عرض عادي

Progress in intelligent computing techniques : proceedings of ICACNI 2016. Volume 1 / Pankaj Kumar Sa [and others], editors

المساهم (المساهمين):نوع المادة : نصنصاللغة: الإنجليزية السلاسل:Advances in intelligent systems and computingالناشر:Singapore : Springer, 2018وصف:xx, 552 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9789811033728
الأعمال المتضمنة:
  • International Conference on Advanced Computing, Networking and Informatics Odisha, India 2016
الموضوع:النوع/الشكل:تصنيف مكتبة الكونجرس:
  • TA1634 .P764 2018
موارد على الانترنت:
المحتويات:
Foreword; Message from the Honorary General Chair Prof. Mike Hinchey; Preface; Advisory Board Members; Chief Patron; Patron; Honorary General Chair; General Chairs; Organizing Co-chairs; Programme Co-chairs; Technical Programme Committee; Organizing Committee; Contents; About the Editors; Cloud Computing, Distributed Systems, Social Networks, and Applications; 1 Review of Elasticsearch Performance Variating the Indexing Methods; Abstract; 1 Introduction; 2 Working Framework; 3 Dataset; 4 Implementation; 5 Results and Interpretation; References
2 Understanding Perception of Cache-Based Side-Channel Attack on Cloud EnvironmentAbstract; 1 Introduction; 1.1 Fault Attacks; 1.2 Power Analysis Attack; 1.3 Electromagnetic (EM) Attacks; 1.4 Acoustic Attacks; 1.5 Cache-Based Attacks; 2 Cache-Based Side-Channel Attacks; 2.1 Introduction to the Cache Memory; 2.2 Types of Cache-Based Side-Channel Attack; 2.2.1 Based on Microarchitecture Attack; Access-Driven Attacks; Time-Driven Attacks; Trace-Driven Attacks; 2.2.2 Based on Usage of the Cache Miss During Cryptographic Algorithms; 3 Related Work; 3.1 Existing Cache-Based Attacking Techniques
3.2 Existing Techniques for Detection of Cache-Based Attacks3.3 Existing Techniques to Mitigate Cache-Based Side-Channel Attacks; 4 Conclusion; References; A Semantic Approach to Classifying Twitter Users; 1 Introduction; 2 Literature Survey; 3 Proposed Approach; 3.1 Building the Feature Vector; 4 Results and Discussion; 5 Conclusions and Future Work; References; Timeline-Based Cloud Event Reconstruction Framework for Virtual Machine Artifacts; 1 Introduction; 2 Related Work; 2.1 Cloud-Based Event Reconstruction; 2.2 Non-cloud-Based Event Reconstruction
3 Framework for Cloud-Based Event Reconstruction (CERf)3.1 Phases for Cloud Event Reconstruction; 3.2 Algorithm for Cloud Event Reconstruction; 4 Experiments and Results; 4.1 Experimental Setup; 4.2 Validation of the Proposed Framework -- CERf; 4.3 Other Parameters Considered by Our CERf (Cloud-Based Event Reconstruction Framework); 5 Conclusion; References; eCloud: An Efficient Transmission Policy for Mobile Cloud Computing in Emergency Areas; 1 Introduction; 2 Related Work; 3 An Efficient Transmission Policy; 4 Mobility Management for Mobile Node with Failure and Repair; 5 Simulation
5.1 Results and Analysis6 Conclusion; References; A Multidimensional Approach to Blog Mining; 1 Introduction; 2 Related Work; 3 Proposed Methodology; 4 Evaluation of Blog Patterns; 5 Experimental Results; 6 Conclusion and Future Work; References; 7 Medicinal Side-Effect Analysis Using Twitter Feed; Abstract; 1 Introduction; 2 Related Work; 3 Methods; 3.1 Dataset; 3.2 Elastic Search (Lucene Index); 3.3 Data Preprocessing; 3.4 Feature Extraction and Reduction; 3.5 Dimensionality Reduction; 3.6 Classification; 4 Automatic Identification of Drug Side-Effect; 5 Results
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TA1634 .P764 2018 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000067243

5.1 Classification with All Set of Features

Foreword; Message from the Honorary General Chair Prof. Mike Hinchey; Preface; Advisory Board Members; Chief Patron; Patron; Honorary General Chair; General Chairs; Organizing Co-chairs; Programme Co-chairs; Technical Programme Committee; Organizing Committee; Contents; About the Editors; Cloud Computing, Distributed Systems, Social Networks, and Applications; 1 Review of Elasticsearch Performance Variating the Indexing Methods; Abstract; 1 Introduction; 2 Working Framework; 3 Dataset; 4 Implementation; 5 Results and Interpretation; References

2 Understanding Perception of Cache-Based Side-Channel Attack on Cloud EnvironmentAbstract; 1 Introduction; 1.1 Fault Attacks; 1.2 Power Analysis Attack; 1.3 Electromagnetic (EM) Attacks; 1.4 Acoustic Attacks; 1.5 Cache-Based Attacks; 2 Cache-Based Side-Channel Attacks; 2.1 Introduction to the Cache Memory; 2.2 Types of Cache-Based Side-Channel Attack; 2.2.1 Based on Microarchitecture Attack; Access-Driven Attacks; Time-Driven Attacks; Trace-Driven Attacks; 2.2.2 Based on Usage of the Cache Miss During Cryptographic Algorithms; 3 Related Work; 3.1 Existing Cache-Based Attacking Techniques

3.2 Existing Techniques for Detection of Cache-Based Attacks3.3 Existing Techniques to Mitigate Cache-Based Side-Channel Attacks; 4 Conclusion; References; A Semantic Approach to Classifying Twitter Users; 1 Introduction; 2 Literature Survey; 3 Proposed Approach; 3.1 Building the Feature Vector; 4 Results and Discussion; 5 Conclusions and Future Work; References; Timeline-Based Cloud Event Reconstruction Framework for Virtual Machine Artifacts; 1 Introduction; 2 Related Work; 2.1 Cloud-Based Event Reconstruction; 2.2 Non-cloud-Based Event Reconstruction

3 Framework for Cloud-Based Event Reconstruction (CERf)3.1 Phases for Cloud Event Reconstruction; 3.2 Algorithm for Cloud Event Reconstruction; 4 Experiments and Results; 4.1 Experimental Setup; 4.2 Validation of the Proposed Framework -- CERf; 4.3 Other Parameters Considered by Our CERf (Cloud-Based Event Reconstruction Framework); 5 Conclusion; References; eCloud: An Efficient Transmission Policy for Mobile Cloud Computing in Emergency Areas; 1 Introduction; 2 Related Work; 3 An Efficient Transmission Policy; 4 Mobility Management for Mobile Node with Failure and Repair; 5 Simulation

5.1 Results and Analysis6 Conclusion; References; A Multidimensional Approach to Blog Mining; 1 Introduction; 2 Related Work; 3 Proposed Methodology; 4 Evaluation of Blog Patterns; 5 Experimental Results; 6 Conclusion and Future Work; References; 7 Medicinal Side-Effect Analysis Using Twitter Feed; Abstract; 1 Introduction; 2 Related Work; 3 Methods; 3.1 Dataset; 3.2 Elastic Search (Lucene Index); 3.3 Data Preprocessing; 3.4 Feature Extraction and Reduction; 3.5 Dimensionality Reduction; 3.6 Classification; 4 Automatic Identification of Drug Side-Effect; 5 Results

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة