![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Practical Challenges in Implementation of Information and Communication Technology
The Information and Communication Technology (ICT) based math’s education is having several technological, infrastructure-based, teacher and student-related challenges. The United States of America is the lead...
-
Chapter and Conference Paper
GA-ProM: A Genetic Algorithm for Discovery of Complete Process Models from Unbalanced Logs
Process mining is the practise of distilling a structured process description from a series of real executions. In past decades, different process discovery algorithms have been used to generate process models...
-
Chapter and Conference Paper
Improving Heart Disease Prediction Using Feature Selection Through Genetic Algorithm
Heart disease is one of the leading causes of fatality. A reliable and robust prediction system is needed for people to take preventive measures and medication beforehand and develop a proactive lifestyle acco...
-
Chapter and Conference Paper
Detection of DDoS Attack in IoT Using Machine Learning
Distributed Denial-of-Service (DDoS) attacks have recently increased exponentially in numbers. With the advent of the Internet-of-things (IoT), it becomes easy for attackers to perform a DDoS attack. IoT devic...
-
Chapter and Conference Paper
A Comparative Study of Prototy** Methods for HCI Design Using Cognitive Load-Based Measures
Increased information complexity in HCI designs causes cognitive load on users. HCI design prototypes have been used in various stages of design process to assess the design quality and enable course correctio...
-
Chapter and Conference Paper
e-Examinations: The Impact of Technology Problems on Student Experience
This study investigated the impact of technology problems on students’ perceptions of computerised examination technology and procedures. Measures included the suitability of the assessment task to computeris...
-
Chapter and Conference Paper
Integration of Antennas for Communication System on Complex Platforms
This paper provides an overview of the antenna integration problem with an illustration of antenna integration for the next generation railway communication systems. The influence of integration on the basic a...
-
Chapter and Conference Paper
Super Resolution Land Cover Map** Using Deep Multi Scale Residual Dense Network
Super Resolution Map** (SRM) is a land cover map** method that generates land surface cover maps at fine spatial resolution from a coarse spatial resolution Remote Sensing (RS) image. Recently deep network...
-
Chapter and Conference Paper
Distributed and Lazy Auditing of Outsourced Data
Data outsourcing is useful for ICT organizations who need cost-effective management of resources. Auditing of outsourced data is an essential requirement for the data owner who outsources it to the untrusted t...
-
Chapter and Conference Paper
A New Hybrid Backstep** Approach for the Position/Force Control of Mobile Manipulators
Based on the conventional backstep** control scheme, a novel hybrid control law is presented which merges the advantages of the model-dependent and the intelligent-technique based model-free schemes. Further...
-
Chapter
Opinion Mining from Social Travel Networks
Opinions have always been an important part of daily lives as it has been a human behaviour to gather information about what other people think about the things we want to buy or the hotel we want to stay at o...
-
Chapter
Security and Privacy Issues in Outsourced Personal Health Record
E-health effectively uses information and communications technology to support health-related services for its users.
-
Chapter and Conference Paper
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud
This paper analyses the efficiency of user and resource-based hierarchies for read access control in cloud. It is shown that resource-based hierarchies are more efficient than user-based hierarchies in terms o...
-
Chapter
Diffusive Processes and Modelling: An Introduction
Diffusion is a common natural process occurring everywhere in physical, chemical, biological, geological systems. Considering the centrality of diffusive process, understanding the effects of diffusion on diff...
-
Chapter and Conference Paper
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme
We propose a simple and efficient hash-based time-bound hierarchical key assignment scheme that requires a single key per user per subscription. It is more efficient than existing schemes in terms of public st...
-
Chapter
Consumer Cloud: Concepts, Vendor Solutions, Industry Applications and Way Forward
Over the years, consumers have been accessing the World Wide Web to perform one or more of the personal functions such as accessing email via messenger/phone communication; managing social and professional ide...
-
Chapter and Conference Paper
Time Based Feedback and Query Expansion for Twitter Search
Twitter is an accepted platform among users for expressing views in a short text called a “Tweet” Application of search models to platforms like Twitter is still an open-ended question, though the creation of ...
-
Chapter and Conference Paper
Design and Simulation of a 3D Actuation System for Magnetic Nano-Particles Delivery System
In this paper, a new electromagnetic actuation system is presented for magnetic nano-particles based targeted drug delivery. The system is composed of three sets of coils; each set contains two parallel coils,...
-
Chapter and Conference Paper
Lattice Based Associative Classifier
Associative classification aims to discover a set of constrained association rules, called Class Association Rules (CARs). The consequent of a CAR is a singleton and is restricted to be a class label. Traditio...
-
Chapter and Conference Paper
Mining of Multiobjective Non-redundant Association Rules in Data Streams
Non-redundant association rule mining requires generation of both closed itemsets and their minimal generators. However, only a few researchers have addressed both the issues for data streams. Further, associa...