Lecture Notes on Data Engineering and Communications Technologies最新文献

筛选
英文 中文
Correlation Between K-means Clustering and Topic Modeling Methods on Twitter Datasets 推特数据集上k -均值聚类与主题建模方法的相关性
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_38
P. Tijare, Jhansi Rani Prathuri
{"title":"Correlation Between K-means Clustering and Topic Modeling Methods on Twitter Datasets","authors":"P. Tijare, Jhansi Rani Prathuri","doi":"10.1007/978-981-16-3961-6_38","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_38","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Problems of Providing Access to a Geographic Information System Processing Data of Different Degrees of Secrecy 地理信息系统处理不同保密程度数据的访问问题
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_17
V. Gryzunov, Darina Gryzunova
{"title":"Problems of Providing Access to a Geographic Information System Processing Data of Different Degrees of Secrecy","authors":"V. Gryzunov, Darina Gryzunova","doi":"10.1007/978-981-16-3961-6_17","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_17","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Contracts and NFTs: Non-Fungible Tokens as a Core Component of Blockchain to Be Used as Collectibles 智能合约和nft:不可替代的代币作为区块链的核心组成部分,用作收藏品
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_34
Akash Arora, Kanisk, Shailender Kumar
{"title":"Smart Contracts and NFTs: Non-Fungible Tokens as a Core Component of Blockchain to Be Used as Collectibles","authors":"Akash Arora, Kanisk, Shailender Kumar","doi":"10.1007/978-981-16-3961-6_34","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_34","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Curbing Criminal Acts on Mobile Phone Network 遏制手机网络犯罪行为
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_10
Olasina Jamiu Rotimi, S. Misra, A. Agrawal, Ezenwoke Azubuike, R. Maskeliūnas, R. Damaševičius
{"title":"Curbing Criminal Acts on Mobile Phone Network","authors":"Olasina Jamiu Rotimi, S. Misra, A. Agrawal, Ezenwoke Azubuike, R. Maskeliūnas, R. Damaševičius","doi":"10.1007/978-981-16-3961-6_10","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_10","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134013460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review 计算机网络中异常与入侵检测的深度学习方法综述
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_45
Khushnaseeb Roshan, Aasim Zafar
{"title":"Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review","authors":"Khushnaseeb Roshan, Aasim Zafar","doi":"10.1007/978-981-16-3961-6_45","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_45","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation and Performance Analysis of Apache Pulsar and NATS 阿帕奇脉冲星和NATS的评估与性能分析
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_16
Vanita Jain, Aarush Ahuja, D. Saini
{"title":"Evaluation and Performance Analysis of Apache Pulsar and NATS","authors":"Vanita Jain, Aarush Ahuja, D. Saini","doi":"10.1007/978-981-16-3961-6_16","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_16","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Augmented Symmetric Optical Image Cryptosystem Based on Hybrid Transform Employing Rear Mounted Technique Using Three Different Complex Masks 基于三种不同复掩模后置混合变换的增强对称光学图像密码系统
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_18
Priyanka Maan, H. Singh, A. Kumari
{"title":"Security Augmented Symmetric Optical Image Cryptosystem Based on Hybrid Transform Employing Rear Mounted Technique Using Three Different Complex Masks","authors":"Priyanka Maan, H. Singh, A. Kumari","doi":"10.1007/978-981-16-3961-6_18","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_18","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Approach for Analyzing Log Files Based on String Matching Regular Expressions 基于字符串匹配正则表达式的日志文件系统分析方法
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_1
Keshav Kaushik, Gargeya Sharma, Gaurav Goyal, Asmit Kumar Sharma, Ashish Chaubey
{"title":"A Systematic Approach for Analyzing Log Files Based on String Matching Regular Expressions","authors":"Keshav Kaushik, Gargeya Sharma, Gaurav Goyal, Asmit Kumar Sharma, Ashish Chaubey","doi":"10.1007/978-981-16-3961-6_1","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_1","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Phishing Websites Using Classification Algorithms 基于分类算法的钓鱼网站检测
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_12
S. Ganesan
{"title":"Detection of Phishing Websites Using Classification Algorithms","authors":"S. Ganesan","doi":"10.1007/978-981-16-3961-6_12","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_12","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishing 保护隐私数据发布的事务数据高效聚类
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_14
Vartika Puri, Parmeet Kaur, Shelly Sachdeva
{"title":"Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishing","authors":"Vartika Puri, Parmeet Kaur, Shelly Sachdeva","doi":"10.1007/978-981-16-3961-6_14","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_14","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123743543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信