000 04118nam a22005535i 4500
001 978-981-13-6351-1
003 DE-He213
005 20240423125322.0
007 cr nn 008mamaa
008 190423s2019 si | s |||| 0|eng d
020 _a9789811363511
_9978-981-13-6351-1
024 7 _a10.1007/978-981-13-6351-1
_2doi
050 4 _aQA76.9.B45
072 7 _aUN
_2bicssc
072 7 _aCOM021000
_2bisacsh
072 7 _aUN
_2thema
082 0 4 _a005.7
_223
245 1 0 _aData, Engineering and Applications
_h[electronic resource] :
_bVolume 2 /
_cedited by Rajesh Kumar Shukla, Jitendra Agrawal, Sanjeev Sharma, Geetam Singh Tomer.
250 _a1st ed. 2019.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2019.
300 _aX, 343 p. 166 illus., 103 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aEfficient Map-Reduce Framework Using Summation -- Secret image sharing over cloud using one dimensional chaotic map -- Design and Development of a Cloud-based Electronic Medical Records (EMR) System -- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography -- Log-based Approach for Security Implementation in Cloud CRM’s -- Performance Analysis of Scheduling Algorithms in Apache Hadoop -- Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment -- Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network -- Certificate Revocation in Hybrid Ad-hoc Network -- NB tree based Intrusion detection technique using Rough set theory model -- An Energy Efficient Intrusion Detection System For Manet -- DDoS Attack Mitigation using Random and Flow Based Scheme -- Digital Image Watermarking Against Geometrical Attack -- Efficient key Management Approach for Vehicular Ad-hoc Network -- Image Forgery Detection: Survey and Future directions -- Comparative Study of Digital Forensic Tools -- A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications -- Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique -- Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B.
520 _aThis book presents a compilation of current trends, technologies, and challenges in connection with Big Data. Many fields of science and engineering are data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new solutions. Given its scope, the book offers a valuable reference guide for all graduate students, researchers, and scientists interested in exploring the potential of Big Data applications.
650 0 _aBig data.
650 0 _aData mining.
650 0 _aArtificial intelligence.
650 1 4 _aBig Data.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aArtificial Intelligence.
700 1 _aShukla, Rajesh Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAgrawal, Jitendra.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSharma, Sanjeev.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSingh Tomer, Geetam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811363504
776 0 8 _iPrinted edition:
_z9789811363528
776 0 8 _iPrinted edition:
_z9789811363535
856 4 0 _uhttps://doi.org/10.1007/978-981-13-6351-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176654
_d176654