Chapter 1. A Short Run Length Descriptor for Image Retrieval.- Chapter 2. A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images.- Chapter 3. Indexing Video by the Content.- Chapter 4. EIDPS: An Efficient Approach to Protect the Network and Intrusion Prevention.- Chapter 5. Slot Utilization and Performance Improvement in Hadoop Cluster.- Chapter 6. An Efficient Educational Data Mining Approach to Support E-Learning.- Chapter 7. A Re-ranking Approach Personalized Web Search Results by Using Privacy Protection.- Chapter 8. An Efficient Virtualization Server Infrastructure for e-Schools of India.- Chapter 9. A Novel Approach for Horizontal Privacy Preserving Data Mining.- Chapter 10. Randomized Cryptosystem Based on Linear Transformation.- Chapter 11. Literature Survey to Improve Image Retrieval Efficiency by Visual Attention Model.- Chapter 12. Substrate Integrated Waveguide Based 4-port Crossover for Beam-forming Applications.- Chapter 13. Computational Model of Pixel Wise Temperature Prediction for Liver Tumor by High Intensity Focused Ultrasound Ablations.- Chapter 14. Implementation of Server Load Balancing in Software Defined Networking.-Chapter 15. Building Stateful Firewall Over Software Defined Networking.- Chapter 16. A Proposed Framework to Adopt Mobile App in 'e-District' Projects to Move One Step ahead for Successful Implementation.- Chapter 17. A Semantic Framework to Standardize Cloud Adoption Process.- Chapter 18. Analysis of Efficiency of Classification and Prediction Algorithms (kNN) for Breast Cancer Dataset.- Chapter 19. A Novel Genetic Algorithm and Particle Swarm Optimization for Data Clustering.- Chapter 20. Design Issues of Big Data Parallelisms.- Chapter 21. Revised ECLAT Algorithm for Frequent Itemset Mining.- Chapter 22. User-interface Design Framework for e-learning through Mobile Devices.- Chapter 23. Application of Three Different Artificial Neural Network Architectures for Voice Conversion.- Chapter 24. Foreground Background Segmentation For Video Processing through Dynamic Hand Gestures.- Chapter 25. Load Encroachment Detection Algorithm for Digital Signal Processor Based Numerical Relay.- Chapter 26. K-Nearest Neighbour and Boundary Cutting Algorithm for Intrusion Detection System.- Chapter 27. Analysis of Electromagnetic Radiation from Cellular Networks considering Geographical Distance and Height of the Antenna.- Chapter 28. Revitalizing VANET Communication Using Bluetooth Devices.- Chapter 29. Virtual Manipulation: An On-screen Interactive Visual Design for Science Learning.- Chapter 30. Bundle Block Detection Using Genetic Neural Network.- Chapter 31. Tools for Data Visualization in Business Intelligence: Case Study Using the Tool Qlikview.- Chapter 32. Application of Support Vector Machines for Fast and Accurate Contingency Ranking in Large Power System.- Chapter 33. A Novel Circular Monopole Fractal Antenna for Bluetooth and UWB Applications with Subsequent Increase in Gain Using Frequency Selective Surfaces.- Chapter 34. Application of Clustering for Improving Search Result of a Website.- Chapter 35. Performance Evaluation of Basic Selfish Node Detection Strategy on Delay Tolerant Networking Routing Protocols.- Chapter 36. Dynamic Texture Recognition: A Review.- Chapter 37. Performance Analysis of Fully Depleted Ultrathin-body (FD UTB) SOI MOSFET Based CMOS Inverter Circuit for Low Power Digital Applications.- Chapter 38. Mathematical Vector Quantity Modulated Three Phase Four Leg Inverter.- Chapter 39. 21st C New Technologies: A Pathway to Inclusive and Sustainable Growth.- Chapter 40. Dual Image Based Reversible Data Hi