ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Data Science and Security: Proceedings of IDSCS 2020

دانلود کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2020

Data Science and Security: Proceedings of IDSCS 2020

مشخصات کتاب

Data Science and Security: Proceedings of IDSCS 2020

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9789811553080, 9789811553097 
ناشر:  
سال نشر:  
تعداد صفحات: 319 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 9 مگابایت 

قیمت کتاب (تومان) : 56,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 17


در صورت تبدیل فایل کتاب Data Science and Security: Proceedings of IDSCS 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علم و امنیت داده ها: مجموعه مقالات IDSCS 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Contents
Editors and Contributors
An Approach to Predict Potential Edges in Online Social Networks
	1 Introduction
	2 Related History
		2.1 Feature Extraction Techniques
	3 Classification and Classification Models
		3.1 The Model Proposed
		3.2 Experimental Setup
	4 Result and Discussion
	5 Conclusion
	References
A Novel Approach to Human–Computer Interaction Using Hand Gesture Recognition
	1 Introduction
	2 Related Work
	3 Proposed Approach
		3.1 Data Collection
		3.2 Data Preprocessing and Training of the Model
	4 Implementation
		4.1 Mobile Application
		4.2 Node.js Server
		4.3 Python Client
	5 Approaches to Classifying Sensor Data
	6 Model Performance
	7 Conclusions
	References
Insider Threat Detection Based on Anomalous Behavior of User for Cybersecurity
	1 Introduction
		1.1 Insiders and Insider Threat
		1.2 Anomalous Behavior of User
	2 Related Work
	3 Methodology
	4 Data Processing and Algorithm Analysis
		4.1 Data Processing
		4.2 Software Requirement
		4.3 Undirected Bipartite Graph Analysis
		4.4 Temporal Data Analysis
		4.5 Model with Logon and Logoff Features for the Implementation of the Anomaly Detection Algorithm
		4.6 Risk Control Model with Logon and Logoff Data
	5 Conclusion and Future Work
	References
A Comparative Study of Text Mining Algorithms for Anomaly Detection in Online Social Networks
	1 Introduction
	2 Related Work
	3 Supervised Machine Learning Approaches
		3.1 Support Vector Machine (SVM)
		3.2 Rocchio Algorithm
		3.3 Decision Trees
		3.4 K-Nearest Neighbour (KNN)
	4 Results and Discussions
	5 Conclusion
	References
Internet of Things (IoT) Security Threats on Physical Layer Security
	1 Introduction
	2 Literature Review
	3 Threat Analysis
	4 Proposed Works
		4.1 Secure Channel Analysis
	5 Result Analysis
	6 Conclusion
	References
Data Mining Models Applied in Prediction of IVF Success Rates: An Overview
	1 Introduction
	2 Data Mining Approaches of IVF Data Analytics
		2.1 Traditional Models (Medical Oriented)
		2.2 Statistical and Regression-Based Models
		2.3 Computational Algorithms Based Models
		2.4 Hybrid Algorithm-Based Models
	3 Conclusion
	References
TreeXP—An Instantiation of XPattern Framework
	1 Introduction
	2 XPattern—A Pattern-Based Clustering Framework
	3 The PathXP Algorithm—An Instance of XPattern Framework
	4 CRXTree Creation—A Novel XML Structure Representation
	5 Proposed Method—TreeXP
	6 Example
	7 Empirical Evaluation
		7.1 Dataset
		7.2 Precision
	8 Conclusion and Future Works
	References
Recommendation of Food Items for Thyroid Patients Using Content-Based KNN Method
	1 Introduction
	2 Related Work
	3 Proposed Framework
		3.1 Generate a Food Preference Weight Vector Using TF–IDF Method
		3.2 Generate a Rating Value for Food Items Using KNN Similarity Score
	4 Experimental Setup
	5 Conclusion
	References
Survey on DNS-Specific Security Issues and Solution Approaches
	1 Introduction
	2 DNS and Security Threats Related to DNS
		2.1 DNS Cache Poisoning Attack
		2.2 DOS/DDOS Attack
		2.3 Spoofing
		2.4 Phishing
		2.5 Identity Theft
		2.6 Forgery
		2.7 Eavesdropping
		2.8 Packet Sniffing
		2.9 Tampering
		2.10 Man-in-the-Middle Attack
	3 Solution to DNS Security Threats
		3.1 DNSSEC (DNS Security Extension)
		3.2 SSL Certificates
		3.3 Extended Validation Certificate
	4 Benefits of DNSSEC and SSL
		4.1 Forgery
		4.2 Tampering
		4.3 Cache Poisoning Attack
		4.4 Eavesdropping
	5 Conclusion
	References
Algorithms for the Metric Dimension of a Simple Graph
	1 Introduction
	2 Metric Dimension and k-Metric Dimension
		2.1 Metric Dimension of a Path and Cycle
		2.2 Metric Basis of a General Graph
		2.3 Algorithm 1: To Find k Such that the Graph G Is k-Metric Dimensional
		2.4 Illustration of the Algorithm
		2.5 Algorithm 2: Greedy Algorithm to Find the Metric Basis
		2.6 Illustration of Algorithm 2
	3 Data Structures for Graph Representation
		3.1 Distinguish Set of a Vertex vk
		3.2 Notation
	4 Breadth-First Search
		4.1 Algorithm 3: Find the BFS Tree with Partition of Vertices
		4.2 Algorithm 4: To Find the Dimension and Metric Basis of a Graph
	References
A Deep Learning Approach in Early Prediction of Lungs Cancer from the 2D Image Scan with Gini Index
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results
	5 Conclusion
	References
A Survey on Guiding Customer Purchasing Patterns in Modern Consumerism Scenario in India
	1 Introduction
	2 Related Work
		2.1 Online Shopping Carts/E-Commerce
		2.2 Digital Shopping Using NFC
		2.3 Easy Shopping Using Barcodes
		2.4 QR Code (Quick Response Code)
	3 Existing System
	4 Proposed System
	5 Design and Implementation
	6 Results
	7 Conclusion and Future Work
	References
Diabetic Retinopathy Detection Using Convolutional Neural Network—A Study
	1 Introduction
	2 Related Works
	3 CNN Models for Diabetic Retinopathy Detection
		3.1 CNN Model 1—Deep CNN-Based DR Detection
		3.2 CNN Model 2—A CNN Model for DR Detection
	4 Experiments
	5 Discussion
	6 Conclusion
	References
ALOSI: Aspect-Level Opinion Spam Identification
	1 Introduction
		1.1 Sentiment Analysis
		1.2 Aspect-Level Sentiment Analysis
		1.3 Spam Detection
	2 Methodology and Workflow
	3 Conclusion
	References
Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Reducing the Dimension with the Use of AABC
		3.2 Detection of Anomalous Lung Cells with the Aid of FFBNN-AABC
		3.3 FFBNN-AABC ALGORITHM
		3.4 Initial Phase
	4 Performance Analysis
	5 Conclusion
	References
A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques
	1 Introduction
		1.1 Our Contributions in This Paper Are as Follows
		1.2 Coverage, Subject
	2 Related Works
		2.1 Issues in Current Algorithms
	3 Proposed Algorithm
		3.1 Idea
		3.2 Algorithm
		3.3 Discussion
	4 Results
	5 Conclusion
	References
Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM)
	1 Introduction
	2 Literature Survey
	3 Data
	4 Methodology
		4.1 The Model
		4.2 Control Overfitting
		4.3 Bi-LSTM
		4.4 Bi-GRU
		4.5 Attention
		4.6 Cyclic Learning Rate
	5 Results and Discussions
	6 Conclusion
	References
An IoT-Based Fog Computing Approach for Retrieval of Patient Vitals
	1 Introduction
	2 Related Work
	3 Design and Implementation
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Recommender System for Analyzing Students’ Performance Using Data Mining Technique
	1 Introduction
	2 Literature Survey
	3 Recommender System
	4 Experimental Results
		4.1 Findings
	5 Conclusion
	References
Classification of Financial News Articles Using Machine Learning Algorithms
	1 Introduction
	2 Related Works
	3 Philosophical Underpinnings
		3.1 Financial News Article Source
		3.2 Textual Representation
		3.3 Machine Learning Process
	4 Experimental Design
		4.1 Data Preprocessing and Feature Selection
		4.2 Classification
		4.3 System Design
	5 Experimental Findings and Discussion
	6 Discussion and Conclusion
	References
OCR System Framework for MODI Scripts using Data Augmentation and Convolutional Neural Network
	1 Introduction
	2 Literature Review
	3 An Overview of CNN Architecture
	4 Methodology
		4.1 Data Augmentation
		4.2 Architectural Details of the Proposed Method
	5 Experimental Study and Results
	6 Conclusion
	References
Robot Path Planning–Prediction: A Multidisciplinary Platform: A Survey
	1 Introduction
	2 Problem Statement
	3 Sampling-Based Planning
		3.1 Artificial Potential Fields
		3.2 Randomized Potential Planner (RPP)
		3.3 Probabilistic Roadmap Method (PRM)
		3.4 Rrt Series
	4 Graph Search-Based Optimal Algorithms
		4.1 Dijkstra Algorithm
		4.2 A* and Its Variants
	5 Mathematically Modelled Planners
	6 Dynamic Programming Path Planners
	7 Bio-inspired Planners
	8 Conclusion
	References
Genome Analysis for Precision Agriculture Using Artificial Intelligence: A Survey
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Conclusion
	References
Efficient Handwritten Character Recognition of MODI Script Using Wavelet Transform and SVD
	1 Introduction
	2 Review of Literature
	3 Methodology
		3.1 Feature Extraction
		3.2 Singular Value Decomposition
		3.3 Classification
		3.4 Proposed Algorithm
	4 Experimental Results
	5 Conclusion
	References
An Advanced Machine Learning Framework for Cybersecurity
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Development of Kid-Friendly YouTube Access Model Using Deep Learning
	1 Introduction
	2 Problem of Current System
	3 Related Work
	4 Methodology
		4.1 Age Detection
		4.2 Sentiment Analysis
	5 Conclusion
	References
Toxic Text Classification
	1 Introduction
	2 Different Approaches
		2.1 Primitive Machine Learning Algorithms
		2.2 Naive Bayes
		2.3 Deep-Learning-Based Methods
		2.4 Ensemble Learning
	3 Data
	4 Cleaning the Data
		4.1 Cleaning Contractions
		4.2 Cleaning Misspelled Words
		4.3 Cleaning Numbers and Punctuation
		4.4 Cleaning Special Characters
	5 Extra Features
	6 The Model Architecture
		6.1 Bi-LSTM
		6.2 Bi-GRU
		6.3 Capsule Network
	7 Formulas
	8 Cyclic Learning Rate
	9 Word Embedding
	10 Experimentation and Final Results
	11 Conclusion
	References
Tag Indicator: A New Predictive Tool for Stock Trading
	1 Introduction
	2 TAG: An Indicator
	3 Methodology
	4 Mathematical Formulation
	5 Analysis
	6 Conclusion
	References
A Predictive Model on Post-earthquake Infrastructure Damage
	1 Introduction
	2 Literature Review
	3 Problem Statement
		3.1 Scope of the Study
		3.2 Objectives of the Study
	4 Research Methodology
		4.1 Data Understanding
		4.2 Modeling
	5 Experimental Analysis
		5.1 Bivariate Analysis
		5.2 Bivariate Analysis
		5.3 Structure Matrix
		5.4 Predictive Modeling
	6 Performance Analysis
		6.1 Findings
	7 Conclusion
	References
On Some Classes of Equitable Irregular Graphs
	1 More Classes of Equitable Irregular Graphs
	2 K-Equitable Irregular Graphs
	3 Conclusion and Scope
	References
Therapy Recommendation Based on Level of Depression Using Social Media Data
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Data Collection
		3.2 Database Generation
		3.3 Feature Engineering
		3.4 Proposed Methodology
	4 Therapy Recommendation System
	5 Results
	6 Conclusion
	References
Phoneme and Phone Pre-processing Using CLIR Techniques
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
	4 Experimental Setup
		4.1 Segmentation and SNR Estimation
		4.2 Suppression
		4.3 Filters
	5 Implementation and Result
	6 Conclusion
	References
Analysis of Various Applications of Blockchain Technology: A Survey
	1 Introduction
	2 Related Work
	3 Analysis of Blockchain Applications in Different Domains
	4 Classification of Blockchain Applications Based on Domains with Proof of Concept (POC)
	5 Conclusion
	References
Implementation of Integer Factorization Algorithm with Pisano Period
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Comparative Study of Existing Methods and Implementation of Pisano Period Factorization
	5 Results and Discussions
	6 Conclusion
	References
Author Index




نظرات کاربران