Data, Engineering and Applications [E-Book] : Volume 2 / edited by Rajesh Kumar Shukla, Jitendra Agrawal, Sanjeev Sharma, Geetam Singh Tomer
This book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of...
Saved in:
Full text |
|
Personal Name(s): | Agrawal, Jitendra, editor |
Sharma, Sanjeev, editor / Shukla, Rajesh Kumar, editor / Singh Tomer, Geetam, editor | |
Edition: |
1st edition 2019 |
Imprint: |
Singapore :
Springer,
2019
|
Physical Description: |
X, 343 pages 166 illustrations, 103 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789811363511 |
DOI: |
10.1007/978-981-13-6351-1 |
Subject (LOC): |
- Efficient Map-Reduce Framework Using Summation
- Secret image sharing over cloud using one dimensional chaotic map
- Design and Development of a Cloud-based Electronic Medical Records (EMR) System
- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography
- Log-based Approach for Security Implementation in Cloud CRM's
- Performance Analysis of Scheduling Algorithms in Apache Hadoop
- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment
- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network
- Certificate Revocation in Hybrid Ad-hoc Network
- NB tree based Intrusion detection technique using Rough set theory model
- An Energy Efficient Intrusion Detection System For Manet
- DDoS Attack Mitigation using Random and Flow Based Scheme
- Digital Image Watermarking Against Geometrical Attack
- Efficient key Management Approach for Vehicular Ad-hoc Network
- Image Forgery Detection: Survey and Future directions
- Comparative Study of Digital Forensic Tools
- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications
- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique
- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B.