000 | 07927nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-981-19-8069-5 | ||
003 | DE-He213 | ||
005 | 20240423125132.0 | ||
007 | cr nn 008mamaa | ||
008 | 221119s2022 si | s |||| 0|eng d | ||
020 |
_a9789811980695 _9978-981-19-8069-5 |
||
024 | 7 |
_a10.1007/978-981-19-8069-5 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aFuture Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications _h[electronic resource] : _b9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam, November 23–25, 2022, Proceedings / _cedited by Tran Khanh Dang, Josef Küng, Tai M. Chung. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 |
_aXVI, 765 p. 339 illus., 261 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1688 |
|
505 | 0 | _aInvited Keynotes -- Towards a Foundation of Web3 -- In-Memory Computing Architectures for Big data and Machine Learning Applications -- Secure and Efficient Implementation of Electronic Money -- Managing the Quality of Data and Metadata for Biobanks -- Big Data Analytics and Distributed Systems -- Towards A Privacy, Secured and Distributed Clinical Data Warehouse Architecture -- Improving the Storage Utilization of 0-Complete Trees as Index Structures -- Implement the Data Conversion System by using α-Lightweight Coreset for Validation Process -- Content Selection Methods Using User Interest Prediction Based on Similarities of Web Activities -- ImageNet Challenging Classification with the Raspberry Pis: A Federated Learning Algorithm of Local Stochastic Gradient Descent Models -- Covid-19 Detection Based on Lung Lesion Signs in Big Data Processing Environment -- Predicting Loan Repayment Using A Hybrid of Genetic Algorithms, Logistic Regression, and Artificial Neural Networks -- Performance Evaluation of Regular Decomposition and Benchmark Clustering Methods -- Security and Privacy Engineering -- Authentication of Luxury Products – Identifying Key Requirements from a Seller and Consumer Perspective -- Analysis of A New Practical SPN-based Scheme in the Luby-Rackoff Model -- Authorization and Access Control for Different Database Models: Requirements and Current State of the Art -- A Hierarchical Deterministic Wallet using Ed25519 Digital Signature Scheme -- A Secure Framework for Internet of Medical Things Security Based System using Lightweight Cryptography enabled Blockchain -- Signature Algorithms on Non-commutative Algebras over Finite Fields of Characteristic Two -- Design a Smart Lock System Using Fingerprint and Password for Enhancing Security -- Machine Learning and Artificial Intelligence for Security and Privacy -- Towards an Attention-based Threat Detection System for IoT Networks -- Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare -- pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop -- Vietnamese Text’s Writing Styles Based Authorship Identification Model -- Application of Machine Learning in Malware Detection -- Smart City and Industry 4.0 Applications -- Text Classification Models and Topic Models: An Overall Picture and A Case Study in Vietnamese -- Deep Hybrid Models for Forecasting Stock Midprices from the High-Frequency Limit Order Book -- An Image Denoising Model based on Nonlinear Partial Diferential Equation Using Deep Learning -- Recommendations in E-Commerce Systems based on Deep Matrix Factorization -- AttendanceKit: A set of Role-based Mobile Applications for Automatic Attendance Checking with UHF RFIDusing Realtime Firebase and Face Recognition -- Poses Classification in a Taekwondo Lesson using Skeleton Data extracted from Videos with Shallow and Deep Learning Architectures -- Social Distancing Violation Detection in Video using ChessBoard and Bird's-eye Perspective -- 3D-FaultSeg-UNet: 3D Fault Segmentation in Seismic Data Using Bi-stream U-Net -- Applying Artificial Intelligence to Plan Flight Paths for Aircraft at Subsonic Speeds -- Capacity Building in Government: Towards Developing A Standard for A Functional Specialist in AI for Public Services -- On the Feasibility of Machine Learning Models for Customer Spending Prediction Problem -- Forecasting the Opening and Closing Price Trends of Stock Using Hybrid Models and Artificial Intelligence Algorithm -- Artificial Intelligence Use in e-Government Services: A Systematic Interdisciplinary Literature Review -- Face Recognition based on Deep Learning and Data Augmentation -- An Approach forSimilarity Vietnamese Documents Detection from English Documents -- Combine Clasification Algorithm and Centernet Model to Predict Trafic Density -- Data Analytics and Healthcare Systems -- Comparison of Health Indicators Construction for Concrete Structure Using Acoustic Emission Hit and Kullback-Leibler Divergence -- Lung and Colon Tumor Classification Based on Transfer Learning-Based Techniques -- An Enhanced Diabetes Mellitus Prediction using Feature Selection-Based Type-2 Fuzzy Model -- A Novel Approach of Using Neural Circuit Policies for COVID-19 Classification on CT-images -- Lung Lesions Segmentation and Classification with Deep Neural Networks -- Security and Data Engineering -- Image Denoising using Fully Connected Network with Reinforcement Learning -- Energy Harvesting Aware for Delay-efficient Data Aggregation in Battery-free IoT Sensors -- Deep Models for Mispronounce Prediction for Vietnamese Learners of English -- An Approach to Hummed-tune and Song Sequences Matching -- 84 Birds Classification using Transfer Learning and EfficientNetB2 -- A Session-based Recommender System for Learning Resources -- A Drowsiness Detection System Based on Eye Landmarks Using IoT -- A Novel Approach for Vietnamese Speech Recognition Using Conformer -- Enhancing obfuscated malware detection with machine learning techniques -- Detecting Intrusion using Multiple Datasets in Software-Defined Networks -- Detecting Exams Fraud Using Transfer Learning and Fine-tuning for ResNet50 -- Shape of Pill Recognition Using Mask R-CNN. | |
520 | _aChapters "Towards a Foundation of Web3" and "Secure and Efficient Implementation of Electronic Money" are available Open Access under a Creative Commons Attribution 4.0 International License via link.springer.com. | ||
650 | 0 | _aApplication software. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aData protection. | |
650 | 0 |
_aEducation _xData processing. |
|
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputers and Education. |
700 | 1 |
_aDang, Tran Khanh. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKüng, Josef. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChung, Tai M. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811980688 |
776 | 0 | 8 |
_iPrinted edition: _z9789811980701 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1688 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-19-8069-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c174636 _d174636 |