{"title":"Secure and Efficient Data Privacy, Authentication and Integrity Schemes Using Hybrid Cryptography","authors":"S. Bhat, V. Kapoor","doi":"10.1007/978-981-13-2673-8_30","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_30","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126603819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sharing Organizational Data Outside Its Domain Using ABE in Cloud Environment","authors":"Reetu Gupta, P. Kanungo, N. Dagdee","doi":"10.1007/978-981-13-2673-8_9","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_9","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Fuzzy Expert System for Dengue Diagnosis","authors":"Tanmay Kasbe, R. S. Pippal","doi":"10.1007/978-981-13-2673-8_1","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_1","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Person-Dependent Face Recognition Using Histogram of Oriented Gradients (HOG) and Convolution Neural Network (CNN)","authors":"Priya Tambi, Sarika Jain, Devendra Mishra","doi":"10.1007/978-981-13-2673-8_5","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_5","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114784144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Hard and Soft Thresholding Techniques for Speech Denoising Using FRFT","authors":"Prafulla Kumar, Sarita Kansal","doi":"10.1007/978-981-13-2673-8_43","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_43","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noninvasive Gluco Pulse Watch","authors":"Varun Sood, Manish Choudhary, A. Malay, R. Patel","doi":"10.1007/978-981-13-2673-8_34","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_34","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FONI by Using Survivability Approach: An Overview","authors":"K. Sairam, C. Singh","doi":"10.1007/978-981-13-2673-8_56","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_56","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Data Storage Security with Efficient Computing in Cloud","authors":"M. Tyagi, M. Manoria, Bharati Mishra","doi":"10.1007/978-981-13-2673-8_13","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_13","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusions of Palm Print with Palm-Phalanges Print and Palm Geometry","authors":"H. Purohit, P. Ajmera","doi":"10.1007/978-981-13-2673-8_59","DOIUrl":"https://doi.org/10.1007/978-981-13-2673-8_59","url":null,"abstract":"","PeriodicalId":403537,"journal":{"name":"International Conference on Advanced Computing Networking and Informatics","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}