Mishra, Krishn K.

Networking Communication and Data Knowledge Engineering

Mishra, Krishn K. - Networking Communication and Data Knowledge Engineering, ebook


Ebook, PDF with Adobe DRM
ISBN: 9789811046001
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Advanced Software Engineering and Cloud Computing

1. WebN: A Strainer Approach for Website Performance Analysis
Charmy Patel, Ravi Gulati

2. A Phase-wise Review of Software Security Metrics
Syed Anas Ansar, Alka, Raees Ahmad Khan

3. A Survey on Code Clone, Its Behavior and Applications
Aakanshi Gupta, Bharti Suri

4. Trust for Task Scheduling in Cloud Computing Unfolds It Through Fruit Congenial
Nidhi Bansal, Ajay Kumar Singh

5. Log-Based Cloud Forensic Techniques: A Comparative Study
Palash Santra, Asmita Roy, Sadip Midya, Koushik Majumder, Santanu Phadikar

6. An Automated Malicious Host Recognition Model in Cloud Forensics
Suchana Datta, Palash Santra, Koushik Majumder, Debashis De

7. Parallel Bat Algorithm-Based Clustering Using MapReduce
Tripathi Ashish, Sharma Kapil, Bala Manju

8. Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in Cloud
Priti Narwal, Shailendra Narayan Singh, Deepak Kumar

9. Low-Size Cipher Text Homomorphic Encryption Scheme for Cloud Data
Manish M. Potey, C. A. Dhote, Deepak H. Sharma

10. Relation Between Facebook Stories and Hours of a Day
Hradesh Kumar, Sanjeev Kumar Yadav

Part II. Image Processing and Computer Vision

11. Lagrangian Twin SVR Based Grayscale Image Watermarking Using LWT-QR Decomposition
Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar

12. Difference in Lights and Color Background Differentiates the Color Skin Model in Face Detection for Security Surveillance
Dimple Chawla, Munesh Chandra Trivedi

13. Feature Extraction and Fuzzy-Based Feature Selection Method for Long Range Captured Iris Images
Anand Deshpande, Prashant P. Patavardhan

14. Information Retrieves from Brain MRI Images for Tumor Detection Using Hybrid Technique K-means and Artificial Neural Network (KMANN)
Manorama Sharma, G. N. Purohit, Saurabh Mukherjee

15. Comparative Analysis and Evaluation of Biclustering Algorithms for Microarray Data
Ankush Maind, Shital Raut

16. Unconstrained Iris Image Super Resolution in Transform Domain
Anand Deshpande, Prashant P. Patavardhan

Part III. Security

17. An Extension to Modified Harn Digital Signature Scheme with the Feature of Message Recovery
Shailendra Kumar Tripathi, Bhupendra Gupta

18. Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks
Jayashree Padmanabhan, Gunavathie Mariappan

19. Personal Verification Using Off-line Signature with Tree-based Features
Arun Kumar Shukla, Suvendu Kanungo

20. Generalized Parametric Model for AVK-Based Cryptosystem
Shaligram Prajapat, Adisha Porwal, Swati Jaiswal, Fatema Saifee, R. S. Thakur

21. Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm
Shikha Mathur, Deepika Gupta, Vishal Goar, Sunita Choudhary

22. Traditional and Hybrid Encryption Techniques: A Survey
Pooja Dixit, Avadhesh Kumar Gupta, Munesh Chandra Trivedi, Virendra Kumar Yadav

23. A Comparative Study of Recent Advances in Big Data for Security and Privacy
Ahlam Kourid, Salim Chikhi

Keywords: Engineering, Communications Engineering, Networks, Computational Intelligence, Data Mining and Knowledge Discovery

Publication year
Lecture Notes on Data Engineering and Communications Technologies
Page amount
20 pages
Technology, Energy, Traffic
Printed ISBN

Similar titles