Future internet technologies and trends : First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings /: First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings. ([2018])
- Record Type:
- Book
- Title:
- Future internet technologies and trends : First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings /: First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings. ([2018])
- Main Title:
- Future internet technologies and trends : First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings
- Other Titles:
- ICFITT 2017
- Further Information:
- Note: Zuber Patel, Shilpi Gupta, (eds.).
- Editors:
- Patel, Zuber
Gupta, Shilpi - Other Names:
- Sardar Vallabhbhai National Institute of Technology, organizer.
European Alliance for Innovation.
International Conference on Future Internet Technologies and Trends, 1st - Contents:
- Intro; Preface; Organization; Contents; LOGO: A New Distributed Leader Election Algorithm in WSNs with Low Energy Consumption; 1 Introduction and Related Work; 2 The Minimum Finding Algorithm; 3 The Local Minima Finding Algorithm; 4 The Proposed Method; 4.1 Concept; 4.2 The LOGO Algorithms; 5 CupCarbon Simulator and SenScript; 6 Simulation Results; 7 Conclusion; References; An Efficient Privacy Preserving System Based on RST Attacks on Color Image; Abstract; 1 Introduction; 2 Literature Survey; 2.1 QR-Code [1, 4]; 2.2 VCS [2]; 2.3 Digital Watermarking [5]; 3 Proposed Preserving Method. 3.1 Overall System3.1.1 Encoder; 3.1.2 Network; 3.1.3 Decoder; 3.2 VCS Algorithm; 3.2.1 Share Generation; 3.2.2 Share Combination; 3.2.3 Embedding Algorithm; 3.2.4 Recover Decoding Algorithm; 4 Results and Discussion; 5 Conclusion; References; HiMod-Pert: Histogram Modification Based Perturbation Approach for Privacy Preserving Data Mining; Abstract; 1 Introduction; 1.1 Our Contributions; 1.2 Organization of the Paper; 2 Literature Survey; 3 The Proposed Method; 4 Experimental Evaluation; 4.1 Setting Environment; 4.2 Experimental Results; 4.3 Experimental Inferences; 5 Conclusions; References. Exhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing1 Introduction; 2 Objective; 3 Methodology; 3.1 Future Direction for Research in the Field of Resource Optimisation at the IaaS Level with the Help of Autonomous Computing; 4 Conclusion; References;Intro; Preface; Organization; Contents; LOGO: A New Distributed Leader Election Algorithm in WSNs with Low Energy Consumption; 1 Introduction and Related Work; 2 The Minimum Finding Algorithm; 3 The Local Minima Finding Algorithm; 4 The Proposed Method; 4.1 Concept; 4.2 The LOGO Algorithms; 5 CupCarbon Simulator and SenScript; 6 Simulation Results; 7 Conclusion; References; An Efficient Privacy Preserving System Based on RST Attacks on Color Image; Abstract; 1 Introduction; 2 Literature Survey; 2.1 QR-Code [1, 4]; 2.2 VCS [2]; 2.3 Digital Watermarking [5]; 3 Proposed Preserving Method. 3.1 Overall System3.1.1 Encoder; 3.1.2 Network; 3.1.3 Decoder; 3.2 VCS Algorithm; 3.2.1 Share Generation; 3.2.2 Share Combination; 3.2.3 Embedding Algorithm; 3.2.4 Recover Decoding Algorithm; 4 Results and Discussion; 5 Conclusion; References; HiMod-Pert: Histogram Modification Based Perturbation Approach for Privacy Preserving Data Mining; Abstract; 1 Introduction; 1.1 Our Contributions; 1.2 Organization of the Paper; 2 Literature Survey; 3 The Proposed Method; 4 Experimental Evaluation; 4.1 Setting Environment; 4.2 Experimental Results; 4.3 Experimental Inferences; 5 Conclusions; References. Exhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing1 Introduction; 2 Objective; 3 Methodology; 3.1 Future Direction for Research in the Field of Resource Optimisation at the IaaS Level with the Help of Autonomous Computing; 4 Conclusion; References; Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey; 1 Introduction; 2 Prediction; 3 Combining Monitoring and Prediction Techniques ref13; 4 Conclusion; References. Experimenting with Energy Efficient VM Migration in IaaS Cloud: Moving Towards Green Cloud1 Introduction; 2 Domain Analysis; 3 Energy Efficiency in IAAS Cloud; 3.1 Proposed Architecture; 3.2 Proposed System Model; 3.3 Descriptive Statistic: Interquartile Range; 4 Proposed Algorithm; 5 Performance Analysis; 5.1 Evaluation of Result; 6 Conclusion and Future Work; References; Capacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing; 1 Introduction; 2 Monitoring the Cloud Environment; 2.1 Monitoring as an Essential Tool in Cloud Computing Environment. 3 Resource Prediction for Context Aware Workload3.1 Profiling in Cloud Computing for Context Aware Workload; 3.2 Proposed Algorithm; 4 Error Handling and Mitigation; 4.1 Proposed Algorithm; 5 Proposed Model; 5.1 Guaranteed SLA Management; 5.2 Provisioning Engine; 5.3 Rules Engine; 5.4 System Monitoring; 5.5 Auditing/Profiling; 5.6 Dynamic Scheduling; 5.7 Error Handling; 6 Conclusion and Future Work; References; ApEn-Based Epileptic EEG Classification Using Support Vector Machine; Abstract; 1 Introduction; 2 Proposed Algorithm; 2.1 ApEn (Approximate Entropy) Based Feature Extraction. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (XI, 275 pages)
- Subjects:
- 004.67/8
Computer science
Computer science -- Congresses
Internet -- Technological innovations -- Congresses
Artificial intelligence
Computer networks
Computer science
Data mining
Image processing
Computers -- Information Technology
Computers -- Computer Graphics
Computers -- Security -- General
Computers -- Intelligence (AI) & Semantics
Computers -- Database Management -- Data Mining
Information retrieval
Image processing
Computer security
Artificial intelligence
Data mining
Computer Communication Networks
Computer vision
Data protection
Artificial intelligence
Data mining
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books - Languages:
- English
- ISBNs:
- 9783319737126
3319737120 - Related ISBNs:
- 9783319737119
3319737112 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373997
- Ingest File:
- 02_352.xml