sitemap | contact us
      
 
  Book Series
  Journals
  Book Proposal Form
 
  Using Published Material
  Rights and Permissions
  Examination Copies
   
   
  List of Publishers
  Bargains
   
   
  Services
   
   
  About Narosa
  History
  Mission
  Group Companies
  Our Strength
  Alliances
   
   
   
 
view in print mode
Future Computing
Editor(s): K. A. Sumithra Devi, B. Renuka Prasad, J. Usha, Andhe Dharani, M. N. Vijayalakshmi, K. S. Jasmine, B. H. Chandrashekar

ISBN:    978-81-8487-271-2 
E-ISBN:   E 978-81-8487-479-2
Publication Year:   2014
Pages:   212
Binding:   Hard Back
Dimension:   210mm x 280mm
Weight:   765



About the book

FUTURE COMPUTING discusses new technology advancements such as Cloud Computing which create new possibilities at lower costs and potential risks. Cloud computing is an aggregation of computing power and large amount of information. Many stake holders are looking into its current use and future evolutionary path. Mobile Technologies will undoubtedly include a diverse array of computing smart devices that look very different from the form factors available today such as touch screens, smartphones and tablets. These powerful cell phones have computer chips integrated into their designs, making them extremely portable and multifunctional. They have unique operating systems and software applications designed specifically for them. These devices also blend wireless networking technology, like cellular service and Bluetooth compatibility, with computing technology to let users go online anywhere and at any time. The book provides some surprising and useful insights into what current and potential users see as the most important benefits of cloud and mobile technologies which are the future computing technologies.



Table of Contents

Preface / Master of Computer Applications / Rashtreeya Sikshana Samithi Trust / R.V. College of Engineering / A Novel Page Rank Scheme for Search Engine with Relation based Keywords and Concepts / Implementing Security in Cloud Computing System based on Trusted Computing Technology / Data Security using the Secret Key/Password with Signature based Authentication and Confidentiality using Secret Sharing / Mobile Cloud Computing Architecture, Applications and M-commerce Approaches / Efficient Low Power Clustering for Mobile Adhoc Networks / Enhancement of the Lifespan in Event-driven WSN using Anycast Mechanism / An Improved Semi-distributed Dynamic Load Balancing Algorithm for Cloud Computing System / A Simple Kokborok Word Stemmer and its Application in Spell Checking System / Forward Kinematic Analysis Algorithm for Articulated Machines / Implementation of Shortest Path in Space using Collision Free Method / Backward Kinematic Design for Vertical Axes Machines / Design and Development of Computer Vision based Behavior between Robots using Swarm Intelligence / A Survey on New Load based Active Queue Management Mechanisms / A Novel Enhancement Measure of Learner Records using Data Mining Techniques / Forest Fire Danger Rate Prediction by Data Mining / Color Emotion based Image Retrieval / Object Oriented Model Classification of Satellite Image / VLSI Partitioning using Combined Decision Tree and K-Nearest Neighbor Algorithms / Text Detection in Document Scanned Images / Techniques for Reducing Network Congestion in Telecom Signalling Networks / Characteristics and Applications of Wireless Underground Sensor Networks / Influence of Senior Citizens Opinion on Functional Design of Cloud based Senior Citizens Wellness Management System / Overview of Wireless Clock Routing Design for VLSI Layout / A Novel Approach for Data Management in Mobile Environment / Scalable Databases for Data Intensive Applications / VoIP Traffic analysis in an IP Network / Anomaly based intrusion Detection System based on Genetic Neural Network using FPGAs with on-chip Network Interface / Pattern Matching for Fragmented Packets in Intrusion Detection Systems / Improving the Efficiency of Query Translation using Relevance Feedback / Brain Tumor Segmentation and 3D Visualization using Fluid Vector Flow and Contour Extraction / Survey on the Energy Enhancing Methods in Sensor Networks / A Study of Congestion Optimization During Placement Ensuring Access Control in Cloud Provisioned e-Governance / Pertinent Encryption in Bluetooth Networks using AES Algorithm / The Role of Semantics in Natural Language Computing.




Audience

Postgraduate Students, Librarians, Teachers and Researchers


CLICK HERE


Group
| Companies | Mission | Strength | Values | History | Contact us
© Narosa Publishing House