標題: Titlebook: Data, Engineering and Applications; Volume 2 Rajesh Kumar Shukla,Jitendra Agrawal,Geetam Singh Book 2019 Springer Nature Singapore Pte Ltd [打印本頁] 作者: 夾子 時間: 2025-3-21 16:31
書目名稱Data, Engineering and Applications影響因子(影響力)
書目名稱Data, Engineering and Applications影響因子(影響力)學(xué)科排名
書目名稱Data, Engineering and Applications網(wǎng)絡(luò)公開度
書目名稱Data, Engineering and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data, Engineering and Applications被引頻次
書目名稱Data, Engineering and Applications被引頻次學(xué)科排名
書目名稱Data, Engineering and Applications年度引用
書目名稱Data, Engineering and Applications年度引用學(xué)科排名
書目名稱Data, Engineering and Applications讀者反饋
書目名稱Data, Engineering and Applications讀者反饋學(xué)科排名
作者: delta-waves 時間: 2025-3-21 22:51
Book 2019re data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new作者: Expiration 時間: 2025-3-22 02:15 作者: gentle 時間: 2025-3-22 05:37 作者: Affiliation 時間: 2025-3-22 08:54
Wing S. Chow,Sunderesh Heragu,Andrew Kusiakprovise the use of resources. This paper discusses various scheduling algorithms implemented in Hadoop environment. The paper also discusses how fine-tuning of scheduling policies could be used to achieve better performance of different applications, which have been implemented and tested in Apache Hadoop.作者: 亞當心理陰影 時間: 2025-3-22 13:50 作者: 亞當心理陰影 時間: 2025-3-22 18:34 作者: 舞蹈編排 時間: 2025-3-23 00:15
Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Mapecryption, both the shares are gathered and secret image is revealed. The proposed method is secure and simple, and involves less complex operations. Different experimental tests have been performed to demonstrate security aspects of the proposed scheme.作者: 債務(wù) 時間: 2025-3-23 02:52 作者: 蠟燭 時間: 2025-3-23 06:48
Performance Analysis of Scheduling Algorithms in Apache Hadoopprovise the use of resources. This paper discusses various scheduling algorithms implemented in Hadoop environment. The paper also discusses how fine-tuning of scheduling policies could be used to achieve better performance of different applications, which have been implemented and tested in Apache Hadoop.作者: 偽造者 時間: 2025-3-23 11:21
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Modelncertainty. Integration of rough set in IDS facilitates better identification of potential malicious contents. Experimental results clearly indicates that NB tree-based IDS with rough set reports better detection rate and lower false positive, subsequently outperforms the existing state of the art.作者: myriad 時間: 2025-3-23 16:52
Comparative Study of Digital Forensic Toolsy help investigating officers and forensic experts to choose the best tool among all available for better crime examination and identification of evidences. Categorization of different forensic tools can result in saving of time while choosing a tool.作者: 饒舌的人 時間: 2025-3-23 21:33 作者: nutrition 時間: 2025-3-24 00:27 作者: alcohol-abuse 時間: 2025-3-24 05:21
Simulation and Simulation Models revocation list to reduce the overburdening of the hybrid ah hoc network. We have also compared our proposed scheme with other binary tree data structure. The result shows that the proposed mechanism is feasible and takes an order of milliseconds.作者: Flat-Feet 時間: 2025-3-24 10:21 作者: 諂媚于性 時間: 2025-3-24 13:10 作者: cornucopia 時間: 2025-3-24 15:49 作者: 舞蹈編排 時間: 2025-3-24 21:07 作者: 難聽的聲音 時間: 2025-3-25 01:06 作者: cortex 時間: 2025-3-25 04:19 作者: Sigmoidoscopy 時間: 2025-3-25 09:27
Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc NetworkThe paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.作者: 元音 時間: 2025-3-25 15:09 作者: 確保 時間: 2025-3-25 17:49 作者: MOTIF 時間: 2025-3-25 20:08
Design and Development of a Cloud-Based Electronic Medical Records (EMR) Systemechnology. The implementation requirement includes the use of client-side tools and server-side scripting languages, as well as a hosting platform. The client-side tools include HTML, CSS, Javascript, and jquery. PHP was used as the server-side scripting while MySQL served as the database. The appli作者: Intact 時間: 2025-3-26 02:42
Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environmentid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number of 作者: NOVA 時間: 2025-3-26 05:55
An Energy-Efficient Intrusion Detection System for MANETer consumption. In order to overcome all these disadvantages of the proposed, Cluster-based game theory for IDS has been proposed that integrates the Game theory and K-means. In the proposed methodology, game theory is used to calculate reliability score, where K-means provide scope of reliability s作者: 大洪水 時間: 2025-3-26 10:57
DDoS Attack Mitigation Using Random and Flow-Based Schemef DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of such attacks. The next section gives a brief description of the existing methods used for mitigation of such attacks. The third section provides a detailed understanding of the algorithm we are using with作者: 出血 時間: 2025-3-26 13:42 作者: 并排上下 時間: 2025-3-26 17:29
Image Forgery Detection: Survey and Future Directionsnipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.作者: 熄滅 時間: 2025-3-26 22:16 作者: 熔巖 時間: 2025-3-27 01:34 作者: 不斷的變動 時間: 2025-3-27 08:05
Computer-Aided Production Managementid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number of 作者: PHON 時間: 2025-3-27 13:29 作者: amorphous 時間: 2025-3-27 15:32 作者: 哄騙 時間: 2025-3-27 18:14
David Greve,Matthew Wilding,David Hardintheme for VANET have been planned. The planned theme is compared with other decentralized and centralized approaches and it is observed experimentally that the proposed approach achieves better performance.作者: SEED 時間: 2025-3-27 22:57 作者: 暗指 時間: 2025-3-28 05:16 作者: 放棄 時間: 2025-3-28 08:37 作者: 歌曲 時間: 2025-3-28 12:13
Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Mapre also emerging as cloud infrastructures are deployed and maintained by third parties. In this paper, we propose a simple method to secure an image for privacy-preserving storage over cloud infrastructure. One-dimensional chaotic logistic map is used to divide the secret image into two shares such 作者: 修飾語 時間: 2025-3-28 17:32 作者: syring 時間: 2025-3-28 19:46 作者: Myocarditis 時間: 2025-3-29 02:32 作者: entice 時間: 2025-3-29 03:59 作者: 以煙熏消毒 時間: 2025-3-29 07:21 作者: 元音 時間: 2025-3-29 14:44
Certificate Revocation in Hybrid Ad Hoc Networktionally or unintentionally, to other vehicles of the VANET which should ignore such messages to protect its safety. However, public-key cryptography (PKI) is used for authentication to protect attackers from causing evils. The work also addresses to remove the malicious certificate from certificate作者: alliance 時間: 2025-3-29 17:29
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Modelmechanism that strives to differentiate between legitimate and malicious activities with intent to secure the resource and henceforth establish trust. Due to this importance significant amount of research has been carried in this domain. This paper introduces concept of Rough sets in IDS as theoreti作者: 旋轉(zhuǎn)一周 時間: 2025-3-29 21:05
An Energy-Efficient Intrusion Detection System for MANETngs to ad hoc wireless network. Nodes in mobile network have small batteries with limited power. The huge numbers of mobile nodes in MANET makes it impractical to replace sensor node batteries. Along with that, it has open medium and wide distribution of nodes that make MANET open to various types o作者: Pepsin 時間: 2025-3-30 03:24 作者: Cabinet 時間: 2025-3-30 04:39 作者: 微不足道 時間: 2025-3-30 09:07 作者: rods366 時間: 2025-3-30 13:40
Image Forgery Detection: Survey and Future Directionsyday life. Unprecedented involvement of digital images can be seen in various paramount fields like medical science, journalism, sports, criminal investigation, image forensic, etc., where authenticity of image is of vital importance. Various tools are available free of cost or with a negligible amo作者: 燒烤 時間: 2025-3-30 19:23 作者: indemnify 時間: 2025-3-30 21:32
A Systematic Survey on Mobile Forensic Tools Used for Forensic Analysis of Android-Based Social Netw An increasing number of our social and economic transactions are taking place with the help of these applications. Unsurprisingly, these developments have attracted the attention of criminals, who commit crimes using the same applications. Fortunately, a criminal almost always leaves behind some ev作者: 突變 時間: 2025-3-31 03:50
Enhanced and Secure Acknowledgement IDS in Mobile Ad Hoc Network by Hybrid Cryptography Technique around the network. Unlike wired frameworks, there is no settled and dedicated association open between the center points. So any center point can get to any association between any center points. Primary Property of MANET is it is open to all which attracts harmful customers. IDS frameworks are us作者: HILAR 時間: 2025-3-31 05:24
Geometric Definitions in Generalalth care, social networking, etc. As a result, an intelligent data analysis tool is needed. MapReduce (MR) framework is normally designed to process huge data and to support potential decision-making. MR has three phases—“., . The intermediate data of mapper is sent to the . via . phase. Thus, the 作者: enfeeble 時間: 2025-3-31 13:00 作者: FAST 時間: 2025-3-31 14:14
Representations for assembly sequencesas improving the efficiency of the patient lifecycle and optimization of the record retrieval process. There seems to be a relationship between delayed access to a healthcare service and mortality rate. The problem of managing patient time, quick access to records, patient workflow coordination, ine