000890293 000__ 05575cam\a2200577Ii\4500 000890293 001__ 890293 000890293 005__ 20230306145920.0 000890293 006__ m\\\\\o\\d\\\\\\\\ 000890293 007__ cr\cn\nnnunnun 000890293 008__ 190510s2019\\\\si\a\\\\o\\\\\100\0\eng\d 000890293 019__ $$a1105190973 000890293 020__ $$a9789811371509$$q(electronic book) 000890293 020__ $$a9811371504$$q(electronic book) 000890293 020__ $$z9789811371493 000890293 0247_ $$a10.1007/978-981-13-7150-9$$2doi 000890293 0247_ $$a10.1007/978-981-13-7 000890293 035__ $$aSP(OCoLC)on1100767240 000890293 035__ $$aSP(OCoLC)1100767240$$z(OCoLC)1105190973 000890293 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dN$T$$dEBLCP$$dUKMGB$$dOCLCF$$dLQU 000890293 049__ $$aISEA 000890293 050_4 $$aTK5105.5 000890293 08204 $$a004.6$$223 000890293 1112_ $$aInternational Research Symposium on Computing and Network Sustainability$$n(2nd :$$d2018 :$$cVelha Goa, India) 000890293 24510 $$aComputing and network sustainability :$$bproceedings of IRSCNS 2018 /$$cSheng-Lung Peng, Nilanjan Dey, Mahesh Bundele, editors. 000890293 2463_ $$aIRSCNS 2018 000890293 264_1 $$aSingapore :$$bSpringer,$$c2019. 000890293 300__ $$a1 online resource (xxvi, 525 pages) :$$billustrations. 000890293 336__ $$atext$$btxt$$2rdacontent 000890293 337__ $$acomputer$$bc$$2rdamedia 000890293 338__ $$aonline resource$$bcr$$2rdacarrier 000890293 4901_ $$aLecture notes in networks and systems,$$x2367-3370 ;$$vvolume 75 000890293 500__ $$aInternational conference proceedings. 000890293 500__ $$aIncludes author index. 000890293 5050_ $$aIntro; Organization; Organizing Chairs; Organizing Co-Chair; Organizing Secretary; Members; Technical Program Committee; Technical Program Committee Co-Chairs; Advisory Committee; Members; Preface; Contents; Editors and Contributors; Snaring Cyber Attacks on IoT Devices with Honeynet; 1 Introduction; 1.1 Architecture of IoT; 1.2 Honeynet; 2 Problem Identification; 3 Implemented Framework; 3.1 Process Flow of Implemented System; 3.2 Virtual Honeynet Architecture; 4 OAuth and Honeynet Implementation; 5 Result Parameter Analysis; 6 Conclusion and Future Work; References 000890293 5058_ $$aImage Enhancement Using Morphological Operations: A Case Study1 Introduction; 2 Erosion Algorithm; 2.1 MATLAB Coding: Erosion; 3 Dilation Algorithm; 3.1 MATLAB Coding: Dilation; 4 Opening Operation; 4.1 MATLAB Coding: Opening; 5 Closing Operation; 5.1 MATLAB Coding: Closing; 6 Results; 7 Applications of Morphology; 8 Conclusion; References; Evaluation of e-NAM Adoption: A Case of Jetalpur Mandi, Gujarat; 1 Introduction; 2 Electronic-National Agriculture Market (e-NAM); 3 Research Methodology; 4 e-NAM in Gujarat; 4.1 About Jetalpur Mandi; 4.2 Process Flow for the Commodity at e-NAMs 000890293 5058_ $$a5 Findings5.1 Observability; 5.2 Relative Advantage; 5.3 Compatibility; 5.4 Trialability; 5.5 Complexity; 6 Discussion and Conclusion; References; A New Technique for Extrinsic Text Summarization; 1 Introduction; 2 Basic Ideas and Theory of Operation; 2.1 Text Mining; 2.2 Text Preprocessing; 2.3 Sentence Extraction; 2.4 Multi-text Summarization; 3 Overview of Current Approach; 4 Algorithm for Present Technique; 5 Experimental Results; 6 Conclusion; References; Dynamic Provisioning of Cloud Resources Based on Workload Prediction; 1 Introduction; 2 Related Works 000890293 5058_ $$a3 Proposed Framework for Auto-scaling Based on Workload Prediction3.1 End-User Layer; 3.2 Application Layer; 3.3 Predictor Layer; 3.4 VM Layer; 4 Conclusion and Future Works; References; Conceptual Machine Learning Framework for Initial Data Analysis; 1 Introduction; 2 Machine Learning; 3 Machine Learning for Initial Data Analysis (IDA); 3.1 Data Cleansing; 3.2 Data Transformation; 4 Machine Learning Framework for IDA; 5 Conclusion; References; The Role of Social Factors in Education: A Case Study in Social Network Perspective; 1 Introduction; 1.1 Objectives and Main Contributions 000890293 5058_ $$a2 Methodology3 Result and Discussion; 4 Conclusion; References; Investigating the Effect of Compression and Decompression in Video Using Fractal Technique; 1 Introduction; 2 Fractal Video Compression; 3 Fractal Triangular Partitioning Scheme (ITP); 3.1 Video Encoding Process Using Triangular Partitioning Scheme; 3.2 Video Decoding Process Using Triangular Partitioning Scheme; 4 Results; 5 Conclusion; References; Classifier Ensembling: Dataset Learning Using Bagging and Boosting; 1 Introduction; 2 Related Work; 3 Issues and Challenges; 4 Problem Statement; 5 Proposed Algorithm 000890293 506__ $$aAccess limited to authorized users. 000890293 520__ $$aThis book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30–31st August 2018. It covers areas such as sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. Presenting novel and recent technologies, it is a valuable resource for researchers and industry professionals alike. 000890293 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 6, 2019). 000890293 650_0 $$aComputer networks$$vCongresses. 000890293 650_0 $$aComputer security$$vCongresses. 000890293 7001_ $$aPeng, Sheng-Lung,$$eeditor. 000890293 7001_ $$aDey, Nilanjan,$$d1984-$$eeditor. 000890293 7001_ $$aBundele, Mahesh,$$eeditor. 000890293 830_0 $$aLecture notes in networks and systems ;$$vv. 75. 000890293 852__ $$bebk 000890293 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-13-7150-9$$zOnline Access$$91397441.1 000890293 909CO $$ooai:library.usi.edu:890293$$pGLOBAL_SET 000890293 980__ $$aEBOOK 000890293 980__ $$aBIB 000890293 982__ $$aEbook 000890293 983__ $$aOnline 000890293 994__ $$a92$$bISE