Rising Threats in Expert Applications and Solutions Proceedings of FICR TEAS 2020 1st Edition by Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel Tavares – Ebook PDF Instant Download/Delivery: 9811560145, 9789811560149
Full download Rising Threats in Expert Applications and Solutions Proceedings of FICR TEAS 2020 1st Edition after payment
Product details:
ISBN 10: 9811560145
ISBN 13: 9789811560149
Author: Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Rosalina Babo, Zdzislaw Polkowski, João Manuel R. S. Tavares
This book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2020, held at IIS University Jaipur, Rajasthan, India, on January 17–19, 2020. Featuring innovative ideas from researchers, academics, industry professionals and students, the book covers a variety of topics, including expert applications and artificial intelligence/machine learning; advanced web technologies, like IoT, big data, and cloud computing in expert applications; information and cybersecurity threats and solutions; multimedia applications in forensics, security and intelligence; advances in app development; management practices for expert applications; and social and ethical aspects of expert applications in applied sciences.
Table of contents:
- Sentiment Analysis on E-Learning Using Machine Learning Classifiers in Python
- Assessment of Needless Code in a Program
- Query Caching Technique Over Cloud-Based MapReduce System: A Survey
- Fuzzy K-Means Clustering in Measuring Course Outcome Attainment System for Higher Educational Institutes
- A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment
- An Implementation of Privacy Preserving “IF THEN ELSE” Rules for Vertically Partitioned Data
- An Essential E-Governance Framework for Knowledge Discovery
- Vulnerability and Mitigation Strategies for Secure Expert Systems
- Developing a Quality Model to Study the Impact of Variability Over the Reusability and Maintainability of Software Product Line Variability Models
- Chunker for Gujarati Language Using Hybrid Approach
- A Novel User Authentication Protocol Using Biometric Data for IoT Networks
- Comparative Study of Different Machine Learning Techniques in the Diagnosis of Dementia
- Automated Voter System by Using Fingerprint and Offline Data Set with Texture Image Processing
- A Hybrid Cluster and PCA-Based Framework for Heart Disease Prediction Using Logistic Regression
- A Deep Learning Approach of Collaborative Filtering to Recommender System with Opinion Mining
- Analytical Design of the DIS Architecture: The Hybrid Model
- A Model for Effective Software Testing in Cloud Environment
- Heuristic Expert Evaluation of e-Learning Application
- Image Query-Based Tablet Identification System by Examining Various Text Recognition Classifiers
- A Survey of Load Balanced Job Scheduling Schemes in Cloud Computing
- Analysis of Algorithms K-Means and Apriori for Data Mining
- Augmenting Cloud Service Discovery Using Ontology
- Performance Analysis of AES, Blowfish and Rijndael: Cryptographic Algorithms for Audio
- A Secured Cloud-Based Framework for Image Processing Using Ant Colony Optimization
- Chili Plant Leaf Disease Detection Using SVM and KNN Classification
- A Review on Image Segmentation
- Ensemble Feature Extraction-Based Detection of Abnormal Mass Present in Medical Images Using Machine Learning
- Classification of Image Steganography in Substitution Technique
- Challenges and Issues in the Existing Methodology for Dynamic Data Capturing of Ontology
- Contextual Information Retrieval Search Engine Challenges
- A Review on American Sign Language Character Recognition
- Enhanced Image Compression Technique to Improve Image Quality for Mobile Applications
- Knowledge-Based Recommendation System for Online Business Using Web Usage Mining
- A Load-Balancing User Management Approach to Prevent DDoS Attack at Cloud Network
- Design, Development, and Implementation of an Image Steganography Algorithm for Encrypted (Using AES) and Non-encrypted Text into an Image
- Predicting the Sales Conversion Rate of Car Insurance Promotional Calls
- Analyzing Desktop and Mobile Application for Text to Speech Conversation
- Revisiting Cloud Security Attacks: Credential Attack
- The Rising of Blockchain Technology and Its Adoption in India
- Analysis of a High Competent Feedforward FFT Architecture
- An Efficient Fault-Tolerant Mechanism to Ameliorate Performance in Wireless Sensor Networks
- Past to Future of Network Security with AI
- Internet of Things for Vehicular Pollution Monitoring and Controlling System
- Progressive Growth of ETL Tools: A Literature Review of Past to Equip Future
- Understanding the Role of Artificial Neural Networks in the Prediction of Mental Health Diseases
- Grey Box Approach for Mobile Application Testing
- Comparative Study of Clustering for Intrusion Detection in Machine Learning
- Financial Knowledge Prediction from Artificial Neural Network (ANN)
- Template-Based Transliteration of Braille Character to Gujarati Text—The Application
- Building a Machine Learning Model for Unstructured Text Classification: Towards Hybrid Approach
- A Study of Behavioral Biases in Investment Decisions Using Artificial Neural Network
- Parallel Ants Colony Optimization Algorithm for Dimensionality Reduction of Scientific Documents
- Effective and Efficient Smart Waste Management System for the Smart Cities Using Internet of Things (IoT): An Indian Perspective
- Analysis of Augmented Course Delivery and Assessment of Undergraduate Computer Engineering Programming Courses with the Use of ICT
- Analysis of Value-Based Academic Accomplishment Through Prominent Management Techniques
- KFCM-Based Direct Marketing
- Multiresolution Adaptive Threshold Based Segmentation of Real-Time Vision-Based Database for Human Motion Estimation
- The Design Perspective of the Structures Based on k-d Tree
- Cervical Cell Cytoplasm Extraction Algorithm
- Analysis of the Influence of Photo Manipulation on Creative Advertising
- Composite Framework of Artificial Neural Network and Decision Tree Algorithm for Prediction of Fraudulent Firm Using Audit Dataset
- Feature Selection and Extraction for Dogri Text Summarization
- Data Mining and Machine Learning Techniques for Malware Detection
- IoTeST: IoT-Enabled Smart Tourism—Shaping the Future of Tourism
- A Recommendation Perspective for Modeling Drug-Target Interaction Predictions Using Network-Based Approaches
- ESDBSCAN: Enhanced Shuffling Based Density Clustering
- Docker Security Analysis Mechanism with Linux Platform
- Reproducible Academic Writing and Interactive Data Visualization Using R Markdown (R Programming Flex-Dashboard: Flex_Dashboard Packages)
- A New Methodology on Sentiment Analysis
- Comparative Analysis of Various Techniques Used to Obtain a Suitable Summary of the Document
- Computational and Performance Aspects of Face Recognition Method (HOPFALRB)
- An Approach Toward Information Retrieval Through Machine Learning and Its Algorithms: A Review
- Person Fall Detection System Using Arduino UNO, SIM900A, and NEO6
- Artificial Neural Network Approach for Modeling Cu(II) and Cr(VI) Ion Biosorption from Synthetic Textile Effluent Using Three Low-Cost Biosorbents
- The Film Industry Leaps into Artificial Intelligence: Scope and Challenges by the Filmmakers
- Blockchain Technology for Healthcare Data
- Strengthening Pix CAPTCHA Using Trainlm Function in Backpropagation
- Reliability and Security Analysis of VoIP Communication Systems
- Analog Front-End Design and Construction for ECG Monitoring System
- Comparative Study of Prewitt and Canny Edge Detector Using Image Processing Techniques
- Terrain Index Analysis of Bardoli Taluka from Geo-Spatial Dimensions
- Performance Evaluation of VLSI Implemented WSN Algorithms
- SpSiSb: The Technique to Identify Forgery in Legal Handwritten Documents
- Prediction of Prediabetes, No Diabetes and Diabetes Mellitus-2 Using Pattern Recognition
- Identification of Educationally Backward Countries in Primary, Secondary and Tertiary Level Students by Using Different Classification Techniques
- Phishing Website Prediction by Using Cuckoo Search as a Feature Selection and Random Forest and BF-Tree Classifier as a Classification Method
- Analysis of the Effect of Topic Modeling on General Corpus Mixed with In-Domain Text for English-Hindi Translation
- Detection and Counting of Microaneurysm for Early Diagnosis of Maculopathy
- A Study on Deep Learning in Neurodegenerative Diseases and Other Brain Disorders
People also search:
rising cyber security threats
threat exposure
risk threat opportunity
application threat modeling example
Tags: Vijay Singh Rathore, Nilanjan Dey, Vincenzo Piuri, Threats