Loading…

Proceedings of International Conference on Communication and Networks ComNet 2016 /

The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19-20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Associatio...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Modi, Nilesh (Editor), Verma, Pramode (Editor), Trivedi, Bhushan (Editor)
Format: e-Book
Language:English
Published: Singapore : Springer Nature Singapore : 2017.
Imprint: Springer,
Edition:1st ed. 2017.
Series:Advances in Intelligent Systems and Computing, 508
Subjects:
Online Access:Full-text access
Table of Contents:
  • Chapter 1. A Novice Approach for Web Application Security
  • Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R'
  • Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect
  • Chapter 4. Enhancement of Security in IoTSyS Framework
  • Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect
  • Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers
  • Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network
  • Chapter 8. Use of ICT for Development of Smart City-Ahmedabad
  • Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering
  • Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network
  • Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming
  • Chapter 12. Control of Robot Using Neural Networks
  • Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment
  • Chapter 14. Information Security Emergency Plan Management System
  • Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud
  • Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation
  • Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards
  • Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing
  • Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix
  • Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics
  • Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH
  • Chapter 22. MMR-LEACH: Multi-tier Multi-hopRouting in LEACH Protocol
  • Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment
  • Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment
  • Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology
  • Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application
  • Chapter 27. Objective Quality Assessments of Restoration Images
  • Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications
  • Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering
  • Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges
  • Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm
  • Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village
  • Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India
  • Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
  • Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression
  • Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images
  • Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks
  • Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks
  • Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries
  • Chapter 40. Internet of Things based Smart Home withIntel Edison
  • Chapter 41. Image Classification Using Discrete Block Truncation Coding
  • Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination
  • Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits
  • Chapter 44. Security Requirements for Internet of Things (IoT)
  • Chapter 45. Identity Based Secure RSA Encryption System
  • Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels
  • Chapter 47. An Extensive Conception of Reusability in Software Component Engineering
  • Chapter 48. Opportunistic Location Update - A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks
  • Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
  • Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters
  • Chapter 51. Target Tracking Accuracy in Contextof Energy Consumption in Wireless Sensor Network
  • Chapter 52. Security in Mobile Ad hoc Networks
  • Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator
  • Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases
  • Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System
  • Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
  • Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration
  • Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem
  • Chapter 59. Differential Voltage Controlled Ring Oscillators - A Review
  • Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach
  • Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization
  • Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things
  • Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows
  • Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person
  • Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport
  • Chapter 66. Real Time Street Light System Using Low Power Microcontroller
  • Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes
  • Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks
  • Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images
  • Chapter 70. LTTC: A Load Testing Tool for Cloud
  • Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine
  • Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching
  • Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection
  • Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks
  • Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.