44,81 €
A variety of computing techniques have been developed in recent times in combination with emerging technologies. Such techniques, coupled with an increase in computing power, has given credence to an information based paradigm in many fields (also termed as informatics). Informatics computing has evolved into complex structures of heterogeneous methods involving multiple data processing applications. Research on new technologies also brings new tools to use along with continuous improvements in existing tools.
This reference presents contributions that cover emerging computing techniques and their implementation in computer science, informatics and engineering, as well as other important topics that are often discussed in the modern computing environment. Chapters in this book are contributed by researchers, academicians and industry experts and inform readers about current computer technologies and applications.
The topics covered in the book include, online privacy, internet gaming disorder, epidemiological modelling (including COVID-19), computer security and malware detection, document sentiment analysis, and project management.
This book is an interesting update on new trends in computing techniques and applications for readers interested in the latest developments in computer science.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 180
Veröffentlichungsjahr: 2021
This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.
Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].
Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.
In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.
Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]
The recent advancement in computing techniques contributes majorly to the evolution and enrichment of human life and the advent of the next generation computing environment. A variety of uses and paradigms for computing techniques are growing in deployment and development for application with other emerging technologies.
Informatic computing techniques have evolved into the complex structure of heterogeneous techniques with multiple interactions with various tools and techniques. As in any other technology, research brings new developments and refinements and continuous improvement of current approaches that push the technology even further.
This issue emphasized on technical contributions of emerging computing techniques and its implementation in computer science and engineering. The objective of this issue is to provide opportunities for researchers, academicians, industry people, and students to exchange their ideas, experiments, and expertise on current computing techniques. Continuous improvements in research areas keep the readers informed with current technologies, applications.
The research papers of this issue are broadly classified into current computing techniques, information and communication technology, information science and technology, and other areas related to computing techniques and implementation.
The editor thanks all the reviewers for their excellent contributions to this issue. I sincerely hope that you will enjoy reading these papers, and we expect them to play an important role in promoting advanced computing techniques and implementation research. I hope that this issue will prove a great success with the exchange of ideas, which will foster future research collaborations.
Does nature compute? What is computation, after all? Computation is a process of converting the input of one form to some other desired output form using certain control actions/instructions. According to the concept of computation, the input is called an antecedent, and the output is called the consequent. A mapping function does the job of converting the input of one form to another form of desired output using certain control actions. The computing concepts are divided into two types of computing, hard computing and soft computing. These are some of the themes you will be coming across in this collection of papers and articles. I am sure you will enjoy them as much I have enjoyed them while participating!! I hope that this book leaves a mark in the field with its various research papers as a chapter for advanced computing techniques, which is applicable and useful for our modern world!.
Privacy preserving data mining has turned out to be progressively well known on the grounds that it permits sharing of security delicate information for study purposes. Nowadays, individuals have turned out to be progressively reluctant to share their information, over and over again people are either declining to share their information or giving erroneous information. As of late, protection safeguarding information mining has been considered broadly, in light of the wide multiplication of touchy data on the web. We examine strategy for randomization, k-anonymization, and other security safeguarding information mining strategies. Learning is matchless quality, and the more people are educated about data break-in, less inclined they will be to fall prey to the underhanded programmer sharks of data innovation. In this paper, we give a review of Privacy preserving data mining techniques.
Data Mining is the method for understanding enormous informational indexes to discover designs that can disengage key factors to make prescient models which will help in taking decisions by the management [1].
One of the most basic and most used definitions of the data mining process, which focuses on its distinguishing characteristics, is given by Fayyad, Piatetsky-Shapiro, and Smyth (1996), who define it as “the nontrivial development in order to find valid, novel, potentially useful, and eventually clear patterns in statistics.”
There exists plenitude of information accessible nowadays, whether it is disconnected or on the web. Every single part utilizes the information for reasons unknown or the other. Retail segment, for instance, utilizes the client's information to comprehend their decision inclinations, their shopping propensities, recurrence of purchasing, and so on. This, consequently, causes the organization to settle on their vital choices up to the imprint to develop the organization right away.
In order to gather the client's information, an organization may pursue any of the strategies, like at the time of checkout or through direct conversation while shopping.
The scope of privacy can be viewed from 4 categories:
Information: which deals with the management of accumulation of individual information.Bodily: which identifies with physical damages from intrusive techniques.Interactions: which deals with any form of interactions.Territory limits: which identifies with the interference of physical restrictions.This paper will concentrate on information classification, which covers the frameworks that gather, examine, and distribute data.
After collecting the entire customer’s data, one might think that whether the data stored in the database is safe in terms of privacy or not.
Here comes the mainly significant concern, not only of the customer but of company as well. Keeping the private information of a customer safe is the foremost responsibility of any organization and failing in doing so may lead them to trouble.
It is harder to get novel clients than to hold current one [2]. After knowing, current customers purchasing habits, one can predict their respective activities and requirements for buying a specific product.
This sort of action encourages the retailer to hold existing clients by offering different plans [3].
Market basket analysis is a method in understanding what things are in high likelihood to be purchased together as indicated by association rule [4]. It gives a slight idea about client’s buying behavior by showcasing relations between varieties of purchased products.
Such sort of relation analysis helps in deciding the display of items and promoting the combination of items. Customers can find each item of their interest easily, and this helps the organization in selling (a different product or service) to an existing customer.
Segmentation refers to partitioning the marketplace into various partitions on the basis of some characteristics. In order to form groups or clusters on the basis of behavior, data mining can be used [5]. With the help of these clusters, customers with similar interests can be identified, and simultaneously we can find customers for target marketing.
Data protection alludes to the desire of people to be in charge of or have some control over information regarding them. Advancement in IT has hiked uncertainties about data safety and its consequences and has encouraged Information Systems specialists to look into data safety issues, including specific replies for resolving various issues [6].
Ways to maintain privacy of customer’s data in retail:
It is usually not possible that you want to protect customer data and use it concurrently.
Start a dedicated data safekeeping role within your organization – this person's entire movement ought to revolve in the region of information safety and ensuring protection of client data. They ought to be conversant in the fundamentals of information security and must be efficient on the majority of latest advancements.Make use of an intermediary service to provide external consulting and assistance – Information defense organizations and external advisors can provide vital advice to allow you to review and address security issues that exist currently and that might come into sight shortly. They can likewise allow you to maintain a data safety plan with succeeding risk assessment. They will stay aimed in their evaluation of your safety conventions as they're not a part of your organization's way of life or law issues.Put into practice privacy preserving data mining techniques – These security measures will let you keep sensitive data safe while maintaining usability. In return, your data will be safe even as you analyze it to give you a tactical benefit in the market.Create a culture that highly prioritizes cyber security – make employees and staff at all levels conscious that data protection is each and every person’s responsibility and that even one slight breach may lead to a serious penalty for everyone within an organization.The insights you put on by accumulating and analyzing customer data can give you added benefit in the retail market, but still, you need to look after that data as well [7].
There is immense growth in the investigation of data mining. Data mining is the strategy of extraction of information from gigantic warehouses. The hugest degree in research system is Privacy preserving data mining (PPDM). It is particularly essential to keep up an extent between maintaining privacy and information disclosure. The goal is to shroud personal data with the objective that the outsider cannot extricate the real data from the database. To deal with such issues, there are various algorithms established by various researchers across the globe. On the whole, those algorithms are termed as Privacy preserving data mining (PPDM) techniques.
Agencies need to alter values of sensitive data to maintain confidentiality and build trust.
More the data is altered, lower is the risk of disclosure.
Strategies that try to achieve masking of individual private information while keeping up basic total connections of the records are referred as data perturbation techniques. These techniques amend genuine data figures to ‘hide’ exact secret entity record information [8].
The main objective of data perturbation technique is to keep the customer’s personal data safe, which includes his/her buying habits, time of visits, etc.
These techniques work by adopting either of the following methods:
Noise inclusion methods modify secret attributes by including noise to achieve confidentiality. In this technique, a hypothetical or randomized number is added or multiplied to secret computable attributes. The hypothetical value is taken from a normal distribution having a mean value zero and a very negligible standard deviation [9, 10] Table 1 discuss the noise addition procedure as follows:
Data swapping is a renowned and famous data perturbation technique. Data swapping can be defined as, the process of swapping of sensitive information among two persons by maintaining the sensitive information about the individuals [11]. In this method, actual individual records are changed with new values so that original dataset is entirely replaced so that the confidential attributes in a dataset are preserved. Through this method, data mining process achieved much accuracy when compared with existing noise addition methods with no breach in the privacy of the individuals.
The main reason for using data swapping technique is that it can be functional all along with additional privacy preserving data mining techniques, for example k-anonymity and randomization [12].
Cryptography is an extensively used method that is used for encrypting a plain text to get cipher (encrypted) text. Clear text or plaintext is defined as the data that is written by the user and can be easily examined and understood with no algorithm. The method of covering normal in order to mask its actual meaning is known as encryption. After applying encryption on a plain text, the random data which is generated is known as cipher text. Cryptography simply muddles data in order to achieve secrecy and/or accuracy of information and facilitates transmission of data among unsure networks so that it cannot be read by any mediator apart from the legal receiver [13, 14].