Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Emerging technologies in data mining and information security. Volume 3 : proceedings of IEMIS 2022 / Paramartha Dutta [and three others].
Format
Book
Language
English
Published/Created
Singapore : Springer, [2022]
©2022
Description
1 online resource (670 pages)
Availability
Available Online
Springer Nature - Springer Intelligent Technologies and Robotics eBooks 2023 English International
Details
Subject(s)
Computer security
—
Congresses
[Browse]
Data mining
—
Congresses
[Browse]
Editor
Dutta, Paramartha
[Browse]
Series
Advances in intelligent systems and computing.
[More in this series]
Advances in Intelligent Systems and Computing
Source of description
Description based on print version record.
Contents
Intro
Foreword
Preface
About This Book
Contents
About the Editors
Computational Intelligence
Empowering Indian Citizens Through the Secure E-Governance: The Digital India Initiative Context
1 Introduction
2 E-Governance Initiatives in India
3 Security Issues in E-Governance
3.1 Usability
3.2 Network Security
3.3 Access Control
3.4 Identification
3.5 Interoperability
4 Enhancing Security Durability for e-Governance Services
4.1 Dependability
4.2 Trustworthiness
4.3 Human Trust
5 Conclusion
References
A Performance Evaluation of Genetic Algorithm and Simulated Annealing for the Solution of TSP with Profit Using Python
2 Mathematical Modeling
3 Proposed Strategy
3.1 Solution Representation
4 Results and Discussion
Performance Assessment of DVR in a Solar-Wind Hybrid Renewable Energy Connected to Grid Using ANN
2 PV System
3 WT System
4 Proposed Structure of DVR
4.1 Operating Mode with DVR
5 Simulation Result and Discussion
6 Conclusion
Development of IoT Middleware Broker Communication Architecture for Industrial Automation with Focus on Future Pandemic Possibilities: Industry 5.0
2 Related Work
2.1 Industrial IoT Middleware
3 Proposed Architecture
4 Result and Analysis
4.1 Results and Analysis
6 Future Scope
Graceful Labeling of Hexagonal and Octagonal Snakes Along a Path
2 Definitions
2.1 Hexagonal Snake
2.2 Octagonal Snake
2.3 Cn Snake
2.4 Graceful Labeling
2.5 Alpha Labeling
2.6 Odd Even Graceful Labeling
3 Conclusion
Comparison and Analysis of Various Autoencoders
2 Datasets
3 Evaluate Images.
3.1 MODEL 1: Simple Autoencoder
3.2 MODEL 2: Deep Autoencoder
3.3 MODEL 3: Convolutional Autoencoder
4 Experimental Results
A New Delta (δ)-Doped Partly Insulated SOI MOSFET for Analogue/RF Applications
2 Device Design and Structure
3 Simulation Results Analysis and Discussion
4 Conclusion
Energy Monitoring with Trend Analysis and Power Signature Interpretation
2 Literature Review
3 Methodology
3.1 Dataset Used
3.2 Time Series Modelling Methodology
3.3 Trigger Modelling Methodology
4 Results and Discussion
Analysis of NavIC Signal Data for Topological Precision
2 Experimental Setup
4 Results and Discussions
Advance Computing
Experimental Study on Resource Allocation for a Software-Defined Network-Based Virtualized Security Functions Platform
Smart Intelligent Drone for Painting Using IoT: An Automated Approach for Efficient Painting
3 Proposed Work
4 Results
Auto-Guide for Caroms Playing Using IoT
Blockchain-Enabled Internet-Of-Vehicles on Distributed Storage
1.1 Cyber Risks and IoV
2 Distributed Storage
3 Current Works
4 Proposed System
4.1 Basic Schema Process
4.2 Hardware and Software Setup
5 Simulations and Results
5.1 Smart Contracts Deployment
6 Results and Evaluation
7 Conclusion
References.
Utilizing Off-Chain Storage Protocol for Solving the Trilemma Issue of Blockchain
3.1 Key-Pair and Address Generation
3.2 Signature Generation
3.3 Generating Raw Block Using CIDs of Transactions
3.4 Creating Hash Block Using Raw Block's CID
3.5 Modified Double-Spending Check for Faster TPS
4 Result Analysis
4.1 Reduction of the Storage Requirement
4.2 Improvement in the Rate of Transactions Per Second
5 Conclusion and Future Recommendation
An Empirical Evaluation to Measure the Blended Effect of Test-Driven Development with Looped Articulation Method
2 Work Done till Date
3 Proposed Methodology with Implementation Details
4 The Case Context
5 Measurement Metric Suite
5.1 Defect Reduction
5.2 Defect Catch and Throughput
6 Empirical Results
6.1 Descriptive Empirical Data
6.2 Inferential Statistics
7 Discussion and Conclusion
Impact of Security Challenges Over Cloud Adoption-A Comparative Study
1.1 Assessment of CyberSecurity Threats on Growth of Cloud Market
1.2 Identification of Cloud Security Threats Impediment to the Growth of Cloud Market
2 Cloud Security: Issues and Challenges
3 Scope of the Research
4 Research Methodology
4.1 Objectives of Study
4.2 Hypothesis of Study
4.3 Sampling Method
4.4 Methods of Data Collection
5 Data Presentation, Analysis and Interpretation
5.1 Objective 1: To Study About the Impact of Rising Ransomware Attack in the Cloud
5.2 Objective 2: To Compare the Security of Public Cloud versus On-Premises Environment
5.3 Objective 3: To Study the Growth of the Actual Market Value of Worldwide Public Cloud Service Spends
5.4 Objective 4: To Study the Number of Cybercrime Registered from Cyber-Victims.
6 Testing of Hypotheses
6.1 Hypothesis 1: "Phishing/Pharming the Most Common Means of Infections Used for Ransomware Attacks Have no Impact on the Cloud Adoption"
6.2 Hypothesis 2: "Personal Data Security is the Prime Concern for all Business and it is the Biggest Security Challenge in the Cloud Adoption"
6.3 Hypothesis 3: "Identity Theft Crime has Noted the Highest Percentage Increase in 2020, Does it Slowdown the Acceptance Rate of Cloud Adoption"
6.4 Hypothesis 4: "Rising Extortion/Ransomware Attacks are Normally Acceptable and it Does Not Damage the Reputation of Cloud Adoption"
7 Findings
8 Conclusion
A Passive Infrared-Based Technique for Long-Term Preservation of Forensic Evidence
2 IR-Based Technologies
3 Passive IR Imaging
3.1 Experiments and Results
4 Proposed Model for Long-Term Preservation of Biological Evidence
4.1 Technical Details
5 Advantages
Smart Contract Assisted Public Key Infrastructure for Internet of Things
2 IoT PKI
2.1 Gaps While Using CA-Based PKI
2.2 Applicability of Blockchain
3 Literature Survey
3.1 Traditional IoT PKI
3.2 Blockchain in IoT PKI
4 Proposed Work: SC-PKI
4.1 Overview
4.2 The Work Process
5 Implementation
6 Analysis and Results
6.1 Two-Layer of Security
6.2 Lightweight
6.3 Better Battery Life
6.4 Certificate Verification Time
7 Conclusion and Future Work
IoTFEC-19: Internet of Things-based Framework for Early Detection of COVID-19 Suspected Cases
2 Background
3 Proposed IoTFEC-19 Framework
3.1 Proposed Architecture
3.2 Proposed Framework
3.3 Data Flow of Proposed Framework
4 Research Opportunities and Emerging Trends
IoT-Based ECG and PCG Monitoring Systems.
2 Methodology
2.1 Need for Cardio Vascular Health Monitoring System
2.2 Elements of the Proposed System
3 Module Description
3.1 Input Image
3.2 Segmentation
3.3 Convolutional Neural Network
3.4 K-Nearest Neighbor Algorithm
3.5 Hardware Tools
Data Science and Data Analytics
Comparison Based Analysis and Prediction for Earlier Detection of Breast Cancer Using Different Supervised ML Approach
2 Bias-Variance Trade-off
3 Comparison- Based Literature Review
4 Methodology
5 Output Results
6 Result Analysis
Smart Crop Prediction and Assistance
2 Literature Survey
3 Proposed System
4 Hardware and Software Used
5 Circuit Diagram
6 Working of the Proposed System:
An Exploration of Machine Learning and Deep Learning-Based Diabetes Prediction Techniques
3 Review on ML-Based Research
4 Review on DL-Based Works
5 Recommendation
Machine Learning-Based Smart Tourist Support System (Smart Guide)
2 Literature Study
3.1 Analyze and Suggest Location with User Preference
3.2 Predict Preferred Transportation Methods and Suggest Best Routes
3.3 Predict and Generate Time Schedule on Effective Time Managing with User Preferences
3.4 Predict and Analyze Seasonal Tourist Arrivals and Give Suggestions Tips to Supportive Service Providers
Analysis of User Inclination in Movie Posters Based on Color Bias
1.1 Literature Survey
2 Study Prerequisites
3 Data Collection and Detection of Implicit Biases
4 Empirical Model for Bias Detection
5 Results.
6 Conclusions and Future Scope.
Show 200 more Contents items
ISBN
981-19-4676-0
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information