1 - 14
1. Security and privacy in the Internet of things : architectures, techniques, and applications [2022]
- Security and privacy in the Internet of things (Wiley-IEEE Press)
- Piscatway, NJ : IEEE Press ; Hoboken, NJ : John Wiley & Sons, Inc., [2022]
- Description
- Book — 1 online resource : illustrations (some color)
- Summary
-
- Advanced attacks and protection mechanisms in IoT devices and networks
- Human aspects of IoT security and privacy
- Applying zero trust security principles to defence mechanisms against data exfiltration attacks
- eSIM-based authentication protocol for UAV remote identification
- Collaborative intrusion detection in the era of IoT : recent advances and challenges
- Cyber-securing IoT infrastructure by modeling network traffic
- Integrity of IoT network flow records in encrypted traffic analytics
- Securing contemporary eHealth architectures : techniques and methods
- Security and privacy of smart homes : issues and solutions
- IoT hardware-based security : a generalized review of threats and countermeasures.
(source: Nielsen Book Data)
- International Conference on Advanced Data and Information Engineering (1st : 2013 : Kuala Lumpur, Malaysia)
- Singapore : Springer, 2014.
- Description
- Book — 1 online resource (xxi, 730 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Part I. Database theory
- part II. Data warehousing and mining
- part III. Image and video processing
- part IV. Information processing and integration
- part V. Information retrieval and visualization
- part VI. Information system
- part VII. Mobile, network, grid and cloud computing
- part VIII. Web data, services and intelligence
- part IX. Recent advances in information systems
- part X. Mining educational data for effective educational resources.
- International Conference on Applications and Techniques in Cyber Intelligence (8th : 2021 : Online)
- Cham : Springer, [2021]
- Description
- Book — 1 online resource (xxx, 994 pages) : illustrations (chiefly color)
- Summary
-
- Intro
- Foreword
- Organization
- General Chairs
- Online Conference Organizing Chairs
- Program Chairs
- Publication Chairs
- Publicity Chairs
- Website and Local Service Chairs
- Program Committee Members
- Welcome Message
- Conference Program at a Glance
- ATCI 2021 Keynotes
- Oral Presentation Instruction
- Registration
- Contents
- Cyber Intelligence for Business and Management Innovations
- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method
- 1 Introduction
- 2 Model Establishment and Indicator Description
- 2.1 Data Sources and Related Instruction
- 2.2 Judging Data Seasonality
- 2.3 Model Establishment
- 3 Model Prediction
- 3.1 Analysis and Prediction Using SARIMA Model
- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition
- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication
- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication
- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language
- 4 Conclusion
- References
- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python
- 1 Introduction
- 2 Data and Model
- 2.1 Variable Selection
- 2.2 Data Source
- 2.3 Descriptive Statistical Analysis
- 2.4 Model Setting and Selection
- 2.5 Model Selection
- 3 Conclusions
- References
- The Influence of Computer Network Technology on Trade Development
- 1 Changes of Trade Market Environment under the Background of Internet Development
- 2 Application of Internet Technology in Trade Activities
- 3 The Impact of Internet on the Development of Trade
- 4 Problems in the Application of Internet in Trade
- 5 Improve the Effectiveness of Internet Application in Trade Process
- 6 Conclusion
- References
- The Application of Knowledge Map and the Construction of Enterprise Knowledge Map
- 1 Introduction
- 2 Knowledge Graph and Structure of the Enterprise Information System
- 3 Application of Knowledge Graph
- 3.1 Problem Solving
- 3.2 Network Security
- 3.3 Intelligent Application
- 4 Construction of Knowledge Map
- 4.1 Knowledge Extraction
- 4.2 Knowledge Integration
- 4.3 Developing Knowledge Map
- 5 Conclusion
- References
- Interaction Mechanism of Regional Tourism Industry and Information Industry
- 1 Introduction
- 2 Research Methods
- 3 Evaluation System
- 4 Interaction Mechanism
- 4.1 Stationarity Test
- 4.2 Selection of Lag Order
- 4.3 PVR Model Estimation
- 4.4 The Dynamic Response of Tourism Industry and Information Industry
- 4.5 Analysis of Variance
- 5 Conclusion
- References
- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model
- 1 Introduction
- 2 Related theories of Office Property Management Service Quality
- 3 Establishment of Service Quality Index System
(source: Nielsen Book Data)
- International Conference on Applications and Techniques in Cyber Intelligence (8th : 2021 : Online)
- Cham : Springer, [2021]
- Description
- Book — 1 online resource (943 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 1. Highlights recent applications and techniques in cyber intelligence 2. Includes the proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021) 3. Presents a broad range of scientific research on cyber intelligence.
(source: Nielsen Book Data)
- International Conference on Emerging Applications and Technologies for Industry 4.0 (2020 : Online)
- Cham : Springer, [2021]
- Description
- Book — 1 online resource : illustrations (some color) Digital: text file.PDF.
- Summary
-
- The Relevance of Nature-Inspired Metaheuristic Algorithms in Smart Sport Training.- Analysis of Variable Learning Rate Back Propagation with Cuckoo Search Algorithm for Data Classification.- A Metaheuristic based virtual machine allocation technique using Whale Optimization Algorithm in cloud.- Data Sampling-based Feature Selection Framework for Software Defect Prediction.- Application of K-Nearest Neighbor Algorithm for Prediction of Television Advertisement Rating.- An Evaluation of the Frameworks for Predicting of COVID-19 in Nigeria using Time Series Data Analytics Model.- Multi-objective Wrapper-based Feature Selection Using Binary Cuckoo Optimisation Algorithm: A Comparison Between NSGAII and NSGAIII.- A Logistic Predictive Model for Determining the Prevalent Mode of Financial Cybercrime in Sub-Saharan Africa.- Mathematical Verification of Hybrid Model for Prime Decision-Making in Driving.- An Efficient Multi-Sensor Positions Human Activity Recognition: Elderly Peoples in Rural Areas in Focus. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Applications and Techniques in Cyber Intelligence (10th : 2022 : Online)
- Cham : Springer, 2023.
- Description
- Book — 1 online resource (999 pages) : illustrations (black and white, and colour).
- Summary
-
- TOPSIS Model Establishment in the Context of Internet Finance
- An Analysis of Internet Financial Risk Prevention Strategies from the Perspective of Network Security
- Prediction of Transaction Risk in Financial Market Based on Neural Network Model
- Intelligent Business Model Data Analysis Based on Particle Swarm Optimization
- Multi-dimensional Data Perception and Intelligent Analysis Framework Design of Management Information System
- Resource Transaction Management System Based on PageRank Algorithm
- Research on Intelligent Student Management Evaluation Information System Based on Data Mining Algorithm
- Purchasing Management System Based on Genetic Algorithm
- Credit Risk Prediction Model of Digital Rural Finance Based on PSO-SVM
- Cache High Availability Intelligent Stall Management System Based on Redis Sentinel Mechanism Architecture
- The Application of BIM Technology in the Construction of Project Construction Management Platform
- Innovation of Financing Mode for Small and Micro Enterprises on Digital Finance Technology Algorithm
- Coal Energy Management Estimation System Based on Artificial Intelligence Algorithm
- Establishment of Enterprise Management Information System Based on Big Data Information Technology
- Application Analysis of Intelligent Information Technology in Transaction Management System
- Design of Management Cloud Information System for Residential Buildings Based on High-Performance Computing and Face Recognition Technology
- Development of Student Management System Based on WeChat Public Platform
- Application of Artificial Intelligence Technology in Human Resource Delicacy Management System
- Application of Data Mining Technology (DMT) in Human Resources Assessment Management System.
- International Conference on Applications and Techniques in Cyber Intelligence (2020 : Online)
- Cham, Switzerland : Springer, [2021]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Combination of Information Technology and College English in the Age of Media.- The Application of Computer Internet of Things in Modern Agricultural Planting Management.- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity.- The Application Analysis of Computer Network Security Data Encryption Technology.- The Application of Computer Technology in Sports Training and Competition.- The Application of BIM Technology in Landscape Garden Engineering Projects.- College Physical Education Based on Multimedia Network Teaching Platform.- Development and Implementation of Health Information Management Platform in Medical Institutions.- Teaching Methods of University Economic Management Course Based on Python.- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SCDM (Conference) (4th : 2020 : Melaka, Malaysia)
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (491 pages)
- Summary
-
- Chapter 1: An Enhanced Model for Digital Reference Services (MDRS).-
- Chapter 2: Fuzzy Random Based Mean Variance Model For Agricultural Production Planning.-
- Chapter 3: Residual Neural Network vs Local Binary Convolutional Neural Networks for Bilingual Handwritten Digit Recognition.-
- Chapter 4: Incorporating the Markov Chain Model in WBSN for Improving Patients' Remote Monitoring Systems.-
- Chapter 5: Designing Deep Neural Network with Chicken Swarm Optimization for Violence Video Classification using VSD2014 Dataset.-
- Chapter 6: Header Based Email Spam Detection Framework Using Support Vector Machine (SVM) Technique.-
- Chapter 7: A Mechanism to Support Agile Frameworks Enhancing Reliability Assessment for SCS Development: A Case Study of Medical Surgery Departments.-
- Chapter 8: Link Bandwidth Recommendation for Indonesian E-Health Grid.-
- Chapter 9: Investigating the Optimal Parameterization of Deep Neural Network and Synthetic Data Workflow for Imbalance Liver Disorder Dataset Classification.-
- Chapter 10: Genetic Algorithm Based Parallel K-Means Data Clustering Algorithm Using MapReduce Programming Paradigm on Hadoop Environment (GAPKCA).-
- Chapter 11: Android Botnet Detection by Classification Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SSCC (Conference) (3rd : 2015 : Cochin, India)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xxi, 548 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Security in cloud computing.- Authentication and access control Systems.- Cryptography and steganography.- System and network security.- Application security.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Soft Computing and Data Mining (5th : 2022 : Online)
- Cham : Springer, 2022.
- Description
- Book — 1 online resource (415 pages)
- Summary
-
This book unfolds ways to transform data into innovative solutions perceived as new remarkable and meaningful value. It offers practical views of the concepts and techniques readers need to get the most out of their large-scale research and data mining projects. It strides them through the data-analytical thinking, circumvents the difficulty in deciphering complex data systems and obtaining commercialization value from the data. Also known as data-driven science, soft computing and data mining disciplines cover a broad spectrum, an interdisciplinary field of scientific methods and processes. The book, Recent Advances in Soft Computing and Data Mining, delivers sufficient knowledge to tackle a wide range of issues seen in complex systems. This is done by exploring a vast combination of practices and applications by incorporating these two domains. To thrive in these data-driven ecosystems, researchers, data analysts, and practitioners must choose the best design to approach the problem with the most efficient tools and techniques. To thrive in these data-driven ecosystems, researchers, data analysts, and practitioners must understand the design choice and options of these approaches, thus to better appreciate the concepts, tools, and techniques used.
(source: Nielsen Book Data)
- International Conference on Applications and Techniques in Cyber Intelligence (2019 : Huainan Shi, China)
- Cham, Switzerland : Springer, [2020]
- Description
- Book — 1 online resource (xxxii, 2132 pages) : illustrations
- Summary
-
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.
- International Conference on Applications and Techniques in Cyber Intelligence (10th : 2022 : Online)
- Cham : Springer, 2023.
- Description
- Book — 1 online resource (775 p.).
- Summary
-
- Intro
- Foreword
- Organization
- The 10th International Conference on Applications and Techniques in Cyber Intelligence (ATCI2022)
- ATCI 2022 Keynotes
- Contents
- Cyber Intelligence for Industrial, IoT, and Smart City
- D Modeling and Simulation of Intelligent Building Robot Based on Star Algorithm
- 1 Introduction
- 2 Method
- 2.1 D Star Algorithm
- 2.2 Intelligent Building Robot
- 2.3 Vibration Modal Analysis of Suspended High-Altitude Platform
- 3 Experience
- 3.1 Object Extraction
- 3.2 Experimental Analysis
- 4 Discussion
- 4.1 Selection of Time Series Prediction Model
- 4.2 Static Obstacle Avoidance Path Planning
- 5 Conclusion
- References
- Industrial Economic Trade Volume Based on Multi-prediction Model Algorithm
- 1 Introduction
- 2 Proposed Method
- 2.1 Linear Prediction Methods
- 2.2 Combination Prediction Ideas
- 3 Experiments
- 3.1 Experimental Content
- 3.2 Experimental Methods
- 4 Discussion
- 4.1 Evolution and Status Quo of Foreign Trade Scale - Take the Yangtze River Economic Belt as an Example
- 4.2 Application of Each Prediction Method in Prediction of Foreign Trade
- 5 Conclusions
- 2 Related Theoretical Overview and Research
- 2.1 Analysis of the Impact of Insufficient Performance in the Development of Prefabricated Buildings
- 2.2 Prefabricated Building Performance Testing System
- 3 Experiment and Research
- 3.1 Experimental Method
- 3.2 Experimental Requirements
- 4 Analysis and Discussion
- 4.1 System Test Performance Analysis
- 4.2 Analysis of the Detection Accuracy of Different Building Performance Data
- 5 Conclusions
- References
- Risk Detection System of Bridge Construction Based on Fast ICA Algorithm
- 1 Introduction
- 2 Method
- 2.1 Fast ICA Algorithm
- 2.2 Risk Detection of Bridge Construction
- 2.3 Risk Measurement
- 3 Experience
- 3.1 Object Extraction
- 3.2 Experimental Analysis
- 4 Discussion
- 4.1 There Are High Risks in Bridge Construction
- 4.2 Comparison and Analysis of Actual Data
- 5 Conclusion
- References
- Research on Optimization of Low-Carbon Logistics Distribution Route Based on Genetic Algorithm
- 1 Introduction
- 2 Logistics Distribution Routing Problem Description
- 3 Mathematical Model of Logistics Distribution Vehicle Scheduling Problem
- 4 Genetic Algorithm Design of the Model
13. Proceedings of the sixth International Conference on Mathematics and Computing : ICMC 2020 [2021]
- International Conference on Mathematics and Computing (6th : 2020 : Sikkim, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (567 pages) Digital: text file.PDF.
- Summary
-
- Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers.- A Geometric based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement.- Solving the search-LWE problem by lattice reduction over projected bases.- Robust Watermarking scheme for compressed image through DCT exploiting Superpixel and Arnold transform.- User Preference multi-criteria recommendations using neural collaborative filtering methods.- Bifurcation analysis of tsunami waves for the modified geophysical Korteweg-de Vries equation.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Communication, Networks and Computing (2nd : 2020 : Gwalior, India)
- Singapore : Springer, 2021.
- Description
- Book — 1 online resource (xv, 381 pages) : illustrations (some color). Digital: text file; PDF.
- Summary
-
- Wired and Wireless Communication Systems.- High Dimensional Data Representation and Processing.- Networking and Information Security.- Computing Techniques for Efficient Networks Design.- Vehicular Technology and Application.- Electronics Circuit for Communication System.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.