LEADER 12056nam 2200661 450 001 9910495223403321 005 20240208141309.0 010 $a981-16-4486-1 035 $a(CKB)4100000012009560 035 $a(MiAaPQ)EBC6713976 035 $a(Au-PeEL)EBL6713976 035 $a(PPN)257353747 035 $a(EXLCZ)994100000012009560 100 $a20220606d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aData science and security $eproceedings of IDSCS 2021 /$feditors, Samiksha Shukla [et al.] 210 1$aSingapore :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (xiv, 489 pages) 225 1 $aLecture notes in networks and systems ;$vVolume 290 311 0 $a981-16-4485-3 320 $aIncludes bibliographical references. 327 $aIntro -- Preface -- Contents -- About the Editors -- Towards a Knowledge Centric Semantic Approach for Text Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Architecture -- 4 Implementation -- 5 Performance Evaluation and Results -- 6 Conclusion -- References -- Detection of Abnormal Red Blood Cells Using Features Dependent on Morphology and Rotation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Determine the ROI -- 3.2 Features Determination -- 4 Quality Assessment -- 5 Experimental Results -- 6 Conclusion -- 7 Future Scope -- References -- A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning -- 1 Introduction -- 2 Background -- 2.1 What is Privacy in Machine Learning -- 3 Classification of Machine Learning Attacks -- 3.1 Explicit Attack -- 3.2 Implicit Attack -- 4 Privacy-Preserving Mechanisms -- 4.1 Data Aggregation -- 4.2 Training Phase -- 4.3 Inference Phase -- 5 Privacy-Enhancing Execution Models and Environments -- 5.1 Federated Learning -- 5.2 Split Learning -- 5.3 Trusted Execution Environment -- 6 Comparative Analysis -- 7 Conclusion -- References -- Deep Learning Methods for Intrusion Detection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Deep Learning Based Intrusion Detection System -- 4 System Implementation -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Finding Optimal Parameters in DNN -- 4.4 Finding Optimal Parameters in CNN -- 4.5 Classification -- 5 Results -- 6 Conclusion -- References -- Adaptive Neuro Fuzzy Approach for Assessment of Learner's Domain Knowledge -- 1 Introduction -- 2 Literature Review -- 3 Dataset Preparation and ANFIS Model Development -- 4 ANFIS Model: Testing and Validation -- 5 Conclusion -- References -- Comparison of Full Training and Transfer Learning in Deep Learning for Image Classification -- 1 Introduction. 327 $a2 Literature Review -- 3 Method -- 3.1 Transfer Learning Approach -- 3.2 Full Training Approach -- 4 Results and Analysis -- 5 Conclusion -- References -- Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things -- 1 Introduction -- 2 IoMT and Security -- 2.1 IoMT Architecture -- 2.2 Security Attacks -- 2.3 Authentication -- 2.4 PUF -- 2.5 OAuth 2.0 -- 3 Literature Review -- 4 Proposed Model -- 4.1 Proposed Architecture -- 4.2 Algorithm -- 4.3 Enrolment Phase -- 4.4 Authentication Phase -- 4.5 Data Transmission Phase -- 5 Analysis of the Proposed Scheme -- 5.1 Replay Attacks -- 5.2 Impersonation Attacks -- 5.3 Eavesdropping Attacks -- 5.4 Stolen Device -- 6 Conclusion -- References -- Sensitivity Analysis of a Multilayer Perceptron Network for Cervical Cancer Risk Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Sensitivity Analysis -- 3.3 Algorithm -- 4 Results and Discussions -- 4.1 Number of Inputs and Accuracy -- 4.2 Number of Epochs and Accuracy -- 4.3 NNIHL and Accuracy -- 4.4 Performance Comparison -- 5 Conclusions -- References -- Data Encryption and Decryption Techniques Using Line Graphs -- 1 Introduction -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Encryption Algorithm -- 3.2 Decryption Algorithm -- 4 Encryption and Decryption of the Plaintext - `Crypto' -- 4.1 Encryption -- 4.2 Decryption -- 5 Conclusion -- References -- Aerial Image Enhanced by Using Dark Channel Prior and Retinex Algorithms Based on HSV Color Space -- 1 Introduction -- 2 Proposed Method -- 2.1 DCP Algorithm -- 2.2 HSV Color Space -- 2.3 MSR Algorithm -- 2.4 The Combination of Enhancement Compounds -- 3 Determine the Quality Assessment -- 4 Result and Discussion -- 5 Conclusions -- References -- CARPM: Comparative Analysis of Routing Protocols in MANET -- 1 Introduction. 327 $a2 Related Work -- 3 Comparative Analysis of Proposed Routing protocol with DSR and AODV and PA-DSR and GC-DSR -- 3.1 Proactive Routing Protocols -- 3.2 Reactive Routing Protocols -- 3.3 Hybrid Routing Protocols -- 4 Challenges or Drawbacks in DSR, AODV and ZRP -- 5 Proposed Green Corridor Protocol -- 5.1 Proposed Model Algorithm Pseudo-code -- 5.2 Results and Discussion -- 6 Conclusion -- References -- Content-Restricted Boltzmann Machines for Diet Recommendation -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- PIREN: Prediction of Intermediary Readers' Emotion from News-Articles -- 1 Introduction -- 2 Literature Survey and Related Works -- 3 Proposed Methodology -- 4 Implementation -- 5 Results and Performance Evaluation -- 6 Conclusion -- References -- Automated Organic Web Harvesting on Web Data for Analytics -- 1 Introduction -- 2 Literature Review -- 3 Overview of Web Scraping System -- 4 The Proposed System -- 5 Experiments and Results -- 6 Conclusion and Future Work -- References -- Convolutional Autoencoder Based Feature Extraction and KNN Classifier for Handwritten MODI Script Character Recognition -- 1 Introduction -- 2 Review of Literature -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 Classification -- 4 Experimental Results -- 5 Conclusion -- References -- ODFWR: An Ontology Driven Framework for Web Service Recommendation -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- References -- Smart Contract Security and Privacy Taxonomy, Tools, and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Taxonomy for Smart Contract Vulnerabilities -- 4 Proposed Taxonomy for Blockchain Smart Contracts -- 4.1 OWASP Risk Rating Methodology -- 4.2 Proposed Taxonomy. 327 $a5 Tools and Methods Used for the Testing -- 6 Open Challenges -- 6.1 Universal Taxonomy -- 6.2 AI-Based Security Tools -- 6.3 The Mechanism to Recall Smart Contract -- 6.4 Auditing Tool that can Support More than One Language -- 6.5 Strategy for Testing a Smart Contract -- 7 Future Work and Conclusion -- References -- Heteroskedasticity Analysis During Operational Data Processing of Radio Electronic Systems -- 1 Introduction -- 2 Literature Analysis and Problem Statement -- 3 Models of Diagnostic Variable in the Case of Heteroskedasticity -- 4 Method for Taking into Account Heteroskedasticity During Analysis of the Diagnostic Variable Trend -- 5 Conclusion -- References -- Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python -- 1 Introduction -- 2 Literature Review -- 3 Methodology for Analysing Genomic Data Using Python -- 3.1 Experimental Setup -- 4 Results and Discussion -- 5 Recent Findings in the Field of Genomics -- 6 Conclusions -- References -- Automatic Detection of Smoke in Videos Relying on Features Analysis Using RGB and HSV Colour Spaces -- 1 Introduction -- 2 Literature Review -- 3 Suggested Method -- 3.1 Cut the Video into Frames -- 3.2 Important Video Frame Determination -- 3.3 Smoke Detection Depending on the Features -- 4 Accuracy Meters -- 5 Result and Dissection -- 6 Conclusions -- References -- A Comparative Study of the Performance of Gait Recognition Using Gait Energy Image and Shannon's Entropy Image with CNN -- 1 Introduction -- 2 Literature Survey -- 3 Gait and Gait Phases -- 4 Experiments and Results -- 5 Conclusion -- References -- OntoJudy: A Ontology Approach for Content-Based Judicial Recommendation Using Particle Swarm Optimisation and Structural Topic Modelling -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation. 327 $a5 Results and Performance Evaluation -- 6 Conclusions -- References -- Classifying Emails into Spam or Ham Using ML Algorithms -- 1 Introduction -- 2 Related Works -- 2.1 Impact of Feature Selection Technique on Email Classification -- 2.2 A Hybrid Algorithm for Malicious Spam Detection in Email through Machine Learning -- 2.3 Study on the Effect of Preprocessing Methods for Spam Email Detection -- 2.4 Review Web Spam Detection Using Data Mining -- 2.5 Machine Learning-Based Spam Email Detection -- 3 Methodology -- 3.1 Naive Bayes -- 3.2 Support Vector Machine (SVMs) -- 3.3 Random Forest -- 3.4 Decision Tree -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 5 Conclusion -- References -- Rice Yield Forecasting in West Bengal Using Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 ARIMA Model -- 3.3 ANN Model -- 3.4 Hybrid Model -- 3.5 Performance Metrics -- 4 Experiments -- 5 Conclusion and Future Work -- References -- An Inventory Model for Growing Items with Deterioration and Trade Credit -- 1 Introduction -- 2 Modal Formation, Notations and Assumptions -- 3 Analysis -- 4 Particular Case -- 5 Solution Procedure -- 6 Sensitivity Analysis -- 7 Conclusion -- References -- A Deep Learning Based Approach for Classification of News as Real or Fake -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experiment Analysis -- 4.1 Data Pre-processing -- 4.2 Model Analysis -- 4.3 Experimental Result -- 5 Conclusion and Future Aspects -- References -- User Authentication with Graphical Passwords using Hybrid Images and Hash Function -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Algorithm -- 4 Working Example -- 4.1 Registration Process -- 4.2 Login Process -- 5 Security Analysis -- 6 Conclusion and Future Work -- References. 327 $aUAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment. 330 $aThis book presents the best-selected papers presented at the International Conference on Data Science, Computation and Security (IDSCS-2021), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during April 1617, 2021. The proceeding is targeting the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing, and cloud computing. 410 0$aLecture notes in networks and systems ;$v290. 606 $aArtificial intelligence$vCongresses 606 $aComputer security$vCongresses 606 $aData mining$vCongresses 606 $aMineria de dades$2thub 606 $aSeguretat informàtica$2thub 606 $aIntel·ligència artificial$2thub 608 $aCongressos$2thub 608 $aLlibres electrònics$2thub 615 0$aArtificial intelligence 615 0$aComputer security 615 0$aData mining 615 7$aMineria de dades 615 7$aSeguretat informàtica 615 7$aIntel·ligència artificial 676 $a006.3 702 $aShukla$b Samiksha 712 12$aInternational Conference on Data Science for Computational Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910495223403321 996 $aData Science and Security$92851471 997 $aUNINA