{"title":"Blockchain and IoT for Auto Leak Unearthing","authors":"P. Sapra, Vaishali Kalra, Simran Sejwal","doi":"10.1007/978-981-16-3961-6_32","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_32","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134600943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric Image Cryptosystem Based on Chaotic Zone Plate Phase Mask and Arnold Transform","authors":"Mehak Khurana, H. Singh","doi":"10.1007/978-981-16-3961-6_5","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_5","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Considerations in the Design of IEEE 802.15.4 Transceiver: A Review","authors":"K. Raj, P. Dinesha, S. Shankar","doi":"10.1007/978-981-16-3961-6_19","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_19","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114559080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Rahunathan, D. Harish, A. Samson, D. Sivabalaselvamani
{"title":"Efficiency Analyzing on Vehicle Tracking Systems","authors":"L. Rahunathan, D. Harish, A. Samson, D. Sivabalaselvamani","doi":"10.1007/978-981-16-3961-6_40","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_40","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Anti-phishing Techniques and its Shortcomings","authors":"Bhawna Sharma, Parvinder Singh","doi":"10.1007/978-981-16-3961-6_24","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_24","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121234825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing of Fuzzy Logic-Based Intrusion Detection System (FIDS) for Detection of Blackhole Attack in AODV for MANETs","authors":"Ruchi Makani, B. Reddy","doi":"10.1007/978-981-16-3961-6_11","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_11","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"8 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Test Case Generation and Fault-Tolerant Framework Based on N-version and Recovery Block Mechanism","authors":"S. Rani, Amandeep Kaur","doi":"10.1007/978-981-16-3961-6_7","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_7","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131929116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principle and Application of Peak Force Tapping Mode Atomic Force Microscope","authors":"Shoujin Wang, Chunxue Hao","doi":"10.1007/978-981-16-5854-9_86","DOIUrl":"https://doi.org/10.1007/978-981-16-5854-9_86","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Application of Computer Graphics Processing and Recognition Technology","authors":"Xiuxian Li, Yurong Zhu","doi":"10.1007/978-981-16-5854-9_25","DOIUrl":"https://doi.org/10.1007/978-981-16-5854-9_25","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Trend and Research of Computer Drawing Technology in Chinese Farmer’s Painting","authors":"Lanting Liu","doi":"10.1007/978-981-16-5854-9_20","DOIUrl":"https://doi.org/10.1007/978-981-16-5854-9_20","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"113 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}