Big Data, Cloud Computing, and Data Science Engineering [electronic resource] / edited by Roger Lee.

Colaborador(es): Lee, Roger [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Studies in Computational Intelligence ; 1075Editor: Cham : Springer International Publishing : Imprint: Springer, 2023Edición: 1st ed. 2023Descripción: XII, 185 p. 76 illus., 60 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783031196089Tema(s): Engineering -- Data processing | Computational intelligence | Big data | Data Engineering | Computational Intelligence | Big DataFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 620.00285 Clasificación LoC:TA345-345.5Recursos en línea: Libro electrónicoTexto
Contenidos:
Research on Development of Sponsorship Effect Analysis Module Using Text Mining Technique -- A Study on the Relationship between ESG News Keywords and ESG Ratings -- Development of Associated Company Network Visualiza-tion Techniques using Company Product and Service In-formation - Using Cosine Similarity Function -- Hybrid CNN-LSTM based time series data prediction model study -- A Study on Predicting Employee Attrition Using Machine Learning -- A study on the Intention to continue using a Highway Driving assistance (HDA) system based on Advanced Driver Assistance System (ADAS) -- Security Policy Deploying System for Zero Trust Environment -- TTY Session Audit Techniques for Linux Platform1 -- A Study on the Role of Higher Education and Human Re-sources Development for Data Driven AI Society -- The Way Forward for Security Vulnerability Disclosure Policy: Comparative Analysis of US, EU, and Nether-lands -- Study on Government Data Governance Framework: based on the National Data Strategy in the US, the UK, Australia, and Japan -- A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability -- Analysis of IoT research topics using LDA Modeling -- Log4j Vulnerability Analysis and Detection Pattern Pro-duction Technology based on Snort Rules -- A Study on Technology Innovation at Incheon International Airport: Focusing on RAISA.
En: Springer Nature eBookResumen: This book presents scientific results of the 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD 2021) which was held on August 4-6, 2022 in Danang, Vietnam. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. All aspects (theory, applications, and tools) of computer and information science, the practical challenges encountered along the way, and the solutions adopted to solve them are all explored here in the results of the articles featured in this book. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 15 of the conference's most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

Research on Development of Sponsorship Effect Analysis Module Using Text Mining Technique -- A Study on the Relationship between ESG News Keywords and ESG Ratings -- Development of Associated Company Network Visualiza-tion Techniques using Company Product and Service In-formation - Using Cosine Similarity Function -- Hybrid CNN-LSTM based time series data prediction model study -- A Study on Predicting Employee Attrition Using Machine Learning -- A study on the Intention to continue using a Highway Driving assistance (HDA) system based on Advanced Driver Assistance System (ADAS) -- Security Policy Deploying System for Zero Trust Environment -- TTY Session Audit Techniques for Linux Platform1 -- A Study on the Role of Higher Education and Human Re-sources Development for Data Driven AI Society -- The Way Forward for Security Vulnerability Disclosure Policy: Comparative Analysis of US, EU, and Nether-lands -- Study on Government Data Governance Framework: based on the National Data Strategy in the US, the UK, Australia, and Japan -- A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability -- Analysis of IoT research topics using LDA Modeling -- Log4j Vulnerability Analysis and Detection Pattern Pro-duction Technology based on Snort Rules -- A Study on Technology Innovation at Incheon International Airport: Focusing on RAISA.

This book presents scientific results of the 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD 2021) which was held on August 4-6, 2022 in Danang, Vietnam. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. All aspects (theory, applications, and tools) of computer and information science, the practical challenges encountered along the way, and the solutions adopted to solve them are all explored here in the results of the articles featured in this book. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 15 of the conference's most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

UABC ; Perpetuidad

Con tecnología Koha