Research Book - data engineering and information security series 1
This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering....
Saved in:
Other Authors: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Penerbit UTHM
2017
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf http://eprints.uthm.edu.my/4158/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uthm.eprints.4158 |
---|---|
record_format |
eprints |
spelling |
my.uthm.eprints.41582022-01-23T05:17:30Z http://eprints.uthm.edu.my/4158/ Research Book - data engineering and information security series 1 TA190-194 Management of engineering works This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security. Data Engineering. Chapter 1 discusses the techniques used for modelling data in data engineering. Chapter 2 looks at the firefly algorithm in solving the optimization problems in data engineering. Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. Chapter 4 discusses the comparative analysis for gamification approaches in education and Chapter 5 looks at performance analysis for the Swotsuite Toolkit for Web Internet of Things (IoTs). Information Security. Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. Chapter 7 discusses the comparative analysis of Data Wiping Techniques using Android Ext4 File System. Chapter 8 looks at comparative gait analysis for criminal investigation using leave bag behind techniques while Chapter 9 discusses the comparisons of seam carving detection techniques for digital images. Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security. Penerbit UTHM Ibrahim, Rosziati Jamel, Sapi'ee 2017 Book PeerReviewed text en http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf Ibrahim, Rosziati and Jamel, Sapi'ee, eds. (2017) Research Book - data engineering and information security series 1. Penerbit UTHM, Batu Pahat, Johor. ISBN 9789672110583 |
institution |
Universiti Tun Hussein Onn Malaysia |
building |
UTHM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tun Hussein Onn Malaysia |
content_source |
UTHM Institutional Repository |
url_provider |
http://eprints.uthm.edu.my/ |
language |
English |
topic |
TA190-194 Management of engineering works |
spellingShingle |
TA190-194 Management of engineering works Research Book - data engineering and information security series 1 |
description |
This research book discusses the current research in Data Engineering and Information Security. It consists of 10 chapters. Chapter 1 to Chapter 5 cover the research areas under Data Engineering while Chapter 6 until Chapter 10 cover the research areas under Information Security.
Data Engineering. Chapter 1 discusses the techniques used for modelling data in data engineering. Chapter 2 looks at the firefly algorithm in solving the optimization problems in data engineering. Chapter 3 proposes a new hybrid evolutionary algorithm for plant forecasting using fuzzy inference system. Chapter 4 discusses the comparative analysis for gamification approaches in education and Chapter 5 looks at performance analysis for the Swotsuite Toolkit for Web Internet of Things (IoTs).
Information Security. Chapter 6 proposes an improved DDoS Detection using Hybrid N-Gram Heuristic Technique in information security area. Chapter 7 discusses the comparative analysis of Data Wiping Techniques using Android Ext4 File System. Chapter 8 looks at comparative gait analysis for criminal investigation using leave bag behind techniques while Chapter 9 discusses the comparisons of seam carving detection techniques for digital images. Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security. |
author2 |
Ibrahim, Rosziati |
author_facet |
Ibrahim, Rosziati |
format |
Book |
title |
Research Book - data engineering and information security series 1 |
title_short |
Research Book - data engineering and information security series 1 |
title_full |
Research Book - data engineering and information security series 1 |
title_fullStr |
Research Book - data engineering and information security series 1 |
title_full_unstemmed |
Research Book - data engineering and information security series 1 |
title_sort |
research book - data engineering and information security series 1 |
publisher |
Penerbit UTHM |
publishDate |
2017 |
url |
http://eprints.uthm.edu.my/4158/1/Research%20Book%20%E2%80%93%20Data%20Engineering%20and%20Information%20Security%20Series%201.pdf http://eprints.uthm.edu.my/4158/ |
_version_ |
1738581214978113536 |
score |
13.19449 |