Advances in data sciences, security and applications : proceedings of ICDSSA 2019 (English)
- New search for: International Conference on Data Sciences, Security and Applications
- Further information on International Conference on Data Sciences, Security and Applications:
- http://d-nb.info/gnd/1186718374
- New search for: Jain, Vanita
- New search for: Chaudhary, Gopal
- New search for: Taplamacioglu, M. Cengiz
- New search for: Agarwal, M. S
- New search for: International Conference on Data Sciences, Security and Applications
- Further information on International Conference on Data Sciences, Security and Applications:
- http://d-nb.info/gnd/1186718374
2020
-
ISBN:
- Conference Proceedings / Print
-
Title:Advances in data sciences, security and applications : proceedings of ICDSSA 2019
-
Contributors:Jain, Vanita ( editor ) / Chaudhary, Gopal ( editor ) / Taplamacioglu, M. Cengiz ( editor ) / Agarwal, M. S ( editor ) / International Conference on Data Sciences, Security and Applications ( author )
-
Conference:ICDSSA ; 2019 ; New Delhi
International Conference on Data Sciences, Security and Applications ; 2019 ; New Delhi -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Singapore
-
Publication date:2020
-
Size:XI, 476 pages
-
Remarks:Illustrationen
-
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
- New search for: 54.72
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.72 Künstliche Intelligenz -
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Classification and Analysis of Real-World Earthquake Data Using Various Machine Learning AlgorithmsVasti, Manka / Dev, Amita et al. | 2020
- 15
-
Crime Data Set Analysis Using Formal Concept Analysis (FCA): A SurveyKapoor, Prerna / Singh, Prem Kumar / Cherukuri, Aswani Kumar et al. | 2020
- 33
-
Analyzing the Patterns of Delhi’s Air PollutionSharma, Shally / Mathur, Sandeep et al. | 2020
- 45
-
Predictive Analysis of NARX, NLIO, and RNN Networks for Short-Term Wind Power ForecastingSrivastava, Tushar / Tripathi, M. M. et al. | 2020
- 63
-
Training Data on Recursive Parallel Processors for Deep LearningRaheja, Shipra / Chopra, Rajiv et al. | 2020
- 73
-
Advanced Anti-theft and Accident Alert System for Two-Wheelers Using Location-Based ServicesArora, Aditya / Sharma, Ekagrata / Dogra, Manasi / Paggowal, Neha / Parikh, Jolly et al. | 2020
- 85
-
A Data Analytics Framework for Decision-Making in AgricultureShankar, Sudha / Rao, Madhuri / Shetty, Prajwala / Thombre, Jui / Manek, Harshita et al. | 2020
- 99
-
Design Flaws and Cryptanalysis of a Standard Mutual Authentication Protocol for Cloud Computing-Based Healthcare SystemKumari, Adesh / Abbasi, M. Yahya / Kumar, Vinod / Alam, Mansaf et al. | 2020
- 111
-
Cognitive Radio Based Environmental Health Monitoring and Regulation System for Toxic GasesPandey, Deependra et al. | 2020
- 123
-
How to Help Johnny to Travel in a Brimming Train?Jain, Vanita / Chaudhary, Gopal / Luthra, Nalin / Rao, Akshit / Jolly, Harman et al. | 2020
- 133
-
Soft Computing Paradigms Based Clustering in Wireless Sensor Networks: A SurveySharma, Richa / Vashisht, Vasudha / Singh, Umang et al. | 2020
- 161
-
ANN Model for Liver Disorder DetectionDhingra, Shubham / Singh, Ishaan / Subburaj, R. / Diwakar, Shalini et al. | 2020
- 169
-
Design Flaws and Cryptanalysis of Elliptic Curve Cryptography-Based Lightweight Authentication Scheme for Smart Grid CommunicationKumar, Vinod / Khan, Akber Ali / Ahmad, Musheer et al. | 2020
- 181
-
Distributed Authentication Security for IOT Using DASS and LOKI91Sharma, Santosh Kumar / Khuntia, Bonomali et al. | 2020
- 197
-
Macro Factors Affecting Cloud Computing Readiness: A Cross-Country AnalysisTripathy, Samit / Jyotishi, Amalendu et al. | 2020
- 211
-
Controller Area Network for Battlefield-of-ThingsDesai, S. Sundeep / Varghese, Vincent / Nene, Manisha J. et al. | 2020
- 225
-
An Experimental Approach to Unravel Effects of Malware on System Network InterfaceSubairu, Sikiru Olanrewaju / Alhassan, John / Misra, Sanjay / Abayomi-Alli, Olusola / Ahuja, Ravin / Damasevicius, Robertas / Maskeliunas, Rytis et al. | 2020
- 237
-
Smart Ticketing for Academic Campus Shuttle Transportation System Based on RFIDAbayomi-Alli, Olusola / Odusami, Modupe / Chima, Richard / Misra, Sanjay / Ahuja, Ravin / Damasevicius, Robertas / Maskeliunas, Rytis et al. | 2020
- 253
-
Design of Big Data Privacy Framework—A Balancing ActGeetha, P. / Naikodi, Chandrakant / Setty, Suresh Lakshmi Narasimha et al. | 2020
- 267
-
Robust Speaker Recognition Based on Low-Level- and Prosodic-Level-FeaturesJagdale, S. M. / Shinde, A. A. / Chitode, J. S. et al. | 2020
- 275
-
Classification of Astronomical Objects Using Various Machine Learning TechniquesSharma, Siddharth / Sharma, Ruchi et al. | 2020
- 285
-
Soundex Algorithm for Hindi Language NamesAnand, Rahul / Mahajan, Rohan / Verma, Nimish / Singh, Prabhnoor et al. | 2020
- 295
-
How Do Innovation Lifecycle Phases Affect the Innovation Success of IT Firms?Thangavelu, Senthilkumar / Jyotishi, Amalendu et al. | 2020
- 307
-
Behavioral Analysis of Active Facebook Users Using the NEO PI-R ModelSandhu, Suhelbeer Singh / Gupta, Ankit / Srivastav, Garima et al. | 2020
- 315
-
Forecasting Air Quality of Delhi Using ARIMA ModelGourav / Rekhi, Jusleen Kaur / Nagrath, Preeti / Jain, Rachna et al. | 2020
- 327
-
ETSP: Enhanced Trust-Based Security Protocol to Handle Blackhole Attacks in Opportunistic NetworksSharma, Deepak Kumar / Agarwal, Saksham / Pasrija, Sagar / Kumar, Sachin et al. | 2020
- 341
-
Proposed Model for Distributed Storage Automation System Using Kubernetes OperatorsSharma, Ashish / Yadav, Sarita / Gupta, Neha / Dhall, Shafali / Rastogi, Shikha et al. | 2020
- 353
-
A Feature-Based Kinship Verification Technique Using Convolutional Neural NetworkJain, Apoorv / Bhagat, Naman / Srivastava, Varun / Tyagi, Priyanshu / Jain, Pragya et al. | 2020
- 363
-
Image Encryption Using Permutation-Diffusion ApproachTewani, Rachna / Garg, Yash / Bagga, Jasmeet Singh / Singh, Akash / Bhalsodia, Rahul et al. | 2020
- 375
-
Facial Recognition Using Deep LearningSingh, Neelabh Shanker / Hariharan, S. / Gupta, Monika et al. | 2020
- 383
-
Implications of Job Loading and Scheduling Structures on Machine Memory EffectivenessAlfa, Abraham Ayegba / Misra, Sanjay / Ogwueleka, Francisca N. / Ahuja, Ravin / Adewumi, Adewole / Damasevicius, Robertas / Maskeliunas, Rytis et al. | 2020
- 395
-
Comparative Study of the Electrical Energy Consumption and Cost for a Residential Building on Fully AC Loads Vis-a-Vis One on Fully DC LoadsOgunleye, Oluwasikemi / Alabi, Adeyemi / Misra, Sanjay / Adewumi, Adewole / Ahuja, Ravin / Damasevicius, Robertas et al. | 2020
- 407
-
Analysis and Vulnerability Assessment of Various Models and Frameworks in Cloud ComputingMishra, Narendra / Singh, R. K. / Yadav, Sumit Kumar et al. | 2020
- 419
-
Adoption of Localization in E-commerceChhibber, Rakhee / Chadha, Chetan et al. | 2020
- 433
-
Review-Based Topic Distribution Profile for Recommender SystemsSaraswat, Mala / Chakraverty, Shampa / Sharma, Agrim et al. | 2020
- 445
-
Develop Ten Security Analytics Metrics for Big Data on the CloudWang, Yong / Rawal, Bharat S. / Duan, Qiang et al. | 2020
- 457
-
Orisyncrasy—An Ear Biometrics on the Fly Using Gabor FilterValechha, Labhesh / Valecha, Hitesh / Ahuja, Varkha / Chawla, Tarun / Sengupta, Sharmila et al. | 2020
- 467
-
Dark Data Analytics Using Blockchain TechnologyNeha / Pahwa, Payal et al. | 2020