درحال بارگذاري...
جستجو
ایمیل دوست | |
نام شما | |
ایمیل شما | |
کد مقابل را وارد نمایید | |
این صفحه برای دوست شما با موفقیت ارسال شد.
4 مرتبه مشاهده شده
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3
Abraham, Ajith
- ISBN:9789811315008
- Main Entry: Abraham, Ajith
- Title:Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3/ Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta Editors.-
- Publisher:Singapore: Springer, 2019.
-
محتواي کتاب
- مشاهده
- Foreword
- Preface
- Organizing Committee
- Patron
- Conference General Chair
- Convener
- Co-convener
- Keynote Speakers
- Technical Program Committee Chair
- Technical Program Committee Co-chair
- Editorial Board
- Advisory Committee
- Technical Committee
- Organizing Chairs
- Organizing Co-chairs
- Organizing Committee Convener
- Organizing Committee
- Registration Chairs
- Publication Chairs
- Publicity and Sponsorship Chair
- Treasurer and Conference Secretary
- Hospitality and Transport Chair
- Web Chair
- About this Book
- Contents
- About the Editors
- High Performance Computing
- Proposed Memory Allocation Algorithm for NUMA-Based Soft Real-Time Operating System
- Mathematical Modeling of QoS-Aware Fog Computing Architecture for IoT Services
- Analysis of Attention Level of Human Body in Different Forms
- Analytical Survey on Standards of Internet of Things Framework and Platforms
- GIS-Based Model for Optimal Collection and Transportation System for Solid Waste in Allahabad City
- Higher Order Low-Pass Filter Using Single Current Differencing Buffered Amplifier
- Design of Voice-Controlled Smart Wheelchair for Physically Challenged Persons
- Distance-Based IoT Surveillance Alert System
- A Predictive Resource Management Technique in Grid
- Ontology-Based Information Retrieval System for University: Methods and Reasoning
- Methodology to Secure Agricultural Data in IoT
- Docker Containers Versus Virtual Machine-Based Virtualization
- Social IoT-Enabled Emergency Event Detection Framework Using Geo-Tagged Microblogs and Crowdsourced Photographs
- Image Encryption
- Cryptanalysis of a Chaotic Key-Based Image Encryption Scheme
- Image Steganography Using Edge Detection by Kirsch Operator and Flexible Replacement Technique
- Blind RGB Image Steganography Using Discrete Cosine Transformation
- Logistic Map-Based Image Steganography Scheme Using Combined LSB and PVD for Security Enhancement
- Blind Digital Image Watermarking for Copyright Protection Based on Hadamard Transform
- Image Processing
- An Analysis of Various Techniques for Leaf Disease Prediction
- Image Compression Using VQ for Lossy Compression
- Oil Spill Detection Using Image Processing Technique: An Occupational Safety Perspective of a Steel Plant
- Blood Vessel Extraction from Fundus Image
- Wavelet and Pyramid Histogram Features for Image-Based Leaf Detection
- A Comparative Analysis on Currency Recognition Systems for iCu₹e and an Improved Grab-Cut for Android Devices
- A Memory-Efficient Image Compression Method Using DWT Applied to Histogram-Based Block Optimization
- Forensic Image Reconstruction Based on Efficient Morphological Operational Model
- Classification of Geographical Features from Satellite Imagery
- 1 Introduction
- 2 Implementation Steps
- 2.1 Algorithm x1 : Sum of Red-Green-Blue (RGB) Pixels
- 2.2 Algorithm x2 : White-Green-Red (WGR) Pixels Count
- 2.3 Algorithm x3 : Texture (Tex) Differences
- 2.4 Algorithm x4 : White Rectangle Count (WRC)
- 2.5 Algorithm x5 : River Pixel Count (RPC)
- 2.6 Combination of x1, x2, x3, x4, and x5 Algorithms
- 2.7 Training of Neural Networks
- 3 Experimental Results
- 4 Conclusion
- References
- Automated Detection of Glaucoma Using Image Processing Techniques
- DWT and DCT-Based Compressed Image Transmission Over AWGN Using C-QAM
- Detection and Identification of Downy Mildew Diseased Leaf of Cucurbita Pepo (Pumpkin) Using Digital Image Processing
- A Survey on Rice Plant Disease Identification Using Image Processing and Data Mining Techniques
- A Survey on Comparison Analysis Between EEG Signal and MRI for Brain Stroke Detection
- Natural Language Processing
- Enhancing Call Center Operations Through Semantic Voice Analysis
- Integration of Wit API with Python Coded Terminal Bot
- An Approach of Splitting Upsarg and Pratyay of Sanskrit Word Using Paninian Framework of Sanskrit Grammar
- Collaborative Ranking-Based Text Summarization Using a Metaheuristic Approach
- Chemical Reaction Optimization Algorithm for Word Detection Using Pictorial Structure
- Sentiment Prediction Based on Lexical Analysis Using Deep Learning
- An Efficient Sentiment Mining Approach on Social Media Networks
- A Crowdsource-Based Approach for Preparing Bangla POS Tagged Corpus
- A Study of Feature Extraction Techniques for Sentiment Analysis
- Sentence-Based Topic Modeling Using Lexical Analysis
- Anatomy of Preprocessing of Big Data for Monolingual Corpora Paraphrase Extraction: Source Language Sentence Selection
- Parallel Frequent Pattern Mining on Natural Language-Based Social Media Data
- Telecommunication and Computer Network
- Adaptive Smart Antenna Using Microstrip Array for Cellular Network
- Social Energy-Based Techniques in Delay-Tolerant Network
- The Cryptographic Properties of Feistel Network-Based Quasigroups
- Studies of Optimization of Throughput: Combining Receiver Diversity in Hybrid ARQ Scheme Over Fading Channel
- Gray Hole and Cooperative Attack Prevention Protocol for MANETs
- Threat Intelligence Analysis of Onion Websites Using Sublinks and Keywords
- Controllability of Network: Identification of Controller Genes in a Gene–Gene Interaction Network
- Analysing MPLS Performance by SDN
- Serving New Interest in Named Data Network
- A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT
- Reduction of Web Latency: An Integrated Proxy Prefetch-Cache System Framework
- Disease Prediction on the Basis of SNPs
- Temporal Signature Mining for Network Intrusion Detection Using TEMR
- High-Capacity Downlink for Millimeter Wave Communication Network Architecture
- Wireless Communication
- Review on Intrigue Used for Caching of Information in View of Information Density in Wireless Ad Hoc Network
- Secure Encryption in Wireless Body Sensor Networks
- An Effective Privacy-Preserving Reputation Scheme for Mobile Crowdsensing
- 1 Introduction
- 2 Related Work
- 3 Preliminaries and Threat Models
- 4 The Proposed Scheme
- 5 Security and Privacy Analysis
- 5.1 Server Cannot Correlate the Participant Identity with His Original Sensing Report
- 5.2 Participants Cannot Collude Together to Give Each Other Positive Feedback Without Being Detected
- 5.3 Attempt to Alter the Computed Reputation or Report Incorrect Information on Behalf of Another Participant
- 5.4 Replay and Sybil Attacks
- 5.5 Voting Process Subject to Bad Mouthing Attack
- 5.6 On–Off Attack and Conflicting Behavior Attack
- 6 Conclusion
- References
- Quantum PSO Algorithm for Clustering in Wireless Sensor Networks to Improve Network Lifetime
- Secure Remote Patient Monitoring with Location-Based Services
- Implementation of Mobility-Assisted Uncertainty Reduction Based on MCR-O Scheme in MANET
- IoT-Based Robot with Wireless and Voice Recognition Mode
- Development of Joint Intelligent Millimeter wave Sensing and Communication
- Wi-Fi Optimization Using Parabolic Reflector and Blocking Materials in Intrusion Detection Systems
- Lifetime and Transport Delay Optimization in Presence of Delay in WSN
- Types of Sensor and Their Applications, Advantages, and Disadvantages
- 1 Introduction
- 2 Property-Based Classification
- 2.1 Optical Sensors
- 2.2 Temperature Sensors
- 2.3 Position Sensors
- 2.4 Image Sensors
- 2.5 Humidity Sensors
- 2.6 Radar Sensors
- 2.7 Laser Sensors
- 2.8 Infrared Sensors
- 2.9 Ultrasonic Sensors
- 2.10 Motion Sensors
- 2.11 Touch Sensors
- 2.12 Proximity Sensors
- 2.13 Acoustic and Sound Sensors
- 2.14 Pressure Sensors
- 2.15 Electric and Magnetic Sensors
- 3 Conclusion
- References
- Mamdani and Sugeno Fuzzy Inference Systems’ Comparison for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks
- Machine Learning
- A Novel Transfer Learning-Based Missing Value Imputation on Discipline Diverse Real Test Datasets—A Comparative Study with Different Machine Learning Algorithms
- Machine Learning in Astronomy: A Case Study in Quasar-Star Classification
- A Supervised Method to Find the Relevance of Extracted Keywords Using Deep Learning Approaches
- An Efficient Traffic Sign Recognition Approach Using a Novel Deep Neural Network Selection Architecture
- Kohonen’s Self-organizing Map Optimizing Prediction of Gene Dependency for Cancer Mediating Biomarkers
- Key Feature Extraction and Machine Learning-Based Automatic Text Summarization
- Prediction of Gold Price Movement Using Geopolitical Risk as a Factor
- Author Index