Intro -- Preface -- Contents -- About the Editors -- 1 A Novel Design and Implementation of Pipeline Inspection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Proposed Design -- 3.2 Mathematical Model -- 4 Hardware Design -- 4.1 Infrared Sensor (IR) -- 4.2 Motor Driver (L293D) and DC Motors -- 4.3 Ultrasonic Sensor -- 4.4 Smoke Sensor (MQ-6) -- 4.5 Temperature Sensor (DHT) -- 4.6 Bluetooth (HC-05) -- 4.7 Architecture of the Bot -- 5 Software Implementation -- 5.1 Experimental Results and Discussions -- 6 Conclusion -- References
2 An In-Depth Survey on Massive Open Online Course Outcome Prediction -- 1 Introduction -- 1.1 K-Means Classification -- 1.2 Linear Regression -- 1.3 Hidden Markov Model -- 1.4 Fuzzy Classification -- 2 Literature Review -- 3 Conclusion -- References -- 3 Prediction of Cardiovascular Diseases Using HUI Miner -- 1 Introduction -- 2 Related Work -- 3 HUI Mining -- 4 Methodology -- 4.1 Acquisition of Data Set -- 4.2 Processing of Data Set -- 4.3 Patient Alert System Through Email -- 5 Results -- 6 Conclusions and Future Scope -- References -- 4 Selection of Connecting Phrases in Weather Forecast
1 Introduction -- 2 Related Works -- 3 Experiments -- 3.1 Dataset -- 3.2 Setup -- 4 Results -- 5 Discussions -- 5.1 Comparison of Our Result with a Previous Work -- 6 Conclusion and Future Work -- References -- 5 Analysis of Bayesian Regularization and Levenberg-Marquardt Training Algorithms of the Feedforward Neural Network Model for the Flow Prediction in an Alluvial Himalayan River -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- 6 Data Mining on Cloud-Based Big Data -- 1 Introduction -- 1.1 The Service Models
2 Background Review -- 3 Discussion -- 3.1 HDFS Architecture -- 3.2 Grid Computing Tools -- 3.3 Big Data Challenges and Issues -- 4 Conclusion -- References -- 7 Performance Analysis of gTBS and EgTBS Task Based Sensing in Wireless Sensor Network -- 1 Introduction -- 2 Proposed Work -- 3 System Model -- 4 Performance Evaluation -- 5 Conclusion -- References -- 8 A Secured Framework for Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Different Framework for Mobile Cloud Computing -- 4 Topic Initiative -- 5 Proposed Work -- 6 Conclusion -- References
9 A Secure Shoulder Surfing Resistant Hybrid Graphical User Authentication Scheme -- 1 Introduction -- 2 Background -- 3 Proposed Scheme -- 4 Security Analysis -- 4.1 Password Space -- 4.2 Password Entropy -- 4.3 Secure from Attacks -- 5 User Study -- 6 Conclusion -- References -- 10 Origin Identification of a Rumor in Social Network -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Diffusion Model -- 3.2 Candidate Partition -- 3.3 Origin Identification of a Rumor -- 4 Experimental Study and Results -- 5 Conclusion -- References -- 11 Luminance [Y] Utility to Compact Color Video