IJGDC Vol. 10, No. 11
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 2005-4270

Vol.1, No.1, 2008
Vol.2, No.1, 2009
Vol.2, No.2, 2009
Vol.2, No.3, 2009
Vol.2, No.4, 2009
Vol.3, No.1, 2010
Vol.3, No.2, 2010
Vol.3, No.3, 2010
Vol.3, No.4, 2010
Vol.4, No.1, 2011
Vol.4, No.2, 2011
Vol.4, No.3, 2011
Vol.4, No.4, 2011
Vol.5, No.1, 2012
Vol.5, No.2, 2012
Vol.5, No.3, 2012
Vol.5, No.4, 2012
Vol.6, No.1, 2013
Vol.6, No.2, 2013
Vol.6, No.3, 2013
Vol.6, No.4, 2013
Vol.6, No.5, 2013
Vol.6, No.6, 2013
Vol.7, No.1, 2014
Vol.7, No.2, 2014
Vol.7, No.3, 2014
Vol.7, No.4, 2014
Vol.7, No.5, 2014
Vol.7, No.6, 2014
Vol.8, No.1, 2015
Vol.8, No.2, 2015
Vol.8, No.3, 2015
Vol.8, No.4, 2015
Vol.8, No.5, 2015
Vol.8, No.6, 2015
Vol.9, No.1, 2016
Vol.9, No.2, 2016
Vol.9, No.3, 2016
Vol.9, No.4, 2016
Vol.9, No.5, 2016
Vol.9, No.6, 2016
Vol.9, No.7, 2016
Vol.9, No.8, 2016
Vol.9, No.9, 2016
Vol.9, No.10, 2016
Vol.9, No.11, 2016
Vol.9, No.12, 2016
Vol.10, No.1, 2017
Vol.10, No.2, 2017
Vol.10, No.3, 2017
Vol.10, No.4, 2017
Vol.10, No.5, 2017
Vol.10, No.6, 2017
Vol.10, No.7, 2017
Vol.10, No.8, 2017
Vol.10, No.9, 2017
Vol.10, No.10, 2017
Vol.10, No.11, 2017

 


Contents

  • Cover Page
  • Inside Cover
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • A Survey on Privacy, Privacy Manager, Privacy laws and Regulations in Hybrid Cloud Network, Debabrata Sarddar, Sanjit Barman, Priyajit Sen and Rajat Pandit (pp. 1-10).
  • Screaming Sound Detection based on UBM-GMM, Suk-Hwan Jung and Yong-Joo Chung (pp. 11-22).
  • Identification of DG Location through Sensitivity Factors under Line Outage Condition, Suresh Babu Daram, Mulpuri Kiran, P. S. Venkataramu and M. S. Nagaraj (pp. 23-32).
  • An Information Loss Reduction Scheme in Big Data k-Anonymization, Sung-Bong Jang and Young-Woong Ko (pp. 33-42).
  • An Improved OTP Grid Authentication Scheme Email-based using Middle-square for Disaster Management System, B. B. Jr. Balilo, B. D. Gerardo, R. P. Medina and Y. Byung (pp. 43-56).
  • Efficiency Enhanced Combinatorial-based File Sharing Scheme for Distributed Storage with Heterogeneous Personal Devices, Jung-Eun Park and Young-Hoon Park (pp. 57-70).
  • Testbed to Verify Interoperability among Heterogeneous Devices with OPC UA, Byunghun Song, Hojoong Kim, Wonhee Lee and Junho Shin (pp. 71-78).
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations, Rahul Saha, G. Geetha, Gulshan Kumar and Hye-Jim Kim (pp. 79-98).
  • An Approach for Summarizing Hindi Text using Restricted Boltzmann Machine in Deep Learning, J. Anitha, N. Thirupathi Rao, Debnath Bhattacharyya and Tai-hoon Kim (pp. 99-108).
  • Analysis of the Flow Mobility of Multimedia Traffic across Software Defined Networks, Ronnie D. Caytiles and Sunguk Lee (pp. 109-116).
  • Bibliography




 
____________________________________________