Joshi, Amit
Information and Communication Technology for Sustainable Development
1. Internet of Things Applications @ Urban Spaces (Tel Aviv Smart City: A Case Study)
Somayya Madakam, Siddharth Tripathi, Rajesh Kumar Arora
2. Impact of Consumer Gender on Expenditure Done in Mobile Shopping Using Test of Independence
Shanti Verma, Kalyani Patel
3. Detecting Phishing Websites Using Rule-Based Classification Algorithm: A Comparison
Sudhanshu Gautam, Kritika Rani, Bansidhar Joshi
4. Mobile Applications Usability Parameters: Taking an Insight View
Sakshi Goel, Renuka Nagpal, Deepti Mehrotra
5. Segmentation of Musculoskeletal Tissues with Minimal Human Intervention
Sourav Mishra, Ravitej Singh Rekhi, Anustha, Garima Vyas
6. Implementation of Modified ID3 Algorithm
Latika Mehrotra, Prashant Sahai Saxena, Nitika Vats Doohan
7. A Data Classification Model: For Effective Classification of Intrusion in an Intrusion Detection System Based on Decision Tree LearningAlgorithm
Latika Mehrotra, Prashant Sahai Saxena, Nitika Vats Doohan
8. Reliability-Aware Green Scheduling in Cloud Computing
Nidhi Rehani, Ritu Garg
9. Proposed Use of Information Dispersal Algorithm in User Profiling
Bhushan Atote, Saniya Zahoor, Mangesh Bedekar, Suja Panicker
10. Recent Research in Wireless Sensor Networks: A Trend Analysis
Prerak S. Shah, Neel N. Patel, Dhrumil M. Patel, Devanshi P. Patel, Rutvij H. Jhaveri
11. Profit Analysis of a Computing Machine with Priority and s/w Rejuvenation
Ashish Kumar, Monika Saini, Devesh Kumar Srivastava
12. V2V-DDS Approach to Provide Sheltered Communication Over ALTERATION ATTACK to Control Against Vehicular Traffic
P. Prittopaul, M. Usha, M. V. S. Santhosh, R. Sharath, E. Kughan
13. Enhancing Performance of Data Centers Using Location-Aware Live VM Migration
Narander Kumar, Swati Saxena
14. Progressive Visual Analytics in Big Data Using MapReduce FPM
Amit Kumar, Prabhat Ranjan
15. Energy Based Recent Trends in Delay Tolerant Networks
Nimish Ukey, Lalit Kulkarni
16. Smart Solar Panel: Wireless Sensor Network-Based Measurement and Monitoring of Performance Parameters of Solar Panel
Dhiraj Nitnaware
17. Efficiency Evaluation of Recommender Systems: Study of Existing Problems and Possible Extensions
Mugdha Sharma, Laxmi Ahuja
18. Comparative Analysis of Application Layer Internet of Things (IoT) Protocols
Himadri Chaudhary, Naman Vaishnav, Birju Tank
19. Machine-Learning-Based Android Malware Detection Techniques—A Comparative Analysis
Nishant Painter, Bintu Kadhiwala
20. Sensing Technology for Detecting Insects in a Paddy Crop Field Using Optical Sensor
Chandan Kumar Sahu, Prabira Kumar Sethy, Santi Kumari Behera
21. Novel Approach to Image Encryption: Using a Combination of JEX Encoding–Decoding with the Modified AES Algorithm
Sneha Birendra Tiwari Sharma, Manjeet Kantak, Nagaraj Vernekar
22. A Survey on Video Smoke Detection
Princy Matlani, Manish Shrivastava
23. Understanding Intrafactor Relationships in Cyberloafing Using Predictive Apriori Algorithm
Soham Banerjee, Sanjeev Thakur
24. Fault Detection and Recovery for Automotive Embedded System Using Rough Set Techniques
Pattanaik Balachandra
25. An Analysis on Pricing Strategies of Software ‘I-Med’ in Healthcare Industry
Pattnaik Manjula, Pattanaik Balachandra
26. FPGA-Based Partial Crypto-Reconfiguration of Nodes for WSN
Prajakta Patrikar, Gayatri Phade
27. Performance Scrutiny of Thinning Algorithms on Printed Gujarati Characters and Handwritten Numerals
Sanket B. Suthar, Rahul S. Goradia, Bijal N. Dalwadi, Sagar M. Patel, Sandip Patel
28. An Exploratory Analysis of Foreign Tourist Visits for Indian State Attractions Using Multinomial Logistic Regression Technique
Hari Bhaskar Sankaranarayanan
29. Performance Exploration of Different Dispersion Compensation Schemes with Binary and Duo Binary Modulation Formats Over Fiber-Optic Communication
Hiroshama Nain, Urvashi Jadon, Vivekanand Mishra
30. Cognitive Radio Networks: State of Research Domain in Next-Generation Wireless Networks—An Analytical Analysis
M. Anusha, Srikanth Vemuru
31. Smart Bike Through Server Using GPS Technology
Rajneesh Tanwar, Ashwani Chaudhary
32. Preventing Node Replication Attack in Mobile Wireless Sensor Networks
Aarti Singh, Kavita Gupta
33. Logistic Regression with Stochastic Gradient Ascent to Estimate Click Through Rate
Jenish Dhanani, Keyur Rana
34. Cloud-Based Pollution Scheming System Using Raspberry Pi
Vaishnavi Kulkarni, Prashant Salunke
35. A Deadlock Detection Technique Using Multi Agent Environment
Rashmi Priya, R. Belwal
36. Google AdWords: A Window into the Google Display Network
Vekariya Subhadra, Kapadiya Urvashi, Fruitwala Pranav, Vyas Tarjni
37. Clustering to Enhance Network Traffic Forecasting
Theyazn H. H. Aldhyani, Manish R. Joshi
38. Load Balancing Mechanism Using Fuzzy Row Penalty Method in Cloud Computing Environment
Narander Kumar, Diksha Shukla
39. Performance Evaluation of Data Mining Techniques
Mani, Bharti Suri, Manoj Kumar
40. Automatic White Blood Cell Segmentation for Detecting Leukemia
Pooja Deshmukh, C. R. Jadhav, N. Usha Rani
41. Indian Script Encoding Technique (ISET): A Hindi Text Steganography Approach
Sunita Chaudhary, Meenu Dave, Amit Sanghi, Hansraj Sidh
42. IC Technology to Support Children with Autism Spectrum Disorder
Nara Kalyani, Katta Shubhankar Reddy
43. Using Hybrid Cryptography and Improved EAACK Develop Secure Intrusion Detection System for MANETs
Sharad Awatade, Pankaj Chandre
44. Diversification in Tag Recommendation System Using Binomial Framework
Jayeeta Chakraborty, Vijay Verma
45. Optimized Task Scheduling Algorithm for Cloud Computing
Monika, Abhimanyu Jindal
46. “BOMEST” a Vital Approach to Extract the Propitious Information from the Big Data
V. K. Jain, Deepali Virmani, Preeti Arora, Ankit Arora
47. Information Privacy Using Stego-Data Element with Visual Cryptography
Manjeet Kantak, Sneha Birendra Tiwari Sharma
48. Power-Aware Virtual Machine Consolidation in Data Centers Using Rousseeuw and Croux Estimators
Lincolin Nhapi, Arun Kumar Yadav, Pallavi Khatri
49. A Rule-Based Self-Learning Model for Automatic Evaluation and Grading of C++Programs
Maxwell Christian
50. Study and Research on Raspberry PI 2 Model B Game Design and Development
Nishant Sahni, Kailash Srinivasan, Karan Vala, Saurabh Malgaonkar
51. Improved Churn Prediction Based on Supervised and Unsupervised Hybrid Data Mining System
J. Vijaya, E. Sivasankar
52. Simulation-Based Comparison of Vampire Attacks on Traditional Manet Routing Protocols
Joshua Reginald Pullagura, Dhulipalla Venkata Rao
Keywords: Engineering, Computational Intelligence, Data Mining and Knowledge Discovery, Computer-Aided Engineering (CAD, CAE) and Design, Communications Engineering, Networks
- Editor
- Joshi, Amit
- Mishra, Durgesh Kumar
- Nayak, Malaya Kumar
- Publisher
- Springer
- Publication year
- 2018
- Language
- en
- Edition
- 1
- Series
- Lecture Notes in Networks and Systems
- Page amount
- 24 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9789811039324
- Printed ISBN
- 978-981-10-3931-7