N. Bačanin, Eva Tuba, M. Zivkovic, I. Strumberger, M. Tuba
{"title":"Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks Localization","authors":"N. Bačanin, Eva Tuba, M. Zivkovic, I. Strumberger, M. Tuba","doi":"10.1007/978-3-030-49336-3_33","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_33","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key-Based Obfuscation Using Strong Physical Unclonable Function: A Secure Implementation","authors":"Surbhi Chhabra, K. Lata","doi":"10.1007/978-3-030-49336-3_39","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_39","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lokesh M. Giripunje, D. Masand, Shishir K. Shandilya
{"title":"Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A Review","authors":"Lokesh M. Giripunje, D. Masand, Shishir K. Shandilya","doi":"10.1007/978-3-030-49336-3_26","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_26","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132407201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks","authors":"Nilesh Kunhare, Ritu Tiwari, J. Dhar","doi":"10.1007/978-3-030-49336-3_36","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_36","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Elleuch, Anis Mezghani, M. Khemakhem, M. Kherallah
{"title":"Clothing Classification Using Deep CNN Architecture Based on Transfer Learning","authors":"M. Elleuch, Anis Mezghani, M. Khemakhem, M. Kherallah","doi":"10.1007/978-3-030-49336-3_24","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_24","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural Network","authors":"Atul Patel, Monidipa Das, S. Ghosh","doi":"10.1007/978-3-030-49336-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_6","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System","authors":"R. Kaur, L. Singh, Babita Pandey, A. Khamparia","doi":"10.1007/978-3-030-49336-3_38","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_38","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116371654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Expression Recognition Using Histogram of Oriented Gradients with SVM-RFE Selected Features","authors":"Sumeet Saurav, Sanjay Singh, Ravi Saini","doi":"10.1007/978-3-030-49336-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_34","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Cyber Security Paradigm: A Review","authors":"S. Qureshi, Shishir K. Shandilya","doi":"10.1007/978-3-030-49336-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-49336-3_27","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smart Health-Oriented Traditional Chinese Medicine Pharmacy Intelligent Service Platform","authors":"Lei Hua, Yuntao Ma, Xiangyu Meng, Bin Xu, Jin Qi","doi":"10.1007/978-3-030-32962-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-32962-4_3","url":null,"abstract":"","PeriodicalId":215912,"journal":{"name":"International Conference on Health Information Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131016949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}