{"title":"Correlation Between K-means Clustering and Topic Modeling Methods on Twitter Datasets","authors":"P. Tijare, Jhansi Rani Prathuri","doi":"10.1007/978-981-16-3961-6_38","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_38","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems of Providing Access to a Geographic Information System Processing Data of Different Degrees of Secrecy","authors":"V. Gryzunov, Darina Gryzunova","doi":"10.1007/978-981-16-3961-6_17","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_17","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Contracts and NFTs: Non-Fungible Tokens as a Core Component of Blockchain to Be Used as Collectibles","authors":"Akash Arora, Kanisk, Shailender Kumar","doi":"10.1007/978-981-16-3961-6_34","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_34","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olasina Jamiu Rotimi, S. Misra, A. Agrawal, Ezenwoke Azubuike, R. Maskeliūnas, R. Damaševičius
{"title":"Curbing Criminal Acts on Mobile Phone Network","authors":"Olasina Jamiu Rotimi, S. Misra, A. Agrawal, Ezenwoke Azubuike, R. Maskeliūnas, R. Damaševičius","doi":"10.1007/978-981-16-3961-6_10","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_10","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review","authors":"Khushnaseeb Roshan, Aasim Zafar","doi":"10.1007/978-981-16-3961-6_45","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_45","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and Performance Analysis of Apache Pulsar and NATS","authors":"Vanita Jain, Aarush Ahuja, D. Saini","doi":"10.1007/978-981-16-3961-6_16","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_16","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Augmented Symmetric Optical Image Cryptosystem Based on Hybrid Transform Employing Rear Mounted Technique Using Three Different Complex Masks","authors":"Priyanka Maan, H. Singh, A. Kumari","doi":"10.1007/978-981-16-3961-6_18","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_18","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Phishing Websites Using Classification Algorithms","authors":"S. Ganesan","doi":"10.1007/978-981-16-3961-6_12","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_12","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishing","authors":"Vartika Puri, Parmeet Kaur, Shelly Sachdeva","doi":"10.1007/978-981-16-3961-6_14","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_14","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123743543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}