Vai al contenuto principale della pagina

Data science and security : proceedings of IDSCS 2021 / / editors, Samiksha Shukla [et al.]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Data science and security : proceedings of IDSCS 2021 / / editors, Samiksha Shukla [et al.] Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2021]
©2021
Descrizione fisica: 1 online resource (xiv, 489 pages)
Disciplina: 006.3
Soggetto topico: Artificial intelligence
Computer security
Data mining
Mineria de dades
Seguretat informàtica
Intel·ligència artificial
Soggetto genere / forma: Congressos
Llibres electrònics
Persona (resp. second.): ShuklaSamiksha
Nota di bibliografia: Includes bibliographical references.
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- Towards a Knowledge Centric Semantic Approach for Text Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Architecture -- 4 Implementation -- 5 Performance Evaluation and Results -- 6 Conclusion -- References -- Detection of Abnormal Red Blood Cells Using Features Dependent on Morphology and Rotation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Determine the ROI -- 3.2 Features Determination -- 4 Quality Assessment -- 5 Experimental Results -- 6 Conclusion -- 7 Future Scope -- References -- A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning -- 1 Introduction -- 2 Background -- 2.1 What is Privacy in Machine Learning -- 3 Classification of Machine Learning Attacks -- 3.1 Explicit Attack -- 3.2 Implicit Attack -- 4 Privacy-Preserving Mechanisms -- 4.1 Data Aggregation -- 4.2 Training Phase -- 4.3 Inference Phase -- 5 Privacy-Enhancing Execution Models and Environments -- 5.1 Federated Learning -- 5.2 Split Learning -- 5.3 Trusted Execution Environment -- 6 Comparative Analysis -- 7 Conclusion -- References -- Deep Learning Methods for Intrusion Detection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Deep Learning Based Intrusion Detection System -- 4 System Implementation -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Finding Optimal Parameters in DNN -- 4.4 Finding Optimal Parameters in CNN -- 4.5 Classification -- 5 Results -- 6 Conclusion -- References -- Adaptive Neuro Fuzzy Approach for Assessment of Learner's Domain Knowledge -- 1 Introduction -- 2 Literature Review -- 3 Dataset Preparation and ANFIS Model Development -- 4 ANFIS Model: Testing and Validation -- 5 Conclusion -- References -- Comparison of Full Training and Transfer Learning in Deep Learning for Image Classification -- 1 Introduction.
2 Literature Review -- 3 Method -- 3.1 Transfer Learning Approach -- 3.2 Full Training Approach -- 4 Results and Analysis -- 5 Conclusion -- References -- Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things -- 1 Introduction -- 2 IoMT and Security -- 2.1 IoMT Architecture -- 2.2 Security Attacks -- 2.3 Authentication -- 2.4 PUF -- 2.5 OAuth 2.0 -- 3 Literature Review -- 4 Proposed Model -- 4.1 Proposed Architecture -- 4.2 Algorithm -- 4.3 Enrolment Phase -- 4.4 Authentication Phase -- 4.5 Data Transmission Phase -- 5 Analysis of the Proposed Scheme -- 5.1 Replay Attacks -- 5.2 Impersonation Attacks -- 5.3 Eavesdropping Attacks -- 5.4 Stolen Device -- 6 Conclusion -- References -- Sensitivity Analysis of a Multilayer Perceptron Network for Cervical Cancer Risk Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Sensitivity Analysis -- 3.3 Algorithm -- 4 Results and Discussions -- 4.1 Number of Inputs and Accuracy -- 4.2 Number of Epochs and Accuracy -- 4.3 NNIHL and Accuracy -- 4.4 Performance Comparison -- 5 Conclusions -- References -- Data Encryption and Decryption Techniques Using Line Graphs -- 1 Introduction -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Encryption Algorithm -- 3.2 Decryption Algorithm -- 4 Encryption and Decryption of the Plaintext - `Crypto' -- 4.1 Encryption -- 4.2 Decryption -- 5 Conclusion -- References -- Aerial Image Enhanced by Using Dark Channel Prior and Retinex Algorithms Based on HSV Color Space -- 1 Introduction -- 2 Proposed Method -- 2.1 DCP Algorithm -- 2.2 HSV Color Space -- 2.3 MSR Algorithm -- 2.4 The Combination of Enhancement Compounds -- 3 Determine the Quality Assessment -- 4 Result and Discussion -- 5 Conclusions -- References -- CARPM: Comparative Analysis of Routing Protocols in MANET -- 1 Introduction.
2 Related Work -- 3 Comparative Analysis of Proposed Routing protocol with DSR and AODV and PA-DSR and GC-DSR -- 3.1 Proactive Routing Protocols -- 3.2 Reactive Routing Protocols -- 3.3 Hybrid Routing Protocols -- 4 Challenges or Drawbacks in DSR, AODV and ZRP -- 5 Proposed Green Corridor Protocol -- 5.1 Proposed Model Algorithm Pseudo-code -- 5.2 Results and Discussion -- 6 Conclusion -- References -- Content-Restricted Boltzmann Machines for Diet Recommendation -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- PIREN: Prediction of Intermediary Readers' Emotion from News-Articles -- 1 Introduction -- 2 Literature Survey and Related Works -- 3 Proposed Methodology -- 4 Implementation -- 5 Results and Performance Evaluation -- 6 Conclusion -- References -- Automated Organic Web Harvesting on Web Data for Analytics -- 1 Introduction -- 2 Literature Review -- 3 Overview of Web Scraping System -- 4 The Proposed System -- 5 Experiments and Results -- 6 Conclusion and Future Work -- References -- Convolutional Autoencoder Based Feature Extraction and KNN Classifier for Handwritten MODI Script Character Recognition -- 1 Introduction -- 2 Review of Literature -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 Classification -- 4 Experimental Results -- 5 Conclusion -- References -- ODFWR: An Ontology Driven Framework for Web Service Recommendation -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- References -- Smart Contract Security and Privacy Taxonomy, Tools, and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Taxonomy for Smart Contract Vulnerabilities -- 4 Proposed Taxonomy for Blockchain Smart Contracts -- 4.1 OWASP Risk Rating Methodology -- 4.2 Proposed Taxonomy.
5 Tools and Methods Used for the Testing -- 6 Open Challenges -- 6.1 Universal Taxonomy -- 6.2 AI-Based Security Tools -- 6.3 The Mechanism to Recall Smart Contract -- 6.4 Auditing Tool that can Support More than One Language -- 6.5 Strategy for Testing a Smart Contract -- 7 Future Work and Conclusion -- References -- Heteroskedasticity Analysis During Operational Data Processing of Radio Electronic Systems -- 1 Introduction -- 2 Literature Analysis and Problem Statement -- 3 Models of Diagnostic Variable in the Case of Heteroskedasticity -- 4 Method for Taking into Account Heteroskedasticity During Analysis of the Diagnostic Variable Trend -- 5 Conclusion -- References -- Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python -- 1 Introduction -- 2 Literature Review -- 3 Methodology for Analysing Genomic Data Using Python -- 3.1 Experimental Setup -- 4 Results and Discussion -- 5 Recent Findings in the Field of Genomics -- 6 Conclusions -- References -- Automatic Detection of Smoke in Videos Relying on Features Analysis Using RGB and HSV Colour Spaces -- 1 Introduction -- 2 Literature Review -- 3 Suggested Method -- 3.1 Cut the Video into Frames -- 3.2 Important Video Frame Determination -- 3.3 Smoke Detection Depending on the Features -- 4 Accuracy Meters -- 5 Result and Dissection -- 6 Conclusions -- References -- A Comparative Study of the Performance of Gait Recognition Using Gait Energy Image and Shannon's Entropy Image with CNN -- 1 Introduction -- 2 Literature Survey -- 3 Gait and Gait Phases -- 4 Experiments and Results -- 5 Conclusion -- References -- OntoJudy: A Ontology Approach for Content-Based Judicial Recommendation Using Particle Swarm Optimisation and Structural Topic Modelling -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation.
5 Results and Performance Evaluation -- 6 Conclusions -- References -- Classifying Emails into Spam or Ham Using ML Algorithms -- 1 Introduction -- 2 Related Works -- 2.1 Impact of Feature Selection Technique on Email Classification -- 2.2 A Hybrid Algorithm for Malicious Spam Detection in Email through Machine Learning -- 2.3 Study on the Effect of Preprocessing Methods for Spam Email Detection -- 2.4 Review Web Spam Detection Using Data Mining -- 2.5 Machine Learning-Based Spam Email Detection -- 3 Methodology -- 3.1 Naive Bayes -- 3.2 Support Vector Machine (SVMs) -- 3.3 Random Forest -- 3.4 Decision Tree -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 5 Conclusion -- References -- Rice Yield Forecasting in West Bengal Using Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 ARIMA Model -- 3.3 ANN Model -- 3.4 Hybrid Model -- 3.5 Performance Metrics -- 4 Experiments -- 5 Conclusion and Future Work -- References -- An Inventory Model for Growing Items with Deterioration and Trade Credit -- 1 Introduction -- 2 Modal Formation, Notations and Assumptions -- 3 Analysis -- 4 Particular Case -- 5 Solution Procedure -- 6 Sensitivity Analysis -- 7 Conclusion -- References -- A Deep Learning Based Approach for Classification of News as Real or Fake -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experiment Analysis -- 4.1 Data Pre-processing -- 4.2 Model Analysis -- 4.3 Experimental Result -- 5 Conclusion and Future Aspects -- References -- User Authentication with Graphical Passwords using Hybrid Images and Hash Function -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Algorithm -- 4 Working Example -- 4.1 Registration Process -- 4.2 Login Process -- 5 Security Analysis -- 6 Conclusion and Future Work -- References.
UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment.
Sommario/riassunto: This book presents the best-selected papers presented at the International Conference on Data Science, Computation and Security (IDSCS-2021), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during April 1617, 2021. The proceeding is targeting the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing, and cloud computing.
Titolo autorizzato: Data Science and Security  Visualizza cluster
ISBN: 981-16-4486-1
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910495223403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems ; ; 290.