Linked e-resources

Details

Part I: Big data and cloud computing: 1. Efficient MapReduce framework using summation / Sahiba Suryawanshi, Praveen Kaushik
2. Secret image sharing over cloud using one-dimensional chaotic map / Priyamwada Sharma, Vedant Sharma
3. Design and development of a cloud-based electronic medical records (EMR) system / Victoria Samuel, Adewole Adewumi, Benjamin Dada, Nicholas Omoregbe, Sanjay Misra, Modupe Odusami
4. Log-based approach for security implementation in cloud CRM's / Madhur Patidar, Pratosh Bansal
5. Performance analysis of scheduling algorithms in Apache Hadoop / Ankit Shah, Mamta Padole
6. Energy-aware prediction-based load balancing approach with VM migration for the cloud environment / Durga Patel, Rajeev Kumar Gupta, R.P. Pateriya.

Part II: Network and securities: 7. Authentication process using secure sum for a new node in mobile ad hoc network / Praveen Gupta, Pratosh Bansal
8. Certificate revocation in hybrid ad hoc network / Anubha Chaturvedi, Brijesh Kumar Chaurasia
9. NB tree based intrusion detection technique using rough set theory model / Neha Gupta, Ritu Prasad, Praneet Saurabh, Bhupendra Verma
10. An energy-efficient intrusion detection system for MANET / Preeti Pandey, Atul Barve
11. DDoS attack mitigation using random and flow-based scheme / Bansidhar Joshi, Bineet Joshi, Kritika Rani
12. Digital image watermarking against geometrical attack / Sandeep Rai, Rajesh Boghey, Dipesh Shahane, Priyanka Saxena
13. Efficient decentralized key management approach for vehicular ad hoc network / Shikha Rathore, Jitendra Agrawal, Sanjeev Sharma, Santosh Sahu
14. Image forgery detection : survey and future directions / Kunj Bihari Meena, Vipin Tyagi
15. Comparative study of digital forensic tools / Mayank Lovanshi, Pratosh Bansal
16. A systematic survey of mobile forensic tools used for forensic analysis of Android-based social networking applications / Nirneeta Gupchup, Nishchol Mishra
17. Enhanced and secure acknowledgement IDS in mobile ad hoc network by hybrid cryptography technique / Aumreesh Kumar Saxena, Piyush Shukla, Sitesh Kumar Sinha
18. Formal verification of causal order-based load distribution mechanism using Event-B / Pooja Yadav, Raghuraj Suryavanshi, Arun Kumar Singh, Divakar Yadav.

Part III: Internet of Things and related areas: 19. An IoT-based architecture for crime management in Nigeria / Falade Adesola, Sanjay Misra, Nicholas Omoregbe, Robertas Damasevicius, Rytis Maskeliunas
20. A comparative analysis of techniques for executing branched instructions / Sanjay Misra, Abraham Ayegba Alfa, Kehinde Douglas Ajagbe, Modupe Odusami, Olusola Abayomi-Alli
21. Design and implementation of an e-policing system to report crimes in Nigeria / Nicolas Omoregbe, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius, Adesola Falade, Adewole Adewumi
22. Performance evaluation of ensemble learners on smartphone sensor generated human activity data set / Dilip Singh Sisodia, Ankit Kumar Yogi
23. An insight into time synchronization algorithms in IoT / Neha Dalwadi, Mamta Padole
24. Comparative study of the electrical energy consumption and cost for a residential building with conventional appliances vis-a-vis one with energy-efficient appliances / Adeyemi Alabi, Oluwasikemi Ogunleye, Sanjay Misra, Olusola Abayomi-Alli, Ravin Ahuja, Modupe Odusami
25. Particle swarm optimization-based MPPT controller for wind turbine systems / Shefali Jagwani, L. Venkatesha
26. A new model of M-secure image via quantization / Vijay Bhandari, Sitendra Tamrakar, Piyush Shukla, Arpana Bhandari
27. Analysis on applicability and feasibility of dynamic programming on the basis of time complexity and space through case studies / Manish Dixit, Mohd Aijaj Khan.

Browse Subjects

Show more subjects...

Statistics

from
to
Export