𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Networking Communication and Data Knowledge Engineering

✍ Scribed by Gregorio Martinez Perez, Krishn K. Mishra, Shailesh Tiwari, Munesh C. Trivedi (eds.)


Publisher
Springer Singapore
Year
2018
Tongue
English
Leaves
264
Series
Lecture Notes on Data Engineering and Communications Technologies 4
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of β€˜International Conference on Recent Advancement in Computer, Communication and Computational Sciences (ICRACCCS 2016)’, held at Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur, India, during 25–26 November 2016. The volume covers variety of topics such as Advanced Communication Networks, Artificial Intelligence and Evolutionary Algorithms, Advanced Software Engineering and Cloud Computing, Image Processing and Computer Vision, and Security. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.

✦ Table of Contents


Front Matter ....Pages i-xx
Front Matter ....Pages 1-1
WebN: A Strainer Approach for Website Performance Analysis (Charmy Patel, Ravi Gulati)....Pages 3-13
A Phase-wise Review of Software Security Metrics (Syed Anas Ansar, Alka, Raees Ahmad Khan)....Pages 15-25
A Survey on Code Clone, Its Behavior and Applications (Aakanshi Gupta, Bharti Suri)....Pages 27-39
Trust for Task Scheduling in Cloud Computing Unfolds It Through Fruit Congenial (Nidhi Bansal, Ajay Kumar Singh)....Pages 41-48
Log-Based Cloud Forensic Techniques: A Comparative Study (Palash Santra, Asmita Roy, Sadip Midya, Koushik Majumder, Santanu Phadikar)....Pages 49-59
An Automated Malicious Host Recognition Model in Cloud Forensics (Suchana Datta, Palash Santra, Koushik Majumder, Debashis De)....Pages 61-71
Parallel Bat Algorithm-Based Clustering Using MapReduce (Tripathi Ashish, Sharma Kapil, Bala Manju)....Pages 73-82
Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in Cloud (Priti Narwal, Shailendra Narayan Singh, Deepak Kumar)....Pages 83-92
Low-Size Cipher Text Homomorphic Encryption Scheme for Cloud Data (Manish M. Potey, C. A. Dhote, Deepak H. Sharma)....Pages 93-102
Relation Between Facebook Stories and Hours of a Day (Hradesh Kumar, Sanjeev Kumar Yadav)....Pages 103-111
Front Matter ....Pages 113-113
Lagrangian Twin SVR Based Grayscale Image Watermarking Using LWT-QR Decomposition (Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar)....Pages 115-126
Difference in Lights and Color Background Differentiates the Color Skin Model in Face Detection for Security Surveillance (Dimple Chawla, Munesh Chandra Trivedi)....Pages 127-135
Feature Extraction and Fuzzy-Based Feature Selection Method for Long Range Captured Iris Images (Anand Deshpande, Prashant P. Patavardhan)....Pages 137-144
Information Retrieves from Brain MRI Images for Tumor Detection Using Hybrid Technique K-means and Artificial Neural Network (KMANN) (Manorama Sharma, G. N. Purohit, Saurabh Mukherjee)....Pages 145-157
Comparative Analysis and Evaluation of Biclustering Algorithms for Microarray Data (Ankush Maind, Shital Raut)....Pages 159-171
Unconstrained Iris Image Super Resolution in Transform Domain (Anand Deshpande, Prashant P. Patavardhan)....Pages 173-180
Front Matter ....Pages 181-181
An Extension to Modified Harn Digital Signature Scheme with the Feature of Message Recovery (Shailendra Kumar Tripathi, Bhupendra Gupta)....Pages 183-193
Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks (Jayashree Padmanabhan, Gunavathie Mariappan)....Pages 195-205
Personal Verification Using Off-line Signature with Tree-based Features (Arun Kumar Shukla, Suvendu Kanungo)....Pages 207-216
Generalized Parametric Model for AVK-Based Cryptosystem (Shaligram Prajapat, Adisha Porwal, Swati Jaiswal, Fatema Saifee, R. S. Thakur)....Pages 217-227
Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm (Shikha Mathur, Deepika Gupta, Vishal Goar, Sunita Choudhary)....Pages 229-237
Traditional and Hybrid Encryption Techniques: A Survey (Pooja Dixit, Avadhesh Kumar Gupta, Munesh Chandra Trivedi, Virendra Kumar Yadav)....Pages 239-248
A Comparative Study of Recent Advances in Big Data for Security and Privacy (Ahlam Kourid, Salim Chikhi)....Pages 249-259
Back Matter ....Pages 261-262

✦ Subjects


Communications Engineering, Networks


πŸ“œ SIMILAR VOLUMES


Networking Communication and Data Knowle
✍ Gregorio Martinez Perez,Krishn K. Mishra,Shailesh Tiwari,Munesh C. Trivedi (eds. πŸ“‚ Library πŸ“… 2018 πŸ› Springer Singapore 🌐 English

<p><p>Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcomi

Data Communications and Computer Network
✍ Michael Duck, Richard Read πŸ“‚ Library πŸ“… 2003 πŸ› Prentice Hall 🌐 English

A broad introductory text written for computer scientists and engineers, focusing on the fundamental aspects of data communications and computer networks. This second edition has been thoroughly revised to cover current networking issues and technologies. Specific updates include those on networks a

Data Communications and Networking
✍ Behrouz A Forouzan, Behrouz Forouzan πŸ“‚ Library πŸ“… 2003 πŸ› McGraw-Hill Science/Engineering/Math 🌐 English

Data Communications and Networking, 3/e provides a comprehensive and current introduction to networking technologies. The book is accessible to students from all backgrounds and uses hundreds of figures to visually represent concepts. <P> The new edition has been completely updated to reflect