توضیحاتی در مورد کتاب Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems)
نام کتاب : Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems)
عنوان ترجمه شده به فارسی : مجموعه مقالات کنفرانس بین المللی محاسبات هوشمند و امنیت سایبری: آینده نگری استراتژیک، چالش های امنیتی و نوآوری (SMARTCYBER 2020): 149 (یادداشت های سخنرانی در شبکه ها و سیستم ها)
سری :
نویسندگان : Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar
ناشر : Springer Singapore
سال نشر : 2020
تعداد صفحات : 376
ISBN (شابک) : 981157989X , 9789811579899
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 14 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Contents
Editors and Contributors
Proposal of Pseudo-Random Number Generators Using PingPong256 and Chaos Maps
1 Introduction
2 Background
2.1 PingPong256
2.2 Logistic Map
3 Proposal main model
3.1 Two logistic Maps and XOR Operations.
3.2 Output Change According to Clock Control Function
3.3 R-Factor Relationship in Logistic Map
4 Conclusions
References
Early Detection of Alzheimer’s Disease from 1.5 T MRI Scans Using 3D Convolutional Neural Network
1 Introduction
2 Data Collection and Preprocessing
2.1 Data Collection
2.2 Data Preprocessing
3 Materials and Methods
3.1 3D Convolutional Neural Networks
3.2 Hypothesis and Training Procedure
3.3 Model Optimization Hyperparameters and Loss
4 Results
5 Discussion
6 Conclusion
References
Graph Theory-Based Numerical Algorithm to Secure WSAN Network with Low Delay and Energy Consumption
1 Introduction
2 Wireless Sensor and Actuator Network Cooperation Algorithm
2.1 Distribution Frame Algorithm
2.2 Routing Framework Algorithms and Real-time Collaboration
2.3 Topology Maintenance Algorithms
2.4 Improved Network SA Collaboration Algorithms
3 Simulation Result and Analysis of Cut-Point Detection Algorithm
4 Conclusion
References
Decentralized Privacy Protection Approach for Video Surveillance Service
1 Introduction
2 The Privacy Problem in Video Surveillance Service
2.1 Related Works
2.2 Accessibility to Video Stream
2.3 Complexity of Compound Identity
3 The Privacy Problem in Video Surveillance Service
3.1 Asset Identity
3.2 Protocol
3.3 Data Transaction
3.4 Tracing Transaction
4 Conclusion
References
Exploring Generative Adversarial Networks for Entity Search and Retrieval
1 Introduction
2 Related Work
3 Generative Adversarial Networks for Entity Retrieval
3.1 IRGAN
3.2 WGAN
4 Experiment
4.1 DBpedia-Entity Test Collection
4.2 Indexing and Retrieval
4.3 Reranking
5 Results
5.1 GANs and Ranking Models
6 Conclusion
References
Secure Marine Communication Under Distributed Slotted MAC
1 Introduction
2 Sea Ad Hoc Network (SANET) Environment
3 Maritime Wireless Communications
4 Proposed Model (Sh-ANET)
5 Comparison of Parameters and Propagation Environment
6 Simulation Result and Analysis
7 Conclusion
References
IoT Technology with Marine Environment Protection and Monitoring
1 Introduction
2 Internet of Things
3 Requirements for Maritime Wireless Communications
3.1 Ship Ad Hoc Network Structural Design in Shore:
3.2 Ship Ad Hoc Network Structural Design in Ocean:
4 Ship Area Network Model
5 IoT Common Later Architectures for Marine Environment Protection and Monitoring
6 Conclusion
References
Automatic Detection of Security Misconfigurations in Web Applications
1 Introduction
2 Overview of Web Applications
2.1 Common Web Application Vulnerabilities
2.2 Security Misconfigurations in Web Applications
2.3 Web Application Security Testing (AST)
3 Our Proposed Approach
4 Experimental Evaluation
5 Related Work
6 Conclusion
References
Real-Time Access Control System Method Using Face Recognition
1 Introduction
2 Related Works
3 Face Recognition System
4 Face Verification Method
5 Conclusion
References
Towards a Sentiment Analyser for Low-resource Languages
1 Introduction
2 Literature Study
3 Research Methodology
4 Result
5 Conclusion
References
DGA Method Based on Fuzzy for Determination of Transformer Oil Quality
1 Introduction
2 Methods
2.1 Dissolved Gas Analysis (DGA)
2.2 Fuzzy Logic
3 Results and Analysis
3.1 DGA Result
3.2 Fuzzy Determination
3.3 Fuzzification Sample
4 Conclusion
References
Deep Learning-Based Apple Defect Detection with Residual SqueezeNet
1 Introduction
2 Experimental Information
2.1 Apple Collection
3 The Proposed Method
3.1 Residual SqueezeNet Architecture
3.2 The Hardware and Software
4 Experimental Result
5 Conclusion
References
Smart Parking Management System in Shopping Malls
1 Introduction
1.1 Case 1: The Baltimore/Washington Airport Car Park
1.2 Case 2: Plaza Singapore Car Park System
1.3 The Comparison of Parking Guidance System in Car Park Case Studies
2 Materials and Methods
2.1 Advantages of Proposed System
2.2 Modules
3 Results and Discussion
3.1 Admin Panel
3.2 Front-End
4 Conclusion
References
Blockchain-Based Solution for Effective Employee Management
1 Introduction
2 Blockchain for Employee Performance
2.1 Human Resources Department
2.2 Marketing Department
2.3 Finance Departement
3 How to Work Blockchain in Improving the Quality of Employee Performance
4 Conclusion
References
Implementation of Motorcycle Monitoring Using Bluetooth with an Android-Based Microcontroller Using Arduino
1 Introduction
2 Architecture Design
2.1 Motor Starter System Components
2.2 Design of Blocks Using App Inventor
3 Result and Discussion
3.1 Bluetooth Connectivity Distance Testing to Turn on the Engine on a Motorcycle
3.2 Bluetooth Connectivity Distance Testing to Turn off the Engine on a Motorcycle
4 Conclusion
References
A Comparative Analysis of Data Mining Analysis Tools
1 Introduction
2 Literature
3 Data Mining Tools
4 Evaluation of Data Mining Tools
5 Result and Conclusion
References
Apple Defects Detection Based on Average Principal Component Using Hyperspectral Imaging
1 Introduction
2 Sample Data Collection
2.1 Apple Collection
2.2 Hyperspectral Image Acquisition
3 The Proposed Method
3.1 Correction and Normalization of HSI
3.2 Principal Component Analysis for Different Regions
3.3 PCs Selection from Different Region and Average
3.4 Defect Detection by Threshold
3.5 Labeling of Apple Surface Area and Region of Interest (ROI) Selection
3.6 Labeling of Apple Surface Area and ROI Selection
4 Experimental Result and Analysis
4.1 PC Analysis and Average Image
4.2 PC Image in the AB-Region
4.3 PC in the VIS Spectral Region
4.4 PC in the NIR Spectral Region
4.5 Selection of Average PC Image in VIS-/NIR-Region
4.6 Detection Result of Defective Apple Sample
4.7 Evaluation and Discussion
5 Conclusion
References
Development of an Information System for the Collection and Processing of Big Data in Construction
1 Introduction
2 Information System Modeling
3 Big Data Processing
4 Information System Implementation
5 Conclusion
References
Genetic Algorithm for Decrypting User’s Personal Information
1 Introduction
2 Process of Genetic Algorithm
3 Experimental Result
4 Conclusion
References
Text File Protection Using Least Significant Bit (LSB) Steganography and Rijndael Algorithm
1 Introduction
2 LSB Steganography and Rijndael Algorithm
3 Related Research
4 Research Methodology
5 Result and Discussion
6 Conclusion
References
Apple Defect Detection Based on Deep Convolutional Neural Network
1 Introduction
2 Sample Data Collection
2.1 Apple Collection
3 The Proposed Method
3.1 Construction of the Dataset
3.2 Construction of the Classifier
3.3 Selection of Proposed Regions
4 Experimental Result
5 Conclusion
References
Satellite Image Segmentation and Classification Using Fuzzy C-Means Clustering and Support Vector Machine Classifier
1 Introduction
2 Proposed Work
3 Results and Discussion
4 Conclusion
References
The Determinants of Internet Financial Reporting for Investor Decision Making: Evidence from Indonesia Companies
1 Introduction
2 Literature Review and Hypothesis Development
3 Research Methods
3.1 Population and Sample
3.2 Operational Definition and Variable Measurement
4 Results and Discussion
5 Conclusion
References
Resource Allocation in the Integration of IoT, Fog, and Cloud Computing: State-of-the-Art and Open Challenges
1 Introduction
2 IoT-Fog-Cloud Architecture
2.1 IoT
2.2 Fog Computing
2.3 Cloud Computing
3 State-of-the-Art of Resource Allocation in IoT-Fog-Cloud
4 Open Challenges and Future Directions
4.1 IoT Device/User’s Context
4.2 Cost
4.3 Business Model
4.4 Dynamic Changes of the IoT-Fog-Cloud Environment
References
The Application of Technology Acceptance Model to Assess the Role of Complexity Toward Customer Acceptance on Mobile Banking
1 Introduction
2 Literature Review and Hypothesis Development
3 Research Methods
3.1 Population and Sample
3.2 Operational Definition and Variable Measurement
4 Results and Discussion
5 Conclusion
References
Exploring the Volatility of Large-Scale Shared Distributed Computing Resources
1 Introduction
2 Motivation and Background Study
3 Result and Discussion
3.1 Volatility Study of Grid Systems
3.2 Microbenchmark Experimental Result
4 Conclusion and Future Work
References
Business Transformations Within Intelligent Eco-Systems
1 Introduction
2 Business Transformation from Industry 4.0 to Industry 5.0
2.1 Business Transformation and Technology Inventions
2.2 Legal Regulations
2.3 Ethical Regulations
2.4 Job Allocation and Decision Making
2.5 Characteristics Guiding Industry 5.0 Development
3 Intelligent Eco-System Business Transformation
4 Conclusion
References
Detection of Network Intrusion and Classification of Cyberattack Using Machine Learning Algorithms: A Multistage Classifier Approach
1 Introduction
2 Literature Survey
3 Materials & Methods
3.1 Dataset Description
3.2 Feature Extraction
3.3 Intrusion Detection
3.4 Intrusion Classification
4 Conclusion
References
Robotic Process Automation Implementation Challenges
1 Introduction
2 RPA Components
2.1 RPA Robots
2.2 RPA Orchestrator
2.3 RPA Studio
3 RPA Advantages and Application Area
4 RPA Challenges
5 Conclusion
Reference
Blockchain Technology to Support Employee Recruitment and Selection in Industrial Revolution 4.0
1 Introduction
2 Blockchain for Recruitment Tool
2.1 The Registration of Prospective Employees
2.2 Administrative Selection of Prospective Employees
2.3 Faster Decision Making
2.4 Placing Employees in the Right Position and Field
3 Conclusion
Reference
Android-Based Online Attendance Application
1 Introduction
2 Research Methodology
3 Result and Discussion
3.1 Application Design
3.2 Entity Relationship Diagram
3.3 Interface Design
3.4 Application Test
4 Conclusion
References
Customer Sentiment Analysis Using Cloud App and Machine Learning Model
1 Introduction
1.1 Background
1.2 Problem Statement
1.3 Motivation
1.4 Existing Work
1.5 Challenges
1.6 Essence of Approach
1.7 Assumptions
1.8 Aim
2 Literature Review
2.1 Gaps in Available Research
3 Materials and Methods
4 Implementation of the System/Methodology
5 Results and Discussions
5.1 Performance Metrics
5.2 Parameter Under Study
5.3 Design Comparisons
5.4 Expected and Obtained Results
6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
References
Mood Enhancer Based on Facial Expression Using Machine Learning and Virtual Assistant Technology—An Android App
1 Introduction
1.1 How Emotion Recognition APIs Work?
1.2 Basic Terminologies
2 Literature Survey
2.1 Image Processing and Feature Extraction
3 Materials and Methods
4 Implementation of the System/Methodology
4.1 The Splash Screen
4.2 The Home Screen
4.3 The Toolbar and Its Menu Options
4.4 The Camera Screen
4.5 The Gallery Selection Screen
5 Results and Discussions
6 Conclusion and Future Work
References
Integrating Complete Locomotive Assistance and IoT-Based Health Care for the Disabled
1 Introduction
1.1 Objective
2 Materials and Methods
3 Detailed Design of the System—Input Output Design
4 Results and Discussion
5 Conclusion
References
Classification of Multiple Steganographic Algorithms Using Hierarchical CNNs and ResNets
1 Introduction
2 Classification of Multiple Steganographic Algorithms
2.1 Using a Single CNN
2.2 Using Hierarchical CNNs
2.3 Using Hierarchical CNNs and ResNets: A Proposed Method
3 Experimental Results
3.1 Using a Single CNN
3.2 Using Hierarchical CNNs
3.3 Using Hierarchical CNNs and ResNets: A Proposed Method
4 Conclusion and Future Work
References
Author Index