Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Soft computing for security applications : proceedings of ICSCS 2022 / edited by G. Ranganathan, Xavier Fernando and Selwyn Piramuthu.
Format
Book
Language
English
Published/Created
Gateway East, Singapore : Springer, [2023]
©2023
Description
1 online resource (754 pages)
Availability
Available Online
Springer Nature - Springer Intelligent Technologies and Robotics eBooks 2023 English International
Details
Subject(s)
Computer security
—
Congresses
[Browse]
Soft computing
[Browse]
Computer security
[Browse]
Editor
Fernando, Xavier N.
[Browse]
Piramuthu, Selwyn
[Browse]
Ranganathan, G.
[Browse]
Series
Advances in Intelligent Systems and Computing
[More in this series]
Advances in Intelligent Systems and Computing ; v.1428
[More in this series]
Bibliographic references
Includes bibliographical references and index.
Source of description
Description based on print version record.
Contents
Intro
Preface
Contents
About the Editors
Smart Question Paper Evaluation: Automated Approach Using the Jaccard Similarity
1 Introduction
2 Literature Review
3 Proposed Approach
4 Results
5 Conclusion
References
Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework
Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements
2 Related Works
2.1 Image Processing Application for "E-Waste" Handling
3 Imaging Analysis
3.1 Missing Holes Detection Using Imaging
3.2 Open-Circuit Detection Using Imaging
3.3 Short-Circuit Detection Using Imaging
4 Result and Discussion
Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry
2.1 Knowledge Management
2.2 Gamification
2.3 Gamification and Incentives in KMS
2.4 Existing Frameworks of Applying Gamification in Knowledge Management Systems.
3 Methodology
3.1 Research Method
3.2 Data Collection Technique
3.3 Sample Size
4 Results and Interpretation
4.1 Outcome for Research Questions
4.2 Proposed Framework for the Gamification of a KMS
4.3 Evaluation of Proposed Framework
Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic
2 Related Work
3 Privacy Attributes Aware (PAA) Information Disclosure Model
4 Experimental Results
Role of Resource Description Framework in Knowledge Discovery in World Wide Web
1.1 Role of RDF in Semantic Web.
2 State of Current Research in Semantic Web
3 Conceptual Model
3.1 Application Architecture
4 Experimental Results and Discussions
5 Conclusion and Scope for Future Work
A Comparative Analysis of Deep Learning-Based Frameworks for Face Vitality Detection
2 Deep Learning in Face PAD Mechanism
2.1 Deep Features-Based Face PAD Models
3 Analysis
4 Research Observations and Discussions
5 Conclusions
Prediction of Students Programming Performance Using Naïve Bayesian and Decision Tree
3 Background
3.1 Naïve Bayes
3.2 Decision Tree
4 Experiment and Result
4.1 Data Collection
4.2 Preprocessing
4.3 Classification
4.4 Post-processing
5 Conclusion and Future Work
The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
2 Attack Forms
3 Network Security Technologies
4 Advanced Security Policies for Networks
A Review on Rice Quality Analysis
2 Methodologies for Rice Quality Analysis
2.1 Spectroscopic Techniques
2.2 Hyperspectral Imaging
2.3 Physio-chemical Properties
2.4 Polarimetric Method
2.5 Discussion
3 Conclusion
Hybrid MPPT-Based Efficiency Improvement of Renewable Energy System Using Step-Up Converter
2 Modeling of PV Cell
3 Need for MPP Tracking
4 Proposed Hybrid MPP Algorithm
5 Simulation Results and Discussion
6 Conclusion
A Review to Enhance Operations in an Airport with a Deep Learning and Computer Vision Approach
3 Proposed Methodologies
3.1 Face Recognition
3.2 Paperless Boarding
3.3 Correlating Luggage With Passenger
4 Conclusion.
Comparative Analysis of Diabetes Prediction Using Machine Learning
2.1 Support Vector Machine (SVM)
2.2 Artificial Neural Network (ANN)
2.3 Deep Neural Network (DNN)
2.4 Convolutional Neural Network (CNN)
3 Result and Discussion
4 Conclusion
A Review on Multiparameter Sensor Design for Biomedical SoC Applications
1.1 Cardiovascular Disease Diagnosis Methods
1.2 Present Wearable Devices for Cardiovascular Disease Monitoring
1.3 Wearable Devices Comparative Analysis
2 Biomedical Signal Processing Perspective
2.1 Photoplethysmograph (PPG) Signal
2.2 PPG Signal Characteristics
Towards Design of a Novel Android Malware Detection Framework Using Hybrid Deep Learning Techniques
3 Proposed Android Malware Detection Framework Using Hybrid Deep Learning Technique
3.1 Description of the Pre-processing Stage
3.2 Hybrid of the Bidirectional Long Short-Term Memory (BiLSTM) and Merged Sparse Auto-Encoder (MSAE) Deep Learning Models
4 Performance Analysis and Discussion
4.1 Dataset Description
4.2 Results and Discussion
A Survey: Secure Cloud Data Storage and Access Control System Using Blockchain
3 Blockchain Technology: Layered Architecture and Types of Network
3.1 Blockchain Layered Architecture
3.2 Types of Networks
4 Access Control Mechanism for Blockchain Technology
4.1 Role-Based Access Control
4.2 Attribute-Based Encryption
4.3 Ciphertext-Policy Attribute-Based Encryption
4.4 Multi-level Security Access Control Model
4.5 Dynamic Access Control with Cryptography Enforced
5 Conclusion and Future Scope
References.
A Rule-Based Adaptive Mobile Application to Learn Android in a Personalized Learning Environment
2.1 Personalized Learning
2.2 Inference Engine and Rete Algorithm
2.3 Critical Appraisal of Existing Systems
3 Proposed System
3.1 Detailed System Architecture
3.2 Algorithm and Logic Used
Missing Data Imputation Using Ensemble Learning Technique: A Review
2 Imputation Techniques
2.1 Single Variable Imputation
2.2 Multivariable Imputation
3 Ensemble Learning
4 Ensemble Learning in Bioinformatics
5 Evaluation Metrics
Forensic Analysis of Images on Online Social Network: A Survey
2 Literature Survey
3 Digital Image Forgery Detection Method
3.1 Active Forensics
3.2 Passive forensics
4 Different Datasets that are Associated with Forgery Detection
5 Limitations
6 Conclusion and Discussion
Survey on Heart Disease Prediction Using Machine Learning Techniques
2.1 Related Works
3 Review on Proposed HD Prediction Using ML Models, Performance Metrics, and the Highest Achievements
3.1 Review on Proposed Models
3.2 Analysis on Performance Metrics
3.3 Analysis on Highest Performance Achievements
4 Evaluation on Adopted HD Prediction Using ML Models Along with Chronological Review
4.1 Review on Datasets Used for Prediction
4.2 Chronological Review
5 Features Defined in HD Prediction via ML Models Along with Review of Simulation Tool
5.1 Analysis on Extracted Features
5.2 Review on Simulation Tool
6 Research Gaps and Challenges
7 Conclusion
Machine Learning-Based Forecasting Technique for Crop Yield: A Study
1 Introduction.
2 Machine Learning Algorithms: An Overview
2.1 Single Learning Models
2.2 Hybrid Learning Models
2.3 Ensemble Learning Models
3 Relevant Literature
4 Observations
E-commerce Application with Analytics for Pharmaceutical Industry
2 Related Work/Literature Survey
2.1 Purpose
2.2 Methodology
2.3 Unsupervised Learning
2.4 Pattern Forecast Process
Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis
2 Survey of Existing Cyber Intelligence Tools
3 Architectural Design
3.1 Crime Type Searching
3.2 Domain/IP Searching
3.3 Social Media Username Searching
3.4 Free Text Searching
3.5 Web Crawling and Scraping
3.6 Named Entity Recognition
3.7 Sentiment Analysis
3.8 Knowledge Graph Generation
4 System Analysis and Potential Innovations
4.1 Interfacing with Multiple Data Sources
4.2 Scraping the Deep Web
4.3 Training the NER Model
5 Limitations and Further Work
5.1 Lack of Substantial Training Dataset
5.2 Volatility of Deep Web Links
5.3 No Mobile Platform and Network Data Stream Support
Image Steganography for Confidential Communication and Secured Data Storing
3 Proposed Model
4 Text in Image Steganography
5 Lift Haar Wavelet Transform
6 AES Encryption
7 Decryption
8 Results and Discussion
9 Conclusion
Real Time Analysis of Artificial Neural Network-Based Fault Detection and Fault Location in the AC Microgrid
2 Artificial Neural Network (ANN)
2.1 Back Propagation Neural Network (BPNN)
3 AC Microgrid
3.1 Faults
4 Methodology of Fault Analysis
5 Real Time Analysis of Results Using OP4510 RT-LAB.
6 Simulation Results.
Show 199 more Contents items
ISBN
981-19-3590-4
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information