Trends in Future Informatics and Emerging Technologies -  - E-Book

Trends in Future Informatics and Emerging Technologies E-Book

0,0
44,81 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

A variety of computing techniques have been developed in recent times in combination with emerging technologies. Such techniques, coupled with an increase in computing power, has given credence to an information based paradigm in many fields (also termed as informatics). Informatics computing has evolved into complex structures of heterogeneous methods involving multiple data processing applications. Research on new technologies also brings new tools to use along with continuous improvements in existing tools.

This reference presents contributions that cover emerging computing techniques and their implementation in computer science, informatics and engineering, as well as other important topics that are often discussed in the modern computing environment. Chapters in this book are contributed by researchers, academicians and industry experts and inform readers about current computer technologies and applications.

The topics covered in the book include, online privacy, internet gaming disorder, epidemiological modelling (including COVID-19), computer security and malware detection, document sentiment analysis, and project management.

This book is an interesting update on new trends in computing techniques and applications for readers interested in the latest developments in computer science.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Seitenzahl: 180

Veröffentlichungsjahr: 2021

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
FOREWORD
List of Contributors
Respite for Customer’s Privacy Issues using Privacy Preserving Data Mining
Abstract
INTRODUCTION
Data Mining
HOW DATA MINING IS CARRIED OUT IN RETAIL SECTOR
IS PRIVACY OF CUSTOMER AT STAKE?
WHY DATA MINING IS REQUIRED IN RETAIL SECTOR
Procuring and Engaging Customer
Market Basket Analysis
Clients Segmentation and Target Advertising
PRIVACY AND PRIVACY PRESERVING DATA MINING
Privacy Defined
PRIVACY PRESERVING DATA MINING
Privacy Preserving Data Mining Techniques
DATA HIDING TECHNIQUES
Data Perturbation
Noise Inclusion
Data Swapping
Cryptography
Anonymization Technique: Masking of Personal Identifiers
Suppression
Generalization
Condensation Approach
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Internet Gaming Disorder: Symptoms, Neurological Issues, and Effective Assessment Modalities
Abstract
Introduction
Internet Gaming Disorder (IGD)
IGD: Symptoms and Social Impact
IGD Assessment: Modalities and Methods
Personality Tests
Functional Magnetic Resonance Imaging (fMRI)
Positron Emission Tomography (PET)
Single Positron Emission Computed Tomography (SPECT)
Electroencephalogram(EEG)
Hybrid Modalities
Comparative Analysis of IGD Assessment Modalities
Conclusion
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Machine Learning APP for Prediction of Pandemic such as COVID-19
Abstract
INTRODUCTION
Literature Review
Proposed Work
Methodology Used
Results and Discussions
Conclusion and Recommendation
Implication for Future Research
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Different Authorization Mechanism for Software System
Abstract
INTRODUCTION
LITERATURE SURVEY
Role-Based Access Control (RBAC)
COMPARISION
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Swift Approach for Malware Detection
Abstract
INTRODUCTION
MACHINE LEARNING
Classification Algorithms
METHODOLOGY
Dataset Description
Learning Phase
Checking Phase
Our Approach
Experimental Results
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Measuring Academics’ Intentions to use a Project Management System (PMS): A Case Study of the College of Computing and Information Technology, Shaqra University
Abstract
Introduction
Framework and Hypothesis
Research Methodology
Result and Data Analysis
Participants’ Characteristics
Relaibility
Assessment of the Hypotheses
Summary of Results
Conclusion
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Document Sentiment Analysis using Python
Abstract
INTRODUCTION
LITERATURE REVIEW
Document-Level Sentiment Analysis
SYSTEM REQUIREMENT
Software and Hardware Requirements
Software Requirements:
Hardware Requirements:
Tools Used
Jupyter Notebook
Spacy Library
NLTK Library
METHODOLOGY
Tokenization
POS Tagging
Dependency Parser
Lemmatization
Named Entity Recognition (NER)
Stop Words
VADER (Valence Aware Dictionary and sEntiment Reasoner)
ARCHITECTURE
EXPERIMENT
Implementation
Dataset [10]
Tokenization of Data
Removal of all the Punctuations
Lemmatization of Words
Removal of Stop Words
Named Entity Recognition Visualizer
Dependency Visualizer
Using VADER for Semantic Orientation
CONCLUSION AND FUTURE SCOPE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Comparison of SDLC Models Based on Software Estimation Techniques
Abstract
INTRODUCTION
SOFTWARE ESTIMATION
Why Estimate?
What to Estimate?
How to Estimate?
LITERATURE REVIEW
COCOMO Model
Incremental Effort Estimation
Effort Estimation Related Studies Review
Improving Effort Estimation in Agile
Analyzing Agile Estimation Techniques
SOFTWARE ESTIMATION IN LEGACY PROJECTS
Decomposition
Sizing
Review
Final Estimate
SOFTWARE ESTIMATION IN AGILE PROJECTS
Planning Poker
Bucket System
T-shirt Size
Relative Mass Valuation
Dot Voting
Forecasting Schedule and Budget
Schedule Determination
Budget Determination
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Internet Privacy Concerns and Social Awareness
Abstract
INTRODUCTION
INTERNET PRIVACY
INTERNET PRIVACY AWARENESS
Why Should Internet Users be Aware of Online Privacy?
What is at Stake?
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Beat the Virus
Abstract
Introduction
COVID 19
Prevention
Indication
Proposed Work
Genre and Design of The Game
Beat the Virus
How The Game ‘BEAT THE VIRUS’ Helps In Awaring People ?
Result
Conclusion
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies(Volume 1) Trends in Future Informatics and Emerging TechnologiesEdited byDeepak Kumar & Saru DhirAmity University

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

The recent advancement in computing techniques contributes majorly to the evolution and enrichment of human life and the advent of the next generation computing environment. A variety of uses and paradigms for computing techniques are growing in deployment and development for application with other emerging technologies.

Informatic computing techniques have evolved into the complex structure of heterogeneous techniques with multiple interactions with various tools and techniques. As in any other technology, research brings new developments and refinements and continuous improvement of current approaches that push the technology even further.

This issue emphasized on technical contributions of emerging computing techniques and its implementation in computer science and engineering. The objective of this issue is to provide opportunities for researchers, academicians, industry people, and students to exchange their ideas, experiments, and expertise on current computing techniques. Continuous improvements in research areas keep the readers informed with current technologies, applications.

The research papers of this issue are broadly classified into current computing techniques, information and communication technology, information science and technology, and other areas related to computing techniques and implementation.

The editor thanks all the reviewers for their excellent contributions to this issue. I sincerely hope that you will enjoy reading these papers, and we expect them to play an important role in promoting advanced computing techniques and implementation research. I hope that this issue will prove a great success with the exchange of ideas, which will foster future research collaborations.

Deepak Kumar &Saru Dhir Amity University India

FOREWORD

Does nature compute? What is computation, after all? Computation is a process of converting the input of one form to some other desired output form using certain control actions/instructions. According to the concept of computation, the input is called an antecedent, and the output is called the consequent. A mapping function does the job of converting the input of one form to another form of desired output using certain control actions. The computing concepts are divided into two types of computing, hard computing and soft computing. These are some of the themes you will be coming across in this collection of papers and articles. I am sure you will enjoy them as much I have enjoyed them while participating!! I hope that this book leaves a mark in the field with its various research papers as a chapter for advanced computing techniques, which is applicable and useful for our modern world!.

Priya Ranjan SRM University Amarawathi, AP India

List of Contributors

Abhishek SrivastavaAmity University Uttar Pradesh, IndiaAbhishek JainDepartment of CSE, ASET, Amity University Uttar Pradesh, IndiaAnkitaMewar University, Rajasthan, IndiaAryan KhariAmity University, Noida, IndiaChetna ChoudharyAmity University Uttar Pradesh, IndiaDeepak KumarAmity Institute of Information Technology, Amity University, IndiaDeepti MehrotraAmity University Uttar Pradesh, IndiaKamal Nayan AgarwalDepartment of Information Systems & SCM, Howard University, USAKapil Dev GuptaDepartment of CSE, ASET, Amity University Uttar Pradesh, IndiaMadhurimaAmity University Uttar Pradesh, IndiaManavi NairAmity University, Noida, IndiaManish AsthanaAmity University, Noida, IndiaMuskan GuptaAmity University, Noida, IndiaMunesh Chandra TrivediDepartment of Computer Science & Engineering, NIT, Agartala Tripura, IndiaNayyar Ahmed KhanComputer Science, Shaqra University, College of Computing and IT, Shaqra, Saudi ArabiaRitu PunhaniAmity University, Noida, IndiaRuchika BathlaAmity University, Noida, IndiaSaru DhirAmity University Uttar Pradesh, IndiaShanu SharmaDepartment of CSE, ASET, Amity University Uttar Pradesh, IndiaSmriti JojoAmity University Uttar Pradesh, IndiaSudhir Kumar GuptaAIIT, Amity University, 125-Noida 201303, IndiaS. Hasnain PashaAmity University Uttar Pradesh, IndiaSonia SainiAmity University, Noida, India

Respite for Customer’s Privacy Issues using Privacy Preserving Data Mining

Deepak Kumar1,Ankita2,*
1 Amity Institute of Information Technology, Amity University, India
2 Mewar University, Rajasthan, India

Abstract

Privacy preserving data mining has turned out to be progressively well known on the grounds that it permits sharing of security delicate information for study purposes. Nowadays, individuals have turned out to be progressively reluctant to share their information, over and over again people are either declining to share their information or giving erroneous information. As of late, protection safeguarding information mining has been considered broadly, in light of the wide multiplication of touchy data on the web. We examine strategy for randomization, k-anonymization, and other security safeguarding information mining strategies. Learning is matchless quality, and the more people are educated about data break-in, less inclined they will be to fall prey to the underhanded programmer sharks of data innovation. In this paper, we give a review of Privacy preserving data mining techniques.

Keywords: Condensation, Cryptography, Data mining, Perturbation, Privacy, Privacy Preserving Data Mining.
*Corresponding author Ankita: Mewar University, Rajasthan, India; E-mail: [email protected]

INTRODUCTION

Data Mining

Data Mining is the method for understanding enormous informational indexes to discover designs that can disengage key factors to make prescient models which will help in taking decisions by the management [1].

One of the most basic and most used definitions of the data mining process, which focuses on its distinguishing characteristics, is given by Fayyad, Piatetsky-Shapiro, and Smyth (1996), who define it as “the nontrivial development in order to find valid, novel, potentially useful, and eventually clear patterns in statistics.”

HOW DATA MINING IS CARRIED OUT IN RETAIL SECTOR

There exists plenitude of information accessible nowadays, whether it is disconnected or on the web. Every single part utilizes the information for reasons unknown or the other. Retail segment, for instance, utilizes the client's information to comprehend their decision inclinations, their shopping propensities, recurrence of purchasing, and so on. This, consequently, causes the organization to settle on their vital choices up to the imprint to develop the organization right away.

In order to gather the client's information, an organization may pursue any of the strategies, like at the time of checkout or through direct conversation while shopping.

IS PRIVACY OF CUSTOMER AT STAKE?

The scope of privacy can be viewed from 4 categories:

Information: which deals with the management of accumulation of individual information.Bodily: which identifies with physical damages from intrusive techniques.Interactions: which deals with any form of interactions.Territory limits: which identifies with the interference of physical restrictions.

This paper will concentrate on information classification, which covers the frameworks that gather, examine, and distribute data.

After collecting the entire customer’s data, one might think that whether the data stored in the database is safe in terms of privacy or not.

Here comes the mainly significant concern, not only of the customer but of company as well. Keeping the private information of a customer safe is the foremost responsibility of any organization and failing in doing so may lead them to trouble.

WHY DATA MINING IS REQUIRED IN RETAIL SECTOR

Procuring and Engaging Customer

It is harder to get novel clients than to hold current one [2]. After knowing, current customers purchasing habits, one can predict their respective activities and requirements for buying a specific product.

This sort of action encourages the retailer to hold existing clients by offering different plans [3].

Market Basket Analysis

Market basket analysis is a method in understanding what things are in high likelihood to be purchased together as indicated by association rule [4]. It gives a slight idea about client’s buying behavior by showcasing relations between varieties of purchased products.

Such sort of relation analysis helps in deciding the display of items and promoting the combination of items. Customers can find each item of their interest easily, and this helps the organization in selling (a different product or service) to an existing customer.

Clients Segmentation and Target Advertising

Segmentation refers to partitioning the marketplace into various partitions on the basis of some characteristics. In order to form groups or clusters on the basis of behavior, data mining can be used [5]. With the help of these clusters, customers with similar interests can be identified, and simultaneously we can find customers for target marketing.

PRIVACY AND PRIVACY PRESERVING DATA MINING

Privacy Defined

Data protection alludes to the desire of people to be in charge of or have some control over information regarding them. Advancement in IT has hiked uncertainties about data safety and its consequences and has encouraged Information Systems specialists to look into data safety issues, including specific replies for resolving various issues [6].

Ways to maintain privacy of customer’s data in retail:

It is usually not possible that you want to protect customer data and use it concurrently.

Start a dedicated data safekeeping role within your organization – this person's entire movement ought to revolve in the region of information safety and ensuring protection of client data. They ought to be conversant in the fundamentals of information security and must be efficient on the majority of latest advancements.Make use of an intermediary service to provide external consulting and assistance – Information defense organizations and external advisors can provide vital advice to allow you to review and address security issues that exist currently and that might come into sight shortly. They can likewise allow you to maintain a data safety plan with succeeding risk assessment. They will stay aimed in their evaluation of your safety conventions as they're not a part of your organization's way of life or law issues.Put into practice privacy preserving data mining techniques – These security measures will let you keep sensitive data safe while maintaining usability. In return, your data will be safe even as you analyze it to give you a tactical benefit in the market.Create a culture that highly prioritizes cyber security – make employees and staff at all levels conscious that data protection is each and every person’s responsibility and that even one slight breach may lead to a serious penalty for everyone within an organization.

The insights you put on by accumulating and analyzing customer data can give you added benefit in the retail market, but still, you need to look after that data as well [7].

PRIVACY PRESERVING DATA MINING

Privacy Preserving Data Mining Techniques

There is immense growth in the investigation of data mining. Data mining is the strategy of extraction of information from gigantic warehouses. The hugest degree in research system is Privacy preserving data mining (PPDM). It is particularly essential to keep up an extent between maintaining privacy and information disclosure. The goal is to shroud personal data with the objective that the outsider cannot extricate the real data from the database. To deal with such issues, there are various algorithms established by various researchers across the globe. On the whole, those algorithms are termed as Privacy preserving data mining (PPDM) techniques.

Agencies need to alter values of sensitive data to maintain confidentiality and build trust.

More the data is altered, lower is the risk of disclosure.

DATA HIDING TECHNIQUES

Data Perturbation

Strategies that try to achieve masking of individual private information while keeping up basic total connections of the records are referred as data perturbation techniques. These techniques amend genuine data figures to ‘hide’ exact secret entity record information [8].

The main objective of data perturbation technique is to keep the customer’s personal data safe, which includes his/her buying habits, time of visits, etc.

These techniques work by adopting either of the following methods:

Noise Inclusion

Noise inclusion methods modify secret attributes by including noise to achieve confidentiality. In this technique, a hypothetical or randomized number is added or multiplied to secret computable attributes. The hypothetical value is taken from a normal distribution having a mean value zero and a very negligible standard deviation [9, 10] Table 1 discuss the noise addition procedure as follows:

Table 1Noise addition procedure [11].DATABASE• Accept records from user • Store data in databasesSELECTION• The user requests for dataDETECTION• The sensitive components of the data are to be identifiedPERTURBATION• Noise is added to the detected dataDISPLAY• The perturbated data is displayed to the user

Data Swapping

Data swapping is a renowned and famous data perturbation technique. Data swapping can be defined as, the process of swapping of sensitive information among two persons by maintaining the sensitive information about the individuals [11]. In this method, actual individual records are changed with new values so that original dataset is entirely replaced so that the confidential attributes in a dataset are preserved. Through this method, data mining process achieved much accuracy when compared with existing noise addition methods with no breach in the privacy of the individuals.

The main reason for using data swapping technique is that it can be functional all along with additional privacy preserving data mining techniques, for example k-anonymity and randomization [12].

Cryptography

Cryptography is an extensively used method that is used for encrypting a plain text to get cipher (encrypted) text. Clear text or plaintext is defined as the data that is written by the user and can be easily examined and understood with no algorithm. The method of covering normal in order to mask its actual meaning is known as encryption. After applying encryption on a plain text, the random data which is generated is known as cipher text. Cryptography simply muddles data in order to achieve secrecy and/or accuracy of information and facilitates transmission of data among unsure networks so that it cannot be read by any mediator apart from the legal receiver [13, 14].

Anonymization Technique: Masking of Personal Identifiers

Suppression