Linked e-resources

Details

Chapter 1. A Hybrid Ant Colony Tabu Search Algorithm for Solving Task Assignment Problem in Heterogeneous Processors
Chapter 2. Study of Chunking Algorithm in Data De-Duplication
Chapter 3. Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography
Chapter 4. Designing a Customized Testing Tool for Windows Phones Utilizing Background Agents
Chapter 5. Real-time Remote Monitoring of Human Vital Signs Using Internet of Things (IoT) and GSM Connectivity
Chapter 6. Task Scheduling Using Multi-Objective Particle Swarm Optimization with Hamming Inertia Weight
Chapter 7. Pedagogue: A Model for Improving Core Competency Level in Placement Interviews through Interactive Android Application
Chapter 8. Non-functional QoS Criterion Based Web Service Ranking
Chapter 9. Experimental Study on Chunking Algorithms of Data De-Duplication System on Large Scale Data
Chapter 10. A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities
Chapter 11. Facial Expression Recognition Using PCA and Texture Based LDN Descriptor
Chapter 12. Role Based Access Control for Encrypted Data Using Vector Decomposition
Chapter 13. Mobile Controlled Door Locking System with Two-factor Authentication
Chapter 14. Integration of UMTS With WLAN Using Intermediate IMS Network
Chapte r 15. Building a Knowledge Vault with Effective Data Processing and Storage
Chapter 16. Comparative Performance Analysis of Microstrip Patch Antenna at 2.4 GHz and 18 GHz Using AN-SOF Professional
Chapter 17. A Study on Security Issues in Cloud Computing
Chapter 18. An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection
Chapter 19. Search Optimisation in Cloud
Chapter 20. Correlated Analysis of Morphological Patterns Between SD-OCT and FFA Imaging for Diabetic Maculopathy Detection: Conformal Mapping Based Approach
Chapter 21. Advanced Cluster Based Attribute Slicing: A New Approach for Privacy Preservation
Chapter 22. Advanced Power Demand Controller and Billing System Using GSM
Chapter 23. A Study on Segmentation Based Copy-Move Forgery Detection Using Daisy Descriptor
Chapter 24. FSM Based VLSI Architecture for the 3x3 Window based DBUTMPF Algorithm
Chapter 25. Detection and Segmentation of Cluttered Objects from Texture Cluttered Scene
Chapter 26. Enhanced Automatic Classification of Epilepsy Diagnosis Using ICD9 and SNOMED-CT
Chapter 27. Scalable Casual Data Consistency for Wide Area Storage with Cloud
Chapter 28. An Enhanced Tourism Recommendation System with Relevancy Feedback Mechanism and Ontological Specifications
Chapter 29. Big Data and Analytics? A Journey Through Basic Concepts to Research Issues
Chapter 30. Efficient Identification of Bots by K-Means Clustering
Chapter 32. Timely Prediction of Road Traffic Congestion Using Ontology
Chapter 33. Optimal Selection of Security Countermeasures for Effective Information Security
Chapter 34. Stabilization of Load in Content Delivery Networks
Chapter 35. Eigen Based Indexing and Retrieval of Similar Videos
Chapter 36. FoetusCare: An Android App for Pregnancy Care
Chapter 37. Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD)
Chapter 38. MIMO Based Efficient Data Transmission Using USRP
Chapter 39. Automatic Road Sign Detection and Recognition Based on Sift Feature Matching Algorithm
Chapter 40. A Performance Analysis of Black-Hole Detection Mechanisms in Ad-hoc Networks
Chapter 41. Sensor Web Enablement for an Indoor Pervasive Network Using RESTful Architecture
Chapter 42. Bio-Sensor Authentication for Medical Applications Using WBAN
Chapter 43. PSO Based Multipath Routing in Wireless Sensor Network
Chapter 44. Information Hiding in H.264, H.265 and MJPEG
Chapter 45. Intelligent Data Prediction System Using Data Mining and Neural Networks
Chapter 46. Resource Allocation for Wireless Network Environment
Chapter 47. Design of PSO Based PI controller for Tension Control in Web Transport Systems
Chapter 48. Distributed Service Level Agreement Driven Dynamic Cloud Resource Management
Chapter 49. Efficient Route Discovery in VANET Using Binary Bat Approach
Chapter 50. Mining Ambiguities Using Pixel-based Content Extraction
Chapter 51. Intelligent Collision Avoidance Approach in VANET Using Artificial Bee Colony Algorithm
Chapter 52. Enhancing the Interactivity in Distributed Interactive Applications
Chapter 53. Comparison and Analysis of Fuzzy Methods -TOPSIS, CORPAS-G, ANP, ELECTRE AND AHP Using Matlab
Chapter 54. Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner
Chapter 55. Forecasting the Stability of the Data Centre Based on Real Time Data of Batch Workload Using Times Series Models
Chapter 56. Active Warden Attack on Steganography Using Prewitt Filter
Chapter 57. Similarity Scores Evaluation in Social Networking Sites
Chapter 58. Estimating Random Delays in Modbus over TCP/IP network Using Experiments and General Linear Regression Neural Networks with Genetic Algorithm Smoothing
Chapter 59. Opinion Mining of User Reviews Using Machine Learning Techniques and Ranking of Products Based on Features
Chapter 60. Identification of Attacks Using Proficient Data Interested Decision Tree Algorithm in Data mining
Chapter 61. NEBULA: Deployment of Cloud Using Open source
Chapter 62. An Efficient Task Scheduling Scheme in Cloud Computing Using Graph Theory
Chapter 63. A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System
Chapter 64. Towards Modelling a Trusted and Secured Centralised Reputation System for VANET?s
Chapter 65. A Survey on Trusted Platform Module For Data Remanence in Cloud
Chapter 66. Multimodal Fuzzy Ontology Creation and Knowledge Information Retrieval
Chapter 67. A Hybrid Cloud Architecture for Secure Service?Measures Against Poodle Vulnerability
Chapter 68. An Efficient Authentication System for Data Forwarding Under Cloud Environment
Chapter 69. Survey on Data Mining Techniques with Data Structures.

Browse Subjects

Show more subjects...

Statistics

from
to
Export