LEADER 00452oas 2200169z- 450 001 996417782503316 035 $a(CKB)3780000000095804 035 $a(EXLCZ)993780000000095804 100 $a20210505cuuuuuuuu -u- - 101 0 $aeng 200 00$aBalonne Beacon (Queensland) 210 $cAPN Newspapers Pty Ltd 517 $aBalonne Beacon 906 $aJOURNAL 912 $a996417782503316 996 $aBalonne Beacon (Queensland)$92209339 997 $aUNISA LEADER 05452nam 22006855 450 001 9911031568003321 005 20251001130723.0 010 $a981-9663-48-2 024 7 $a10.1007/978-981-96-6348-4 035 $a(CKB)41521119200041 035 $a(MiAaPQ)EBC32323759 035 $a(Au-PeEL)EBL32323759 035 $a(DE-He213)978-981-96-6348-4 035 $a(EXLCZ)9941521119200041 100 $a20251001d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Conference on Network Security and Blockchain Technology $eICNSBT 2025 /$fedited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (600 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1405 311 08$a981-9663-47-4 327 $aFPGA Implementation of LSB Steganography Without Multiplier and Divider -- Cryptanalysis and improvement on low cost CL-ASS for wireless sensor networks -- Image Steganography with Efficient Utilization of Difference of Gaussian Edge Detection and Dilation -- LBP based Robust medical image watermarking in wavelet domain -- Cryptanalysis over Xu et al.?s CLAS scheme for VANETs -- Optimizing Cybersecurity Defences: Leveraging YARA Rules for Enhanced Detection of Custom PDF Spyware -- Template security in Biometrics system for fingerprint minutiae templates using Fuzzy vault method -- A Multilingual PDF Text-to-Speech Converter with Translation Capabilities -- An Image Watermarking approach using Hybrid GWO-GA in IWT Domain -- Developing a Secure Authentication and Key Agreement Protocol for Internet of Vehicles (IOV) Utilizing 5G Networks -- On Detection of Phishing URLs using Plant Propagation Algorithm -- Phishing URL Detection via Machine Learning: A Comprehensive Survey -- A Novel Synonym-Based Attack Algorithm for Generating Undetectable Adversarial Text Examples in Machine Learning -- Open-Audit: Enhancing Software Compliance with Blockchain and Zero-Knowledge Proofs -- Privacy-Preserved Efficient Contact Tracing in Contact Graph Components of Body Area Networks using Blockchain -- Integration of Blockchain to Internet of Things (IoT) -- Anomaly Detection in IoT Networks Using WGAN-GP: A Novel Approach for Robust IoT Security -- Urban Resilience: Using Autoencoder-Decoder LSTM Model with Green Roofs and Vertical Gardens to Combat Air Pollution -- Smart Cities' Clean Air: Federated Bidirectional Long Short-term Memory for Enhanced Air Quality Index Forecasting -- Min-Cart: An Eco-Friendly Approach to Minimize Air Pollution and Carbon Footprint -- Augmented Transfer Learning for Skin Cancer Detection: Enhancing Accuracy using Edge Detection -- Advanced Brain Tumor Classification with UNet Segmentation and Deep Maxout Classifier Techniques -- Enhancing Classification of Gemstones through Deep Learning Analysis: A Comparative Study -- LSTM-Based Image Enrichment and Description Generation to Enhance Visual Perception for Visually Challenged People -- Deforestation Detection Using Domain Adversarial Neural Network -- GeoLands: Machine Learning-Powered Landslide Risk Assessment -- Performance Improvement of an Automated Alzheimer Classification System -- Integrated Energy-Efficient Air Pollution Prediction and Control Framework -- Automatic Detection and Classification of Brain Tumors Using Deep Learning Model. 330 $aThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2025), held at Haldia Institute of Technology, Haldia, West Bengal, India, during January 14?16, 2025. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1405 606 $aTelecommunication 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aArtificial Intelligence. 676 $a621.382 700 $aGiri$b Debasis$01380213 701 $aKambourakis$b Georgios$01850280 701 $aIslam$b S. K. Hafizul$01785598 701 $aSrivastava$b Gautam$01802732 701 $aMaitra$b Tanmoy$01850281 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911031568003321 996 $aProceedings of International Conference on Network Security and Blockchain Technology$94443286 997 $aUNINA LEADER 04212nam 2200697Ia 450 001 9910965490803321 005 20251116150158.0 010 $a9786610176205 010 $a9780309166195 010 $a0309166195 010 $a9781280176203 010 $a1280176202 010 $a9780309531528 010 $a0309531527 035 $a(CKB)1000000000024174 035 $a(EBL)3564064 035 $a(SSID)ssj0000097151 035 $a(PQKBManifestationID)12025887 035 $a(PQKBTitleCode)TC0000097151 035 $a(PQKBWorkID)10114899 035 $a(PQKB)11772755 035 $a(Au-PeEL)EBL3564064 035 $a(CaPaEBR)ebr10068527 035 $a(CaONFJC)MIL17620 035 $a(OCoLC)74395432 035 $a(MiAaPQ)EBC3564064 035 $a(Perlego)4735027 035 $a(BIP)11993239 035 $a(EXLCZ)991000000000024174 100 $a20040924h20042004 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAdaptive management for water resources project planning /$fPanel on adaptive Management for Resource Stewardship [et al.] 205 $a1st ed. 210 1$aWashington, D.C. :$cNational Research Council,$d2004. 210 4$aŠ2004 215 $a1 online resource (xiv, 123 pages) $cmaps 300 $a"Committee to Assess the U.S. Army Corps of Engineers Water Resources Methods of Analysis and Peer Review for Water Resources Project Planning, Water Science and Technology Board, Ocean Studies Board,Division on Earth and Life Studies." 311 08$a9780309091916 311 08$a0309091918 320 $aIncludes bibliographical references (p. 100-106). 327 $a""Front Matter""; ""Foreword""; ""Preface""; ""Contents""; ""Executive Summary""; ""1 Report Purpose and Scope""; ""2 Adaptive Management Theories, Frameworks, and Practices""; ""3 The Context of Corps Decision Making""; ""4 Case Studies of Adaptive Management""; ""5 Prospects for Adaptive Management in the Corps""; ""6 Epilogue""; ""References""; ""Acronyms""; ""Appendixes""; ""Appendix A Water Resources Development Act 2000 Public Law No. 106-541, of the 106th Congress""; ""Appendix B Rosters""; ""Appendix C Biographical Information of Panel Members and Staff"" 330 $aThis book reviews the Corps of Engineers' experiences to date with the concept of oeadaptive management and provides advice on additional and more effective implementation of this planning approach. The adaptive management concept itself is complex and evolving, but might be summarized as oelearning while doing. The book reviews literature on adaptive management and notes that a range of adaptive management practices present themselves for Corps projects. It is noted that there is no oecookbook approach to adaptive management, and the book encourages the Corps of Engineers to continue to work with and learn from its applications of the concept. To facilitate institutional learning and to ensure that experiences are being employed across the agency, the book recommends that a Corps Center for Adaptive Management be established. The book also notes that greater involvement from the administration and Congress will be essential to successful adaptive management applications, as the Corps' efforts in this area will benefit from clarified water resources management objectives, the authority to manage adaptively, and from resources necessary for programs such as stakeholder collaboration and post-construction evaluations. 606 $aWater resources development$zUnited States$xPlanning 606 $aWater resources development$xResearch$zUnited States 606 $aPeer review 615 0$aWater resources development$xPlanning. 615 0$aWater resources development$xResearch 615 0$aPeer review. 676 $a333.9100973 712 02$aNational Research Council (U.S.).$bPanel on Adaptive Management for Resource Stewardship. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910965490803321 996 $aAdaptive management for water resources project planning$94358814 997 $aUNINA