Research Book - data engineering and information security series 1

This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering....

Full description

Saved in:
Bibliographic Details
Other Authors: Ibrahim, Rosziati
Format: Book
Language:English
Published: Penerbit UTHM 2017
Subjects:
Online Access:http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf
http://eprints.uthm.edu.my/4158/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.4158
record_format eprints
spelling my.uthm.eprints.41582022-01-23T05:17:30Z http://eprints.uthm.edu.my/4158/ Research Book - data engineering and information security series 1 TA190-194 Management of engineering works This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering. Chapter 1 discusses the techniques used for modelling data in data engineering. Chapter 2 looks at the firefly algorithm in solving the optimization problems in data engineering. Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. Chapter 4 discusses the comparative analysis for gamification approaches in education and Chapter 5 looks at performance analysis for the Swotsuite Toolkit for Web Internet of Things (IoTs). Information Security. Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. Chapter 7 discusses the comparative analysis of Data Wiping Techniques using Android Ext4 File System. Chapter 8 looks at comparative gait analysis for criminal investigation using leave bag behind techniques while Chapter 9 discusses the comparisons of seam carving detection techniques for digital images. Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security. Penerbit UTHM Ibrahim, Rosziati Jamel, Sapi'ee 2017 Book PeerReviewed text en http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf Ibrahim, Rosziati and Jamel, Sapi'ee, eds. (2017) Research Book - data engineering and information security series 1. Penerbit UTHM, Batu Pahat, Johor. ISBN 9789672110583
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
language English
topic TA190-194 Management of engineering works
spellingShingle TA190-194 Management of engineering works
Research Book - data engineering and information security series 1
description This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering. Chapter 1 discusses the techniques used for modelling data in data engineering. Chapter 2 looks at the firefly algorithm in solving the optimization problems in data engineering. Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. Chapter 4 discusses the comparative analysis for gamification approaches in education and Chapter 5 looks at performance analysis for the Swotsuite Toolkit for Web Internet of Things (IoTs). Information Security. Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. Chapter 7 discusses the comparative analysis of Data Wiping Techniques using Android Ext4 File System. Chapter 8 looks at comparative gait analysis for criminal investigation using leave bag behind techniques while Chapter 9 discusses the comparisons of seam carving detection techniques for digital images. Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security.
author2 Ibrahim, Rosziati
author_facet Ibrahim, Rosziati
format Book
title Research Book - data engineering and information security series 1
title_short Research Book - data engineering and information security series 1
title_full Research Book - data engineering and information security series 1
title_fullStr Research Book - data engineering and information security series 1
title_full_unstemmed Research Book - data engineering and information security series 1
title_sort research book - data engineering and information security series 1
publisher Penerbit UTHM
publishDate 2017
url http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf
http://eprints.uthm.edu.my/4158/
_version_ 1738581214978113536
score 13.19449