{"title":"Analysis of Risk and Security Within Fog Computing-Enabled e-Healthcare System in Uttarakhand","authors":"Naveen Tewari, S. Budhani","doi":"10.1007/978-981-16-3961-6_3","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_3","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passive Video Forgery Detection Techniques to Detect Copy Move Tampering Through Feature Comparison and RANSAC","authors":"Jatin Patel, R. Sheth","doi":"10.1007/978-981-16-3961-6_15","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_15","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abra Shafiq Siddiqi, M. Alam, Deepak Mehta, S. Zafar
{"title":"Machine Learning-Based Predictive Analysis to Abet Climatic Change Preparedness","authors":"Abra Shafiq Siddiqi, M. Alam, Deepak Mehta, S. Zafar","doi":"10.1007/978-981-16-3961-6_44","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_44","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Correlation Blockchain Matrix Factorization to Enhance the Disease Prediction Accuracy and Security in IoT Medical Data","authors":"P. Renuka, B. Booba","doi":"10.1007/978-981-16-3961-6_30","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_30","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Guru Prasad, R. Girija, R. Vedhapriyavadhana, S. Jayalakshmi
{"title":"Assessment of Open Source Tools and Techniques for Network Security","authors":"U. Guru Prasad, R. Girija, R. Vedhapriyavadhana, S. Jayalakshmi","doi":"10.1007/978-981-16-3961-6_25","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_25","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114721919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Malware Detection Using Extreme Learning Machine Optimized with Swarm Intelligence","authors":"R. Gupta, Aviral Agarwal, Dev Dua, Ankit Yadav","doi":"10.1007/978-981-16-3961-6_4","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_4","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Evolutionary Algorithms for Energy Efficient and Secure Wireless Sensor Networks","authors":"R. Yadav, S. Indu, D. Gupta","doi":"10.1007/978-981-16-3961-6_49","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_49","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121941266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and Transformation Analysis of the Mithi River","authors":"Saumya Deshmukh, Shrishti Karkera, Prachi Rawale, Chhaya Narvekar","doi":"10.1007/978-981-16-3961-6_41","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_41","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis of 2 × 4 Microstrip Patch Antenna Array with Defected Ground Structure for 5G Mobile Communication","authors":"S. Zafar, V. Saxena, R. K. Baghel","doi":"10.1007/978-981-16-3961-6_39","DOIUrl":"https://doi.org/10.1007/978-981-16-3961-6_39","url":null,"abstract":"","PeriodicalId":252755,"journal":{"name":"Lecture Notes on Data Engineering and Communications Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131410706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}