Mobile Computing and Sustainable Informatics最新文献

筛选
英文 中文
Classification of Intrusions in RPL-Based IoT Networks: A Comparison 基于rpl的物联网网络入侵分类:比较
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_65
P. Nandhini, S. Kuppuswami, S. Malliga
{"title":"Classification of Intrusions in RPL-Based IoT Networks: A Comparison","authors":"P. Nandhini, S. Kuppuswami, S. Malliga","doi":"10.1007/978-981-16-1866-6_65","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_65","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Cryptographic Hashing Algorithms for Image Identification in Deduplication Process 重复数据删除过程中图像识别的加密哈希算法分析
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_62
G. Sujatha, D. Hemavathi, K. Sornalakshmi, S. Sindhu
{"title":"Analysis of Cryptographic Hashing Algorithms for Image Identification in Deduplication Process","authors":"G. Sujatha, D. Hemavathi, K. Sornalakshmi, S. Sindhu","doi":"10.1007/978-981-16-1866-6_62","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_62","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keyword Recognition from EEG Signals on Smart Devices a Novel Approach 智能设备上脑电信号关键字识别的新方法
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_3
Sushil Pandharinath Bedre, S. K. Jha, C. Patil, M. Dhopeshwarkar, A. Gaikwad, P. Yannawar
{"title":"Keyword Recognition from EEG Signals on Smart Devices a Novel Approach","authors":"Sushil Pandharinath Bedre, S. K. Jha, C. Patil, M. Dhopeshwarkar, A. Gaikwad, P. Yannawar","doi":"10.1007/978-981-16-1866-6_3","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_3","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134034118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Replication Protocol Using Scalable Partition Prediction and Information Estimation Algorithm for Improving DCN Data Availability 基于可扩展分区预测和信息估计算法的DCN复制协议
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_44
B. Thiruvenkatam, M. Mukeshkrishnan
{"title":"A Novel Replication Protocol Using Scalable Partition Prediction and Information Estimation Algorithm for Improving DCN Data Availability","authors":"B. Thiruvenkatam, M. Mukeshkrishnan","doi":"10.1007/978-981-16-1866-6_44","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_44","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"93 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Critical Analysis of Virtual LAN and Its Advantages for the Campus Networks 校园网虚拟局域网及其优势分析
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_56
Saampatii Vakharkar, Nitin A. Sakhare
{"title":"Critical Analysis of Virtual LAN and Its Advantages for the Campus Networks","authors":"Saampatii Vakharkar, Nitin A. Sakhare","doi":"10.1007/978-981-16-1866-6_56","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_56","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130206951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facial Expression Recognition System 面部表情识别系统
Mobile Computing and Sustainable Informatics Pub Date : 2021-07-23 DOI: 10.1007/978-981-16-1866-6_25
H. Kumar, Ayush Elhance, Vansh Nagpal, N. Partheeban, K. Baalamurugan, Srinivasan Sriramulu
{"title":"Facial Expression Recognition System","authors":"H. Kumar, Ayush Elhance, Vansh Nagpal, N. Partheeban, K. Baalamurugan, Srinivasan Sriramulu","doi":"10.1007/978-981-16-1866-6_25","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_25","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Residual Learning for Facial Emotion Recognition 基于深度残差学习的面部情绪识别
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_22
Sagar Mishra, Basanta Joshi, Rajendra Paudyal, Duryodhan Chaulagain, S. Shakya
{"title":"Deep Residual Learning for Facial Emotion Recognition","authors":"Sagar Mishra, Basanta Joshi, Rajendra Paudyal, Duryodhan Chaulagain, S. Shakya","doi":"10.1007/978-981-16-1866-6_22","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_22","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"245 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120939299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment 资源受限物联网环境下入侵检测方法综述
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_12
A. Bhavani, Neha Mangla
{"title":"A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment","authors":"A. Bhavani, Neha Mangla","doi":"10.1007/978-981-16-1866-6_12","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_12","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126074433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Modeling Using Normal Mammograms for Predicting Breast Cancer 使用正常乳房x光片的深度学习模型预测乳腺癌
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_30
A. Sivasangari, D. Deepa, T. Anandhi, Suja Cherukullapurath Mana, R. Vignesh, B. Keerthi Samhitha
{"title":"Deep Learning Modeling Using Normal Mammograms for Predicting Breast Cancer","authors":"A. Sivasangari, D. Deepa, T. Anandhi, Suja Cherukullapurath Mana, R. Vignesh, B. Keerthi Samhitha","doi":"10.1007/978-981-16-1866-6_30","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_30","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer 通过增强去抖动缓冲器减轻IP电话中延迟引起的延迟
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_1
Asif Karim, Eshtiak Ahmed, S. Azam, Bharanidharan Shanmugam, Pronab Ghosh
{"title":"Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer","authors":"Asif Karim, Eshtiak Ahmed, S. Azam, Bharanidharan Shanmugam, Pronab Ghosh","doi":"10.1007/978-981-16-1866-6_1","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_1","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信