Proceedings of International Conference on Communication and Networks: ComNet 2016

Front Cover
Nilesh Modi, Pramode Verma, Bhushan Trivedi
Springer, Apr 7, 2017 - Technology & Engineering - 757 pages
1 Review

The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19–20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Association of Computing Machinery (ACM), Ahmedabad Chapter. The book aims to provide a forum to researchers to propose theory and technology on the networks and services, share their experience in IT and telecommunications industries and to discuss future management solutions for communication systems, networks and services. It comprises of original contributions from researchers describing their original, unpublished, research contribution. The papers are mainly from 4 areas – Security, Management and Control, Protocol and Deployment, and Applications. The topics covered in the book are newly emerging algorithms, communication systems, network standards, services, and applications.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

1 A Novice Approach for Web Application Security
1
2 Correlation Between Text Book Usage and Academic Performance of Student in Higher Education Using R
10
3 Human Computer Interaction Through Hand Gestures for Home Automation Using Microsoft Kinect
19
4 Enhancement of Security in IoTSyS Framework
31
5 Segmentation and Recognition of Fingers Using Microsoft Kinect
44
6 Randomness Evaluation of ZUC SNOW and GRAIN Stream Ciphers
55
More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network
64
8 Use of ICT for Development of Smart CityAhmedabad
77
40 Internet of Things Based Smart Home with Intel Edison
384
41 Image Classification Using Discrete Block Truncation Coding
393
42 Preprocessing of Log Files Using Diffusion Map for Forensic Examination
403
43 An Efficient and Robust Image Steganographic Technique Without Stuffing Data Bits
411
44 Security Requirements for Internet of Things IoT
419
45 Identity Based Secure RSA Encryption System
428
46 Using Genetic Algorithm for Process Migration in Multicore Kernels
439
47 An Extensive Conception of Reusability in Software Component Engineering
449

9 Optimization of the Neighbor Parameter of kNearest Neighbor Algorithm for Collaborative Filtering
87
10 The Efficient Scheme for Contention Reduction in Bufferless OBS Network
94
11 Empowering Throughput Over Proactive Wireless Network Using Multistreaming
101
12 Control of Robot Using Neural Networks
109
13 Achieving Energy Aware Mechanism in Cloud Computing Environment
118
14 Information Security Emergency Plan Management System
129
15 ReliabilityAware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud
138
16 Realization of Virtual Resource Management Framework in IaaS Cloud Federation
155
17 Designing an Enhanced Simulation Module for Multimedia Transmission Over Wireless Standards
165
18 Mitigating Data Segregation and Privacy Issues in Cloud Computing
174
19 Software Risk Measurement and Interpretation with Generated Precedence Matrix
183
A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics
189
21 Energy Efficient Cluster Head Selection in EnergyLEACH
197
Multitier Multihop Routing in LEACH Protocol
205
23 Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment
215
24 Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment
223
25 Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology
233
26 Home Automation Using Single Board Computing as an Internet of Things Application
245
27 Objective Quality Assessments of Restoration Images
255
28 miBEAT Based Continuous and Robust Biometric Identification System for OntheGo Applications
269
29 Classification of Technical and Management Metrics in Object Oriented Software Engineering
276
A Survey of Event Matching Algorithms and Open Research Challenges
287
31 Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm
295
32 Internet of Things IoT Based Water Level Monitoring System for Smart Village
305
33 Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad MS India
313
An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment
323
35 Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression
332
36 Feature Based Object Mining and Tagging Algorithm for Digital Images
345
Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks
353
38 Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks
366
39 An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries
377
48 Opportunistic Location UpdateA Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks
458
Security Risks Perspective
469
50 Sorted KMeans Towards the Enhancement of KMeans to Form Stable Clusters
479
51 Target Tracking Accuracy in Context of Energy Consumption in Wireless Sensor Network
487
52 Security in Mobile Ad Hoc Networks
501
53 Design of Ultra Low Power Voltage Controlled Ring Oscillator
512
54 A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases
523
55 Cognitive Decision Making for Object Recognition by Humanoid System
533
56 Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
542
57 A Review on Wireless Mobile Communication Systems Generations and Integration
551
58 Reducing the ColdUser and ColdItem Problem in Recommender System by Reducing the Sparsity of the Sparse Matrix and Addressing the Divers...
561
59 Differential Voltage Controlled Ring OscillatorsA Review
571
60 An Advanced WebBased Bilingual Domain Independent Interface to Database Using Machine Learning Approach
580
61 Comparison of ABC Framework with AHP Wiegers Method CostValue Priority Groups for Requirements Prioritization
591
62 Scalability Analysis of Medium Access Control Protocols for Internet of Things
601
63 A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows
612
A Case of Astrological Predictions About the Status of Person
623
65 Machine to Machine Sensor Network Implementation for Securing Railway Transport
635
66 Real Time Street Light System Using Low Power Microcontroller
644
67 Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes
655
68 New Approach for Performance and Security Enhancement in OCDMA Networks
666
69 DecisionBased Spectral Embedding Approach for Identifying Facial Behaviour on RGBD Images
677
A Load Testing Tool for Cloud
689
71 A Hybrid Approach to Enhance the Security of Automated Teller Machine
699
72 A Novel Approach for Copy Move Forgery Detection Using Template Matching
710
73 Analysis of Rule Based Expert Systems Developed and Implemented for Career Selection
723
74 A Pragmatic Analysis of Security and Integrity in Software Defined Networks
732
75 Modern Approach for Vehicle Traffic Monitoring and Signal Management System in ITS
741
Author Index
754
Copyright

Other editions - View all

Common terms and phrases

About the author (2017)

Dr. Nilesh Modi is Professor and Head of the Department, Narsinhbhai Institute of Computer Studies and Management, Gujarat, India. He has rich experience of around 13 years in academics and IT industry. Dr. Modi is doctorate in e-Security (Computer Science and Application). Continuing his research on Cyber Security, presently he is pursuing post-doctoral research on Wireless Communication and Security and certification in Ethical Hacking. He is working as a recognized research supervisor for PhD and M.Phil. programs for different universities in India. He has reviewed number of PhD, M.Phil. and M.Tech. thesis from different universities in India and abroad. He is also serving as a manuscript reviewer and program committee member for different research journals and conferences of national and international repute in the world. He has published more than 75 research papers in International and National Journals and Conference Proceedings. He has delivered number of expert talk on e-Security and hacking in National and International Conferences.

Dr. Modi is an active life member of CSI, ACM IEEE, IACSIT, IACSI, IAEng apart from his academic and industrial career. As a consultant, he is contributing to different system development projects with IT industry and actively involved in different Government projects. He is also serving as a member of Board Of Studies and Selection Committee in Gujarat Technological University along with different universities in the country. He is working as district coordinator for SANDHAN Program initiated by Government of Gujarat.

Dr. Pramode K Verma joined The University of Oklahoma in Tulsa as Professor of Computer Engineering and Director of the T-Com program in December 1999. Besides teaching and research, his responsibilities include creating cooperative endeavors with the information technology corporations in the Tulsa region. Dr. Verma obtained his doctorate in Electrical Engineering from Concordia University in 1970, a Bachelor’s degree in Engineering in 1962 from the Indian Institute of Science, Bangalore, and a Bachelor’s degree in Science (Honors) in 1959 from Patna University, India. In 1984, he also obtained an M.B.A. from the Wharton School of the University of Pennsylvania. He is the author of over fifty publications in telecommunications, computer communications and related fields. His other professional accomplishments include Editor, Journal of Telecommunication Networks, 1982-1985; and Contributor to the McGraw Hill Encyclopedia of Science and Technology (Sixth Edition).

Dr. Verma is the author of Performance Estimation of Computer Communication Networks: A Structured Approach, published by the Computer Science Press (1989), and the contributing editor of ISDN Systems: Architecture, Technology, and Applications, published by Prentice-Hall, Inc. (1990). His first book has been translated into French and published as Modeles des Performances des Reseaux in 1992 by W. H. Freeman and Company. He is a contributor to So This is 1984: Some Personal Views by Governors of the International Council for Computer Communication, published by Elsevier Science Publishers B.V. (1984). More recently, Dr. Verma contributed to and co-edited The Computer Communication Revolution Multidisciplinary Retrospective and Prospective, published by the ICCC Press, 1997. He has been a keynote speaker at a number of conferences, including the third annual convention of the Computer Society of India in New Delhi. His research interests include Telecommunications Networks, Networking Technology and Interoperability.

Prof. Bhushan Trivedi joined the GLS University as Professor of Computer Technology in 1999. He is now serving the GLS Institute of Computer Technology as Director. Prof. Trivedi obtained his doctorate from Hemchandracharya North Gujarat University in 2008, MCA degree from MS University, Vadodara in 1988 and BSc from Gujarat University in 1984. He has over 35 papers published in national and international level journals and several contributions in conference proceedings. His interest areas are effective teaching techniques, network security, and sensor networks.

Bibliographic information