00940nam--2200337---45--9900004910902033160-471-53128-60049109USA010049109(ALEPH)000049109USA01004910920010604d1975----km-y0ITAy0103-------baENGUSMolecular SpectroscopyIra N. LevineNew YorkJohn Wiley & Sonscopyr. 1975X, 491 p.ill.20 cm2001Spettroscopia molecolare541.28Levine,Ira N.27022ITACBSISBD990000491090203316541.28 LEV0026470 CBS541.2800104926BKSCIALANDI9020010604USA01112620020403USA011657PATRY9020040406USA011634Molecular spectroscopy329953UNISA03204nam 2200649 450 991078915490332120230803201653.01-60917-396-1(CKB)3710000000082267(EBL)1672318(SSID)ssj0001181181(PQKBManifestationID)11685884(PQKBTitleCode)TC0001181181(PQKBWorkID)11159414(PQKB)10250310(MiAaPQ)EBC3338342(OCoLC)873984790(MdBmJHUP)muse33957(MiAaPQ)EBC1672318(Au-PeEL)EBL3338342(CaPaEBR)ebr10822245(OCoLC)923250579(Au-PeEL)EBL1672318(EXLCZ)99371000000008226720130426h20142014 uy| 0engur|n|---|||||txtccrBawaajimo a dialect of dreams in Anishinaabe language and literature /Margaret NoodinEast Lansing :Michigan State University Press,[2014]©20141 online resource (235 p.)American Indian Studies SeriesDescription based upon print version of record.1-61186-105-5 Includes bibliographical references and index.Contents; N'digo: Preface; N'miigwechwiwaag: Acknowledgments; Ziibaaskobiige: To Set a Written Net; Chapter 1. Anishinaabemowin: The Anishinaabe Language; Chapter 2. Anishinaabebiige: Anishinaabe Literature; Chapter 3. Gikenmaadizo miinwaa Gikenmaa'aan: Patterns of Identity in the Writing of Louise Erdrich; Chapter 4. Zhaabwii'endam: Conscious Survival in the Writing of Jim Northrup; Chapter 5. Giizhigomaadiziwin: Universal Life in the Writing of Basil Johnston; Chapter 6. Waninawendamowinan: Stirred Thoughts in the Writing of Gerald Vizenor; Chapter 7. Ziiginibiige: Poured WritingMaziniaganan Gii Gindanaanan: Works CitedNanaandawaabanjigan: Index Bawaajimo: A Dialect of Dreams in Anishinaabe Language and Literature combines literary criticism, sociolinguistics, native studies, and poetics to introduce an Anishinaabe way of reading. Although nationally specific, the book speaks to a broad audience by demonstrating an indigenous literary methodology. Investigating the language itself, its place of origin, its sound and structure, and its current usage provides new critical connections between North American fiction, Native American literatures, and Anishinaabe narrative. The four Anishinaabe authors discussed in the book, American Indian studies series (East Lansing, Mich.)Ojibwa languageDialectsNorth AmericaOjibwa languageFolkloreOjibwa literatureHistory and criticismOjibwa languageDialectsOjibwa languageOjibwa literatureHistory and criticism.497/.333Noodin Margaret1574380MiAaPQMiAaPQMiAaPQBOOK9910789154903321Bawaajimo3850642UNINA02564nas 2200793-a 450 99620096560331620240413020415.01423-0143(CKB)954925623245(CONSER)sn-96039420-(MiFhGG)814T(MiAaPQ)33949(EXLCZ)9995492562324519960712a19969999 --- -engtxtrdacontentcrdamediacrrdacarrierKidney & blood pressure researchBasel ;New York Karger Medical and Scientific Publishers©1996-1 online resourceTitle from cover.Table of contents also available online via the World Wide Web.Refereed/Peer-reviewedPrint version: Kidney & blood pressure research. (DLC)sn 96039420 (OCoLC)35073635 1420-4096 Kidney and blood pressure researchKIDNEY BLOOD PRESSURE RESKIDNEY BLOOD PRESS RKIDNEY BL PKIDNEY AND BLOOD PRESSURE RESEARCHKIDNEY BLOOD PRESS RESKidney Blood Press ResKidneysPeriodicalsKidneysDiseasesPeriodicalsBlood pressurePeriodicalsBlood pressureDiseasesPeriodicalsBlood PressureHypertension, RenalKidneyKidney DiseasesBlood pressurefast(OCoLC)fst00834794Kidneysfast(OCoLC)fst00987372KidneysDiseasesfast(OCoLC)fst00987389Malalties del ronyóthubHipertensióthubPeriodical.Periodicals.fastRevistes electròniquesthubKidneysKidneysDiseasesBlood pressureBlood pressureDiseasesBlood Pressure.Hypertension, Renal.Kidney.Kidney Diseases.Blood pressure.Kidneys.KidneysDiseases.Malalties del ronyóHipertensióGesellschaft für Nephrologie.Deutsche Liga zur Bekämpfung des hohen Blutdrucks.Deutsche Hypertonie Gesellschaft.JOURNAL996200965603316exl_impl conversionKidney & blood pressure research2122702UNISA12852nam 22008655 450 991064426680332120251225173614.09783031230950303123095710.1007/978-3-031-23095-0(MiAaPQ)EBC7175605(Au-PeEL)EBL7175605(CKB)25994381500041(DE-He213)978-3-031-23095-0(PPN)267807880(EXLCZ)992599438150004120230110d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvancements in Smart Computing and Information Security First International Conference, ASCIS 2022, Rajkot, India, November 24–26, 2022, Revised Selected Papers, Part II /edited by Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat1st ed. 2022.Cham :Springer Nature Switzerland :Imprint: Springer,2022.1 online resource (315 pages)Communications in Computer and Information Science,1865-0937 ;1760Print version: Rajagopal, Sridaran Advancements in Smart Computing and Information Security Cham : Springer,c2023 9783031230943 Includes bibliographical references and index.Intro -- Preface -- Organization -- Abstracts of Keynotes -- Post-pandemic Applications of AI and Machine Learning -- Smart and Soft Computing Methods for Prioritizing Software Requirements in Large-Scale Software Projects -- Your Readiness for Industry 4.0 -- Securing NexGen Automotives - Threats and Trends -- Cyber Attacks Classification and Attack Handling Methods Using Machine Learning Methods -- The Internet of Things (IoT) Ecosystem Revolution in the World of Global Sports -- Orchestration of Containers: Role of Artificial Intelligence -- Enterprise Cybersecurity Strategies in the Cloud -- Contents - Part II -- Contents - Part I -- Cyber Security -- A Comprehensive Study on Cyber Legislation in G20 Countries -- 1 Introduction -- 2 Literature Review -- 2.1 Argentina -- 2.2 Australia -- 2.3 Brazil -- 2.4 Canada -- 2.5 China -- 2.6 France -- 2.7 Germany -- 2.8 India -- 2.9 Indonesia -- 2.10 Italy -- 2.11 Japan -- 2.12 South Korea -- 2.13 Mexico -- 2.14 Russia -- 2.15 Saudi Arabia -- 2.16 South Africa -- 2.17 Turkey -- 2.18 United Kingdom -- 2.19 United State of America -- 2.20 European Union -- 3 Conclusions -- References -- Image Encryption Algorithm Based on Timeout, Pixel Transposition and Modified Fisher-Yates Shuffling -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Generation -- 2.2 Encryption Process -- 2.3 Decryption Process -- 3 Library and Packages -- 4 Performance Analysis and Results -- 4.1 NPCR & -- UACI Test -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 Peak Signal to Noise Ratio (PSNR) -- 4.5 Key Space Analysis -- 4.6 Key Sensitivity Test -- 4.7 Encryption Time -- 4.8 Correlation Analysis -- 4.9 Mono-bit Test -- 4.10 Entropy Analysis -- 4.11 Average Difference (AD) and Maximum Difference (MD) -- 4.12 Structural Content (SC) -- 5 Conclusion -- References.EXAM: Explainable Models for Analyzing Malicious Android Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Set Preparation -- 3.2 Feature Extraction -- 3.3 Pre-processing the Feature Set and FVT Creation -- 3.4 Model Preparation and Classification -- 3.5 Obfuscation of Samples -- 3.6 Interpretation of Results Using SHAP -- 4 Experiments and Results -- 4.1 Evaluation Measures -- 4.2 Research Questions -- 4.3 Comparison with State-of-the-Art Approaches -- 5 Conclusion -- References -- Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers -- 1 Introduction -- 1.1 Research Contribution -- 1.2 Paper Organisation -- 2 Related Work in the Domain -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Mitigation and Prevention Methods for Distributed Denial-of-Service Attacks on Network Servers -- 1 Introduction -- 2 Proposed Survey -- 2.1 Motivation for DDoS Attacks -- 2.2 Attack Strategies and Phases -- 2.3 Attack Methods -- 3 Prevention Methods -- 3.1 Prevention Using Filters -- 3.2 Secure Overlay -- 3.3 Honeypots -- 3.4 Load Balancing -- 3.5 Additional Security Patches -- 4 DDoS Mitigation Methods -- 4.1 Detection of DDoS Attacks -- 5 Conclusion -- References -- A Machine Learning Framework for Automatic Detection of Malware -- 1 Introduction -- 2 Literature Review -- 3 Proposed Framework -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Machine Learning Technique -- 5 Proposed Framework Architecture -- 6 Evaluation of Proposed Framework -- 7 Comparison of Proposed Framework -- 7.1 Comparison on the Basis of Framework Available in the Literature.7.2 Comparison of the Proposed Framework with Different Anti-virus Scanners -- 8 Experimental Findings -- 9 Conclusion -- References -- An Improved Symmetric Key Encryption Method Using Randomized Matrix Generation -- 1 Introduction -- 2 Types of Encryption Technique -- 2.1 AES -- 2.2 DES -- 2.3 Blowfish -- 3 Proposed Technique -- 3.1 Random Key Generation Algorithm -- 3.2 Text Message Encryption Algorithm -- 3.3 Text Message Decryption Algorithm -- 4 Matrix Operations -- 4.1 Matrix Determinant -- 4.2 Matrix Multiplication -- 4.3 Matrix Transpose Operation -- 5 Performance Analysis -- 5.1 Implementation of System -- 5.2 Text Encryption Algorithms Performance Analysis -- 5.3 Analysis of Complexity for Random Key Generation -- 5.4 Analysis of Execution Time -- 5.5 Analysis of Throughput -- 6 Conclusion -- References -- Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3 -- 1 Introduction -- 1.1 AODV Routing Protocol -- 1.2 Black Hole Attack -- 1.3 Literature Survey -- 1.4 Simulation Set-Up -- 1.5 Result Analyses -- 1.6 Conclusion -- References -- Comparative Analysis of Several Approaches of Encoding Audio Files -- 1 Introduction -- 2 Overview of Cryptography -- 3 Aims of Cryptography -- 3.1 The Many Forms that Cryptography Can Take -- 4 Cryptographic Algorithms at a Glance -- 4.1 DES -- 4.2 3DES -- 4.3 AES -- 4.4 Blowfish -- 4.5 RC4 -- 4.6 Twofish -- 4.7 ThreeFish -- 5 Background and Related Works -- 5.1 Related Research and Development on Audio Encryption -- 6 Recent Works on Audio Encryption -- 7 Limitations -- 8 Conclusion -- References -- A Secure Mechanism for Safeguarding Cloud Infrastructure -- 1 Introduction -- 2 Literature Review -- 3 Types of Security in Cloud Computing -- 3.1 Information Security -- 3.2 Identity Security -- 3.3 Network Security -- 3.4 Software Security -- 3.5 Infrastructure Security.4 Security Concerns in Cloud -- 4.1 Virtualization -- 4.2 Public-Cloud Storage -- 4.3 Multitenancy -- 4.4 Identity and Access Management (IAM) -- 5 Security of Data in Cloud-Computing -- 6 Major Security Challenges -- 6.1 Internal Attacks -- 6.2 Partial/Incomplete Data Deletion -- 6.3 Interception of Data -- 6.4 Failure of Isolation -- 7 Using Encryption for Data Protection -- 7.1 Block-Cipher -- 7.2 Stream Ciphers -- 7.3 Hash Functions -- 8 Case Study on Cloud Based Cyber Security Model for Identification of Safe and Malicious Request -- 9 Conclusion -- References -- Phishing URLs Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 URLs Descriptions -- 3 Research Methodology -- 4 Result and Analysis -- 4.1 Result -- 4.2 Analysis -- 5 Conclusion -- References -- Android Malware Detection with Classification Based on Hybrid Analysis and N-gram Feature Extraction -- 1 Introduction -- 1.1 Average Cost of a Data Breach -- 1.2 Growth Rate of Malware Infections -- 1.3 India and Asia Statistics on Malware Attacks -- 1.4 Trends in the Number of Attacks -- 1.5 Users Attacked by Malware -- 2 Research Objective/Problem Statement -- 3 Challenges in Malware Detection -- 4 Theoretical Framework -- 5 Hypothesis Declaration -- 6 Methodology -- 7 Approach -- 8 Outline of the Work Proposed -- 8.1 Process for the Proposed Scheme of Work -- 9 Conclusion -- 10 Further Research -- References -- Industry -- Image Processing and Deep Neural Networks for Face Mask Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Machine Learning Approach -- 3.2 Supervised Learning -- 3.3 Unsupervised Learning -- 3.4 Viola Jones algorithm -- 4 Mathematical Formulation -- 5 Results and Discussion -- 6 Conclusion -- References -- An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications.1 Introduction -- 2 Introduction of IoT -- 3 Software and Hardware Performance Metrics -- 4 Research Directions and Open Research Challenges -- 5 Conclusion -- Appendix 1 -- Hardware and Software Performances of LWC Algorithm -- References -- Permissioned Blockchain-Based Solution to Document Processing in the Real Estate Industry -- 1 Introduction -- 1.1 Blockchain Technology -- 1.2 Indian Real Estate Sector -- 1.3 Impact of Blockchain Technology on the Indian Real Estate Sector -- 2 Related Research Work and Limitations -- 2.1 Summarization of Recent Research Work -- 2.2 Research Gap -- 3 Proposed Research Work -- 3.1 Designed Framework and Components -- 3.2 Core Transaction Process Flow -- 3.3 Proposed Algorithms -- 3.4 Deployment -- 4 Conclusion and Future Scope -- References -- Automatic Evaluation of Free Text Answers: A Review -- 1 Introduction -- 2 Related Work -- 3 A Systematic Review -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Blockchain Federated Learning Framework for Privacy-Preservation -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Performance Evaluation -- 4.1 Datasets -- 4.2 Simulation Setup -- 4.3 Evaluation Metrics -- 4.4 Results and Discussion -- 5 Conclusion -- References -- Path Planning and Static Obstacle Avoidance for Unmanned Aerial Systems -- 1 Introduction -- 2 Methodology -- 2.1 A* Search -- 2.2 Rapidly-Exploring Random Tree -- 2.3 Ant Colony Optimization -- 2.4 Imitation Learning -- 3 Results and Discussion -- 4 Conclusion and Future Work -- References -- Comparative Study of Various Algorithms for Vehicle Detection and Counting in Traffic -- 1 Introduction -- 2 Literature Review -- 2.1 YOLO Real-Time Object Tracking -- 3 Methodology -- 3.1 YOLOv3 Architecture -- 3.2 YOLOv4 Architecture -- 3.3 YOLOv5 Architecture -- 3.4 YOLOv6 Architecture -- 3.5 YOLOv7 Architecture.4 Results and Discussion.This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.Communications in Computer and Information Science,1865-0937 ;1760Artificial intelligenceComputer networksComputer systemsCoding theoryInformation theoryApplication softwareData protectionArtificial IntelligenceComputer Communication NetworksComputer System ImplementationCoding and Information TheoryComputer and Information Systems ApplicationsData and Information SecurityArtificial intelligence.Computer networks.Computer systems.Coding theory.Information theory.Application software.Data protection.Artificial Intelligence.Computer Communication Networks.Computer System Implementation.Coding and Information Theory.Computer and Information Systems Applications.Data and Information Security.330006.3Rajagopal SridaranFaruki ParvezPopat KalpeshMiAaPQMiAaPQMiAaPQBOOK9910644266803321Advancements in smart computing and information security3364147UNINA