Volume 2:
Section 3:Big Data and Cloud Computing 32 A Survey on Big Data Analytics using Apache Hadoop Praveen Sahu, Shikha Agrawal, Raju Barasker Department of CSE, UIT RGPV, Bhopal, India
[email protected],
[email protected],
[email protected] 33 A Review of Anomaly Detection in Hadoop Platform Using Machine Learning Technique Anushka Bhargava, Varsha Sharma, Sanjeev Sharma School of IT, UTD, RGPV, Bhopal
[email protected],
[email protected],
[email protected] 34 Efficient Map-Reduce Framework Using Summation Sahiba Suryawanshi, Department of Computer Science and Engineering Maulana Azad National Institute of Technology (MANIT), Bhopal, India
[email protected],
[email protected] Dr. Praveen Kaushik 35 Secret image sharing over cloud using one dimensional chaotic map Priyamwada Sharma School of IT, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,India
[email protected],
[email protected] Vedant Sharma Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India 36 Design and Development of a Cloud-based Electronic Medical Records (EMR) System Victoria SAMUELa,1 Adewole ADEWUMI a Benjamin DADA Nicholas Omoregbe and Sanjay MISRA Center of ICT/ICE Research, CUCRID Building, Covenant University, Nigeria 37 Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography Bappaditya Jana, Saptarshi Mitra, Jayanta Poray Techno India University West Bengal Kolkata, West Bengal,India
[email protected],
[email protected],
[email protected] 38 Log-based Approach for Security Implementation in Cloud CRM's Madhur Patidar, Dr Pratosh Bansal Department of Information Technology, Devi Ahilya Vishwavidyalaya, Indore, MP, India
[email protected],
[email protected] 39 Performance Analysis of Scheduling Algorithms in Apache Hadoop Ankit Shah Shankersinh Vaghela Bapu Institute of Technology, Gandhinagar, India
[email protected],
[email protected] Dr. Mamta Padole The Maharaja Sayajjirao University of Baroda, India 40 Energy Aware Prediction Based Load Balancing Approach with VM Migration for the Cloud Environment Durga Patel, Rajeev Kumar Gupta, R. K. Pateriya Department of CSE, MANIT, Bhopal, India
[email protected],
[email protected],
[email protected] 41 ObjectRecognitionwithLocalDifferenceBinaryApproachUsing Grid Technique Reema Dhar, Swati Sharma Jodhpur National University, Rajasthan India
[email protected],
[email protected],
[email protected] Deepak Kumar Jain University of Chinese and Academy of Science, Beijing, China Section 4:Network and Securities 42 Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network Praveen Gupta* Pratosh Bansal PITM, Indore IET, DAVV, Indore 43 Certificate Revocation in Hybrid Ad-hoc Network Anubha Chaturvedi, Brijesh Kumar Chaurasia Department of Computer Science & Engineering, ITM University Gwalior, Gwalior, M. P. India
[email protected],
[email protected] 44 NB tree based Intrusion detection technique using Rough set theory model Neha Gupta, Ritu Prasad Technocrats Institute of Technology (Excellence), Bhopal, India
[email protected],
[email protected],
[email protected],
[email protected] Praneet Saurabh, Bhupendra Verma Technocrats Institute of Technology, Bhopal, India 45 AN ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Preeti Pandey, Atul Barve Oriental Institute of Science & Technology, Bhopal India
[email protected],
[email protected] 46 DDoS Attack Mitigation using Random and Flow Based Scheme Bansidhar Joshi Jaypee Institute of Information Technology, Noida, India
[email protected],
[email protected],
[email protected] Bineet Joshi SRHU, Dehradun, India
Kritika Rani Jaypee Institute of Information Technology, Noida, India 47 Digital Image Watermarking Against Geometrical Attack Sandeep Rai , Rajesh Boghey, Dipesh Shahane, Priyanka Saxena Computer Science and Engineering
Technocrats Institute Technology (Excellence)
Bhopal, India
[email protected],
[email protected],
[email protected],
[email protected] 48 Reverse Image Data Hiding Using Transform Techniques Nishi Vishwakarma , Neelesh Gupta , Neetu Sharma TRUBA Bhopal
[email protected],
[email protected] 49 Efficient key Management Approach for Vehicular Ad-hoc Network ShikhaRathore,Jitendra Agrawal, Sanjeev Sharma, Santosh Sahu School of IT, UTD, RGPV, Bhopal
[email protected],
[email protected],
[email protected],
[email protected] 50 Image Forgery Detection: Survey and Future directions Kunj Bihari Meena and Vipin Tyagi Jaypee University of Engineering and Technology Raghogarh, Guna - MP INDIA
[email protected] 51 Comparative Study of Digital Forensic Tools MayankLovanshi, Pratosh Bansal Department of Information Technology
Devi Ahilya vishwavidyalaya,Indore,MP, India
[email protected],
[email protected] 52 A Systematic Survey on Mobile Forensic tools used for Forensic Analysis of Android based Social Networking Applications Nirneeta Gupchup and Dr. Nishchol Mishra School of Information Technology, RGPV University, Bhopal India
[email protected],
[email protected] 53 Enhanced and Secure Acknowledgement IDS in Mobile Adhoc Network by Hybrid Cryptography Technique Aumreesh Kumar Saxena, Dr. Sitesh Kumar Sinha
Dr. Piyush Shukla AISECT University, Bhopal, India,
[email protected] ,
[email protected] ,
[email protected] UIT RGPV. Bhopal,India 54 New Chaos-Based Algorithm for Bmp Image Encryption and Decryption using chaotic logistic map Pooja Kathil*, sachin goyal, Ratish Agrawal, Mahesh Pawar Dept. of Information Technology, Rajiv Gandhi Technical University Bhopal (M.P.), India
[email protected],
[email protected],
[email protected] ,
[email protected] 55 Performance Evaluation of Efficient Coverage and Connectivity Preservation with Load Balance for WSN Bharti Yaduwanshi , IEEE Member Ramnath Narhete Onprice Infotech Pvt. Limited
[email protected],
[email protected] 56 Formal Verification of Causal Order Based Load Distribution Mechanism Using Event-B
Raghuraj Suryavanshi Pranveer Singh Institute of Technology, Kanpur, India
[email protected];
[email protected];divakar_yadav@ rediffmail.com Arun Kumar Singh
Goel Institute of Technology and Management Lucknow, India Divakar Yadav Institute of Engineering and Technology Lucknow, India 57 A Novel Approach of Data Deduplication for Distributed Storage Shubhanshi Singhal, Naresh Kuma, Computer Science and Engg. Deptt, UIET, Kurukshetra University, Kurukshetra-, India
[email protected],
[email protected],
[email protected] S.C. Jain Computer Science and Engg. Deptt,Rajasthan Technical University, Kota-India Section 5: Internet of things and related areas 58 A Surveyon different techniques used in Wireless Fire Warning System Himshi Chouksey, Manish Ahirwar, Shikha Agrawal UIT RGPV, Bhopal, India
[email protected],
[email protected],
[email protected] 59 An IOT Based Architecture for Crime Management in Nigeria Olusola Abayomi-Alli, Sanjay Misra Center of ICT/ICE Research, CUCRID Building, Covenant University, Ota, Nigeria
[email protected],
[email protected],
[email protected],
[email protected],
[email protected] Robertas Damasevicius, Rytis
Maskeliunas
Kaunas University of Technology, Kaunas, Lithuania 60 A Comparative Analysis of Techniques for Executing Branched Instructions Sanjay Misra, Modupe Odusami, Olusola Abayomi-Alli Center of ICT/ICE Research, CUCRID Building, Covenant University, Otta, Nigeria Ayegba AlfaAbraham, Ajagbe Douglas Kehinde Kogi State College of Education, Ankpa, Nigeria, 61 Design and Implementation of an E-Policing System to Report Crimes in Nigeria Nicholas Omoregbe, Sanjay Misra, Adesola Falade, Adewole Adewumi Department of Computer and Information Sciences, Covenant University, Ota, Nigeria
[email protected],
[email protected],
[email protected],
[email protected];
[email protected],
[email protected] Rytis Maskeliunas, Robertas Damasevicius Kaunas University of Technology, Kaunas, Lithuania. 62 Performance Evaluation of Ensemble Learner on Smart Phone Sensor Generated Human Activity Data Set Dilip Singh Sisodia,
Ankit Kumar Yogi National Institute of Technology Raipur, India
[email protected],
[email protected] Jaypee University of Engineering & Technology Guna 63 An Insight into Time Synchronization Algorithms in IoT Ms. Neha Dalwadi Vadodara Institute of Engineering, Vadodara, India
[email protected],
[email protected] Dr. Mamta Padole The Maharaja Sayajirao University of Baroda, Vadodara, India 64 Comparative study of the electrical energy consumption and cost for a residential building with conventional appliances vis-a-vis one with energy efficient appliances Adeyemi Alabi, Oluwasikemi Ogunleye, Sanjay Misra, Olusola Abayomi-Alli, Modupe Odusami
Center of ICT/ICE Research, CUCRID Building, Covenant university Ota, Nigeria
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected] Ravin Ahuja Department of Computer Engineering, University of Delhi, India 65 Particle Swarm Optimization Based MPPT Controller for Wind Turbine Systems Shefali Jagwani BMSCE, Bangalore, India
[email protected] ,
[email protected] L. Venkatesha 66 Developing a Multi-modal Listing Service for Real Estate Agency Practice in Nigeria Adewole Adewumi, Chukwuemeka Iroham, Daniel Audu, Sanjay Misra
Ravin Ahuja Center of ICT/ICE Research, CUCRID Building, Covenant University, Nigeria
[email protected],
[email protected],
[email protected],
[email protected] University of Delhi, Delhi, India
67 A new model of M-secure image via quantization Vijay Bhandari, Dr.Sitendra Tamarkar AISECT Bhopal
[email protected],
[email protected],
[email protected] ,
[email protected] Dr Piyush Shukla, Arpana Bhandari 68 Analysis on Applicability and Feasibility of Dynamic Programming on the basis of Time Complexity and Space through Case Studies Mohd Aijaj Khan
Department of Electronics Engineering
Madhav Institute of Technology and Science, Gwalior, India
[email protected],
[email protected] Manish Dixit Department of CSE and IT
Madhav Institute of Technology and Science, Gwalior, India