Chapter 1. A Compact Triple and Quadruple Band Antenna for Bluetooth/WiMAX/WLAN/X-Band Applications.- Chapter 2. DDA: An Approach to Handle DDoS (Ping Flood) Attack.- Chapter 3. Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform.- Chapter 4. Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization and Performance Evaluation on Multi Cluster Heterogeneous Environment.- Chapter 5. Faster Load Flow Analysis.- Chapter 6. Fuzzy Link Based Analysis for Mining Informational Systems.- Chapter 7. Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static and Dynamic Constraints.- Chapter 8. Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm.- Chapter 9. An Improvement in Performance of Optical Communication System using Linearly Chirped Apodized Fiber Bragg Grating.- Chapter 10. Enhancement of Minimum Spanning Tree.- Chapter 11. Feasibility Study of Proposed Architecture for Automatic Assessment of Use Case Diagram.- Chapter 12. Extraction of Web Content Based on Content Type.- Chapter 13. User Based Collaborative Filtering Using Bloom Filter with MapReduce.- Chapter 14. ICT Based Facilities Management Tools for Buildings.- Chapter 15. Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET.- Chapter 16. UDP Flooding Attack Detection Using Information Metric Measure.- Chapter 17. Generalized MCDM Based Decision Support System for Personnel Prioritization.- Chapter 18. A Proactive Dynamic Rate Control Scheme for AIMD based Reactive TCP Variants.- Chapter 19. Investigating Varying Time Black Hole attack on QoS over MANET.- Chapter 20. Hybrid Approach to Reduce Time Complexity of String Matching Algorithm using Hashing with Chaining.- Chapter 21. INDTime: Temporal Tagger- First Step Towards Temporal Information Retrieval.- Chapter 22. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography and Steganography.- Chapter 23. A Comparative Analysis of Feature Selection Methods and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD).- Chapter 24. ACE (Advanced Compression Encryption) Scheme for Image Authentication.- Chapter 25. An Efficient and Interactive Approach for Association Rules Generation by Integrating Ontology and Filtering Technique.- Chapter 26. Detection of Wormhole Attack in Wireless Sensor Networks.- Chapter 27. Comparative Analysis of MCML Compressor with and without Concept of Sleep Transistor.- Chapter 28. Design & Analysis of Ultra-Compact Four Band Wavelength Demultiplexer Based on 2D Photonic Crystal.- Chapter 29. Designing and Optimization of Nano-Ring Resonator Based Photonic Pressure Sensor.- Chapter 30. Classifying Nodes in Social Media Space.- Chapter 31. A Novel Hexagonal Shaped Based Band Stop Frequency Selective Surface with Multi-Band Applications.- Chapter 32. AXSM: An Automated Tool for XML Schema Matching.- Chapter 33. Development of Web Map Service For Open Street Maps (OSM) Data.- Chapter 34. Improved Indoor Positioning using RSS and Directional Antenna Integrating With RFID and Wireless Technology.- Chapter 35. Secured Cloud Data Storage - Prototype Trust Model for Public Cloud Storage.- Chapter 36. A Semi Circular Monopole Antenna for Ultra Wide Band Applications.- Chapter 37. Security Analysis of Different LFSR Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR Based Attacks.- Chapter 38. Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25GHz) Appli

Share This Book: