標(biāo)題: Titlebook: Data Science and Security; Proceedings of IDSCS Dharm Singh Jat,Samiksha Shukla,Durgesh Kumar Mish Conference proceedings 2021 The Editor(s [打印本頁] 作者: MAXIM 時間: 2025-3-21 16:29
書目名稱Data Science and Security影響因子(影響力)
書目名稱Data Science and Security影響因子(影響力)學(xué)科排名
書目名稱Data Science and Security網(wǎng)絡(luò)公開度
書目名稱Data Science and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Science and Security被引頻次
書目名稱Data Science and Security被引頻次學(xué)科排名
書目名稱Data Science and Security年度引用
書目名稱Data Science and Security年度引用學(xué)科排名
書目名稱Data Science and Security讀者反饋
書目名稱Data Science and Security讀者反饋學(xué)科排名
作者: Pepsin 時間: 2025-3-21 20:46
,A Novel Approach to Human–Computer Interaction Using Hand Gesture Recognition,their utilization. Henceforth, there has been developing enthusiasm for the improvement of new methodologies and innovations for bridging this barrier. In this project, a novel approach has been presented toward hand gesture recognition using smartphone sensor reading, which can be applied to intera作者: 朝圣者 時間: 2025-3-22 02:13 作者: 新字 時間: 2025-3-22 05:42 作者: 商業(yè)上 時間: 2025-3-22 10:07 作者: Ambulatory 時間: 2025-3-22 13:52
Data Mining Models Applied in Prediction of IVF Success Rates: An Overview, as input and produce prediction as output are the need of the hour in IVF research area. The automated systems include mechanism for pre-processing of input metrics and prediction stage that is built using algorithms such as decision trees, na?ve Bayes classifiers, case-based reasoning system, logi作者: Ambulatory 時間: 2025-3-22 18:31
,TreeXP—An Instantiation of XPattern Framework,only used over cross-platforms. XML clustering is an active research area. Because of the complexity of XML clustering, it remains a challenging area in data analytics, especially when Big Data is considered. In this paper, we focus on clustering of XML based on structure. A novel method for represe作者: POINT 時間: 2025-3-22 22:14 作者: PLAYS 時間: 2025-3-23 02:09
Survey on DNS-Specific Security Issues and Solution Approaches,ailable to all users to resolve their hostnames. They are not configured with any administrative control. DNS is an open resolver so that it is a hot cake for attackers to perform various attacks such as cache poisonings, DOS, and DDOS attacks. DNS only converts domain names to their matching IP add作者: Meditate 時間: 2025-3-23 08:50 作者: 留戀 時間: 2025-3-23 12:56 作者: 全能 時間: 2025-3-23 14:42
A Survey on Guiding Customer Purchasing Patterns in Modern Consumerism Scenario in India,e shopping malls user does happy shopping but feels tired and sick for standing in the long queues for the billing. Each product can be billed by reading the barcode on each product; thus, a single person scanning thousands of products of hundreds and more customers is a tedious task. Thus, we have 作者: Expiration 時間: 2025-3-23 20:40 作者: Ancillary 時間: 2025-3-23 23:05
ALOSI: Aspect-Level Opinion Spam Identification,form on social media and e-commerce for users to express/explore opinions on products and/or product manufacturers for the betterment of the product development. A tentative product rating can be derived from the product opinions mined. ALOSI takes opinion mining to a deeper level performing opinion作者: corn732 時間: 2025-3-24 04:26
Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis,and the timely prognosis. Hence, early detection of anomalous malignant cells is needed for pre-diagnosis of lung cancer as it plays a major role in the prognosis and treatment. In this work, an innovative pre-diagnosis approach is suggested, wherein the size of the dataset comprising risk factors a作者: Memorial 時間: 2025-3-24 07:23 作者: neoplasm 時間: 2025-3-24 12:26
Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM),pportunities in psychiatry where the diagnosis relies on the historical data of patients as well as the states of mood that increase the complexity of distinguishing between bipolar disorder and borderline disorder during diagnosis. This paper is inspired by prior work where the symptoms were treate作者: 割公牛膨脹 時間: 2025-3-24 15:54
An IoT-Based Fog Computing Approach for Retrieval of Patient Vitals,r technologies for an efficient use. Cloud computing has been a greater part in Internet of Things, since all the data from the sensors are stored in the cloud for later retrieval or comparison. To retrieve time-sensitive data to end users within a needed time, fog computing plays a vital role. Due 作者: 公共汽車 時間: 2025-3-24 19:13 作者: abstemious 時間: 2025-3-25 01:40 作者: 放肆的你 時間: 2025-3-25 05:38 作者: 吞下 時間: 2025-3-25 10:36 作者: 都相信我的話 時間: 2025-3-25 13:58 作者: Admire 時間: 2025-3-25 19:42 作者: 要素 時間: 2025-3-25 21:48
https://doi.org/10.1007/978-1-4419-0730-1combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.作者: GRIN 時間: 2025-3-26 03:34 作者: Perigee 時間: 2025-3-26 06:13
An Approach to Predict Potential Edges in Online Social Networks,roaches. In this paper, we have tried to develop an edge prediction model which will be trained using a supervised machine learning technique. For experimental analysis, Wikipedia network has been used.作者: Commentary 時間: 2025-3-26 10:11
A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques,combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.作者: 宴會 時間: 2025-3-26 16:17 作者: minion 時間: 2025-3-26 20:45 作者: cajole 時間: 2025-3-27 00:10 作者: Microaneurysm 時間: 2025-3-27 01:33
Arthur S. Sherman,Yue-Xian Li,Joel E. Keizerat of cloud computing in terms of retrieval latency using parameters such as temperature, humidity, and heartbeat. With this experiment, it has been proved that fog computing performs better than cloud computing in terms of retrieval latency.作者: 審問,審訊 時間: 2025-3-27 08:18 作者: Wernickes-area 時間: 2025-3-27 11:36
Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis, well-guided FFBNN-AABC to authenticate whether the supplied investigational data is competent to effectively forecast the lung disorder or not. The results obtained show a considerable improvement in the classification performance compared to other approaches like Genetic Algorithm (GA) and Particle Swarm Optimization (PSO).作者: 逢迎春日 時間: 2025-3-27 14:47 作者: 增長 時間: 2025-3-27 19:47
Computational Biomechanics for Medicine, classifies the data using deep learning algorithms. Furthermore, once the gesture has been accurately classified, the gesture is mapped to an action. This paper also provides an analysis of a comparative study done for this area.作者: inculpate 時間: 2025-3-28 01:19
Martyn P. Nash,Adam Wittek,Karol Millerty technique to achieve the security requirement of the devices connected to IoT, communicating between the legitimate users. This enables to develop a secure channel to configure the device without the application of any complex system or changes in the hardware of the device.作者: 使混合 時間: 2025-3-28 04:43
Computational Biomechanics for Medicineructure, clustering is carried out with a new algorithm, TreeXP, which follows the XPattern framework. The performances of the proposed representation and clustering algorithm are compared with a well-established PathXP algorithm and found to give the same performance, but require very less time.作者: 使困惑 時間: 2025-3-28 08:56 作者: 弄污 時間: 2025-3-28 12:30
9. Modeling of Cardiac Electro-Mechanics,retinopathy detection using deep architectures. Further, two architectures are implemented with minor modifications. Experiments are carried out with different sample sizes, and the detection accuracies of the two architectures are compared.作者: dura-mater 時間: 2025-3-28 16:23 作者: 褲子 時間: 2025-3-28 18:54 作者: 致命 時間: 2025-3-29 01:57
,TreeXP—An Instantiation of XPattern Framework,ructure, clustering is carried out with a new algorithm, TreeXP, which follows the XPattern framework. The performances of the proposed representation and clustering algorithm are compared with a well-established PathXP algorithm and found to give the same performance, but require very less time.作者: Entrancing 時間: 2025-3-29 06:32
Algorithms for the Metric Dimension of a Simple Graph,of metric basis is called the metric dimension of .. In this paper, we develop algorithms to find the metric dimension and a metric basis of a simple graph. These algorithms have the worst-case complexity of .(.).作者: flammable 時間: 2025-3-29 08:36
,Diabetic Retinopathy Detection Using Convolutional Neural Network—A Study,retinopathy detection using deep architectures. Further, two architectures are implemented with minor modifications. Experiments are carried out with different sample sizes, and the detection accuracies of the two architectures are compared.作者: demote 時間: 2025-3-29 13:27 作者: 多嘴 時間: 2025-3-29 18:54 作者: Serenity 時間: 2025-3-29 22:01 作者: 小故事 時間: 2025-3-30 01:03
https://doi.org/10.1007/978-3-319-15503-6eatures. The framework uses the domain knowledge to build the private model to analyze unique food characteristics. The proposed recommender model generates diet recommendation list for thyroid patients using food items rating patterns and similarity scores. The experimental setup validated the prop作者: 冰河期 時間: 2025-3-30 04:21 作者: Efflorescent 時間: 2025-3-30 11:45
https://doi.org/10.1007/978-3-031-09327-2eural Network (CNN) algorithm to integrate multilayer perceptron for image segmentation. In this process, we combined both traditional feature extraction and high-level feature extraction to classify lung images. The convolutional neural network for feature extraction will identify lung cancer cells作者: Medley 時間: 2025-3-30 15:16
Christopher P. Fall,Joel E. Keizeriscussed in this study. The model is tested with the synthetic signature dataset provided by the Alan Turing Institute in signature-psychiatry repository. The end result has 0.95 AUC which is an improvement over the last result of 0.90 AUC.作者: 尖 時間: 2025-3-30 18:49
Simone Rizzetto,Attila Csikász-Nagyerformance levels. This method can help students a great deal by letting them as well as their instructors identify areas for improvement, especially in large classes, and take appropriate action in a timely manner.作者: enterprise 時間: 2025-3-30 20:51 作者: 帶來墨水 時間: 2025-3-31 04:32 作者: Junction 時間: 2025-3-31 09:03 作者: 不合 時間: 2025-3-31 12:40 作者: 夾死提手勢 時間: 2025-3-31 17:11
Survey on DNS-Specific Security Issues and Solution Approaches,dentiality, packet fragmentation, amplification attack, and mainly it is a strong source of a DDOS attack. In this paper, we discuss how to increase the security of DNSSEC protocol by adding an extra layer of security using the EV-SSL certificate to overcome DNS security threats.作者: 招惹 時間: 2025-3-31 19:27 作者: IOTA 時間: 2025-3-31 22:51
Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM),iscussed in this study. The model is tested with the synthetic signature dataset provided by the Alan Turing Institute in signature-psychiatry repository. The end result has 0.95 AUC which is an improvement over the last result of 0.90 AUC.作者: CLAIM 時間: 2025-4-1 04:31 作者: 價值在貶值 時間: 2025-4-1 08:21
https://doi.org/10.1007/978-981-15-5309-7Data Security; Cyber Security; DNS Security; Privacy on the Internet; Internet Measurement; QoS and Inter作者: 小步走路 時間: 2025-4-1 11:22 作者: 動脈 時間: 2025-4-1 16:45 作者: 嚴(yán)峻考驗 時間: 2025-4-1 21:51 作者: Friction 時間: 2025-4-2 02:34 作者: Oscillate 時間: 2025-4-2 04:00
Computational Biomechanics for Medicinetion in recent years, produces enormous text data related to the human behaviours based on their interactions with each other. This data is intrinsically unstructured and ambiguous in nature. The data involves incorrect spellings and inaccurate grammars leading to lexical, syntactic and semantic amb作者: 奇思怪想 時間: 2025-4-2 08:06