![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Sentiment analysis from unstructured hotel reviews data in social network using deep learning techniques
The Internet is benefiting the people to access and provide information. One of the platforms to share the information is online social networks such as blogs, Facebook, and Twitter. People express their senti...
-
Article
Modeling of automated glowworm swarm optimization based deep learning model for legal text summarization
Automatic legal text summarization becomes a challenging process because of unusual structure and high complexity of the documents. Existing works related to legal text summarization are available, both for ge...
-
Article
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms
Software-defined networks (SDN) offer a centralized administration programming interface to govern the network infrastructure. It overtook conventional networks by creating a configurable link between the cont...
-
Article
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
Technology that is perfect is free of vulnerability. Technological growth offers users online data storage and access to it from anywhere. Cloud computing is a model that provides data storage on a contract fa...
-
Chapter and Conference Paper
Sentiment Analysis on Diabetes Diagnosis Health Care Using Machine Learning Technique
Sentiment analysis is a natural language processing technique that extricated data from the text to identify the positive and negative polarity of information. This work aims at analyzing sentiments in healthc...
-
Chapter and Conference Paper
Comparative Analysis: Sentiment Analysis for Legal Judgment Text in India’s Supreme Court Based on GloVe Pretrained Word Embedding and Deep Learning Models
With the rapid growth of Internet technology in recent years, an innovative legal research tool for Indian case laws has been established to save time for legal professionals. Sentiment analysis employs head n...
-
Chapter and Conference Paper
A Keyword-Based Multi-label Text Categorization in the Indian Legal Domain Using Bi-LSTM
In this era of information abundance, text segmentation can be used effectively to locate and extract information specific to the user’s needs, within a massive load of documents. Text categorization refers to...
-
Chapter and Conference Paper
Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques
Software Defined Networks (SDN) have become more efficient and popular by having effective controller. Centralized controller makes the decision to handle traffic in data plane by analyzing the entire network....
-
Article
A Distributed Energy aware Controller Placement Model for Software-Defined Data Centre Network
The single controller setup, in software-defined data center, is purposed to support dynamic load and scalability of switches. As such, multiple controller implementations become a promising approach to handle...
-
Chapter and Conference Paper
A Posture Recognition System for Assisted Self-Learning of Yoga by Cognitive Impaired Older People for the Prevention of Falls
According to United Nation’s World Population ageing report, every country is facing an ageing issue by most of their citizens. It is estimated that 75% of fall injuries occur in low- and middle-income countri...
-
Chapter and Conference Paper
IOT Based Autonomous Inventory Management for Warehouses
We all know that in today’s highly competitive world, everything has been developed by some technologies like IOT, digital, cloud, sensors, etc. Nowadays warehouses and inventories are facing so many problems ...
-
Chapter
Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)
In recent decades, the Internet of Things (IoT) is transforming into an attractive system to drive a substantive hop on stock and enterprises through physical, computerized, and social spaces. For enhancing th...
-
Chapter and Conference Paper
Improved Key Generation Scheme of RSA (IKGSR) Algorithm Based on Offline Storage for Cloud
Cloud computing is the most prominently used technology to store and recover information from anyplace with the assistance of web. One of the challenging tasks is to provide security to client information stor...