Loading…
Proceedings of International Conference on Communication and Networks ComNet 2016 /
The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19-20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Associatio...
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | e-Book |
Language: | English |
Published: |
Singapore :
Springer Nature Singapore :
2017.
Imprint: Springer, |
Edition: | 1st ed. 2017. |
Series: | Advances in Intelligent Systems and Computing,
508 |
Subjects: | |
Online Access: | Full-text access |
Table of Contents:
- Chapter 1. A Novice Approach for Web Application Security
- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using 'R'
- Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect
- Chapter 4. Enhancement of Security in IoTSyS Framework
- Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect
- Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers
- Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network
- Chapter 8. Use of ICT for Development of Smart City-Ahmedabad
- Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering
- Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network
- Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming
- Chapter 12. Control of Robot Using Neural Networks
- Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment
- Chapter 14. Information Security Emergency Plan Management System
- Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud
- Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation
- Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards
- Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing
- Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix
- Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics
- Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH
- Chapter 22. MMR-LEACH: Multi-tier Multi-hopRouting in LEACH Protocol
- Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment
- Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment
- Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology
- Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application
- Chapter 27. Objective Quality Assessments of Restoration Images
- Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications
- Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering
- Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges
- Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm
- Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village
- Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India
- Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
- Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression
- Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images
- Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks
- Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks
- Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries
- Chapter 40. Internet of Things based Smart Home withIntel Edison
- Chapter 41. Image Classification Using Discrete Block Truncation Coding
- Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination
- Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits
- Chapter 44. Security Requirements for Internet of Things (IoT)
- Chapter 45. Identity Based Secure RSA Encryption System
- Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels
- Chapter 47. An Extensive Conception of Reusability in Software Component Engineering
- Chapter 48. Opportunistic Location Update - A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks
- Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
- Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters
- Chapter 51. Target Tracking Accuracy in Contextof Energy Consumption in Wireless Sensor Network
- Chapter 52. Security in Mobile Ad hoc Networks
- Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator
- Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases
- Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System
- Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
- Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration
- Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem
- Chapter 59. Differential Voltage Controlled Ring Oscillators - A Review
- Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach
- Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization
- Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things
- Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows
- Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person
- Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport
- Chapter 66. Real Time Street Light System Using Low Power Microcontroller
- Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes
- Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks
- Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images
- Chapter 70. LTTC: A Load Testing Tool for Cloud
- Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine
- Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching
- Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection
- Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks
- Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.