Linked e-resources

Details

Preface; Contents; About the Editors; 1 Web Information Extraction on Multiple Ontologies Based on Concept Relationships upon Training the User Profiles; Abstract; 1 Introduction; 2 Review of Related Works; 3 Proposed Web Information Extraction Method; 3.1 Web-based Ontology; 3.2 User Profiling Ontology; 3.3 Cross-Ontology Mining Algorithm for Web Information Extraction; 4 Experimental Setup and Dataset Description; 4.1 Performance Analysis; 5 Conclusion; References; 2 A Study on Competent Crawling Algorithm (CCA) for Web Search to Enhance Efficiency of Information Retrieval; Abstract.

1 Introduction2 Crawler; 2.1 Web Crawler Architecture; 2.2 Work Flow of Crawlers; 2.3 Crawling Algorithm's Performance Comparisons; 2.3.1 Competent Crawling Algorithm; 3 Conclusion; References; 3 High Payload Reversible Watermarking for Securing Medical Images in a Cloud Environment; Abstract; 1 Introduction; 2 Literature Survey; 3 Proposed System; 3.1 Data Embedding Algorithm; 3.2 Data Extraction Algorithm; 4 Results and Discussions; References; 4 Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System; Abstract; 1 Introduction; 2 Related Works.

3 Proposed Work3.1 Auditing by Data Owner/Client; 3.2 Notifications for the Resource Access; 3.3 Validating Time Complexity for Resource; 4 Validation; 5 Conclusion and Future Work; References; 5 An Intelligent Cloud Security System for Critical Applications; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Work; 3.1 Malicious Insider; 3.2 Application Algorithm; 4 Validation; 5 Conclusion; References; 6 An Efficient Framework for Health System Based on Hybrid Cloud with ABE-Outsourced Decryption; Abstract; 1 Introduction; 2 Cloud Deployment Models; 3 Motivation and Background.

4 Related Works5 Proposed Work; 5.1 Detailed Framework; 5.2 Scenario-Based Explanation with Data Flow in Hybrid Cloud; 6 Issues in Cloud; 7 Conclusion and Future Work; References; 7 A Knowledgeable Feature Selection Based on Set Theory for Web Intrusion Detection System; Abstract; 1 Introduction; 2 Related Works; 3 Existing Feature Selection; 4 KDD CUP 99 Dataset; 5 Proposed Work; 6 Implementation; 7 Conclusions; References; 8 FLC-Based Adaptive Neuro-Fuzzy Inference System for Enhancing the Traveling Comfort; Abstract; 1 Introduction; 2 Half-Car Model; 3 Controllers.

3.1 Fuzzy Logic Controller3.2 Artificial Neural Network Controller; 3.3 Adaptive Neuro-Fuzzy Inference System; 4 Simulation Results and Discussion; 5 Conclusion; References; 9 State Variable Filter Design Using Improvised Particle Swarm Optimization Algorithm; Abstract; 1 Introduction; 2 PSO; 3 Proposed Improvements to Conventional PSO; 3.1 Inertia Weight Variation; 3.2 Self-Termination; 3.3 Validation on Benchmark Functions; 4 State Variable Active Filters; 5 Results and Analysis; 6 Conclusion; References; 10 A Novel Algorithm on IP Traceback to Find the Real Source of Spoofed IP Packets.

Browse Subjects

Show more subjects...

Statistics

from
to
Export