Research Book - data engineering and information security series 1
This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering....
Saved in:
Other Authors: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Penerbit UTHM
2017
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf http://eprints.uthm.edu.my/4158/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security.
Data Engineering. Chapter 1 discusses the techniques used for modelling data in data engineering. Chapter 2 looks at the firefly algorithm in solving the optimization problems in data engineering. Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. Chapter 4 discusses the comparative analysis for gamification approaches in education and Chapter 5 looks at performance analysis for the Swotsuite Toolkit for Web Internet of Things (IoTs).
Information Security. Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. Chapter 7 discusses the comparative analysis of Data Wiping Techniques using Android Ext4 File System. Chapter 8 looks at comparative gait analysis for criminal investigation using leave bag behind techniques while Chapter 9 discusses the comparisons of seam carving detection techniques for digital images. Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security. |
---|