Chapter 1. A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors.- Chapter 2. Study of Chunking Algorithm in Data De-Duplication.- Chapter 3. Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography.- Chapter 4. Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents.- Chapter 5. Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity.- Chapter 6. Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight.- Chapter 7. Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application.- Chapter 8. Non-functional QoS Criterion Based Web Service Ranking.- Chapter 9. Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data.- Chapter 10. A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities.- Chapter 11. Facial Expression Recognition Using PCA and Texture Based LDN Descriptor.- Chapter 12. Role Based Access Control for Encrypted Data Using Vector Decomposition.- Chapter 13. Mobile Controlled Door Locking System with Two-factor Authentication.- Chapter 14. Integration of UMTS With WLAN Using Intermediate IMS Network.- Chapter 15. Building a Knowledge Vault with Effective Data Processing and Storage.- Chapter 16. Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional.- Chapter 17. A Study on Security Issues in Cloud Computing.- Chapter 18. An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection.- Chapter 19. Search Optimisation in Cloud.- Chapter 20. Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach.- Chapter 21. Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation.- Chapter 22. Advanced Power Demand Controller and Billing System Using GSM.- Chapter 23. A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor.- Chapter 24. FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm.- Chapter 25. Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene.- Chapter 26. Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT.- Chapter 27. Scalable Casual Data Consistency for Wide Area Storage with Cloud.- Chapter 28. An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications.- Chapter 29. Big Data and Analytics – A Journey Through Basic Concepts to Research Issues.- Chapter 30. Efficient Identification of Bots by K-Means Clustering.- Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology.- Chapter 33. Optimal Selection of Security Countermeasures for Effective Information Security.- Chapter 34. Stabilization of Load in Content Delivery Networks.- Chapter 35. Eigen Based Indexing and Retrieval of Similar Videos.- Chapter 36. FoetusCare: An Android App for Pregnancy Care.- Chapter 37. Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD).- Chapter 38. MIMO Based Efficient Data Transmission Using USRP.- Chapter 39. Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm.- Chapter 40. A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks.- Chapter 41. Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture.- Chapter 42. Bio-Sensor Authentication for Medical Applications Using WBAN.- Chapter 43. PSO Based Multipath Routing in Wireless Sensor Network.- Chapter 44. Information Hiding in H.264, H.265 and MJPEG.- Chapter 45. Intelligent Data Prediction System Using Data Mining and Neural Networks.- Chapter 46. Resource Allocation for Wireless Network Environment.- Chapter 47. Design of PSO Based PI controller for Tension Control in Web Transport Systems.- Chapter 48. Distributed Service Level Agreement Driven Dynamic Cloud Resource Management.- Chapter 49. Efficient Route Discovery in VANET Using Binary Bat Approach.- Chapter 50. Mining Ambiguities Using Pixel-based Content Extraction.- Chapter 51. Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm.- Chapter 52. Enhancing the Interactivity in Distributed Interactive Applications.- Chapter 53. Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab.- Chapter 54. Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner.- Chapter 55. Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models.- Chapter 56. Active Warden Attack on Steganography Using Prewitt Filter.- Chapter 57. Similarity Scores Evaluation in Social Networking Sites.- Chapter 58. Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing.- Chapter 59. Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features.- Chapter 60. Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining.- Chapter 61. NEBULA: Deployment of Cloud Using Open source.- Chapter 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory.- Chapter 63. A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System.- Chapter 64. Towards Modelling a Trusted and Secured Centralised Reputation System for VANET’s.- Chapter 65. A Surveyon Trusted Platform Module For Data Remanence in Cloud.- Chapter 66. Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval.- Chapter 67. A Hybrid Cloud Architecture for Secure Service –Measures Against Poodle Vulnerability.- Chapter 68. An Efficient Authentication System for Data Forwarding Under Cloud Environment.- Chapter 69. Survey on Data Mining Techniques with Data Structures.
Les mer