語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data Science and Security = Proceedings of IDSCS 2022 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Data Science and Security/ edited by Samiksha Shukla, Xiao-Zhi Gao, Joseph Varghese Kureethara, Durgesh Mishra.
其他題名:
Proceedings of IDSCS 2022 /
其他作者:
Mishra, Durgesh.
面頁冊數:
XX, 507 p. 223 illus., 153 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Mobile and Network Security. -
電子資源:
https://doi.org/10.1007/978-981-19-2211-4
ISBN:
9789811922114
Data Science and Security = Proceedings of IDSCS 2022 /
Data Science and Security
Proceedings of IDSCS 2022 /[electronic resource] :edited by Samiksha Shukla, Xiao-Zhi Gao, Joseph Varghese Kureethara, Durgesh Mishra. - 1st ed. 2022. - XX, 507 p. 223 illus., 153 illus. in color.online resource. - Lecture Notes in Networks and Systems,4622367-3389 ;. - Lecture Notes in Networks and Systems,1.
CoInMPro: Confidential Inference and Model Protection using Secure Multi-Party Computation -- An Improved Face Mask-Aware Recognition System Based on Deep Learning -- Semantically Driven Machine Learning Infused Approach for Tracing Evolution on Software Requirements -- Detecting Dengue Disease using Ensemble Classification Algorithms -- Masked Face Recognition and Liveness Detection using Deep Learning Techniques -- Method of Optimal Threshold Calculation in Case of Radio Equipment Maintenance -- Swarm Intelligence Based Smart City Applications: A Review for Transformative Technology with Artificial Intelligence -- Performance Evaluation of Machine Learning Classifiers for Prediction of Type 2 Diabetes using Stress Related Parameters -- Performance Evaluation of Machine Learning Classifiers for Prediction of Type 2 Diabetes using Stress Related Parameters -- Parametrised Hesitant Fuzzy Soft Multiset for Decision Making -- Some Variations of Domination in Order Sum Graphs -- Emotion Detection using Natural Language Processing and ConvNets -- Analysis and Forecasting of Crude Oil Price Based on Univariate and Multivariate Time Series Approaches -- Deep Learning based Gender Recognition using Fusion of Texture Features from Gait Silhouettes -- Forest Protection by Fire Detection, Alarming, Messaging through IoT, Blockchain and Digital Technologies in Thailand Chiang Mai Forest Range -- On Circulant Completion of Graphs.
This book presents best selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2022), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during 11 – 12 February 2022. The book proposes new technologies and discusses future solutions and applications of data science, data analytics and security. The book targets current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing and cloud computing.
ISBN: 9789811922114
Standard No.: 10.1007/978-981-19-2211-4doiSubjects--Topical Terms:
1211619
Mobile and Network Security.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Data Science and Security = Proceedings of IDSCS 2022 /
LDR
:03613nam a22003975i 4500
001
1088154
003
DE-He213
005
20220701164739.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811922114
$9
978-981-19-2211-4
024
7
$a
10.1007/978-981-19-2211-4
$2
doi
035
$a
978-981-19-2211-4
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Data Science and Security
$h
[electronic resource] :
$b
Proceedings of IDSCS 2022 /
$c
edited by Samiksha Shukla, Xiao-Zhi Gao, Joseph Varghese Kureethara, Durgesh Mishra.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XX, 507 p. 223 illus., 153 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes in Networks and Systems,
$x
2367-3389 ;
$v
462
505
0
$a
CoInMPro: Confidential Inference and Model Protection using Secure Multi-Party Computation -- An Improved Face Mask-Aware Recognition System Based on Deep Learning -- Semantically Driven Machine Learning Infused Approach for Tracing Evolution on Software Requirements -- Detecting Dengue Disease using Ensemble Classification Algorithms -- Masked Face Recognition and Liveness Detection using Deep Learning Techniques -- Method of Optimal Threshold Calculation in Case of Radio Equipment Maintenance -- Swarm Intelligence Based Smart City Applications: A Review for Transformative Technology with Artificial Intelligence -- Performance Evaluation of Machine Learning Classifiers for Prediction of Type 2 Diabetes using Stress Related Parameters -- Performance Evaluation of Machine Learning Classifiers for Prediction of Type 2 Diabetes using Stress Related Parameters -- Parametrised Hesitant Fuzzy Soft Multiset for Decision Making -- Some Variations of Domination in Order Sum Graphs -- Emotion Detection using Natural Language Processing and ConvNets -- Analysis and Forecasting of Crude Oil Price Based on Univariate and Multivariate Time Series Approaches -- Deep Learning based Gender Recognition using Fusion of Texture Features from Gait Silhouettes -- Forest Protection by Fire Detection, Alarming, Messaging through IoT, Blockchain and Digital Technologies in Thailand Chiang Mai Forest Range -- On Circulant Completion of Graphs.
520
$a
This book presents best selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2022), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during 11 – 12 February 2022. The book proposes new technologies and discusses future solutions and applications of data science, data analytics and security. The book targets current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing and cloud computing.
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Data Science.
$3
1174436
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Computer networks—Security measures.
$3
1366173
650
0
$a
Data protection.
$3
557764
650
0
$a
Artificial intelligence—Data processing.
$3
1366684
650
0
$a
Computational intelligence.
$3
568984
700
1
$a
Mishra, Durgesh.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1395316
700
1
$a
Kureethara, Joseph Varghese.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1352267
700
1
$a
Gao, Xiao-Zhi.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1062279
700
1
$a
Shukla, Samiksha.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1353751
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811922107
776
0 8
$i
Printed edition:
$z
9789811922121
830
0
$a
Lecture Notes in Networks and Systems,
$x
2367-3370 ;
$v
1
$3
1267315
856
4 0
$u
https://doi.org/10.1007/978-981-19-2211-4
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入