Chapter 1. A Novice Approach for Web Application Security.- Chapter 2. Correlation between Text book usage and Academic Performance of Student in Higher Education Using ‘R’.- Chapter 3. Human Computer Interaction through Hand Gestures for Home Automation Using Microsoft Kinect.- Chapter 4. Enhancement of Security in IoTSyS Framework.- Chapter 5. Segmentation and Recognition of Fingers Using Microsoft Kinect.- Chapter 6. Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers.- Chapter 7. MSECHP: More Stable Election of Cluster Head Protocol for Heterogeneous Wireless Sensor Network.- Chapter 8. Use of ICT for Development of Smart City-Ahmedabad.- Chapter 9. Optimization of the Neighbor Parameter of k-Nearest Neighbor Algorithm for Collaborative Filtering.- Chapter 10. The Efficient Scheme for Contention Reduction in Bufferless OBS Network.- Chapter 11. Empowering Throughput over Proactive Wireless Network Using Multi-streaming.- Chapter 12. Control of Robot Using Neural Networks.- Chapter 13. Achieving Energy Aware Mechanism in Cloud Computing Environment.- Chapter 14. Information Security Emergency Plan Management System.- Chapter 15. Reliability-Aware Workflow Scheduling Using Monte Carlo Failure Estimation in Cloud.- Chapter 16. Realization of Virtual Resource Management Framework in IaaS Cloud Federation.- Chapter 17. Designing an Enhanced Simulation Module for Multimedia Transmission over Wireless Standards.- Chapter 18. Mitigating Data Segregation and Privacy Issues in Cloud Computing.- Chapter 19. Software Risk Measurement and Interpretation with Generated Precedence Matrix.- Chapter 20. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big Data Analytics.- Chapter 21. Energy Efficient Cluster Head Selection in Energy-LEACH.- Chapter 22. MMR-LEACH: Multi-tier Multi-hopRouting in LEACH Protocol.- Chapter 23. Cooperative Sensors for Identifying an Impulsive Events of Asynchronous Environment.- Chapter 24. Trust Integrated Federated Architecture Ranking Service Models in Cloud Computing Environment.- Chapter 25. Leakage Power Reduction Technique by Using Multigate FinFET in DSM Technology.- Chapter 26. Home Automation Using Single Board Computing as an Internet of Things Application.- Chapter 27. Objective Quality Assessments of Restoration Images.- Chapter 28. miBEAT based Continuous and Robust Biometric Identification System for on-the-go Applications.- Chapter 29. Classification of Technical and Management Metrics in Object Oriented Software Engineering.- Chapter 30. Publish/Subscribe Mechanism for IoT: A Survey of Event Matching Algorithms and Open Research Challenges.- Chapter 31. Chronic Kidney Disease Prediction Using Back Propagation Neural Network Algorithm.- Chapter 32. Internet of Things (IoT) Based Water Level Monitoring System for Smart Village.- Chapter 33. Application of Remote Sensing for Assessing Forest Cover Conditions of Aurangabad, (MS), India.- Chapter 34. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment.- Chapter 35. Prediction of Students Performance of an Institute Using ClassificationViaClustering and ClassificationViaRegression.- Chapter 36. Feature Based Object Mining and Tagging Algorithm for Digital Images.- Chapter 37. Exploratory Assessment Based Child Nodes Selection (EACNS): Energy Efficient Multicast Routing Topology for Mobile Ad Hoc Networks.- Chapter 38. Improved EAACK to Overcome Attacks in MANET and Wireless Sensor Networks.- Chapter 39. An Efficient System Model for Multicasting Measured Noise Value of Polluting Industries.- Chapter 40. Internet of Things based Smart Home withIntel Edison.- Chapter 41. Image Classification Using Discrete Block Truncation Coding.- Chapter 42. Preprocessing of log Files Using Diffusion Map for Forensic Examination.- Chapter 43. An Efficient and Robust Image Steganographic Technique without Stuffing Data bits.- Chapter 44. Security Requirements for Internet of Things (IoT).- Chapter 45. Identity Based Secure RSA Encryption System.- Chapter 46. Using Genetic Algorithm for Process Migration in Multicore Kernels.- Chapter 47. An Extensive Conception of Reusability in Software Component Engineering.- Chapter 48. Opportunistic Location Update – A Novel Cost Efficient Reactive Approach to Remove Pauses in Cellular Networks.- Chapter 49. Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective.- Chapter 50. Sorted K-Means towards the enhancement of K-Means to Form Stable Clusters.- Chapter 51. Target Tracking Accuracy in Contextof Energy Consumption in Wireless Sensor Network.- Chapter 52. Security in Mobile Ad hoc Networks.- Chapter 53. Design of Ultra Low Power Voltage Controlled Ring Oscillator.- Chapter 54. A Dynamic Session Oriented Clustering Approach for Detecting Intrusions in Databases.- Chapter 55. Cognitive Decision Making for Object Recognition by Humanoid System.- Chapter 56. Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems.- Chapter 57. A Review on Wireless Mobile Communication Systems Generations and Integration.- Chapter 58. Reducing the Cold-user and Cold-item problem in Recommender System by reducing the Sparsity of the Sparse Matrix and Addressing the Diversity-accuracy Problem.- Chapter 59. Differential Voltage Controlled Ring Oscillators – A Review.- Chapter 60. An Advanced Web-Based Bilingual Domain Independent Interface to Database Using Machine Learning Approach.- Chapter 61. Comparison of ABC Framework with AHP, Wiegers method, Cost-value, Priority Groups for Requirements Prioritization.- Chapter 62. Scalability Analysis of Medium Access Control Protocols for Internet of Things.- Chapter 63. A Review on Comparison of Workflow Scheduling Algorithms with Scientific Workflows.- Chapter 64. Predictive Approach of CBR in Artificial Intelligence: A Case of Astrological Predictions About the status of Person.- Chapter 65. Machine to Machine Sensor Network Implementation for Securing Railway Transport.- Chapter 66. Real Time Street Light System Using Low Power Microcontroller.- Chapter 67. Dealing with Indian Jurisprudence by Analyzing the Web Mining Results of a Case of Cybercrimes.- Chapter 68. New Approach for Performance and Security Enhancement in OCDMA Networks.- Chapter 69. Decision Based Spectral Embedding Approach for Identifying Facial Behavior on RGB-D Images.- Chapter 70. LTTC: A Load Testing Tool for Cloud.- Chapter 71. A Hybrid Approach to Enhance the Security of Automated Teller Machine.- Chapter 72. A Novel Approach for Copy Move Forgery Detection Using Template Matching.- Chapter 73. Analysis of Rule Based Expert Systems developed and implemented for Career Selection.- Chapter 74. A Pragmatic Analysis of Security and Integrity in Software Defined Networks.- Chapter 75. Modern Approach for Vehicle Traffic Monitoring & Signal Management System in ITS.