Soft computing for security applications : proceedings of ICSCS 2022 / edited by G. Ranganathan, Xavier Fernando and Selwyn Piramuthu.

Format
Book
Language
English
Published/​Created
  • Gateway East, Singapore : Springer, [2023]
  • ©2023
Description
1 online resource (754 pages)

Details

Subject(s)
Editor
Series
Bibliographic references
Includes bibliographical references and index.
Source of description
Description based on print version record.
Contents
  • Intro
  • Preface
  • Contents
  • About the Editors
  • Smart Question Paper Evaluation: Automated Approach Using the Jaccard Similarity
  • 1 Introduction
  • 2 Literature Review
  • 3 Proposed Approach
  • 4 Results
  • 5 Conclusion
  • References
  • Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework
  • Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements
  • 2 Related Works
  • 2.1 Image Processing Application for "E-Waste" Handling
  • 3 Imaging Analysis
  • 3.1 Missing Holes Detection Using Imaging
  • 3.2 Open-Circuit Detection Using Imaging
  • 3.3 Short-Circuit Detection Using Imaging
  • 4 Result and Discussion
  • Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry
  • 2.1 Knowledge Management
  • 2.2 Gamification
  • 2.3 Gamification and Incentives in KMS
  • 2.4 Existing Frameworks of Applying Gamification in Knowledge Management Systems.
  • 3 Methodology
  • 3.1 Research Method
  • 3.2 Data Collection Technique
  • 3.3 Sample Size
  • 4 Results and Interpretation
  • 4.1 Outcome for Research Questions
  • 4.2 Proposed Framework for the Gamification of a KMS
  • 4.3 Evaluation of Proposed Framework
  • Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic
  • 2 Related Work
  • 3 Privacy Attributes Aware (PAA) Information Disclosure Model
  • 4 Experimental Results
  • Role of Resource Description Framework in Knowledge Discovery in World Wide Web
  • 1.1 Role of RDF in Semantic Web.
  • 2 State of Current Research in Semantic Web
  • 3 Conceptual Model
  • 3.1 Application Architecture
  • 4 Experimental Results and Discussions
  • 5 Conclusion and Scope for Future Work
  • A Comparative Analysis of Deep Learning-Based Frameworks for Face Vitality Detection
  • 2 Deep Learning in Face PAD Mechanism
  • 2.1 Deep Features-Based Face PAD Models
  • 3 Analysis
  • 4 Research Observations and Discussions
  • 5 Conclusions
  • Prediction of Students Programming Performance Using Naïve Bayesian and Decision Tree
  • 3 Background
  • 3.1 Naïve Bayes
  • 3.2 Decision Tree
  • 4 Experiment and Result
  • 4.1 Data Collection
  • 4.2 Preprocessing
  • 4.3 Classification
  • 4.4 Post-processing
  • 5 Conclusion and Future Work
  • The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
  • 2 Attack Forms
  • 3 Network Security Technologies
  • 4 Advanced Security Policies for Networks
  • A Review on Rice Quality Analysis
  • 2 Methodologies for Rice Quality Analysis
  • 2.1 Spectroscopic Techniques
  • 2.2 Hyperspectral Imaging
  • 2.3 Physio-chemical Properties
  • 2.4 Polarimetric Method
  • 2.5 Discussion
  • 3 Conclusion
  • Hybrid MPPT-Based Efficiency Improvement of Renewable Energy System Using Step-Up Converter
  • 2 Modeling of PV Cell
  • 3 Need for MPP Tracking
  • 4 Proposed Hybrid MPP Algorithm
  • 5 Simulation Results and Discussion
  • 6 Conclusion
  • A Review to Enhance Operations in an Airport with a Deep Learning and Computer Vision Approach
  • 3 Proposed Methodologies
  • 3.1 Face Recognition
  • 3.2 Paperless Boarding
  • 3.3 Correlating Luggage With Passenger
  • 4 Conclusion.
  • Comparative Analysis of Diabetes Prediction Using Machine Learning
  • 2.1 Support Vector Machine (SVM)
  • 2.2 Artificial Neural Network (ANN)
  • 2.3 Deep Neural Network (DNN)
  • 2.4 Convolutional Neural Network (CNN)
  • 3 Result and Discussion
  • 4 Conclusion
  • A Review on Multiparameter Sensor Design for Biomedical SoC Applications
  • 1.1 Cardiovascular Disease Diagnosis Methods
  • 1.2 Present Wearable Devices for Cardiovascular Disease Monitoring
  • 1.3 Wearable Devices Comparative Analysis
  • 2 Biomedical Signal Processing Perspective
  • 2.1 Photoplethysmograph (PPG) Signal
  • 2.2 PPG Signal Characteristics
  • Towards Design of a Novel Android Malware Detection Framework Using Hybrid Deep Learning Techniques
  • 3 Proposed Android Malware Detection Framework Using Hybrid Deep Learning Technique
  • 3.1 Description of the Pre-processing Stage
  • 3.2 Hybrid of the Bidirectional Long Short-Term Memory (BiLSTM) and Merged Sparse Auto-Encoder (MSAE) Deep Learning Models
  • 4 Performance Analysis and Discussion
  • 4.1 Dataset Description
  • 4.2 Results and Discussion
  • A Survey: Secure Cloud Data Storage and Access Control System Using Blockchain
  • 3 Blockchain Technology: Layered Architecture and Types of Network
  • 3.1 Blockchain Layered Architecture
  • 3.2 Types of Networks
  • 4 Access Control Mechanism for Blockchain Technology
  • 4.1 Role-Based Access Control
  • 4.2 Attribute-Based Encryption
  • 4.3 Ciphertext-Policy Attribute-Based Encryption
  • 4.4 Multi-level Security Access Control Model
  • 4.5 Dynamic Access Control with Cryptography Enforced
  • 5 Conclusion and Future Scope
  • References.
  • A Rule-Based Adaptive Mobile Application to Learn Android in a Personalized Learning Environment
  • 2.1 Personalized Learning
  • 2.2 Inference Engine and Rete Algorithm
  • 2.3 Critical Appraisal of Existing Systems
  • 3 Proposed System
  • 3.1 Detailed System Architecture
  • 3.2 Algorithm and Logic Used
  • Missing Data Imputation Using Ensemble Learning Technique: A Review
  • 2 Imputation Techniques
  • 2.1 Single Variable Imputation
  • 2.2 Multivariable Imputation
  • 3 Ensemble Learning
  • 4 Ensemble Learning in Bioinformatics
  • 5 Evaluation Metrics
  • Forensic Analysis of Images on Online Social Network: A Survey
  • 2 Literature Survey
  • 3 Digital Image Forgery Detection Method
  • 3.1 Active Forensics
  • 3.2 Passive forensics
  • 4 Different Datasets that are Associated with Forgery Detection
  • 5 Limitations
  • 6 Conclusion and Discussion
  • Survey on Heart Disease Prediction Using Machine Learning Techniques
  • 2.1 Related Works
  • 3 Review on Proposed HD Prediction Using ML Models, Performance Metrics, and the Highest Achievements
  • 3.1 Review on Proposed Models
  • 3.2 Analysis on Performance Metrics
  • 3.3 Analysis on Highest Performance Achievements
  • 4 Evaluation on Adopted HD Prediction Using ML Models Along with Chronological Review
  • 4.1 Review on Datasets Used for Prediction
  • 4.2 Chronological Review
  • 5 Features Defined in HD Prediction via ML Models Along with Review of Simulation Tool
  • 5.1 Analysis on Extracted Features
  • 5.2 Review on Simulation Tool
  • 6 Research Gaps and Challenges
  • 7 Conclusion
  • Machine Learning-Based Forecasting Technique for Crop Yield: A Study
  • 1 Introduction.
  • 2 Machine Learning Algorithms: An Overview
  • 2.1 Single Learning Models
  • 2.2 Hybrid Learning Models
  • 2.3 Ensemble Learning Models
  • 3 Relevant Literature
  • 4 Observations
  • E-commerce Application with Analytics for Pharmaceutical Industry
  • 2 Related Work/Literature Survey
  • 2.1 Purpose
  • 2.2 Methodology
  • 2.3 Unsupervised Learning
  • 2.4 Pattern Forecast Process
  • Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis
  • 2 Survey of Existing Cyber Intelligence Tools
  • 3 Architectural Design
  • 3.1 Crime Type Searching
  • 3.2 Domain/IP Searching
  • 3.3 Social Media Username Searching
  • 3.4 Free Text Searching
  • 3.5 Web Crawling and Scraping
  • 3.6 Named Entity Recognition
  • 3.7 Sentiment Analysis
  • 3.8 Knowledge Graph Generation
  • 4 System Analysis and Potential Innovations
  • 4.1 Interfacing with Multiple Data Sources
  • 4.2 Scraping the Deep Web
  • 4.3 Training the NER Model
  • 5 Limitations and Further Work
  • 5.1 Lack of Substantial Training Dataset
  • 5.2 Volatility of Deep Web Links
  • 5.3 No Mobile Platform and Network Data Stream Support
  • Image Steganography for Confidential Communication and Secured Data Storing
  • 3 Proposed Model
  • 4 Text in Image Steganography
  • 5 Lift Haar Wavelet Transform
  • 6 AES Encryption
  • 7 Decryption
  • 8 Results and Discussion
  • 9 Conclusion
  • Real Time Analysis of Artificial Neural Network-Based Fault Detection and Fault Location in the AC Microgrid
  • 2 Artificial Neural Network (ANN)
  • 2.1 Back Propagation Neural Network (BPNN)
  • 3 AC Microgrid
  • 3.1 Faults
  • 4 Methodology of Fault Analysis
  • 5 Real Time Analysis of Results Using OP4510 RT-LAB.
  • 6 Simulation Results.
ISBN
981-19-3590-4
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information