語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Security and Computer Science ...
~
Bhuiyan, Touhid.
Cyber Security and Computer Science = Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Security and Computer Science/ edited by Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali.
其他題名:
Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /
其他作者:
Ali, Md. Asraf.
面頁冊數:
XVII, 745 p. 379 illus., 252 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computing Milieux. -
電子資源:
https://doi.org/10.1007/978-3-030-52856-0
ISBN:
9783030528560
Cyber Security and Computer Science = Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /
Cyber Security and Computer Science
Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /[electronic resource] :edited by Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali. - 1st ed. 2020. - XVII, 745 p. 379 illus., 252 illus. in color.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,3251867-8211 ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based On ISO/IEC-27001 -- Performance Optimization of Layered SignatureBased Intrusion Detection System Using Snort -- Designing A New Hybrid Cryptographic Model RP-DMAC: Receiver Pivotal Directional MAC with Multichannel for IoT Based WSN -- Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization -- Analysis of Agent-based & Agent-less Sandboxing for Dynamic Malware Analysis -- A Large Scale Investigation to Identify the Pattern of Permissions in Obfuscated Android Malwares -- A New 8-Directional Pixel Selection Technique of LSB -- An Enhancement of Kerberos Using BiometricTemplate and Steganography -- A Vulnerability Detection Framework for CMS Using Port Scanning Technique -- A Risk Based Analysis on Linux Hosted E-Commerce -- T-way Strategy for (Sequence less Input Interaction) -- Test Case Generation Inspired by Fish Swarm Searching Algorithm -- Chemical Reaction Optimization for Solving Resource Constrained Project Scheduling Problem -- A Modified Particle Swarm Optimization for Autonomous UAV Path Planning in 3D Environment -- A New Approach to Solve Quadratic Equation Using Genetic Algorithm -- Link Prediction on Networks Created from UEFA European Competitions -- Sustainable Rice Production Analysis and Forecasting Rice Yield Based on Weather Circumstances Using Data Mining Techniques for Bangladesh -- Bangladeshi Stock Price Prediction and Analysis with Potent Machine Learning Approaches -- Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction -- Prevalence of Machine Learning Techniques in Software Defect Prediction -- Software Process Improvement based on Defect Prevention using Capability and Testing Model Integration in Extreme Programming -- Predicting Fans’ FIFA World Cup Team Preference from Tweets -- Machine Learning Based Recommendation Systems for the Mode of Childbirth -- EMG-based Classification of Forearm Muscles in Prehension Movements: Performance Comparison of Machine Learning Algorithms -- Prediction Model for Self-Assessed Health Status in Flood-Prone Area of Bangladesh -- Machine learning techniques for predicting surface EMG activities on upper limb muscle: A systematic review -- Retrospective Analysis of Hematological Cancer by Correlating Hematological Malignancy with Occupation, Residence, Associated Infection, Knowledge and Previous Cancer History in Relatives -- Performance Comparison of Early Breast Cancer Detection Precision Using AI and Ultra-wideband (UWB) Bio-Antennas -- Processing with Patients’ Statement: An Advanced Disease Diagnosis Technique -- Non-Invasive Diabetes Level Monitoring System using Artificial Intelligence and UWB -- An Investigation and Evaluation of N-Gram, TF-IDF and Ensemble Methods in Sentiment Classification -- Aspect Based Sentiment Analysis In Bangla Dataset Based On Aspect Term Extraction -- Development of a Tangent Based Robust Speech Feature Extraction Model -- Semantic Sentence Modeling for Learning Textual Similarity Exploiting LSTM -- A Study of fastText Word Embedding Effects in Document Classification in Bangla Language -- A Hybrid Approach Towards Two Stage Bengali Question -- Classification Utilizing Smart DataBalancing Technique -- An Empirical Framework to Identify Authorship from Bengali Literary Works -- Supervised Machine Learning for Multi-Label Classification of Bangla Articles -- Ulcer Detection in Wireless Capsule Endoscopy Using Locally Computed Features -- Human Age Estimation And Gender Classification Using Deep Conolutional Neural Network -- Diagnosis of Acute Lymphoblastic Leukemia from Microscopic Image of Peripheral Blood Smear Using Image Processing Technique -- Analysis of Software Defined Wireless Network with IP Mobility in Multiple Controllers Domain -- An SDN Based Distributed IoT Network with NFV Implementation for Smart Cities -- On the Energy Efficiency and Performance of DelayTolerant -- Conic Programming Approach to Reduce Congestion -- Sightless Helper: An Interactive Mobile Application for Blind Assistance and Safe Navigation -- IoT Based Smart Health Monitoring System for Diabetes Patients using Neural Network -- Parking Recommender System Using Q-Learning and Cloud Computing -- Advanced Artistic Style Transfer Using Deep Neural Network -- Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets -- Efficient Query Processing for Multidimensional Data Cubes -- Proposal of a Highly Birefringent Bow-Tie Photonic Crystal Fiber for Nonlinear Applications -- A Bioinformatics Analysis to Identify Hub Genes from Protein-Protein Interaction Network for Cancer and Stress -- Innovative Automation Algorithm in Micro-multinational Data-entry Industry -- Classification of Succulent Plant using Convolutional Neural Network -- Smoke Detection from Different Environmental Conditions using Faster R-CNN Approach Based on Deep Neural Network -- Convolutional Neural Networks Based Bengali Handwritten Character Recognition -- Detection and Classification of Road Damage Using R-CNN and Faster R-CNN: A Deep Learning Approach. .
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.
ISBN: 9783030528560
Standard No.: 10.1007/978-3-030-52856-0doiSubjects--Topical Terms:
669921
Computing Milieux.
LC Class. No.: QA76.76.A65
Dewey Class. No.: 004
Cyber Security and Computer Science = Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /
LDR
:07737nam a22004095i 4500
001
1029100
003
DE-He213
005
20200729101707.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030528560
$9
978-3-030-52856-0
024
7
$a
10.1007/978-3-030-52856-0
$2
doi
035
$a
978-3-030-52856-0
050
4
$a
QA76.76.A65
072
7
$a
UB
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UB
$2
thema
082
0 4
$a
004
$2
23
245
1 0
$a
Cyber Security and Computer Science
$h
[electronic resource] :
$b
Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings /
$c
edited by Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVII, 745 p. 379 illus., 252 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
325
505
0
$a
Framework for the Optimal Design of an Information System to Diagnostic the Enterprise Security Level and Management the Information Risk Based On ISO/IEC-27001 -- Performance Optimization of Layered SignatureBased Intrusion Detection System Using Snort -- Designing A New Hybrid Cryptographic Model RP-DMAC: Receiver Pivotal Directional MAC with Multichannel for IoT Based WSN -- Android Malware Detection by Machine Learning Apprehension and Static Feature Characterization -- Analysis of Agent-based & Agent-less Sandboxing for Dynamic Malware Analysis -- A Large Scale Investigation to Identify the Pattern of Permissions in Obfuscated Android Malwares -- A New 8-Directional Pixel Selection Technique of LSB -- An Enhancement of Kerberos Using BiometricTemplate and Steganography -- A Vulnerability Detection Framework for CMS Using Port Scanning Technique -- A Risk Based Analysis on Linux Hosted E-Commerce -- T-way Strategy for (Sequence less Input Interaction) -- Test Case Generation Inspired by Fish Swarm Searching Algorithm -- Chemical Reaction Optimization for Solving Resource Constrained Project Scheduling Problem -- A Modified Particle Swarm Optimization for Autonomous UAV Path Planning in 3D Environment -- A New Approach to Solve Quadratic Equation Using Genetic Algorithm -- Link Prediction on Networks Created from UEFA European Competitions -- Sustainable Rice Production Analysis and Forecasting Rice Yield Based on Weather Circumstances Using Data Mining Techniques for Bangladesh -- Bangladeshi Stock Price Prediction and Analysis with Potent Machine Learning Approaches -- Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction -- Prevalence of Machine Learning Techniques in Software Defect Prediction -- Software Process Improvement based on Defect Prevention using Capability and Testing Model Integration in Extreme Programming -- Predicting Fans’ FIFA World Cup Team Preference from Tweets -- Machine Learning Based Recommendation Systems for the Mode of Childbirth -- EMG-based Classification of Forearm Muscles in Prehension Movements: Performance Comparison of Machine Learning Algorithms -- Prediction Model for Self-Assessed Health Status in Flood-Prone Area of Bangladesh -- Machine learning techniques for predicting surface EMG activities on upper limb muscle: A systematic review -- Retrospective Analysis of Hematological Cancer by Correlating Hematological Malignancy with Occupation, Residence, Associated Infection, Knowledge and Previous Cancer History in Relatives -- Performance Comparison of Early Breast Cancer Detection Precision Using AI and Ultra-wideband (UWB) Bio-Antennas -- Processing with Patients’ Statement: An Advanced Disease Diagnosis Technique -- Non-Invasive Diabetes Level Monitoring System using Artificial Intelligence and UWB -- An Investigation and Evaluation of N-Gram, TF-IDF and Ensemble Methods in Sentiment Classification -- Aspect Based Sentiment Analysis In Bangla Dataset Based On Aspect Term Extraction -- Development of a Tangent Based Robust Speech Feature Extraction Model -- Semantic Sentence Modeling for Learning Textual Similarity Exploiting LSTM -- A Study of fastText Word Embedding Effects in Document Classification in Bangla Language -- A Hybrid Approach Towards Two Stage Bengali Question -- Classification Utilizing Smart DataBalancing Technique -- An Empirical Framework to Identify Authorship from Bengali Literary Works -- Supervised Machine Learning for Multi-Label Classification of Bangla Articles -- Ulcer Detection in Wireless Capsule Endoscopy Using Locally Computed Features -- Human Age Estimation And Gender Classification Using Deep Conolutional Neural Network -- Diagnosis of Acute Lymphoblastic Leukemia from Microscopic Image of Peripheral Blood Smear Using Image Processing Technique -- Analysis of Software Defined Wireless Network with IP Mobility in Multiple Controllers Domain -- An SDN Based Distributed IoT Network with NFV Implementation for Smart Cities -- On the Energy Efficiency and Performance of DelayTolerant -- Conic Programming Approach to Reduce Congestion -- Sightless Helper: An Interactive Mobile Application for Blind Assistance and Safe Navigation -- IoT Based Smart Health Monitoring System for Diabetes Patients using Neural Network -- Parking Recommender System Using Q-Learning and Cloud Computing -- Advanced Artistic Style Transfer Using Deep Neural Network -- Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets -- Efficient Query Processing for Multidimensional Data Cubes -- Proposal of a Highly Birefringent Bow-Tie Photonic Crystal Fiber for Nonlinear Applications -- A Bioinformatics Analysis to Identify Hub Genes from Protein-Protein Interaction Network for Cancer and Stress -- Innovative Automation Algorithm in Micro-multinational Data-entry Industry -- Classification of Succulent Plant using Convolutional Neural Network -- Smoke Detection from Different Environmental Conditions using Faster R-CNN Approach Based on Deep Neural Network -- Convolutional Neural Networks Based Bengali Handwritten Character Recognition -- Detection and Classification of Road Damage Using R-CNN and Faster R-CNN: A Deep Learning Approach. .
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
1 4
$a
Computer Applications.
$3
669785
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computers.
$3
565115
650
0
$a
Application software.
$3
528147
700
1
$a
Ali, Md. Asraf.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1325715
700
1
$a
Rahman, Md. Mostafijur.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1325714
700
1
$a
Bhuiyan, Touhid.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1075154
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030528553
776
0 8
$i
Printed edition:
$z
9783030528577
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-030-52856-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入