Cyber Security and Computer Science : Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020 : Proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on Cyber Security and Protection of Digital Services (2th 2020 : Dhaka, Bangladesh)
Imprint:Cham, Switzerland : Springer, [2020]
Description:1 online resource (xvii, 745 p.) : ill. (some col.)
Language:English
Series:Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; volume 325
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 325.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12607284
Hidden Bibliographic Details
Other authors / contributors:Bhuiyan, Touhid, editor.
ISBN:9783030528560
3030528561
9783030528553
3030528553
Language / Script:Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
Notes:International conference proceedings.
Includes bibliographical references and index.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Description based on online resource; title from digital title page (viewed on September 02, 2020).
Summary:This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing.
Other form:Original 3030528553 9783030528553
Standard no.:10.1007/978-3-030-52

MARC

LEADER 00000cam a2200000Ii 4500
001 12607284
005 20210813213023.0
006 m d
007 cr nn||||mamaa
008 200826s2020 sz a ob 101 0 eng d
015 |a GBC0D2680  |2 bnb 
016 7 |a 019863745  |2 Uk 
019 |a 1182515948  |a 1193273211  |a 1195444745  |a 1203567472  |a 1222783677 
020 |a 9783030528560  |q (electronic bk.) 
020 |a 3030528561  |q (electronic bk.) 
020 |z 9783030528553 
020 |z 3030528553 
024 8 |a 10.1007/978-3-030-52 
035 |a (OCoLC)1191060723  |z (OCoLC)1182515948  |z (OCoLC)1193273211  |z (OCoLC)1195444745  |z (OCoLC)1203567472  |z (OCoLC)1222783677 
035 9 |a (OCLCCM-CC)1191060723 
037 |a com.springer.onix.9783030528560  |b Springer Nature 
040 |a LQU  |b eng  |e rda  |c LQU  |d YDXIT  |d GW5XE  |d YDX  |d EBLCP  |d OCLCF  |d NLW  |d UKMGB  |d UKAHL 
049 |a MAIN 
050 4 |a HV8079.C65  |b I582 2020 
111 2 |a International Conference on Cyber Security and Protection of Digital Services  |n (2th  |d 2020 :  |c Dhaka, Bangladesh) 
245 1 0 |a Cyber Security and Computer Science :  |b Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020 : Proceedings /  |c Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali, (Eds.). 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2020] 
300 |a 1 online resource (xvii, 745 p.) :  |b ill. (some col.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;  |v volume 325 
500 |a International conference proceedings. 
504 |a Includes bibliographical references and index. 
505 0 |a T Cities -- On the Energy Efficiency and Performance of DelayTolerant -- Conic Programming Approach to Reduce Congestion -- Sightless Helper: An Interactive Mobile Application for Blind Assistance and Safe Navigation -- IoT Based Smart Health Monitoring System for Diabetes Patients using Neural Network -- Parking Recommender System Using Q-Learning and Cloud Computing -- Advanced Artistic Style Transfer Using Deep Neural Network -- Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets -- Efficient Query Processing for Multidimensional Data Cubes -- Proposal of a Highly Birefringent Bow-Tie Photonic Crystal Fiber for Nonlinear Applications -- A Bioinformatics Analysis to Identify Hub Genes from Protein-Protein Interaction Network for Cancer and Stress -- Innovative Automation Algorithm in Micro-multinational Data-entry Industry -- Classification of Succulent Plant using Convolutional Neural Network -- Smoke Detection from Different Environmental Conditions using Faster R-CNN Approach Based on Deep Neural Network -- Convolutional Neural Networks Based Bengali Handwritten Character Recognition -- Detection and Classification of Road Damage Using R-CNN and Faster R-CNN: A Deep Learning Approach stems for the Mode of Childbirth -- EMG-based Classification of Forearm Muscles in Prehension Movements: Performance Comparison of Machine Learning Algorithms -- Prediction Model for Self-Assessed Health Status in Flood-Prone Area of Bangladesh -- Machine learning techniques for predicting surface EMG activities on upper limb muscle: A systematic review -- Retrospective Analysis of Hematological Cancer by Correlating Hematological Malignancy with Occupation, Residence, Associated Infection, Knowledge and Previous Cancer History in Relatives -- Performance Comparison of Early Breast Cancer Detection Precision Using AI and Ultra-wideband (UWB) Bio-Antennas -- Processing with Patients Statement: An Advanced Disease Diagnosis Technique -- Non-Invasive Diabetes Level Monitoring System using Artificial Intelligence and UWB -- An Investigation and Evaluation of N-Gram, TF-IDF and Ensemble Methods in Sentiment Classification -- Aspect Based Sentiment Analysis In Bangla Dataset Based On Aspect Term Extraction -- Development of a Tangent Based Robust Speech Feature Extraction Model -- Semantic Sentence Modeling for Learning Textual Similarity Exploiting LSTM -- A Study of fastText Word Embedding Effects in Document Classification in Bangla Language -- A Hybrid Approach Towards Two Stage Bengali Question -- Classification Utilizing Smart DataBalancing Technique -- An Empirical Framework to Identify Authorship from Bengali Literary Works -- Supervised Machine Learning for Multi-Label Classification of Bangla Articles -- Ulcer Detection in Wireless Capsule Endoscopy Using Locally Computed Features -- Human Age Estimation And Gender Classification Using Deep Conolutional Neural Network -- Diagnosis of Acute Lymphoblastic Leukemia from Microscopic Image of Peripheral Blood Smear Using Image Processing Technique -- Analysis of Software Defined Wireless Network with IP Mobility in Multiple Controllers Domain -- An SDN Based Distributed IoT Network with NFV Implementation for Smar. 
520 |a This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020. The 58 full papers were carefully reviewed and selected from 133 submissions. The papers detail new ideas, inventions, and application experiences to cyber security systems. They are organized in topical sections on optimization problems; image steganography and risk analysis on web applications; machine learning in disease diagnosis and monitoring; computer vision and image processing in health care; text and speech processing; machine learning in health care; blockchain applications; computer vision and image processing in health care; malware analysis; computer vision; future technology applications; computer networks; machine learning on imbalanced data; computer security; Bangla language processing. 
588 |a Description based on online resource; title from digital title page (viewed on September 02, 2020). 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
650 0 |a Computer crimes  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Internet  |x Security measures  |v Congresses. 
650 7 |a Computer crimes  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Internet  |x Security measures  |2 fast  |0 (OCoLC)fst01751426 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Bhuiyan, Touhid,  |e editor. 
776 0 8 |c Original  |z 3030528553  |z 9783030528553  |w (OCoLC)1157670903 
830 0 |a Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;  |v 325.  |0 http://id.loc.gov/authorities/names/no2009128062 
903 |a HeVa 
929 |a oclccm 
999 f f |i 809a54f7-c5e2-52ea-8d5a-e69d6c52cc4d  |s 58fc301c-b4c9-5c01-ab15-fbbdee5ef61b 
928 |t Library of Congress classification  |a HV8079.C65 I582 2020  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-52856-0  |z Springer Nature  |g ebooks  |i 12622892