Data 4 Methodology 4.1 The Model 4.2 Control Overfitting 4.3 Bi-LSTM 4.4 Bi-GRU 4.5 Attention 4.6 Cyclic Learning Rate 5 Results and Discussions 6 Conclusion References An IoT-Based Fog Computing Approach for Retrieval of Patient Vitals 1 Introduction 2 Related Work 3 Design and Implementation 4 Results and Discussion 5 Conclusion and Future Work References Recommender System for Analyzing Students’ Performance Using Data Mining Technique 1 Introduction 2 Literature Survey 3 Recommender System 4 Experimental Results 4.1 Findings 5 Conclusion References Classification of Financial News Articles Using Machine Learning Algorithms 1 Introduction 2 Related Works 3 Philosophical Underpinnings 3.1 Financial News Article Source 3.2 Textual Representation 3.3 Machine Learning Process 4 Experimental Design 4.1 Data Preprocessing and Feature Selection 4.2 Classification 4.3 System Design 5 Experimental Findings and Discussion 6 Discussion and Conclusion References OCR System Framework for MODI Scripts using Data Augmentation and Convolutional Neural Network 1 Introduction 2 Literature Review 3 An Overview of CNN Architecture 4 Methodology 4.1 Data Augmentation 4.2 Architectural Details of the Proposed Method 5 Experimental Study and Results 6 Conclusion References Robot Path Planning–Prediction: A Multidisciplinary Platform: A Survey 1 Introduction 2 Problem Statement 3 Sampling-Based Planning 3.1 Artificial Potential Fields 3.2 Randomized Potential Planner (RPP) 3.3 Probabilistic Roadmap Method (PRM) 3.4 Rrt Series 4 Graph Search-Based Optimal Algorithms 4.1 Dijkstra Algorithm 4.2 A* and Its Variants 5 Mathematically Modelled Planners 6 Dynamic Programming Path Planners 7 Bio-inspired Planners 8 Conclusion References Genome Analysis for Precision Agriculture Using Artificial Intelligence: A Survey 1 Introduction 2 Literature Survey 3 Methodology 4 Conclusion References Efficient Handwritten Character Recognition of MODI Script Using Wavelet Transform and SVD 1 Introduction 2 Review of Literature 3 Methodology 3.1 Feature Extraction 3.2 Singular Value Decomposition 3.3 Classification 3.4 Proposed Algorithm 4 Experimental Results 5 Conclusion References An Advanced Machine Learning Framework for Cybersecurity 1 Introduction 2 Related Work 3 Proposed Methodology 4 Results and Discussion 5 Conclusion and Future Work References Development of Kid-Friendly YouTube Access Model Using Deep Learning 1 Introduction 2 Problem of Current System 3 Related Work 4 Methodology 4.1 Age Detection 4.2 Sentiment Analysis 5 Conclusion References Toxic Text Classification 1 Introduction 2 Different Approaches 2.1 Primitive Machine Learning Algorithms 2.2 Naive Bayes 2.3 Deep-Learning-Based Methods 2.4 Ensemble Learning 3 Data 4 Cleaning the Data 4.1 Cleaning Contractions 4.2 Cleaning Misspelled Words 4.3 Cleaning Numbers and Punctuation 4.4 Cleaning Special Characters 5 Extra Features 6 The Model Architecture 6.1 Bi-LSTM 6.2 Bi-GRU 6.3 Capsule Network 7 Formulas 8 Cyclic Learning Rate 9 Word Embedding 10 Experimentation and Final Results 11 Conclusion References Tag Indicator: A New Predictive Tool for Stock Trading 1 Introduction 2 TAG: An Indicator 3 Methodology 4 Mathematical Formulation 5 Analysis 6 Conclusion References A Predictive Model on Post-earthquake Infrastructure Damage 1 Introduction 2 Literature Review 3 Problem Statement 3.1 Scope of the Study 3.2 Objectives of the Study 4 Research Methodology 4.1 Data Understanding 4.2 Modeling 5 Experimental Analysis 5.1 Bivariate Analysis 5.2 Bivariate Analysis 5.3 Structure Matrix 5.4 Predictive Modeling 6 Performance Analysis 6.1 Findings 7 Conclusion References On Some Classes of Equitable Irregular Graphs 1 More Classes of Equitable Irregular Graphs 2 K-Equitable Irregular Graphs 3 Conclusion and Scope References Therapy Recommendation Based on Level of Depression Using Social Media Data 1 Introduction 2 Related Work 3 Proposed Model 3.1 Data Collection 3.2 Database Generation 3.3 Feature Engineering 3.4 Proposed Methodology 4 Therapy Recommendation System 5 Results 6 Conclusion References Phoneme and Phone Pre-processing Using CLIR Techniques 1 Introduction 2 Literature Survey 3 Proposed Methodology 4 Experimental Setup 4.1 Segmentation and SNR Estimation 4.2 Suppression 4.3 Filters 5 Implementation and Result 6 Conclusion References Analysis of Various Applications of Blockchain Technology: A Survey 1 Introduction 2 Related Work 3 Analysis of Blockchain Applications in Different Domains 4 Classification of Blockchain Applications Based on Domains with Proof of Concept (POC) 5 Conclusion References Implementation of Integer Factorization Algorithm with Pisano Period 1 Introduction 2 Literature Review 3 Methodology 4 Comparative Study of Existing Methods and Implementation of Pisano Period Factorization 5 Results and Discussions 6 Conclusion References Author Index