000868223 000__ 06147cam\a2200469Ii\4500 000868223 001__ 868223 000868223 005__ 20230306145944.0 000868223 006__ m\\\\\o\\d\\\\\\\\ 000868223 007__ cr\cn\nnnunnun 000868223 008__ 190424s2019\\\\si\\\\\\ob\\\\000\0\eng\d 000868223 020__ $$a9789811363511$$q(electronic book) 000868223 020__ $$a981136351X$$q(electronic book) 000868223 020__ $$z9789811363504 000868223 035__ $$aSP(OCoLC)on1098213289 000868223 035__ $$aSP(OCoLC)1098213289 000868223 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dEBLCP$$dDKU 000868223 049__ $$aISEA 000868223 050_4 $$aQA76.9.D343 000868223 08204 $$a006.3/12$$223 000868223 24500 $$aData, engineering and applications.$$nVolume 2 /$$ceditors, Rajesh Kumar Shula, Jitendra Agrawal, Sanjeev Sharma and Geetam Singh Tomer. 000868223 264_1 $$aSingapore :$$bSpringer,$$c[2019] 000868223 300__ $$a1 online resource. 000868223 336__ $$atext$$btxt$$2rdacontent 000868223 337__ $$acomputer$$bc$$2rdamedia 000868223 338__ $$aonline resource$$bcr$$2rdacarrier 000868223 504__ $$aIncludes bibliographical references. 000868223 50500 $$gPart I:$$tBig data and cloud computing:$$g1.$$tEfficient MapReduce framework using summation /$$rSahiba Suryawanshi, Praveen Kaushik --$$g2.$$tSecret image sharing over cloud using one-dimensional chaotic map /$$rPriyamwada Sharma, Vedant Sharma --$$g3.$$tDesign and development of a cloud-based electronic medical records (EMR) system /$$rVictoria Samuel, Adewole Adewumi, Benjamin Dada, Nicholas Omoregbe, Sanjay Misra, Modupe Odusami --$$g4.$$tLog-based approach for security implementation in cloud CRM's /$$rMadhur Patidar, Pratosh Bansal --$$g5.$$tPerformance analysis of scheduling algorithms in Apache Hadoop /$$rAnkit Shah, Mamta Padole --$$g6.$$tEnergy-aware prediction-based load balancing approach with VM migration for the cloud environment /$$rDurga Patel, Rajeev Kumar Gupta, R.P. Pateriya. 000868223 50580 $$gPart II:$$tNetwork and securities:$$g7.$$tAuthentication process using secure sum for a new node in mobile ad hoc network /$$rPraveen Gupta, Pratosh Bansal --$$g8.$$tCertificate revocation in hybrid ad hoc network /$$rAnubha Chaturvedi, Brijesh Kumar Chaurasia --$$g9.$$tNB tree based intrusion detection technique using rough set theory model /$$rNeha Gupta, Ritu Prasad, Praneet Saurabh, Bhupendra Verma --$$g10.$$tAn energy-efficient intrusion detection system for MANET /$$rPreeti Pandey, Atul Barve --$$g11.$$tDDoS attack mitigation using random and flow-based scheme /$$rBansidhar Joshi, Bineet Joshi, Kritika Rani --$$g12.$$tDigital image watermarking against geometrical attack /$$rSandeep Rai, Rajesh Boghey, Dipesh Shahane, Priyanka Saxena --$$g13.$$tEfficient decentralized key management approach for vehicular ad hoc network /$$rShikha Rathore, Jitendra Agrawal, Sanjeev Sharma, Santosh Sahu --$$g14.$$tImage forgery detection : survey and future directions /$$rKunj Bihari Meena, Vipin Tyagi --$$g15.$$tComparative study of digital forensic tools /$$rMayank Lovanshi, Pratosh Bansal --$$g16.$$tA systematic survey of mobile forensic tools used for forensic analysis of Android-based social networking applications /$$rNirneeta Gupchup, Nishchol Mishra --$$g17.$$tEnhanced and secure acknowledgement IDS in mobile ad hoc network by hybrid cryptography technique /$$rAumreesh Kumar Saxena, Piyush Shukla, Sitesh Kumar Sinha --$$g18.$$tFormal verification of causal order-based load distribution mechanism using Event-B /$$rPooja Yadav, Raghuraj Suryavanshi, Arun Kumar Singh, Divakar Yadav. 000868223 50580 $$gPart III:$$tInternet of Things and related areas:$$g19.$$tAn IoT-based architecture for crime management in Nigeria /$$rFalade Adesola, Sanjay Misra, Nicholas Omoregbe, Robertas Damasevicius, Rytis Maskeliunas --$$g20.$$tA comparative analysis of techniques for executing branched instructions /$$rSanjay Misra, Abraham Ayegba Alfa, Kehinde Douglas Ajagbe, Modupe Odusami, Olusola Abayomi-Alli --$$g21.$$tDesign and implementation of an e-policing system to report crimes in Nigeria /$$rNicolas Omoregbe, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius, Adesola Falade, Adewole Adewumi --$$g22.$$tPerformance evaluation of ensemble learners on smartphone sensor generated human activity data set /$$rDilip Singh Sisodia, Ankit Kumar Yogi --$$g23.$$tAn insight into time synchronization algorithms in IoT /$$rNeha Dalwadi, Mamta Padole --$$g24.$$tComparative study of the electrical energy consumption and cost for a residential building with conventional appliances vis-a-vis one with energy-efficient appliances /$$rAdeyemi Alabi, Oluwasikemi Ogunleye, Sanjay Misra, Olusola Abayomi-Alli, Ravin Ahuja, Modupe Odusami --$$g25.$$tParticle swarm optimization-based MPPT controller for wind turbine systems /$$rShefali Jagwani, L. Venkatesha --$$g26.$$tA new model of M-secure image via quantization /$$rVijay Bhandari, Sitendra Tamrakar, Piyush Shukla, Arpana Bhandari --$$g27.$$tAnalysis on applicability and feasibility of dynamic programming on the basis of time complexity and space through case studies /$$rManish Dixit, Mohd Aijaj Khan. 000868223 506__ $$aAccess limited to authorized users. 000868223 520__ $$aThis book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new solutions. Given its scope, the book offers a valuable reference guide for all graduate students, researchers, and scientists interested in exploring the potential of Big Data applications. --$$cProvided by publisher. 000868223 588__ $$aOnline resource; title from PDF title page (viewed April 25, 2019). 000868223 650_0 $$aData mining. 000868223 650_0 $$aMachine learning. 000868223 7001_ $$aShukla, Rajesh K.,$$eeditor. 000868223 7001_ $$aAgrawal, Jitendra,$$eeditor. 000868223 7001_ $$aSharma, Sanjeev$$c(Information technology executive),$$eeditor. 000868223 7001_ $$aTomer, Geetam Singh,$$eeditor. 000868223 852__ $$bebk 000868223 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-13-6351-1$$zOnline Access$$91397441.1 000868223 909CO $$ooai:library.usi.edu:868223$$pGLOBAL_SET 000868223 980__ $$aEBOOK 000868223 980__ $$aBIB 000868223 982__ $$aEbook 000868223 983__ $$aOnline 000868223 994__ $$a92$$bISE