Mishra, Krishn K.
Networking Communication and Data Knowledge Engineering
Part I. Advanced Software Engineering and Cloud Computing
1. WebN: A Strainer Approach for Website Performance Analysis
Charmy Patel, Ravi Gulati
2. A Phase-wise Review of Software Security Metrics
Syed Anas Ansar, Alka, Raees Ahmad Khan
3. A Survey on Code Clone, Its Behavior and Applications
Aakanshi Gupta, Bharti Suri
4. Trust for Task Scheduling in Cloud Computing Unfolds It Through Fruit Congenial
Nidhi Bansal, Ajay Kumar Singh
5. Log-Based Cloud Forensic Techniques: A Comparative Study
Palash Santra, Asmita Roy, Sadip Midya, Koushik Majumder, Santanu Phadikar
6. An Automated Malicious Host Recognition Model in Cloud Forensics
Suchana Datta, Palash Santra, Koushik Majumder, Debashis De
7. Parallel Bat Algorithm-Based Clustering Using MapReduce
Tripathi Ashish, Sharma Kapil, Bala Manju
8. Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in Cloud
Priti Narwal, Shailendra Narayan Singh, Deepak Kumar
9. Low-Size Cipher Text Homomorphic Encryption Scheme for Cloud Data
Manish M. Potey, C. A. Dhote, Deepak H. Sharma
10. Relation Between Facebook Stories and Hours of a Day
Hradesh Kumar, Sanjeev Kumar Yadav
Part II. Image Processing and Computer Vision
11. Lagrangian Twin SVR Based Grayscale Image Watermarking Using LWT-QR Decomposition
Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar
12. Difference in Lights and Color Background Differentiates the Color Skin Model in Face Detection for Security Surveillance
Dimple Chawla, Munesh Chandra Trivedi
13. Feature Extraction and Fuzzy-Based Feature Selection Method for Long Range Captured Iris Images
Anand Deshpande, Prashant P. Patavardhan
14. Information Retrieves from Brain MRI Images for Tumor Detection Using Hybrid Technique K-means and Artificial Neural Network (KMANN)
Manorama Sharma, G. N. Purohit, Saurabh Mukherjee
15. Comparative Analysis and Evaluation of Biclustering Algorithms for Microarray Data
Ankush Maind, Shital Raut
16. Unconstrained Iris Image Super Resolution in Transform Domain
Anand Deshpande, Prashant P. Patavardhan
Part III. Security
17. An Extension to Modified Harn Digital Signature Scheme with the Feature of Message Recovery
Shailendra Kumar Tripathi, Bhupendra Gupta
18. Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks
Jayashree Padmanabhan, Gunavathie Mariappan
19. Personal Verification Using Off-line Signature with Tree-based Features
Arun Kumar Shukla, Suvendu Kanungo
20. Generalized Parametric Model for AVK-Based Cryptosystem
Shaligram Prajapat, Adisha Porwal, Swati Jaiswal, Fatema Saifee, R. S. Thakur
21. Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm
Shikha Mathur, Deepika Gupta, Vishal Goar, Sunita Choudhary
22. Traditional and Hybrid Encryption Techniques: A Survey
Pooja Dixit, Avadhesh Kumar Gupta, Munesh Chandra Trivedi, Virendra Kumar Yadav
23. A Comparative Study of Recent Advances in Big Data for Security and Privacy
Ahlam Kourid, Salim Chikhi
Keywords: Engineering, Communications Engineering, Networks, Computational Intelligence, Data Mining and Knowledge Discovery
- Editor
- Mishra, Krishn K.
- Perez, Gregorio Martinez
- Tiwari, Shailesh
- Trivedi, Munesh C.
- Publisher
- Springer
- Publication year
- 2018
- Language
- en
- Edition
- 1
- Series
- Lecture Notes on Data Engineering and Communications Technologies
- Page amount
- 20 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9789811046001
- Printed ISBN
- 978-981-10-4599-8