Lecture Notes on Data Engineering and Communications Technologies最新文献

筛选
英文 中文
Cloud Security: The Future of Data Storage 云安全:数据存储的未来
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_9
Parveen Bajaj, R. Arora, Mehak Khurana, Shilpa Mahajan
{"title":"Cloud Security: The Future of Data Storage","authors":"Parveen Bajaj, R. Arora, Mehak Khurana, Shilpa Mahajan","doi":"10.1007/978-981-16-3961-6_9","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_9","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Self-Sovereign Identity Management System Using Blockchain 基于区块链的自主身份管理系统
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_31
Tripti Rathee, Parvinder Singh
{"title":"A Self-Sovereign Identity Management System Using Blockchain","authors":"Tripti Rathee, Parvinder Singh","doi":"10.1007/978-981-16-3961-6_31","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_31","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilization and Energy Consumption Optimization for Cloud Computing Environment 云计算环境下的利用与能耗优化
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_50
Rajeev Tiwari, Roohi Sille, N. Salankar, Pardeep Singh
{"title":"Utilization and Energy Consumption Optimization for Cloud Computing Environment","authors":"Rajeev Tiwari, Roohi Sille, N. Salankar, Pardeep Singh","doi":"10.1007/978-981-16-3961-6_50","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_50","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hierarchal Communication Architecture for Multi-level Energy Harvesting Support in Underwater Sensor Network 水下传感器网络多层次能量收集支持的层次通信体系结构
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_48
Anuradha, A. Bindal, D. Prasad, Afshan Hassan
{"title":"Hierarchal Communication Architecture for Multi-level Energy Harvesting Support in Underwater Sensor Network","authors":"Anuradha, A. Bindal, D. Prasad, Afshan Hassan","doi":"10.1007/978-981-16-3961-6_48","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_48","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognition of Driver Drowsiness to Inculcate Predictive Analysis 驾驶员困倦认知灌输预测分析
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_37
Abra Shafiq Siddiqi, M. Alam, S. Zafar, Samia Khan, Nida Iftekhar
{"title":"Cognition of Driver Drowsiness to Inculcate Predictive Analysis","authors":"Abra Shafiq Siddiqi, M. Alam, S. Zafar, Samia Khan, Nida Iftekhar","doi":"10.1007/978-981-16-3961-6_37","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_37","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication of Digital Media Using Reversible Watermarking 基于可逆水印的数字媒体认证
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_6
Geeta Sharma, Vinay Kumar, Kavita Chaudhary
{"title":"Authentication of Digital Media Using Reversible Watermarking","authors":"Geeta Sharma, Vinay Kumar, Kavita Chaudhary","doi":"10.1007/978-981-16-3961-6_6","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_6","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Sensing Technologies for Business Solutions 商业解决方案的人类感知技术
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_42
Rajeev Tiwari, K. Kumar, Satyam Kumar, Shelly
{"title":"Human-Sensing Technologies for Business Solutions","authors":"Rajeev Tiwari, K. Kumar, Satyam Kumar, Shelly","doi":"10.1007/978-981-16-3961-6_42","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_42","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Offensive Approach for Hiding Malicious Payloads in an Image 在图像中隐藏恶意载荷的攻击性方法
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_23
Keshav Kaushik, Sneha Surana
{"title":"An Offensive Approach for Hiding Malicious Payloads in an Image","authors":"Keshav Kaushik, Sneha Surana","doi":"10.1007/978-981-16-3961-6_23","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_23","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in Health Care: A Review 医疗保健中的区块链:综述
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_35
Sanya Bindlish, Sargam Chhabra, Kshitij Mehta, P. Sapra
{"title":"Blockchain in Health Care: A Review","authors":"Sanya Bindlish, Sargam Chhabra, Kshitij Mehta, P. Sapra","doi":"10.1007/978-981-16-3961-6_35","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_35","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Secure Car Hiring System 基于区块链的安全租车系统
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_29
Sonakshi, S. Verma
{"title":"A Blockchain-Based Secure Car Hiring System","authors":"Sonakshi, S. Verma","doi":"10.1007/978-981-16-3961-6_29","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_29","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信