Computer Networks, Big Data and IoT最新文献

筛选
英文 中文
A Deep Learning Approach to Detect Lumpy Skin Disease in Cows 奶牛肿块性皮肤病的深度学习检测方法
Computer Networks, Big Data and IoT Pub Date : 2020-02-28 DOI: 10.1007/978-981-16-0965-7_30
G. Rai, Naveen, A. Hussain, Amit Kumar, Rahul Nijhawan
{"title":"A Deep Learning Approach to Detect Lumpy Skin Disease in Cows","authors":"G. Rai, Naveen, A. Hussain, Amit Kumar, Rahul Nijhawan","doi":"10.1007/978-981-16-0965-7_30","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_30","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques 利用独特的机器学习技术识别恶性网站
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_39
Laki Sahu, Sanjukta Mohanty, S. K. Mohapatra, A. Acharya
{"title":"Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques","authors":"Laki Sahu, Sanjukta Mohanty, S. K. Mohapatra, A. Acharya","doi":"10.1007/978-981-16-0965-7_39","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_39","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data 用于可视化加密货币时间数据的数据流架构
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_50
A. Bandi
{"title":"Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data","authors":"A. Bandi","doi":"10.1007/978-981-16-0965-7_50","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_50","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW) 企业网络:基于下一代防火墙(NGFW)的安全增强和策略管理
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_59
Md. Taslim Arefin, Md. Raihan Uddin, Nawshad Ahmad Evan, Raiyan Alam
{"title":"Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)","authors":"Md. Taslim Arefin, Md. Raihan Uddin, Nawshad Ahmad Evan, Raiyan Alam","doi":"10.1007/978-981-16-0965-7_59","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_59","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing 边缘DNS全局服务器负载均衡,用于边缘计算负载均衡
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_57
P. Raj
{"title":"An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing","authors":"P. Raj","doi":"10.1007/978-981-16-0965-7_57","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_57","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of IoT and SDN to Mitigate DDoS with RYU Controller 集成物联网和SDN以缓解RYU控制器的DDoS攻击
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_52
Mimi Cherian, Satishkumar Verma
{"title":"Integration of IoT and SDN to Mitigate DDoS with RYU Controller","authors":"Mimi Cherian, Satishkumar Verma","doi":"10.1007/978-981-16-0965-7_52","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_52","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing 多访问边缘计算中负载平衡的Johnson排序
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_24
P. Raj
{"title":"Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing","authors":"P. Raj","doi":"10.1007/978-981-16-0965-7_24","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_24","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126528142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution 通过“现收现付”方法解决实体问题,挑战数据模型和数据机密性
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_37
E. Lydia, T. V. Rao, K. Kumar, A. Mohan, Sumalatha Lingamgunta
{"title":"Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution","authors":"E. Lydia, T. V. Rao, K. Kumar, A. Mohan, Sumalatha Lingamgunta","doi":"10.1007/978-981-16-0965-7_37","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_37","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm 基于增强破玻璃算法的多所有者访问健康记录保存与置乱
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_38
Kshitij U. Pimple, Nilima Dongre Jawade
{"title":"Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm","authors":"Kshitij U. Pimple, Nilima Dongre Jawade","doi":"10.1007/978-981-16-0965-7_38","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_38","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm 移动自组织网络及其性能优化算法研究
Computer Networks, Big Data and IoT Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-0965-7_12
Vishal Polara, J M Rathod
{"title":"A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm","authors":"Vishal Polara, J M Rathod","doi":"10.1007/978-981-16-0965-7_12","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_12","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信