Emerging technologies in data mining and information security. Volume 3 : proceedings of IEMIS 2022 / Paramartha Dutta [and three others].

Format
Book
Language
English
Published/​Created
  • Singapore : Springer, [2022]
  • ©2022
Description
1 online resource (670 pages)

Details

Subject(s)
Editor
Series
  • Advances in intelligent systems and computing. [More in this series]
  • Advances in Intelligent Systems and Computing
Source of description
Description based on print version record.
Contents
  • Intro
  • Foreword
  • Preface
  • About This Book
  • Contents
  • About the Editors
  • Computational Intelligence
  • Empowering Indian Citizens Through the Secure E-Governance: The Digital India Initiative Context
  • 1 Introduction
  • 2 E-Governance Initiatives in India
  • 3 Security Issues in E-Governance
  • 3.1 Usability
  • 3.2 Network Security
  • 3.3 Access Control
  • 3.4 Identification
  • 3.5 Interoperability
  • 4 Enhancing Security Durability for e-Governance Services
  • 4.1 Dependability
  • 4.2 Trustworthiness
  • 4.3 Human Trust
  • 5 Conclusion
  • References
  • A Performance Evaluation of Genetic Algorithm and Simulated Annealing for the Solution of TSP with Profit Using Python
  • 2 Mathematical Modeling
  • 3 Proposed Strategy
  • 3.1 Solution Representation
  • 4 Results and Discussion
  • Performance Assessment of DVR in a Solar-Wind Hybrid Renewable Energy Connected to Grid Using ANN
  • 2 PV System
  • 3 WT System
  • 4 Proposed Structure of DVR
  • 4.1 Operating Mode with DVR
  • 5 Simulation Result and Discussion
  • 6 Conclusion
  • Development of IoT Middleware Broker Communication Architecture for Industrial Automation with Focus on Future Pandemic Possibilities: Industry 5.0
  • 2 Related Work
  • 2.1 Industrial IoT Middleware
  • 3 Proposed Architecture
  • 4 Result and Analysis
  • 4.1 Results and Analysis
  • 6 Future Scope
  • Graceful Labeling of Hexagonal and Octagonal Snakes Along a Path
  • 2 Definitions
  • 2.1 Hexagonal Snake
  • 2.2 Octagonal Snake
  • 2.3 Cn Snake
  • 2.4 Graceful Labeling
  • 2.5 Alpha Labeling
  • 2.6 Odd Even Graceful Labeling
  • 3 Conclusion
  • Comparison and Analysis of Various Autoencoders
  • 2 Datasets
  • 3 Evaluate Images.
  • 3.1 MODEL 1: Simple Autoencoder
  • 3.2 MODEL 2: Deep Autoencoder
  • 3.3 MODEL 3: Convolutional Autoencoder
  • 4 Experimental Results
  • A New Delta (δ)-Doped Partly Insulated SOI MOSFET for Analogue/RF Applications
  • 2 Device Design and Structure
  • 3 Simulation Results Analysis and Discussion
  • 4 Conclusion
  • Energy Monitoring with Trend Analysis and Power Signature Interpretation
  • 2 Literature Review
  • 3 Methodology
  • 3.1 Dataset Used
  • 3.2 Time Series Modelling Methodology
  • 3.3 Trigger Modelling Methodology
  • 4 Results and Discussion
  • Analysis of NavIC Signal Data for Topological Precision
  • 2 Experimental Setup
  • 4 Results and Discussions
  • Advance Computing
  • Experimental Study on Resource Allocation for a Software-Defined Network-Based Virtualized Security Functions Platform
  • Smart Intelligent Drone for Painting Using IoT: An Automated Approach for Efficient Painting
  • 3 Proposed Work
  • 4 Results
  • Auto-Guide for Caroms Playing Using IoT
  • Blockchain-Enabled Internet-Of-Vehicles on Distributed Storage
  • 1.1 Cyber Risks and IoV
  • 2 Distributed Storage
  • 3 Current Works
  • 4 Proposed System
  • 4.1 Basic Schema Process
  • 4.2 Hardware and Software Setup
  • 5 Simulations and Results
  • 5.1 Smart Contracts Deployment
  • 6 Results and Evaluation
  • 7 Conclusion
  • References.
  • Utilizing Off-Chain Storage Protocol for Solving the Trilemma Issue of Blockchain
  • 3.1 Key-Pair and Address Generation
  • 3.2 Signature Generation
  • 3.3 Generating Raw Block Using CIDs of Transactions
  • 3.4 Creating Hash Block Using Raw Block's CID
  • 3.5 Modified Double-Spending Check for Faster TPS
  • 4 Result Analysis
  • 4.1 Reduction of the Storage Requirement
  • 4.2 Improvement in the Rate of Transactions Per Second
  • 5 Conclusion and Future Recommendation
  • An Empirical Evaluation to Measure the Blended Effect of Test-Driven Development with Looped Articulation Method
  • 2 Work Done till Date
  • 3 Proposed Methodology with Implementation Details
  • 4 The Case Context
  • 5 Measurement Metric Suite
  • 5.1 Defect Reduction
  • 5.2 Defect Catch and Throughput
  • 6 Empirical Results
  • 6.1 Descriptive Empirical Data
  • 6.2 Inferential Statistics
  • 7 Discussion and Conclusion
  • Impact of Security Challenges Over Cloud Adoption-A Comparative Study
  • 1.1 Assessment of CyberSecurity Threats on Growth of Cloud Market
  • 1.2 Identification of Cloud Security Threats Impediment to the Growth of Cloud Market
  • 2 Cloud Security: Issues and Challenges
  • 3 Scope of the Research
  • 4 Research Methodology
  • 4.1 Objectives of Study
  • 4.2 Hypothesis of Study
  • 4.3 Sampling Method
  • 4.4 Methods of Data Collection
  • 5 Data Presentation, Analysis and Interpretation
  • 5.1 Objective 1: To Study About the Impact of Rising Ransomware Attack in the Cloud
  • 5.2 Objective 2: To Compare the Security of Public Cloud versus On-Premises Environment
  • 5.3 Objective 3: To Study the Growth of the Actual Market Value of Worldwide Public Cloud Service Spends
  • 5.4 Objective 4: To Study the Number of Cybercrime Registered from Cyber-Victims.
  • 6 Testing of Hypotheses
  • 6.1 Hypothesis 1: "Phishing/Pharming the Most Common Means of Infections Used for Ransomware Attacks Have no Impact on the Cloud Adoption"
  • 6.2 Hypothesis 2: "Personal Data Security is the Prime Concern for all Business and it is the Biggest Security Challenge in the Cloud Adoption"
  • 6.3 Hypothesis 3: "Identity Theft Crime has Noted the Highest Percentage Increase in 2020, Does it Slowdown the Acceptance Rate of Cloud Adoption"
  • 6.4 Hypothesis 4: "Rising Extortion/Ransomware Attacks are Normally Acceptable and it Does Not Damage the Reputation of Cloud Adoption"
  • 7 Findings
  • 8 Conclusion
  • A Passive Infrared-Based Technique for Long-Term Preservation of Forensic Evidence
  • 2 IR-Based Technologies
  • 3 Passive IR Imaging
  • 3.1 Experiments and Results
  • 4 Proposed Model for Long-Term Preservation of Biological Evidence
  • 4.1 Technical Details
  • 5 Advantages
  • Smart Contract Assisted Public Key Infrastructure for Internet of Things
  • 2 IoT PKI
  • 2.1 Gaps While Using CA-Based PKI
  • 2.2 Applicability of Blockchain
  • 3 Literature Survey
  • 3.1 Traditional IoT PKI
  • 3.2 Blockchain in IoT PKI
  • 4 Proposed Work: SC-PKI
  • 4.1 Overview
  • 4.2 The Work Process
  • 5 Implementation
  • 6 Analysis and Results
  • 6.1 Two-Layer of Security
  • 6.2 Lightweight
  • 6.3 Better Battery Life
  • 6.4 Certificate Verification Time
  • 7 Conclusion and Future Work
  • IoTFEC-19: Internet of Things-based Framework for Early Detection of COVID-19 Suspected Cases
  • 2 Background
  • 3 Proposed IoTFEC-19 Framework
  • 3.1 Proposed Architecture
  • 3.2 Proposed Framework
  • 3.3 Data Flow of Proposed Framework
  • 4 Research Opportunities and Emerging Trends
  • IoT-Based ECG and PCG Monitoring Systems.
  • 2 Methodology
  • 2.1 Need for Cardio Vascular Health Monitoring System
  • 2.2 Elements of the Proposed System
  • 3 Module Description
  • 3.1 Input Image
  • 3.2 Segmentation
  • 3.3 Convolutional Neural Network
  • 3.4 K-Nearest Neighbor Algorithm
  • 3.5 Hardware Tools
  • Data Science and Data Analytics
  • Comparison Based Analysis and Prediction for Earlier Detection of Breast Cancer Using Different Supervised ML Approach
  • 2 Bias-Variance Trade-off
  • 3 Comparison- Based Literature Review
  • 4 Methodology
  • 5 Output Results
  • 6 Result Analysis
  • Smart Crop Prediction and Assistance
  • 2 Literature Survey
  • 3 Proposed System
  • 4 Hardware and Software Used
  • 5 Circuit Diagram
  • 6 Working of the Proposed System:
  • An Exploration of Machine Learning and Deep Learning-Based Diabetes Prediction Techniques
  • 3 Review on ML-Based Research
  • 4 Review on DL-Based Works
  • 5 Recommendation
  • Machine Learning-Based Smart Tourist Support System (Smart Guide)
  • 2 Literature Study
  • 3.1 Analyze and Suggest Location with User Preference
  • 3.2 Predict Preferred Transportation Methods and Suggest Best Routes
  • 3.3 Predict and Generate Time Schedule on Effective Time Managing with User Preferences
  • 3.4 Predict and Analyze Seasonal Tourist Arrivals and Give Suggestions Tips to Supportive Service Providers
  • Analysis of User Inclination in Movie Posters Based on Color Bias
  • 1.1 Literature Survey
  • 2 Study Prerequisites
  • 3 Data Collection and Detection of Implicit Biases
  • 4 Empirical Model for Bias Detection
  • 5 Results.
  • 6 Conclusions and Future Scope.
ISBN
981-19-4676-0
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information