LEADER 01564nam a2200361 i 4500001 99129136333506421 005 20230303110628.0 006 m o d | 007 cr cnu|||||||| 008 230303s2022 si o 000 0 eng d 020 981-19-4676-0 035 (MiAaPQ)EBC7102414 035 (Au-PeEL)EBL7102414 035 (CKB)24950557200041 035 (PPN)264955943 035 (EXLCZ)9924950557200041 040 MiAaPQ |beng |erda |epn |cMiAaPQ |dMiAaPQ 050 4 QA76.9.A25 |b.E447 2022 082 0 005.8 |223 245 00 Emerging technologies in data mining and information security. |nVolume 3 : |bproceedings of IEMIS 2022 / |cParamartha Dutta [and three others]. 264 1 Singapore : |bSpringer, |c[2022] 264 4 |c©2022 300 1 online resource (670 pages) 336 text |btxt |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 490 1 Advances in Intelligent Systems and Computing 505 0 Intro -- Foreword -- Preface -- About This Book -- Contents -- About the Editors -- Computational Intelligence -- Empowering Indian Citizens Through the Secure E-Governance: The Digital India Initiative Context -- 1 Introduction -- 2 E-Governance Initiatives in India -- 3 Security Issues in E-Governance -- 3.1 Usability -- 3.2 Network Security -- 3.3 Access Control -- 3.4 Identification -- 3.5 Interoperability -- 4 Enhancing Security Durability for e-Governance Services -- 4.1 Dependability -- 4.2 Trustworthiness -- 4.3 Human Trust -- 5 Conclusion -- References -- A Performance Evaluation of Genetic Algorithm and Simulated Annealing for the Solution of TSP with Profit Using Python -- 1 Introduction -- 2 Mathematical Modeling -- 3 Proposed Strategy -- 3.1 Solution Representation -- 4 Results and Discussion -- 5 Conclusion -- References -- Performance Assessment of DVR in a Solar-Wind Hybrid Renewable Energy Connected to Grid Using ANN -- 1 Introduction -- 2 PV System -- 3 WT System -- 4 Proposed Structure of DVR -- 4.1 Operating Mode with DVR -- 5 Simulation Result and Discussion -- 6 Conclusion -- References -- Development of IoT Middleware Broker Communication Architecture for Industrial Automation with Focus on Future Pandemic Possibilities: Industry 5.0 -- 1 Introduction -- 2 Related Work -- 2.1 Industrial IoT Middleware -- 3 Proposed Architecture -- 4 Result and Analysis -- 4.1 Results and Analysis -- 5 Conclusion -- 6 Future Scope -- References -- Graceful Labeling of Hexagonal and Octagonal Snakes Along a Path -- 1 Introduction -- 2 Definitions -- 2.1 Hexagonal Snake -- 2.2 Octagonal Snake -- 2.3 Cn Snake -- 2.4 Graceful Labeling -- 2.5 Alpha Labeling -- 2.6 Odd Even Graceful Labeling -- 3 Conclusion -- References -- Comparison and Analysis of Various Autoencoders -- 1 Introduction -- 2 Datasets -- 3 Evaluate Images. 505 8 3.1 MODEL 1: Simple Autoencoder -- 3.2 MODEL 2: Deep Autoencoder -- 3.3 MODEL 3: Convolutional Autoencoder -- 4 Experimental Results -- 5 Conclusion -- References -- A New Delta (δ)-Doped Partly Insulated SOI MOSFET for Analogue/RF Applications -- 1 Introduction -- 2 Device Design and Structure -- 3 Simulation Results Analysis and Discussion -- 4 Conclusion -- References -- Energy Monitoring with Trend Analysis and Power Signature Interpretation -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset Used -- 3.2 Time Series Modelling Methodology -- 3.3 Trigger Modelling Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of NavIC Signal Data for Topological Precision -- 1 Introduction -- 2 Experimental Setup -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Advance Computing -- Experimental Study on Resource Allocation for a Software-Defined Network-Based Virtualized Security Functions Platform -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Smart Intelligent Drone for Painting Using IoT: An Automated Approach for Efficient Painting -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- Auto-Guide for Caroms Playing Using IoT -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- Blockchain-Enabled Internet-Of-Vehicles on Distributed Storage -- 1 Introduction -- 1.1 Cyber Risks and IoV -- 2 Distributed Storage -- 3 Current Works -- 4 Proposed System -- 4.1 Basic Schema Process -- 4.2 Hardware and Software Setup -- 5 Simulations and Results -- 5.1 Smart Contracts Deployment -- 6 Results and Evaluation -- 7 Conclusion -- References. 505 8 Utilizing Off-Chain Storage Protocol for Solving the Trilemma Issue of Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Key-Pair and Address Generation -- 3.2 Signature Generation -- 3.3 Generating Raw Block Using CIDs of Transactions -- 3.4 Creating Hash Block Using Raw Block's CID -- 3.5 Modified Double-Spending Check for Faster TPS -- 4 Result Analysis -- 4.1 Reduction of the Storage Requirement -- 4.2 Improvement in the Rate of Transactions Per Second -- 5 Conclusion and Future Recommendation -- References -- An Empirical Evaluation to Measure the Blended Effect of Test-Driven Development with Looped Articulation Method -- 1 Introduction -- 2 Work Done till Date -- 3 Proposed Methodology with Implementation Details -- 4 The Case Context -- 5 Measurement Metric Suite -- 5.1 Defect Reduction -- 5.2 Defect Catch and Throughput -- 6 Empirical Results -- 6.1 Descriptive Empirical Data -- 6.2 Inferential Statistics -- 7 Discussion and Conclusion -- References -- Impact of Security Challenges Over Cloud Adoption-A Comparative Study -- 1 Introduction -- 1.1 Assessment of CyberSecurity Threats on Growth of Cloud Market -- 1.2 Identification of Cloud Security Threats Impediment to the Growth of Cloud Market -- 2 Cloud Security: Issues and Challenges -- 3 Scope of the Research -- 4 Research Methodology -- 4.1 Objectives of Study -- 4.2 Hypothesis of Study -- 4.3 Sampling Method -- 4.4 Methods of Data Collection -- 5 Data Presentation, Analysis and Interpretation -- 5.1 Objective 1: To Study About the Impact of Rising Ransomware Attack in the Cloud -- 5.2 Objective 2: To Compare the Security of Public Cloud versus On-Premises Environment -- 5.3 Objective 3: To Study the Growth of the Actual Market Value of Worldwide Public Cloud Service Spends -- 5.4 Objective 4: To Study the Number of Cybercrime Registered from Cyber-Victims. 505 8 6 Testing of Hypotheses -- 6.1 Hypothesis 1: "Phishing/Pharming the Most Common Means of Infections Used for Ransomware Attacks Have no Impact on the Cloud Adoption" -- 6.2 Hypothesis 2: "Personal Data Security is the Prime Concern for all Business and it is the Biggest Security Challenge in the Cloud Adoption" -- 6.3 Hypothesis 3: "Identity Theft Crime has Noted the Highest Percentage Increase in 2020, Does it Slowdown the Acceptance Rate of Cloud Adoption" -- 6.4 Hypothesis 4: "Rising Extortion/Ransomware Attacks are Normally Acceptable and it Does Not Damage the Reputation of Cloud Adoption" -- 7 Findings -- 8 Conclusion -- References -- A Passive Infrared-Based Technique for Long-Term Preservation of Forensic Evidence -- 1 Introduction -- 2 IR-Based Technologies -- 3 Passive IR Imaging -- 3.1 Experiments and Results -- 4 Proposed Model for Long-Term Preservation of Biological Evidence -- 4.1 Technical Details -- 5 Advantages -- 6 Conclusion -- References -- Smart Contract Assisted Public Key Infrastructure for Internet of Things -- 1 Introduction -- 2 IoT PKI -- 2.1 Gaps While Using CA-Based PKI -- 2.2 Applicability of Blockchain -- 3 Literature Survey -- 3.1 Traditional IoT PKI -- 3.2 Blockchain in IoT PKI -- 4 Proposed Work: SC-PKI -- 4.1 Overview -- 4.2 The Work Process -- 5 Implementation -- 6 Analysis and Results -- 6.1 Two-Layer of Security -- 6.2 Lightweight -- 6.3 Better Battery Life -- 6.4 Certificate Verification Time -- 7 Conclusion and Future Work -- References -- IoTFEC-19: Internet of Things-based Framework for Early Detection of COVID-19 Suspected Cases -- 1 Introduction -- 2 Background -- 3 Proposed IoTFEC-19 Framework -- 3.1 Proposed Architecture -- 3.2 Proposed Framework -- 3.3 Data Flow of Proposed Framework -- 4 Research Opportunities and Emerging Trends -- 5 Conclusion -- References -- IoT-Based ECG and PCG Monitoring Systems. 505 8 1 Introduction -- 2 Methodology -- 2.1 Need for Cardio Vascular Health Monitoring System -- 2.2 Elements of the Proposed System -- 3 Module Description -- 3.1 Input Image -- 3.2 Segmentation -- 3.3 Convolutional Neural Network -- 3.4 K-Nearest Neighbor Algorithm -- 3.5 Hardware Tools -- 4 Results and Discussion -- 5 Conclusion -- References -- Data Science and Data Analytics -- Comparison Based Analysis and Prediction for Earlier Detection of Breast Cancer Using Different Supervised ML Approach -- 1 Introduction -- 2 Bias-Variance Trade-off -- 3 Comparison- Based Literature Review -- 4 Methodology -- 5 Output Results -- 6 Result Analysis -- References -- Smart Crop Prediction and Assistance -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Hardware and Software Used -- 5 Circuit Diagram -- 6 Working of the Proposed System: -- 7 Conclusion -- References -- An Exploration of Machine Learning and Deep Learning-Based Diabetes Prediction Techniques -- 1 Introduction -- 2 Methodology -- 3 Review on ML-Based Research -- 4 Review on DL-Based Works -- 5 Recommendation -- 6 Conclusion -- References -- Machine Learning-Based Smart Tourist Support System (Smart Guide) -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 3.1 Analyze and Suggest Location with User Preference -- 3.2 Predict Preferred Transportation Methods and Suggest Best Routes -- 3.3 Predict and Generate Time Schedule on Effective Time Managing with User Preferences -- 3.4 Predict and Analyze Seasonal Tourist Arrivals and Give Suggestions Tips to Supportive Service Providers -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of User Inclination in Movie Posters Based on Color Bias -- 1 Introduction -- 1.1 Literature Survey -- 2 Study Prerequisites -- 3 Data Collection and Detection of Implicit Biases -- 4 Empirical Model for Bias Detection -- 5 Results. 505 8 6 Conclusions and Future Scope. 588 Description based on print version record. 650 0 Computer security |vCongresses. 650 0 Data mining |vCongresses. 776 08 |iPrint version:Dutta, Paramartha |tEmerging Technologies in Data Mining and Information Security |dSingapore : Springer,c2022 |z9789811946752 700 1 Dutta, Paramartha, |eeditor. 830 0 Advances in intelligent systems and computing. 906 BOOK