G. Rai, Naveen, A. Hussain, Amit Kumar, Rahul Nijhawan
{"title":"A Deep Learning Approach to Detect Lumpy Skin Disease in Cows","authors":"G. Rai, Naveen, A. Hussain, Amit Kumar, Rahul Nijhawan","doi":"10.1007/978-981-16-0965-7_30","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_30","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laki Sahu, Sanjukta Mohanty, S. K. Mohapatra, A. Acharya
{"title":"Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques","authors":"Laki Sahu, Sanjukta Mohanty, S. K. Mohapatra, A. Acharya","doi":"10.1007/978-981-16-0965-7_39","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_39","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data","authors":"A. Bandi","doi":"10.1007/978-981-16-0965-7_50","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_50","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129434249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Taslim Arefin, Md. Raihan Uddin, Nawshad Ahmad Evan, Raiyan Alam
{"title":"Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)","authors":"Md. Taslim Arefin, Md. Raihan Uddin, Nawshad Ahmad Evan, Raiyan Alam","doi":"10.1007/978-981-16-0965-7_59","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_59","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing","authors":"P. Raj","doi":"10.1007/978-981-16-0965-7_57","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_57","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of IoT and SDN to Mitigate DDoS with RYU Controller","authors":"Mimi Cherian, Satishkumar Verma","doi":"10.1007/978-981-16-0965-7_52","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_52","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing","authors":"P. Raj","doi":"10.1007/978-981-16-0965-7_24","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_24","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126528142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Lydia, T. V. Rao, K. Kumar, A. Mohan, Sumalatha Lingamgunta
{"title":"Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution","authors":"E. Lydia, T. V. Rao, K. Kumar, A. Mohan, Sumalatha Lingamgunta","doi":"10.1007/978-981-16-0965-7_37","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_37","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm","authors":"Kshitij U. Pimple, Nilima Dongre Jawade","doi":"10.1007/978-981-16-0965-7_38","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_38","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm","authors":"Vishal Polara, J M Rathod","doi":"10.1007/978-981-16-0965-7_12","DOIUrl":"https://doi.org/10.1007/978-981-16-0965-7_12","url":null,"abstract":"","PeriodicalId":405106,"journal":{"name":"Computer Networks, Big Data and IoT","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}