Conclusion
The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication techn...
| Main Authors: | Alginahi, Yasser M., Kabir, M. Nomani |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
The Institution of Engineering and Technology (IET)
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/25537/ http://umpir.ump.edu.my/id/eprint/25537/1/Conclusion.pdf |
Similar Items
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016)
by: Alginahi, Yasser M., et al.
Published: (2016)
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015)
by: M. Nomani, Kabir, et al.
Published: (2015)
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017)
by: Ali, Jahan, et al.
Published: (2017)
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Analysis of a Transportation System with Correlated Network Intersections: A Case Study for a Central Urban City With High Seasonal Fluctuation Trends
by: Tayan, Omar, et al.
Published: (2017)
by: Tayan, Omar, et al.
Published: (2017)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
A mathematical model of lung functionality using pressure signal for volume-controlled ventilation
by: Al-Hetari, Husam Y., et al.
Published: (2020)
by: Al-Hetari, Husam Y., et al.
Published: (2020)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Availability Analysis Of Shared Backup Path Protection Under Multiple-Link Failure Scenario In WDM Networks
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
Towards optimal search: a modified secant method for efficient search in a big database
by: M. Nomani, Kabir, et al.
Published: (2018)
by: M. Nomani, Kabir, et al.
Published: (2018)
Bit Allocation Strategy Based on Psychovisual Threshold in Image Compression
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Artificial neural network modeling for predicting thermal conductivity of EG/water-based CNC nanofluid for engine cooling using different activation functions
by: Hasan, Md. Munirul, et al.
Published: (2024)
by: Hasan, Md. Munirul, et al.
Published: (2024)
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Numerical solution of bio-nano-convection transport from a horizontal plate with blowing and multiple slip effects
by: Uddin, Md. Jashim, et al.
Published: (2019)
by: Uddin, Md. Jashim, et al.
Published: (2019)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Staircase Detection to Guide Visually Impaired People: A Hybrid Approach
by: Habib, Ahsan, et al.
Published: (2019)
by: Habib, Ahsan, et al.
Published: (2019)
Modeling and Simulation of Emergency Evacuation from Industry Buildings under Toxic Cloud Release
by: Benseghir, Hocine, et al.
Published: (2018)
by: Benseghir, Hocine, et al.
Published: (2018)
A racial recognition method based on facial color and texture for improving demographic classification
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Modeling lung functionality in volume-controlled ventilation for critical care patients
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
by: Al-Hetari, Husam Yousef, et al.
Published: (2020)
A novel approach towards tamper detection of digital holy Quran generation
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
Computational investigation on protein sequence of non-O157 VTEC for potentiality of vaccine production
by: Karim Khan, Md Fazlul, et al.
Published: (2020)
by: Karim Khan, Md Fazlul, et al.
Published: (2020)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Block-based Tchebichef image watermarking scheme using psychovisual threshold
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Breast cancer prediction: A comparative study using machine learning techniques
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
Discrete wavelet packet transform for electroencephalogram-based emotion recognition in the valence-arousal space
by: Ahmad, Farzana Kabir, et al.
Published: (2015)
by: Ahmad, Farzana Kabir, et al.
Published: (2015)
Multi label ranking based on positive pairwise correlations among labels
by: Alazaidah, Raed, et al.
Published: (2020)
by: Alazaidah, Raed, et al.
Published: (2020)
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
by: Abas, Azizi, et al.
Published: (2017)
by: Abas, Azizi, et al.
Published: (2017)
Similar Items
-
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019) -
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016) -
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015) -
Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things
by: Ali, Jahan, et al.
Published: (2017) -
Optimal search algorithm in a big database using interpolation–extrapolation method
by: Kabir, M. Nomani, et al.
Published: (2019)