|
A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors |
|
|
1 | (12) |
|
|
|
|
|
Study of Chunking Algorithm in Data Deduplication |
|
|
13 | (8) |
|
|
|
|
|
Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography |
|
|
21 | (12) |
|
|
|
|
|
Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents |
|
|
33 | (14) |
|
|
|
|
|
|
|
Real-Time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity |
|
|
47 | (10) |
|
|
|
|
|
|
|
Task Scheduling Using Multi-objective Particle Swarm Optimization with Hamming Inertia Weight |
|
|
57 | (10) |
|
|
|
|
|
Pedagogue: A Model for Improving Core Competency Level in Placement Interviews Through Interactive Android Application |
|
|
67 | (12) |
|
|
|
|
|
|
|
|
|
|
|
Non Functional QoS Criterion Based Web Service Ranking |
|
|
79 | (12) |
|
|
|
|
|
Experimental Study on Chunking Algorithms of Data Deduplication System on Large Scale Data |
|
|
91 | (8) |
|
|
|
|
|
|
|
A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities |
|
|
99 | (14) |
|
|
|
|
|
|
|
Facial Expression Recognition Using PCA and Texture-Based LDN Descriptor |
|
|
113 | (10) |
|
|
|
|
|
Role-Based Access Control for Encrypted Data Using Vector Decomposition |
|
|
123 | (10) |
|
|
|
|
|
|
|
Mobile Controlled Door Locking System with Two-Factor Authentication |
|
|
133 | (8) |
|
|
|
|
|
|
|
|
|
Integration of UMTS with WLAN Using Intermediate IMS Network |
|
|
141 | (12) |
|
|
|
|
|
|
|
|
|
Building a Knowledge Vault with Effective Data Processing and Storage |
|
|
153 | (6) |
|
|
|
|
|
|
|
|
|
Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional |
|
|
159 | (8) |
|
|
|
|
|
A Study on Security Issues in Cloud Computing |
|
|
167 | (10) |
|
|
|
|
|
|
|
An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection |
|
|
177 | (10) |
|
|
|
|
|
|
|
Search Optimization in Cloud |
|
|
187 | (8) |
|
|
|
|
|
|
|
|
|
Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping-Based Approach |
|
|
195 | (10) |
|
|
|
|
|
|
|
Advanced Cluster-Based Attribute Slicing: A New Approach for Privacy Preservation |
|
|
205 | (10) |
|
|
|
|
|
Advanced Power Demand Controller and Billing System Using GSM |
|
|
215 | (8) |
|
|
|
|
|
A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor |
|
|
223 | (12) |
|
|
|
|
|
FSM-Based VLSI Architecture for the 3 × 3 Window-Based DBUTMPF Algorithm |
|
|
235 | (14) |
|
|
|
|
|
|
|
|
|
Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene |
|
|
249 | (10) |
|
|
|
|
|
|
|
Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT |
|
|
259 | (8) |
|
|
|
|
|
Scalable Casual Data Consistency for Wide Area Storage with Cloud |
|
|
267 | (14) |
|
|
|
|
|
An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications |
|
|
281 | (10) |
|
|
|
|
|
|
|
Big Data and Analytics---A Journey Through Basic Concepts to Research Issues |
|
|
291 | (16) |
|
|
|
|
|
Efficient Identification of Bots by K-Means Clustering |
|
|
307 | (12) |
|
|
|
Message Authentication and Source Privacy in Wi-Fi |
|
|
319 | (12) |
|
|
|
|
|
Timely Prediction of Road Traffic Congestion Using Ontology |
|
|
331 | (14) |
|
|
|
|
|
|
|
|
|
Optimal Selection of Security Countermeasures for Effective Information Security |
|
|
345 | (10) |
|
|
|
|
|
|
|
Stabilization of Load in Content Delivery Networks |
|
|
355 | (10) |
|
|
|
Eigen-Based Indexing and Retrieval of Similar Videos |
|
|
365 | (12) |
|
|
|
|
|
FoetusCare: An Android App for Pregnancy Care |
|
|
377 | (16) |
|
|
|
|
|
Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD) |
|
|
393 | (12) |
|
|
|
|
|
MIMO-Based Efficient Data Transmission Using USRP |
|
|
405 | (16) |
|
|
|
|
|
|
|
|
|
Automatic Road Sign Detection and Recognition Based on SIFT Feature Matching Algorithm |
|
|
421 | (12) |
|
|
|
|
|
A Performance Analysis of Black Hole Detection Mechanisms in Ad Hoc Networks |
|
|
433 | (12) |
|
|
|
|
|
Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture |
|
|
445 | (12) |
|
|
|
|
|
Bio-sensor Authentication for Medical Applications Using WBAN |
|
|
457 | (12) |
|
|
|
|
|
PSO-Based Multipath Routing in Wireless Sensor Network |
|
|
469 | (10) |
|
|
|
|
|
Information Hiding in H.264, H.265, and MJPEG |
|
|
479 | (10) |
|
|
|
|
|
Intelligent Data Prediction System Using Data Mining and Neural Networks |
|
|
489 | (12) |
|
|
|
|
|
|
|
Resource Allocation for Wireless Network Environment |
|
|
501 | (8) |
|
|
|
|
|
|
|
Design of PSO-Based PI Controller for Tension Control in Web Transport Systems |
|
|
509 | (8) |
|
|
|
|
|
|
|
|
|
|
|
Distributed Service Level Agreement-Driven Dynamic Cloud Resource Management |
|
|
517 | (12) |
|
|
|
|
|
Efficient Route Discovery in VANET Using Binary Bat Approach |
|
|
529 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Mining Ambiguities Using Pixel-Based Content Extraction |
|
|
537 | (8) |
|
|
|
|
|
|
|
|
|
Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm |
|
|
545 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Enhancing the Interactivity in Distributed Interactive Applications |
|
|
553 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Comparison and Analysis of Fuzzy Methods---TOPSIS, COPRAS-G, ANP, ELECTRE and AHP Using MATLAB |
|
|
561 | (10) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner |
|
|
571 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Forecasting the Stability of the Data Centre Based on Real-Time Data of Batch Workload Using Times Series Models |
|
|
579 | (12) |
|
|
|
|
|
|
|
Active Warden Attack on Steganography Using Prewitt Filter |
|
|
591 | (10) |
|
|
|
|
|
|
|
Similarity Scores Evaluation in Social Networking Sites |
|
|
601 | (14) |
|
|
|
|
|
|
|
Estimating Random Delays in Modbus Over TCP/IP Network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing |
|
|
615 | (12) |
|
|
|
|
|
|
|
|
|
Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features |
|
|
627 | (12) |
|
|
|
|
|
Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data Mining |
|
|
639 | (8) |
|
|
|
|
|
|
|
NEBULA: Deployment of Cloud Using Open Source |
|
|
647 | (8) |
|
|
|
|
|
|
|
|
|
|
|
An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory |
|
|
655 | (8) |
|
|
|
|
|
A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System |
|
|
663 | (12) |
|
|
|
|
|
Towards Modelling a Trusted and Secured Centralised Reputation System for VANET's |
|
|
675 | (14) |
|
|
|
|
|
A Survey on Trusted Platform Module for Data Remanence in Cloud |
|
|
689 | (8) |
|
|
|
|
|
Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval |
|
|
697 | (10) |
|
|
|
|
|
A Hybrid Cloud Architecture for Secure Service---Measures Against Poodle Vulnerability |
|
|
707 | (8) |
|
|
|
|
|
|
|
An Efficient Authentication System for Data Forwarding Under Cloud Environment |
|
|
715 | (12) |
|
|
|
|
|
Survey on Data Mining Techniques with Data Structures |
|
|
727 | |
|
|
|
|
|
|
| Author Index |
|