Lecture Notes on Data Engineering and Communications Technologies最新文献

筛选
英文 中文
Coin Drop—A Decentralised Exchange Platform 投币——一个去中心化的交易平台
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_33
Vanita Jain, Akanshu Raj, Abhi Tanwar, Mridul Khurana, Achin Jain
{"title":"Coin Drop—A Decentralised Exchange Platform","authors":"Vanita Jain, Akanshu Raj, Abhi Tanwar, Mridul Khurana, Achin Jain","doi":"10.1007/978-981-16-3961-6_33","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_33","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123867459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Risk and Security Within Fog Computing-Enabled e-Healthcare System in Uttarakhand 北阿坎德邦雾计算电子医疗保健系统的风险和安全分析
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_3
Naveen Tewari, S. Budhani
{"title":"Analysis of Risk and Security Within Fog Computing-Enabled e-Healthcare System in Uttarakhand","authors":"Naveen Tewari, S. Budhani","doi":"10.1007/978-981-16-3961-6_3","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_3","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison and RANSAC 基于特征比较和RANSAC的被动视频伪造检测技术
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_15
Jatin Patel, R. Sheth
{"title":"Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison and RANSAC","authors":"Jatin Patel, R. Sheth","doi":"10.1007/978-981-16-3961-6_15","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_15","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-Based Predictive Analysis to Abet Climatic Change Preparedness 基于机器学习的预测分析以促进气候变化准备
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_44
Abra Shafiq Siddiqi, M. Alam, Deepak Mehta, S. Zafar
{"title":"Machine Learning-Based Predictive Analysis to Abet Climatic Change Preparedness","authors":"Abra Shafiq Siddiqi, M. Alam, Deepak Mehta, S. Zafar","doi":"10.1007/978-981-16-3961-6_44","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_44","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Correlation Blockchain Matrix Factorization to Enhance the Disease Prediction Accuracy and Security in IoT Medical Data 关联区块链矩阵分解提高物联网医疗数据疾病预测准确性和安全性
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_30
P. Renuka, B. Booba
{"title":"A Correlation Blockchain Matrix Factorization to Enhance the Disease Prediction Accuracy and Security in IoT Medical Data","authors":"P. Renuka, B. Booba","doi":"10.1007/978-981-16-3961-6_30","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_30","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Open Source Tools and Techniques for Network Security 网络安全的开源工具和技术评估
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_25
U. Guru Prasad, R. Girija, R. Vedhapriyavadhana, S. Jayalakshmi
{"title":"Assessment of Open Source Tools and Techniques for Network Security","authors":"U. Guru Prasad, R. Girija, R. Vedhapriyavadhana, S. Jayalakshmi","doi":"10.1007/978-981-16-3961-6_25","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_25","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114721919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligence 利用群智能优化的极限学习机检测Android恶意软件
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_4
R. Gupta, Aviral Agarwal, Dev Dua, Ankit Yadav
{"title":"Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligence","authors":"R. Gupta, Aviral Agarwal, Dev Dua, Ankit Yadav","doi":"10.1007/978-981-16-3961-6_4","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_4","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Evolutionary Algorithms for Energy Efficient and Secure Wireless Sensor Networks 高效安全无线传感器网络的进化算法研究进展
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_49
R. Yadav, S. Indu, D. Gupta
{"title":"Review of Evolutionary Algorithms for Energy Efficient and Secure Wireless Sensor Networks","authors":"R. Yadav, S. Indu, D. Gupta","doi":"10.1007/978-981-16-3961-6_49","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_49","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121941266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation and Transformation Analysis of the Mithi River 密提河评价与改造分析
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_41
Saumya Deshmukh, Shrishti Karkera, Prachi Rawale, Chhaya Narvekar
{"title":"Evaluation and Transformation Analysis of the Mithi River","authors":"Saumya Deshmukh, Shrishti Karkera, Prachi Rawale, Chhaya Narvekar","doi":"10.1007/978-981-16-3961-6_41","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_41","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of 2 × 4 Microstrip Patch Antenna Array with Defected Ground Structure for 5G Mobile Communication 5G移动通信接地结构缺陷的2 × 4微带贴片天线阵列设计与分析
Lecture Notes on Data Engineering and Communications Technologies Pub Date : 2021-10-02 DOI: 10.1007/978-981-16-3961-6_39
S. Zafar, V. Saxena, R. K. Baghel
{"title":"Design and Analysis of 2 × 4 Microstrip Patch Antenna Array with Defected Ground Structure for 5G Mobile Communication","authors":"S. Zafar, V. Saxena, R. K. Baghel","doi":"10.1007/978-981-16-3961-6_39","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_39","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131410706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信