Linked e-resources

Details

Intro
Preface
Contents
Editors and Contributors
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types
1 Introduction
2 Related Work
3 Methods and Materials
3.1 Features Extraction
3.2 Kernel Functions
3.3 Extreme Learning Machine (ELM) Method
3.4 SVM (Support Vector Machine) Method
3.5 Datasets Description
3.6 Evaluation Metrics
4 Testing and Results
5 Conclusion
References
Securing the Networks Against DDoS Attacks Using Blockchain Technology
1 Introduction

2 Related Work
3 Proposed System
4 Implementation and Result
5 Evaluation
6 Conclusion
References
A Machine Vision-Based Approach for Tuberculosis Identification in Chest X-Rays Images of Patients
1 Introduction
2 Literature Review
3 Methodology
4 Result and Discussion
5 Conclusion
References
Prediction of Patients' Incurable Diseases Utilizing Deep Learning Approach
1 Introduction
2 Literature Review
3 Description of the Dataset and the Model
4 Framework for the Suggested Work
5 The KNN
6 Decision Tree
7 Deep Learning

8 Evaluation of the Method
9 The Discussion and Analysis of the Results
10 Conclusion
References
Real-Time Control of Humanoid Robotic Arm Motion Using IT2FLC Based on Kinect Sensor
1 Introduction
2 Components and Methodology
2.1 HRA Model
2.2 Kinect Camera
2.3 The Controller Design
3 Results
3.1 Calculation Results
3.2 Simulation and Implementation Results
4 Discussion and Conclusion
References
Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer
1 Introduction
1.1 Controlled Entry via Blockchain

1.2 Model for Safeguarding Data
1.3 Internet-Hosted Blockchain with Built-In Security Access Controls
1.4 Significant Obstacles
2 Survey of the Related Research
3 Methodology
3.1 Methodology Typically Used When Exchanging Sensitive Information
4 Results and Analysis
5 Conclusion
References
Effective Strategies for Resource Allocation and Scheduling in Cloud Computing
1 Introduction
2 Literature Survey
2.1 Existing System
3 Methodology for the Study
3.1 Studying with CloudSim
3.2 Proposed Cloud Model
3.3 Indictor of Performance

4 Result and Discussion
5 Conclusion
References
A Brief Review Particle Swarm Optimization on Intrusion Detection System
1 Introduction
2 Literature Review
3 Dataset for IDS
4 Results
5 Discussion and Conclusion
6 Future Scope and Benefit Towards Society
References
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model
1 Introduction
2 Related Works
3 Overall Proposed Framework
4 Secured Map Layer with Chain Rolling Double Hash Algorithm

Browse Subjects

Show more subjects...

Statistics

from
to
Export