Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
30
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,652
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Proceedings of International Conference on Communication and Networks
other
Editor(s):
Nilesh Modi
,
Pramode Verma
,
Bhushan Trivedi
Publication date
(Print):
2017
Publisher:
Springer Singapore
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scholarly Communication
Author and book information
Book
ISBN (Print):
978-981-10-2749-9
ISBN (Electronic):
978-981-10-2750-5
Publication date (Print):
2017
DOI:
10.1007/978-981-10-2750-5
SO-VID:
83e46a2c-e0dc-444b-85df-1db57cf11bd8
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A Novice Approach for Web Application Security
pp. 11
Correlation Between Text Book Usage and Academic Performance of Student in Higher Education Using ‘R’
pp. 19
Human Computer Interaction Through Hand Gestures for Home Automation Using Microsoft Kinect
pp. 31
Enhancement of Security in IoTSyS Framework
pp. 45
Segmentation and Recognition of Fingers Using Microsoft Kinect
pp. 55
Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers
pp. 65
MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network
pp. 77
Use of ICT for Development of Smart City-Ahmedabad
pp. 87
Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering
pp. 95
The Efficient Scheme for Contention Reduction in Bufferless OBS Network
pp. 101
Empowering Throughput Over Proactive Wireless Network Using Multistreaming
pp. 109
Control of Robot Using Neural Networks
pp. 119
Achieving Energy Aware Mechanism in Cloud Computing Environment
pp. 129
Information Security Emergency Plan Management System
pp. 139
Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud
pp. 155
Realization of Virtual Resource Management Framework in IaaS Cloud Federation
pp. 165
Designing an Enhanced Simulation Module for Multimedia Transmission Over Wireless Standards
pp. 175
Mitigating Data Segregation and Privacy Issues in Cloud Computing
pp. 183
Software Risk Measurement and Interpretation with Generated Precedence Matrix
pp. 189
IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics
pp. 197
Energy Efficient Cluster Head Selection in Energy-LEACH
pp. 205
MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol
pp. 215
Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment
pp. 223
Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment
pp. 233
Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology
pp. 245
Home Automation Using Single Board Computing as an Internet of Things Application
pp. 255
Objective Quality Assessments of Restoration Images
pp. 269
miBEAT Based Continuous and Robust Biometric Identification System for On-the-Go Applications
pp. 277
Classification of Technical and Management Metrics in Object Oriented Software Engineering
pp. 287
Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges
pp. 295
Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm
pp. 305
Internet of Things (IoT) Based Water Level Monitoring System for Smart Village
pp. 313
Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India
pp. 323
EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
pp. 333
Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression
pp. 345
Feature Based Object Mining and Tagging Algorithm for Digital Images
pp. 353
Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks
pp. 367
Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks
pp. 377
An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries
pp. 385
Internet of Things Based Smart Home with Intel Edison
pp. 393
Image Classification Using Discrete Block Truncation Coding
pp. 403
Preprocessing of Log Files Using Diffusion Map for Forensic Examination
pp. 411
An Efficient and Robust Image Steganographic Technique Without Stuffing Data Bits
pp. 419
Security Requirements for Internet of Things (IoT)
pp. 429
Identity Based Secure RSA Encryption System
pp. 439
Using Genetic Algorithm for Process Migration in Multicore Kernels
pp. 449
An Extensive Conception of Reusability in Software Component Engineering
pp. 459
Opportunistic Location Update—A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks
pp. 469
Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
pp. 479
Sorted K-Means Towards the Enhancement of K-Means to Form Stable Clusters
pp. 487
Target Tracking Accuracy in Context of Energy Consumption in Wireless Sensor Network
pp. 501
Security in Mobile Ad Hoc Networks
pp. 513
Design of Ultra Low Power Voltage Controlled Ring Oscillator
pp. 523
A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases
pp. 533
Cognitive Decision Making for Object Recognition by Humanoid System
pp. 543
Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
pp. 551
A Review on Wireless Mobile Communication Systems Generations and Integration
pp. 561
Reducing the Cold-User and Cold-Item Problem in Recommender System by Reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-Accuracy Problem
pp. 571
Differential Voltage Controlled Ring Oscillators—A Review
pp. 581
An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach
pp. 591
Comparison of ABC Framework with AHP, Wiegers Method, Cost-Value, Priority Groups for Requirements Prioritization
pp. 601
Scalability Analysis of Medium Access Control Protocols for Internet of Things
pp. 613
A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows
pp. 623
Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the Status of Person
pp. 635
Machine to Machine Sensor Network Implementation for Securing Railway Transport
pp. 645
Real Time Street Light System Using Low Power Microcontroller
pp. 655
Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes
pp. 667
New Approach for Performance and Security Enhancement in OCDMA Networks
pp. 677
Decision-Based Spectral Embedding Approach for Identifying Facial Behaviour on RGB-D Images
pp. 689
LTTC: A Load Testing Tool for Cloud
pp. 699
A Hybrid Approach to Enhance the Security of Automated Teller Machine
pp. 711
A Novel Approach for Copy Move Forgery Detection Using Template Matching
pp. 723
Analysis of Rule Based Expert Systems Developed and Implemented for Career Selection
pp. 733
A Pragmatic Analysis of Security and Integrity in Software Defined Networks
pp. 741
Modern Approach for Vehicle Traffic Monitoring and Signal Management System in ITS
Similar content
2,652
Extracellular Vesicle-Mediated Communication Within Host-Parasite Interactions
Authors:
Zhenyu Wu
,
Lingling Wang
,
Jiaying Li
…
The Rising Tide of Non-Communicable Diseases in Bangladesh: The Role of Lifestyle Changes
Authors:
Faisal Ahmed
,
MD. Ahmed
Brain-computer interfaces for communication and rehabilitation.
Authors:
Ujwal Chaudhary
,
Niels Birbaumer
,
Ander Ramos-Murguialday
See all similar
Cited by
2
Architecture specification of parametric component-based systems
Authors:
Maria Pittou
,
George Rahonis
Weighted parametric systems: Modelling and architecture specification
Authors:
Maria Pittou
,
George Rahonis
See all cited by