Abstract is missing.
- Security and Privacy in Cloud Computing: A SurveyMahesh U. Shankarwar, Ambika V. Pawar. 1-11 [doi]
- Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some CryptocoresKrishnendu Guha, Romio Rosan Sahani, Moumita Chakraborty, Amlan Chakrabarti, Debasri Saha. 13-20 [doi]
- Generating Digital Signature Using DNA CodingGadang Madhulika, Chinta Seshadri Rao. 21-28 [doi]
- DNA Encryption Based Dual Server Password AuthenticationP. V. S. N. Raju, Pritee Parwekar. 29-37 [doi]
- Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud SystemNavneet Kaur Gill, Sarbjeet Singh. 39-47 [doi]
- Signalling Cost Analysis of Community ModelBoudhayan Bhattacharya, Banani Saha. 49-56 [doi]
- Steganography with Cryptography in AndroidAkshay Kandul, Ashwin More, Omkar Davalbhakta, Rushikesh Artamwar, Dinesh Kulkarni. 57-64 [doi]
- A Cloud Based Architecture of Existing e-District Project in India towards Cost Effective e-Governance ImplementationManas Kumar Sanyal, Sudhangsu Das, Sajal Bhadra. 65-73 [doi]
- A Chaotic Substitution Based Image Encryption Using APA-transformationMusheer Ahmad, Akshay Chopra, Prakhar Jain, Shahzad Alam. 75-83 [doi]
- Security, Trust and Implementation Limitations of Prominent IoT PlatformsShiju Satyadevan, Boney S. Kalarickal, M. K. Jinesh. 85-95 [doi]
- An Improved Image Steganography Method with SPIHT and Arithmetic CodingLekha S. Nair, Lakshmi M. Joshy. 97-104 [doi]
- Image Steganography - Least Significant Bit with Multiple ProgressionsSavita Goel, Shilpi Gupta, Nisha Kaushik. 105-112 [doi]
- On the Implementation of a Digital Watermarking Based on Phase CongruencyAbhishek Basu, Arindam Saha, Jeet Das, Sandipta Roy, Sushavan Mitra, Indranil Mal, Subir Kumar Sarkar. 113-120 [doi]
- Influence of Various Random Mobility Models on the Performance of AOMDV and DYMOSuryaday Sarkar, Meghdut Roychowdhury, Biswa Mohan Sahoo, Souvik Sarkar. 121-125 [doi]
- Handling Data Integrity Issue in SaaS CloudAnandita Singh Thakur, P. K. Gupta, Punit Gupta. 127-134 [doi]
- Load and Fault Aware Honey Bee Scheduling Algorithm for Cloud InfrastructurePunit Gupta, Satya Prakash Ghrera. 135-143 [doi]
- Secure Cloud Data Computing with Third Party Auditor ControlApoorva Rathi, Nilesh Parmar. 145-152 [doi]
- Effective Disaster Management to Enhance the Cloud PerformanceChintureena, V. Suma. 153-163 [doi]
- Implementation of Technology in Indian Agricultural ScenarioPhuritshabam Robert, B. Naveen Kumar, U. S. Poornima, V. Suma. 165-174 [doi]
- JPEG Steganography and Steganalysis - A ReviewSiddhartha Banerjee, Bibek Ranjan Ghosh, Pratik Roy. 175-187 [doi]
- Enhanced Privacy and Surveillance for Online Social NetworksTeja Yaramasa, G. Krishna Kishore. 189-196 [doi]
- Neuro-key Generation Based on HEBB Network for Wireless CommunicationArindam Sarkar, J. K. Mandal, Pritha Mondal. 197-205 [doi]
- KSOFM Network Based Neural Key Generation for Wireless CommunicationMadhumita Sengupta, J. K. Mandal, Arindam Sarkar, Tamal Bhattacharjee. 207-215 [doi]
- Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG)J. K. Mandal, Debdyuti Datta, Arindam Sarkar. 217-224 [doi]
- Automatic Video Scene Segmentation to Separate Script and RecognitionBharatratna P. Gaikwad, Ramesh R. Manza, Ganesh R. Manza. 225-235 [doi]
- Gesture: A New CommunicatorSaikat Basak, Arundhuti Chowdhury. 237-244 [doi]
- A Novel Fragile Medical Image Watermarking Technique for Tamper Detection and Recovery Using VarianceR. Eswaraiah, E. Sreenivasa Reddy. 245-253 [doi]
- MRI Skull Bone Lesion Segmentation Using Distance Based Watershed SegmentationAnkita Mitra, Arunava De, Anup Kumar Bhattacharjee. 255-261 [doi]
- Extraction of Texture Based Features of Underwater Images Using RLBP DescriptorS. Nagaraja, C. J. Prabhakar, P. U. Praveen Kumar. 263-272 [doi]
- Summary-Based Efficient Content Based Image Retrieval in P2P NetworkMona, B. G. Prasad. 273-280 [doi]
- Dynamic Texture Segmentation Using Texture Descriptors and Optical Flow TechniquesPratik Soygaonkar, Shilpa Paygude, Vibha Vyas. 281-288 [doi]
- Design and Implementation of Brain Computer Interface Based Robot Motion ControlDevashree Tripathy, Jagdish Lal Raheja. 289-296 [doi]
- Advanced Adaptive Algorithms for Double Talk Detection in Echo Cancellers: A Technical ReviewVineeta Das, Asutosh Kar, Mahesh Chandra. 297-305 [doi]
- A Comparative Study of Iterative Solvers for Image De-noisingSubit K. Jain, Rajendra K. Ray, Arnav Bhavsar. 307-314 [doi]
- Assessment of Urbanization of an Area with Hyperspectral Image DataSomdatta Chakravortty, Devadatta Sinha, Anil Bhondekar. 315-322 [doi]
- Range Face Image Registration Using ERFI from 3D ImagesSuranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri. 323-333 [doi]
- Emotion Recognition for Instantaneous Marathi Spoken WordsVaibhav V. Kamble, Ratnadeep R. Deshmukh, Anil R. Karwankar, Varsha R. Ratnaparkhe, Suresh A. Annadate. 335-346 [doi]
- Performance Evaluation of Bimodal Hindi Speech Recognition under Adverse EnvironmentPrashant Upadhyaya, Omar Farooq, M. R. Abidi, Priyanka Varshney. 347-355 [doi]
- Extraction of Shape Features Using Multifractal Dimension for Recognition of Stem-Calyx of an AppleS. H. Mohana, C. J. Prabhakar. 357-365 [doi]
- An Approach to Design an Intelligent Parametric Synthesizer for Emotional SpeechSoumya Smruti, Jagyanseni Sahoo, Monalisa Dash, Mihir N. Mohanty. 367-374 [doi]
- Removal of Defective Products Using RobotsBirender Singh, Mahesh Chandra, Nikitha Kandru. 375-382 [doi]
- Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation ApproachSudipta Roy, Piue Ghosh, Samir Kumar Bandyopadhyay. 383-394 [doi]
- An Innovative Approach to Show the Hidden Surface by Using Image Inpainting TechniqueRajat Sharma, Amit Agarwal. 395-403 [doi]
- Fast Mode Decision Algorithm for H.264/SVCL. Balaji, K. K. Thyagharajan. 405-412 [doi]
- Recognizing Handwritten Devanagari Words Using Recurrent Neural NetworkSonali G. Oval, Sankirti Shirawale. 413-421 [doi]
- Homomorphic Filtering for Radiographic Image Contrast Enhancement and Artifacts EliminationIgor Belykh. 423-430 [doi]
- A Framework for Human Recognition Based on Locomotive Object ExtractionC. Sivasankar, A. Srinivasan. 431-439 [doi]
- Abnormal Event Detection in Crowded Video ScenesV. K. Gnanavel, A. Srinivasan. 441-448 [doi]
- Comparative Analysis and Bandwidth Enhancement with Direct Coupled C Slotted Microstrip Antenna for Dual Wide Band ApplicationsRajat Srivastava, Vinod Kumar Singh, Shahanaz Ayub. 449-455 [doi]
- Quality Assessment of Images Using SSIM Metric and CIEDE2000 Distance Methods in Lab Color SpaceT. Chandrakanth, B. Sandhya. 457-464 [doi]
- Review Paper on Linear and Nonlinear Acoustic Echo CancellationD. K. Gupta, V. K. Gupta, Mahesh Chandra. 465-473 [doi]
- PCA Based Medical Image Fusion in Ridgelet DomainAbhinav Krishn, Vikrant Bhateja, Himanshi, Akanksha Sahu. 475-482 [doi]
- Swarm Optimization Based Dual Transform Algorithm for Secure Transaction of Medical ImagesAnusudha Krishnamurthi, N. Venkateswaran, J. Valarmathi. 483-491 [doi]
- Convolutional Neural Networks for the Recognition of Malayalam CharactersR. Anil, K. Manjusha, S. Sachin Kumar, K. P. Soman. 493-500 [doi]
- Modeling of Thorax for Volumetric Computation Using Rotachora ShapesShabana Urooj, Vikrant Bhateja, Pratiksha Saxena, Aimé Lay-Ekuakille, Patrizia Vergallo. 501-507 [doi]
- A Review of ROI Image Retrieval TechniquesNishant Shrivastava, Vipin Tyagi. 509-520 [doi]
- A Novel Algorithm for Suppression of Salt and Pepper Impulse Noise in Fingerprint Images Using B-Spline InterpolationP. Syamala Jaya Sree, Prasanth Kumar Pattnaik, S. P. Ghrera. 521-528 [doi]
- Spectral-Subtraction Based Features for Speaker IdentificationMahesh Chandra, Pratibha Nandi, Aparajita kumari, Shipra Mishra. 529-536 [doi]
- Automated System for Detection of Cerebral Aneurysms in Medical CTA ImagesM. Vaseemahamed, M. Ravishankar. 537-543 [doi]
- Contrast Enhancement of Mammograms Images Based on Hybrid ProcessingInam Ul Islam Wani, M. C. Hanumantharaju, M. T. Gopal Krishna. 545-552 [doi]
- An Improved Handwritten Word Recognition Rate of South Indian Kannada Words Using Better Feature Extraction ApproachM. S. Patel, Sanjay Linga Reddy, Krupashankari S. Sandyal. 553-561 [doi]
- An Efficient Way of Handwritten English Word RecognitionM. S. Patel, Sanjay Linga Reddy, Anuja Jana Naik. 563-571 [doi]
- Text Detection and Recognition Using Camera Based ImagesH. Y. Darshan, M. T. Gopal Krishna, M. C. Hanumantharaju. 573-579 [doi]
- Retinal Based Image Enhancement Using Contourlet TransformP. Sharath Chandra, M. C. Hanumantharaju, M. T. Gopalakrishna. 581-587 [doi]
- Detection and Classification of Microaneurysms Using DTCWT and Log Gabor Features in Retinal ImagesSujay Angadi, M. Ravishankar. 589-596 [doi]
- Classifying Juxta-Pleural Pulmonary NodulesK. Sariya, M. Ravishankar. 597-603 [doi]
- The Statistical Measurement of an Object-Oriented Programme Using an Object Oriented MetricsRasmita Panigrahi, Sarada Baboo, Neelamadhab Padhy. 605-618 [doi]
- Applicability of Software Defined Networking in Campus NetworkSingh Sandeep, R. A. Khan, Agrawal Alka. 619-627 [doi]
- Author-Profile System Development Based on Software Reuse of Open Source ComponentsDerrick Nazareth, Kavita Asnani, Okstynn Rodrigues. 629-636 [doi]
- Software and Graphical Approach for Understanding Friction on a BodyMolla Ramizur Rahman. 637-644 [doi]
- An Investigation on Coupling and Cohesion as Contributory Factors for Stable System Design and Hence the Influence on System Maintainability and ReusabilityU. S. Poornima, V. Suma. 645-650 [doi]
- Application of Component-Based Software Engineering in Building a Surveillance RobotChaitali More, Louella Colaco, Razia Sardinha. 651-658 [doi]
- Comprehension of Defect Pattern at Code Construction Phase during Software Development ProcessBhagavant Deshpande, Jawahar J. Rao, V. Suma. 659-666 [doi]
- Pattern Analysis of Post Production Defects in Software IndustryDivakar Harekal, Jawahar J. Rao, V. Suma. 667-671 [doi]
- Secure Efficient Routing against Packet Dropping Attacks in Wireless Mesh NetworksT. M. Navamani, P. Yogesh. 673-686 [doi]
- Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETsYogita Wankhade, Vidya Dhamdhere, Pankaj Vidhate. 687-695 [doi]
- Co-operative Shortest Path Relay Selection for Multihop MANETsRama Devi Boddu, K. Kishan Rao, M. Asha Rani. 697-706 [doi]
- Intelligent Intrusion Detection System in Wireless Sensor NetworkAbdur Rahaman Sardar, Rashmi Ranjan Sahoo, Moutushi Singh, Souvik Sarkar, Jamuna Kanta Singh, Koushik Majumder. 707-712 [doi]
- Secure Routing in MANET through Crypt-Biometric TechniqueZafar Sherin, M. K. Soni. 713-720 [doi]
- Remote Login Password Authentication Scheme Using Tangent Theorem on CircleShipra Kumari, Hari Om. 721-728 [doi]
- A Survey of Security Protocols in WSN and Overhead EvaluationShiju Sathyadevan, Subi Prabhakaranl, K. Bipin. 729-738 [doi]
- DFDA: A Distributed Fault Detection Algorithm in Two Tier Wireless Sensor NetworksKumar Nitesh, Prasanta K. Jana. 739-746 [doi]
- Secured Categorization and Group Encounter Based Dissemination of Post Disaster Situational Data Using Peer-to-Peer Delay Tolerant NetworkSouvik Basu, Siuli Roy. 747-755 [doi]
- Lifetime Maximization in Heterogeneous Wireless Sensor Network Based on Metaheuristic ApproachManisha Bhende, Suvarna Patil, Sanjeev Wagh. 757-764 [doi]
- Lightweight Trust Model for Clustered WSNMoutushi Singh, Abdur Rahaman Sardar, Rashmi Ranjan Sahoo, Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar. 765-773 [doi]
- An Efficient and Secured Routing Protocol for VANETIndrajit Bhattacharya, Subhash Ghosh, Debashis Show. 775-783 [doi]
- Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor NetworksB. Anil Kumar, N. Bhaskara Rao, M. S. Sunitha. 785-791 [doi]
- Rank and Weight Based Protocol for Cluster Head Selection for WSNS. R. Biradar, Gunjan Jain. 793-801 [doi]