![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Perceptual Hash Computation of Multimedia Objects Using Improved KL Transform
This paper presents an improvement for Karhunen–Loeve (KL) transform which is a new approach for computation of perceptual hash in multimedia objects. Basically, all the cryptographic algorithms used for compu...
-
Chapter and Conference Paper
Blockchain-Enabled Traceable, Transparent Transportation System for Blood Bank
Electronic health records (EHR) and patient health records are an Internet-based health application which is sharable to authorized stakeholders such as doctors, specialist, and patients. One of the important ...
-
Chapter and Conference Paper
BER Performance Evaluation of Different Modulation Techniques for Underwater FSO Communication System
Wireless data transmission in the underwater medium is of high importance for applications related to the oil industry, military, and scientific community purposes. In the underwater environment, optical wave ...
-
Chapter and Conference Paper
Storage and Analysis of Synchrophasor Data for Event Detection in Indian Power System Using Hadoop Ecosystem
Synchrophasor devices commonly referred to as phasor measurement units (PMUs) have been rapidly deployed in power grids to get a clearer picture of the events that take place in power grid at very high samplin...
-
Chapter and Conference Paper
An Energy-Efficient Model Using Cooperative MIMO in Wireless Sensor Network
Data integrity and conservation of energy is one of the important issues in today’s wireless network world. In wireless sensor network, the sensors are formed into different clusters and cooperatively communic...
-
Chapter and Conference Paper
A Framework of Service Selection and Composition for Flexible Network Architecture
Internet becomes a back bone of the communication network in the current era. People are very much dependent on the internet to connect from one end to another globally in todays environment. Internet suffers ...
-
Chapter and Conference Paper
Detection and Prevention of Phishing Attack Using Dynamic Watermarking
Nowadays phishing attacks are increasing with burgeoning rate which is highly problematic for social and financial websites.Many antiphishing mechanisms currently focused to verify whether a web site is genuin...