My Account Log in

1 option

Future Data and Security Engineering : 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27-29, 2019, Proceedings / edited by Tran Khanh Dang, Josef Küng, Makoto Takizawa, Son Ha Bui.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Dang, Tran Khanh, Editor.
Küng, Josef, Editor.
Takizawa, Makoto, Editor.
Bui, Son Ha, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI ; SL 3, 11814
Information Systems and Applications, incl. Internet/Web, and HCI ; 11814
Language:
English
Subjects (All):
Application software.
Artificial intelligence.
Data protection.
Image processing-Digital techniques.
Computer vision.
Computer and Information Systems Applications.
Artificial Intelligence.
Data and Information Security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Local Subjects:
Computer and Information Systems Applications.
Artificial Intelligence.
Data and Information Security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Physical Description:
1 online resource (XVI, 748 pages) : 416 illustrations, 186 illustrations in color.
Edition:
1st ed. 2019.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 6th International Conference on Future Data and Security Engineering, FDSE 2019, held in Nha Trang City, Vietnam, in November 2019. The 38 full papers and 14 short papers presented together with 2 papers of keynote speeches were carefully reviewed and selected from 159 submissions. The selected papers are organized into the following topical headings: Invited Keynotes, Advanced Studies in Machine Learning, Advances in Query Processing and Optimization, Big Data Analytics and Distributed Systems, Deep Learning and Applications, Cloud Data Management and Infrastructure, Security and Privacy Engineering, Authentication and Access Control, Blockchain and Cybersecurity, Emerging Data Management Systems and Applications, Short papers: Security and Data Engineering.
Contents:
Invited Keynotes
Individual Privacy Supporting Organisational Security
A New Test Suite Reduction Approach Based on Hypergraph Minimal Transversal Mining
Advanced Studies in Machine Learning
Machine Learning Based Monitoring of the Pneumatic Actuators' Behavior Through Signal Processing Using Real-world Data Set
A Comparative Study of the Use of Coresets for Clustering Large Datasets
Leakage Classification Based on Improved KullbackLeibler Separation in Water Pipelines
Mining Incrementally Closed Itemsets over Data Stream with the Technique of Batch-Update
A Combination Solution for Sleep Apnea and Heart Rate Detection based on Accelerometer Tracking
A Model for Real-time Traffic Signs Recognition based on the YOLO Algorithm - A Case Study using Vietnamese Traffic Signs
Disease Prediction using Metagenomic Data Visualizations based on Manifold Learning and Convolutional Neural Network
An Efficient Model for Sentiment Analysis of Electronic Product Reviews in Vietnamese
Advances in Query Processing and Optimization
Computing History-Dependent Schedules for Processes with Temporal Constraints
Finding All Minimal Maximum Subsequences in Parallel
OCL2PSQL: An OCL-to-SQL Code-Generator for Model-Driven Engineering
Big Data Analytics and Distributed Systems
Framework for Peer-to-Peer Data Sharing over Web Browsers
Efficiently Semantic-aware Pairwise Similarity an Applicable Use-case
Lower Bound on Network Diameter for Distributed Function Computation
Deep Learning and Applications
A Combined Enhancing and Feature Extraction Algorithm to Improve Learning Accuracy for Gene Expression Classification
Age and Gender Estimation of Asian Faces using Deep Residual Network
Light-weight Deep Convolutional Network-Based Approach for Recognizing Emotion on FPGA Platform
Metagenome-based Disease Classification with Deep learning and Visualizations based on Self-Organizing Maps
Cloud Data Management and Infrastructure
On Analyzing the Trade-off between Over-Commitment Ratio and Quality of Service in NFV Datacenter
Dynamic Data Management Strategy on Cloud Network by Fog Computing Model
Openness in Fog Computing for the Internet of Things
A Top-Down Scheduling for Time Efficient Data Aggregation in WSNs
Security and Privacy Engineering
A New Technique to Improve the Security of Elliptic Curve Encryption and Signature Schemes
A Visual Model for Privacy Awareness and Understanding in Online Social Networks
A Method to Enhance the Security Capability of Python IDE
Studying Machine Learning Techniques for Intrusion Detection Systems
Authentication and Access Control
Enforcing Access Controls in IoT Networks
Resource-constrained IoT Authentication Protocol: An ECC-based Hybrid Scheme for Device-to-Server and Device-to-Device Communications
Adventures in the Analysis of Access Control Policies
Blockchain and Cybersecurity
Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors
MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web
Blockchain-based Open Data: An Approach for Resolving Data Integrity and Transparency
Emerging Data Management Systems and Applications
GMeta: A Novel Algorithm to Utilize Highly Connected Components for Metagenomic Binning
Visualization of Medical Images Data Based on Geometric Modeling
Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains
Exploiting Social Data to Enhance Web Search
Retinal Vessels Segmentation by Improving Salient Region Combined with Sobel Operator Condition
Energy Saving Solution for Air Conditioning Systems
Short papers: Security and Data Engineering
Identifying Minimum Set of Persons That Influenced by a Promotion Campaign
Facial Expression Recognition On Static Images
Cryptocurrencies Price Index Prediction Using Neural Networks On Bittrex Exchange
Application of Fuzzy Logic in University Suggestion System for Vietnamese High School Students
Towards an Improvement of Complex Answer Retrieval System
Keyword-search Interval-query Dynamic Symmetric Searchable Encryption
The Implicit Effect of Items Rating on Recommendation System
Counting People Using Images from Two Low Cost Webcams
Predicting the Price of Bitcoin Using Hybrid ARIMA and Machine Learning
Deep Learning Approach for Receipt Recognition
Efficient CNN Models for Beer Bottle Cap Classification Problem
An Approach for Plagiarism Detection in Learning Resources
Detecting Kuzushiji Characters from Historical Documents by Two-dimensional Context Box Proposal Network
An Empirical Study on Fabric Defect Classification using Deep Network Models.
Other Format:
Printed edition:
ISBN:
978-3-030-35653-8
9783030356538
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account