語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Future Data and Security Engineering...
~
Dang, Tran Khanh.
Future Data and Security Engineering = 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Future Data and Security Engineering/ edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui.
其他題名:
6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
其他作者:
Dang, Tran Khanh.
面頁冊數:
XVI, 748 p. 416 illus., 186 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Application software. -
電子資源:
https://doi.org/10.1007/978-3-030-35653-8
ISBN:
9783030356538
Future Data and Security Engineering = 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
Future Data and Security Engineering
6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /[electronic resource] :edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui. - 1st ed. 2019. - XVI, 748 p. 416 illus., 186 illus. in color.online resource. - Information Systems and Applications, incl. Internet/Web, and HCI ;11814. - Information Systems and Applications, incl. Internet/Web, and HCI ;9149.
Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
This book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering.
ISBN: 9783030356538
Standard No.: 10.1007/978-3-030-35653-8doiSubjects--Topical Terms:
528147
Application software.
LC Class. No.: QA76.76.A65
Dewey Class. No.: 005.7
Future Data and Security Engineering = 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
LDR
:07177nam a22004215i 4500
001
1004954
003
DE-He213
005
20200701105058.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030356538
$9
978-3-030-35653-8
024
7
$a
10.1007/978-3-030-35653-8
$2
doi
035
$a
978-3-030-35653-8
050
4
$a
QA76.76.A65
072
7
$a
UNH
$2
bicssc
072
7
$a
COM032000
$2
bisacsh
072
7
$a
UNH
$2
thema
072
7
$a
UDBD
$2
thema
082
0 4
$a
005.7
$2
23
245
1 0
$a
Future Data and Security Engineering
$h
[electronic resource] :
$b
6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedings /
$c
edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XVI, 748 p. 416 illus., 186 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
11814
505
0
$a
Invited Keynotes -- Individual Privacy Supporting Organisational Security -- A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining -- Advanced Studies in Machine Learning -- Machine Learning Based Monitoring of the Pneumatic Actuators’ Behavior Through Signal Processing Using Real-world Data Set -- A Comparative Study of the Use of Coresets for Clustering Large Datasets -- Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines -- Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update -- A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking -- A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs -- Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network -- An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese -- Advances in Query Processing and Optimization -- Computing History-Dependent Schedules for Processes with Temporal Constraints -- Finding All Minimal Maximum Subsequences in Parallel -- OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering -- Big Data Analytics and Distributed Systems -- Framework for Peer-to-Peer Data Sharing over Web Browsers -- Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case -- Lower Bound on Network Diameter for Distributed Function Computation -- Deep Learning and Applications -- A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification -- Age and Gender Estimation of Asian Faces using Deep Residual Network -- Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform -- Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps -- Cloud Data Management and Infrastructure -- On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter -- Dynamic Data Management Strategy on Cloud Network by Fog Computing Model -- Openness in Fog Computing for the Internet of Things -- A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs -- Security and Privacy Engineering -- A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes -- A Visual Model for Privacy Awareness and Understanding in Online Social Networks -- A Method to Enhance the Security Capability of Python IDE -- Studying Machine Learning Techniques for Intrusion Detection Systems -- Authentication and Access Control -- Enforcing Access Controls in IoT Networks -- Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications -- Adventures in the Analysis of Access Control Policies -- Blockchain and Cybersecurity -- Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors -- MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web -- Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency -- Emerging Data Management Systems and Applications -- GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning -- Visualization of Medical Images Data Based on Geometric Modeling -- Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains -- Exploiting Social Data to Enhance Web Search -- Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition -- Energy Saving Solution for Air Conditioning Systems -- Short papers: Security and Data Engineering -- Identifying Minimum Set of Persons That Influenced by a Promotion Campaign -- Facial Expression Recognition On Static Images -- Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange -- Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students -- Towards an Improvement of Complex Answer Retrieval System -- Keyword-search Interval-query Dynamic Symmetric Searchable Encryption -- The Implicit Effect of Items Rating on Recommendation System -- Counting People Using Images from Two Low Cost Webcams -- Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning -- Deep Learning Approach for Receipt Recognition -- Efficient CNN Models for Beer Bottle Cap Classification Problem -- An Approach for Plagiarism Detection in Learning Resources -- Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network -- An Empirical Study on Fabric Defect Classification using Deep Network Models.
520
$a
This book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering.
650
0
$a
Application software.
$3
528147
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Data protection.
$3
557764
650
0
$a
Optical data processing.
$3
639187
650
1 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
671334
700
1
$a
Dang, Tran Khanh.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1069429
700
1
$a
Küng, Josef.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1257033
700
1
$a
Takizawa, Makoto.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
682118
700
1
$a
Bui, Son Ha.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1298458
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030356521
776
0 8
$i
Printed edition:
$z
9783030356545
830
0
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9149
$3
1253558
856
4 0
$u
https://doi.org/10.1007/978-3-030-35653-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入