![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Testing of Natural Fiber Composites
Efforts have been made to develop biodegradable and environment-friendly materials due to environmental issues and increased dependency on fossil fuels. The usage of natural materials in composites has increas...
-
Chapter
Nanomedicines in the Treatment of Nervous System Disorders
The chapter overviews different diseases of central nervous system (CNS), the problems associated with conventional therapies to CNS and transport mechanisms associated with the delivery of drugs into the CNS....
-
Chapter and Conference Paper
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals...
-
Chapter
Glaucoma Genetics in Pakistan
Glaucoma, a multifactorial ocular disease, is clinically and genetically heterogeneous. It is the second leading cause of blindness in elderly population worldwide. Because of the complex nature of glaucoma, t...
-
Chapter
Impacts of Water Quality on Human Health in Pakistan
Pakistan is ranked third among countries facing severe water shortage. Yet the country’s water resources are being depleted with such intensity that it has become a country with physical water deficiency, with...
-
Chapter
Phytoremediation of Agricultural Pollutants
Agricultural pollution is a global environmental concern. Agricultural pollution is mainly caused by the application of farming inputs (e.g., fertilizers and pesticides) and practices (e.g., excessive tillage ...
-
Chapter and Conference Paper
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems
Timely detection of an insider attack is prevalent among challenges in database security. Research on anomaly-based database intrusion detection systems has received significant attention because of its potent...
-
Chapter and Conference Paper
Detecting Anomalous Behavior in DBMS Logs
It is argued that anomaly-based techniques can be used to detect anomalous DBMS queries by insiders. An experiment is described whereby an n-gram model is used to capture normal query patterns in a log of SQL ...
-
Chapter and Conference Paper
On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images
In this paper, a perceptual encryption scheme based on scrambling of DCT blocks in JPEG compressed images and its variants are proposed. These schemes are suitable for the environment where perceptual degradat...
-
Chapter and Conference Paper
Robust Edge-Enhanced Fragment Based Normalized Correlation Tracking in Cluttered and Occluded Imagery
Correlation trackers are in use for the past four decades. Edge based correlation tracking algorithms have proved their strength for long term tracking, but these algorithms suffer from two major problems: clu...