Sisäänkirjautuminen

Barolli, Leonard

Advances in Internetworking, Data & Web Technologies

Barolli, Leonard - Advances in Internetworking, Data & Web Technologies, e-kirja

421,50€

E-kirja, PDF, Adobe DRM-suojattu
ISBN: 9783319594637
DRM-rajoitukset

TulostusEi sallittu
Kopioi leikepöydälleEi sallittu

Table of contents

1. An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble
Zhen Cao, Minqing Zhang, Xiaolong Chen, Wenjun Sun, Chun Shan

2. Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem
Liu Yiqun

3. Credit Risk Assessment of Peer-to-Peer Lending Borrower Utilizing BP Neural Network
Zhengnan Yuan, Zihao Wang, He Xu

4. Implementation of a GA-based Simulation System for Placement of IoT Devices: Evaluation for a WSAN Scenario
Miralda Cuka, Kosuke Ozera, Ryoichiro Obukata, Donald Elmazi, Tetsuya Oda, Leonard Barolli

5. A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining
Hufsa Mohsin

6. A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts
Li Zhenlin, Zhang Wei, Ding Yitao, Bai Ping

7. Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study
Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli

8. Effects of Number of Activities the Member Failures on Qualified Voting in P2P Mobile Collaborative Team: A Comparison Study for Two Fuzzy-Based Systems
Yi Liu, Keita Matsuo, Makoto Ikeda, Leonard Barolli

9. A User Prediction and Identification System for Tor Networks Using ARIMA Model
Tetsuya Oda, Miralda Cuka, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli

10. Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition
Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Keita Matsuo, Leonard Barolli

11. Designing the Light Weight Rotation Boolean Permutation on Internet of Things
Yu Zhou

12. The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering
Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian

13. Numerical Simulation for the Nonlinear Elliptic Problem
Qingli Zhao, Jin Li, Lei Yang

14. Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion
Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu

15. Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement
Fuqiang Di, Junyi Duan, Minqing Zhang, Yingnan Zhang, Jia Liu

16. A Deep Network with Composite Residual Structure for Handwritten Character Recognition
Zheheng Rao, Chunyan Zeng, Nan Zhao, Min Liu, Minghu Wu, Zhifeng Wang

17. An Ensemble Hashing Framework for Fast Image Retrieval
Huanyu Li, Yunqiang Li

18. A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment
Huanyu Li, Jing Wang, Hua Shen

19. Automatic Kurdish Text Classification Using KDC 4007 Dataset
Tarik A. Rashid, Arazo M. Mustafa, Ari M. Saeed

20. Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm
Bai Ping, Zhang Wei, Li Zhenlin, Xu An Wang

21. A New Middleware Architecture for RFID Data Management
Weiwei Shen, Han Wu, He Xu, Peng Li

22. Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE
Lu Cheng, Xiaozhong Pan, Yuechuan Wei, Liqun Lv

23. Design and Implementation of Simulated DME/P Beaconing System Based on FPGA
Ye Sun, Jingyi Zhang, Xin Xiang, Kechu Yi

24. LDPC Codes Estimation Model of Decoding Parameter and Realization
Li Xiaobei, Zhang Jingyi, Wang Rui, Zou Yazhou

25. A Novel Query Extension Method Based on LDA
Yongjun Zhang, Jialin Ma, Zhijian Wang, Bolun Chen

26. Target Recognition Method Based on Multi-class SVM and Evidence Theory
Wen Quan, Jian Wang, Lei Lei, Maolin Gao

27. Selective Ensemble Based on Probability PSO Algorithm
Wen Quan, Jian Wang, Zhongmin He, Jiaofeng Zuo

28. The Research of QoS Monitoring-Based Cloud Service Selection
Ling Li, Feng Ye, Qian Huang

29. Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny
Feng Ye, Yong Chen, Qian Huang, Ling Li

30. Perception Mining of Network Protocol’s Dormant Behavior
Yan-Jing Hu

31. Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation
Cong Liu, Xiang Li, Minghu Wu

32. Towards a Web-Based Teaching Tool to Measure and Represent the Emotional Climate of Virtual Classrooms
Modesta Pousada, Santi Caballé, Jordi Conesa, Antoni Bertrán, Beni Gómez-Zúñiga, Eulàlia Hernández, Manuel Armayones, Joaquim Moré

33. An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation
Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu

34. A New Broadcast Encryption Scheme for Multi Sets
Liqun Lv, Xiaoyuan Yang

35. Key Encapsulation Mechanism from Multilinear Maps
Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xuan Wang

36. An Multi-hop Broadcast Protocol for VANETs
Li Yongqiang, Wang Zhong, Fan Qinggang, Cai Yanning, Chen Baisong

37. DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark
Zhi-Qiang Gao, Long-Jun Zhang

38. Technique for Image Fusion Based on PCNN and Convolutional Neural Network
Weiwei Kong, Yang Lei, Jing Ma

39. Fast Iterative Reconstruction Based on Condensed Hierarchy Tree
Wan Fang, Jin HuaZhong, Lei GuangBo, Ruan Ou

40. An Optimal Model of Web Cache Based on Improved K-Means Algorithm
Qiang Wang

41. Detecting Crowdsourcing Spammers in Community Question Answering Websites
Kaiqing Hao, Lei Wang

42. A Spam Message Detection Model Based on Bayesian Classification
Yitao Yang, Runqiu Hu, Chengyan Qiu, Guozi Sun, Huakang Li

43. Spam Mail Filtering Method Based on Suffix Tree
Runqiu Hu, Yitao Yang

44. MP3 Audio Watermarking Algorithm Based on Unipolar Quantization
Wu Wenhui, Guo Xuan, Xiao Zhiting, Wen Renyi

45. Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System
Caiquan Xiong, Yuan Li, Ke Lv

46. An Unconstrained Face Detection Algorithm Based on Visual Saliency
Ying Tong, Rui Chen, Liangbao Jiao, Yu Yan

47. Pavement Crack Detection Fused HOG and Watershed Algorithm of Range Image
Huazhong Jin, Fang Wan, Ou Ruan

48. Compressed Video Sensing with Multi-hypothesis Prediction
Rui Chen, Ying Tong, Jie Yang, Minghu Wu

49. Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
Qingping Wang, Ou Ruan, Zihao Wang

50. A Combined Security Scheme for Network Coding
Chao Xu, Yonghui Chen, Hui Yu, Yan Jiang, Guomin Sun

51. Gaussian Scale Patch Group Sparse Representation for Image Restoration
Yaqi Lu, Minghu Wu, Nan Zhao, Min Liu, Cong Liu

52. An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang

53. A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction
Yiqun Liu, Jianqi Zhang, Zhen Zhang, Haining Luo, Xiaorui Wang

54. Building Real-Time Travel Itineraries Using ‘off-the-shelf’ Data from the Web
Ayushi Gupta, Sharmistha Rai, Himali Singal, Monika Chaudhary, Rishabh Kaushal

55. Energy Efficient Integration of Renewable Energy Sources in Smart Grid
Ghulam Hafeez, Nadeem Javaid, Saman Zahoor, Itrat Fatima, Zahoor AliKhan, Safeerullah

56. Cost and Comfort Based Optimization of Residential Load in Smart Grid
Fahim Ahmed, Nadeem Javaid, Awais Manzoor, Malik Ali Judge, Fozia Feroze, Zahoor Ali Khan

57. Efficient Utilization of HEM Controller Using Heuristic Optimization Techniques
Asif Khan, Nadeem Javaid, Adnan Ahmed, Saqib Kazmi, Hafiz Majid Hussain, Zahoor Ali Khan

58. A Shadow Elimination Algorithm Based on HSV Spatial Feature and Texture Feature
Ranran Song, Min Liu, Minghu Wu, Juan Wang, Cong Liu

59. A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li

60. Improved Online/Offline Attribute Based Encryption and More
Jindan Zhang, Baocang Wang, Xu An Wang

61. On the Security of a Cloud Data Storage Auditing Protocol IPAD
Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang

62. LF-LDA: A Topic Model for Multi-label Classification
Yongjun Zhang, Jialin Ma, Zijian Wang, Bolun Chen

63. Data Analysis for Infant Formula Nutrients
Qian Huang, Chao Zhang, Feng Ye, Qi Wang, Sisi Chen

64. A Classification Method Based on Improved BIA Model for Operation and Maintenance of Information System in Large Electric Power Enterprise
Chong Wang, Qi Wang, Qian Huang, Feng Ye

65. A Model Profile for Pattern-Based Definition and Verification of Composite Cloud Services
Flora Amato, Nicola Mazzocca, Francesco Moscato, Fatos Xhafa

66. A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks
Yongqiang Li, Zhong Wang, Qinggang Fan, Yanning Cai, Yubin Wu, Yunjie Zhu

67. Cyber-Attack Risks Analysis Based on Attack-Defense Trees
Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang

68. Multi-focus Image Fusion Method Based on NSST and IICM
Yang Lei

69. Pilot Contamination Elimination in Massive MIMO Systems
Rui-Chao Hu, Bing-He Wang

70. Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm
Yan-Yu Duan, Qing-Ge Gong, Zhen-Sheng Peng, Yun Wang, Zhi-Qiang Gao

71. A Kind of Improved Hidden Native Bayesian Classifier
Yang Wenshuai, Zhao Hongxu, Gao Zhiqiang

72. Study of a Disaster Relief Troop’s Transportation Problem Based on Minimum Cost Maximum Flow
Zhen-Sheng Peng, Qing-Ge Gong, Yan-Yu Duan, Yun Wang, Zhi-Qiang Gao

73. A Cascading Diffusion Prediction Model in Micro-blog Based on Multi-dimensional Features
Yun Wang, Zhi-Ming Zhang, Zhen-Shen Peng, Yan-Yu Duan, Zhi-Qiang Gao

74. Multi-target Detection of FMCW Radar Based on Width Filtering
Mingfei Liu, Yi Qu, Yefeng Zhang

75. DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX
Lingling Zeng, Wei Ren, Min Lei, Yu Yang

76. Research on CSER Rumor Spreading Model in Online Social Network
An-Hui Li, Jing Wang, Ya-Qi Wang

Avainsanat: Engineering, Computational Intelligence, Communications Engineering, Networks, Information Systems Applications (incl. Internet)

Toimittaja
 
 
Julkaisija
Springer
Julkaisuvuosi
2018
Kieli
en
Painos
1
Sarja
Lecture Notes on Data Engineering and Communications Technologies
Sivumäärä
29 sivua
Kategoria
Tekniikka, energia, liikenne
Tiedostomuoto
E-kirja
eISBN (PDF)
9783319594637
Painetun ISBN
978-3-319-59462-0

Samankaltaisia e-kirjoja