Abstract is missing.
- Efficient multilevel clustering for large-scale heterogeneous wireless sensor networksVivek Katiyar, Narottam Chand, Surender Soni. 1-6 [doi]
- Reducing handoff call blocking probability by hybrid channel allocationDebabrata Sarddar, Tapas Jana, Utpal Biswas, Joydeep Banerjee, Souvik Kumar Saha, Mrinal K. Naskar. 7-10 [doi]
- A new approach to efficient Bluetooth Scatternet formation in adhoc wireless networkHemali B. Kotak, Hiteishi M. Diwanji, Paresh P. Kotak. 11-16 [doi]
- A cooperative caching strategy in mobile ad hoc networks based on clustersNaveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra. 17-20 [doi]
- Optimized ant based routing protocol for MANETAshima Rout, Srinivas Sethi, Debajyoti Mishra. 21-25 [doi]
- A robust cluster based routing protocol for MANETSrinivas Sethi, Ashima Rout, Debajyoti Mishra, Shatabdinalini. 26-31 [doi]
- A new approach on caching based routing for mobile networksP. K. Guha Thakurta, Nilesh Mallick, Gargi Dutta, Subhansu Bandyopadhyay. 32-35 [doi]
- Energy efficiency comparison of some topology-based and location-based mobile ad hoc routing protocolsVed Prakash, Brajesh kumar, A. K. Srivastava. 36-39 [doi]
- THWMP: trust based secure routing for wireless mesh networksRakesh Matam, Somanath Tripathy. 40-45 [doi]
- Multiple antenna techniques in WiMaxRam Prakash Bhardwaj, Vinod Kumar, Charanjeet Singh. 46-49 [doi]
- Eliminating misbehaving nodes by opinion based trust evaluation model in MANETsPoonam Gera, Kumkum Garg, Manoj Misra. 50-55 [doi]
- Performance comparison of adaptive MMSE-MRC MUD for DS-CDMA system in different multipath channelsMangala R. Gajbhiye, J. K. Satapathy. 56-61 [doi]
- Long-haul 64-channel 10-Gbps DWDM system design and simulation in presence of optical Kerr's effectBijayananda Patnaik, Prasant Kumar Sahu. 62-66 [doi]
- A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networksMuktikanta Sa, Amiya Kumar Rath. 67-70 [doi]
- Memory based message efficient clustering (MMEC) for enhancement of lifetime in wireless sensor networks using a node deployment protocolJoydeep Banerjee, Souvik Kumar Mitra, Pradipta Ghosh, Mrinal K. Naskar. 71-76 [doi]
- Peak to average power ratio of orthogonal spreading codes for multicarrier CDMA systemDeepak Kedia, Manoj Duhan, Sandeep Arya. 77-81 [doi]
- Resource allocation for downlink OFDMA in WiMAX systemsA. Wankhede Vishal, Jha Rakesh, Upena D. Dalal. 82-85 [doi]
- Survey on techniques to resolve problems associated with RTS/CTS mechanismRahul Mishra, Shivam Nayak, Kapil Verma, Dayashankar Singh. 86-91 [doi]
- Fault tolerant greedy perimeter stateless routing in wireless networkJyotsana Jaiswal, Pabitra Mohan Khilar. 92-95 [doi]
- NILDD: nearest intersection location dependent dissemination of traffic information in VANETsBrij Bihari Dubey, Naveen Chauhan, Lalit Kumar Awasthi. 96-99 [doi]
- On distributed self fault diagnosis for wireless multimedia sensor networksArunanshu Mahapatro, Pabitra Mohan Khilar. 100-105 [doi]
- Design of high speed routers using RED algorithmP. Kishore, Prasad Gandikota, P. V. Sridevi. 106-109 [doi]
- A wavelength intersection cardinality based routing and wavelength assignment algorithm in optical WDM networksVirendra Singh Shekhawat, K. Ohmkar, Vinod Kumar Chaubey. 110-113 [doi]
- Energy aware topology security scheme for mobile ad hoc networkAbhijit Das, Atiqur Rahman, Soumya Sankar Basu, Atal Chaudhuri. 114-118 [doi]
- A VLMS based pseudo-fractional optimum order estimation algorithmAsutosh Kar, Ravinder Nath, Alaka Barik. 119-123 [doi]
- Data gathering in wireless sensor network using realistic power controlSwarup Kumar Mitra, Joydeep Banerjee, Arpita Chakraborty, Mrinal K. Naskar. 124-127 [doi]
- Passive duplicate address detection in DYMO routing protocol for MANETSKadha Vijaya Kumar, V. Sumalatha. 128-133 [doi]
- Maximum likelihood DOA estimation in distributed wireless sensor network using adaptive particle swarm optimizationTrilochan Panigrahi, A. D. Hanumantharao, Ganapati Panda, Babita Majhi, Bernard Mulgrew. 134-137 [doi]
- A framework for disaster management using wireless ad hoc networksNiranjan Kumar Ray, Ashok Kumar Turuk. 138-141 [doi]
- IEMS: indoor environment monitoring system using ZigBee wireless sensor networkSuman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee. 142-145 [doi]
- A survey on secure hierarchical routing protocols in wireless sensor networksSuraj Sharma, Sanjay Kumar Jena. 146-151 [doi]
- Parallelized K-Means clustering algorithm for self aware mobile ad-hoc networksLikewin Thomas, Kiran Manjappa, B. Annappa, G. Ram Mohana Reddy. 152-155 [doi]
- Comparison of reactive and proactive routing protocols for different mobility conditions in WSNKhushboo Tripathi, Manjusha Pandey, Shekhar Verma. 156-161 [doi]
- Quality-of-service at data link layer in wireless cellular networksAbhishek Mairh, Hemanta Kumar Pati. 162-165 [doi]
- An improved forwarder selection approach for energy aware geographic routing in three dimensional wireless sensor networksManas Kumar Mishra, M. M. Gore. 166-171 [doi]
- A fragile color image watermarking framework focusing a new invisible domainPradosh Bandyopadhyay, Soumik Das, Monalisa Banerjee, Atal Chaudhuri. 172-177 [doi]
- A chip-based watermarking framework for color image authenticationSoumik Das, Pradosh Bandyopadhyay, Monalisa Banerjee, Atal Chaudhuri. 178-183 [doi]
- Automated leukemia detection in blood microscopic images using statistical texture analysisSubrajeet Mohapatra, Dipti Patra, Sanghamitra Satpathy. 184-187 [doi]
- Finding minimal resource allocation in grid with reliability and trust computations using 2-way split backward searchGutha Jaya Krishna, C. Raghavendra Rao, Rajeev Wankar. 188-193 [doi]
- Fast requantization using self organizing feature map with orthogonal polynomials transformR. Krishnamoorthy, R. Punidha. 194-199 [doi]
- Parallelization of DNA sequence alignment using OpenMPS. R. Sathe, D. D. Shrimankar. 200-203 [doi]
- On improved processor allocation in 2D mesh-based multicomputers: controlled splitting of parallel requestsSulieman Bani-Ahmad. 204-209 [doi]
- Performance analysis of FPGA interconnect fabric for ultra-low power applicationsS. D. Pable, Mohd. Hasan. 210-214 [doi]
- Performance optimization of CNFET for ultra-low power reconfigurable architectureS. D. Pable, Mohd. Hasan. 215-220 [doi]
- An effective pixel-wise fragile watermarking scheme based on ARA bitsShivendra Shivani, Anoop Kumar Patel, Sushila Kamble, Suneeta Agarwal. 221-226 [doi]
- Automatic segmentation of MR brain imagesJyothisha J. Nair, V. K. Govindan. 227-230 [doi]
- Text line segmentation of unconstrained handwritten Kannada scriptV. N. Manjunath Aradhya, C. Naveena. 231-234 [doi]
- Generation of 3D fractal images for Mandelbrot setBulusu Rama, Jibitesh Mishra. 235-238 [doi]
- Robust face recognition using curvelet transformGyanendra K. Verma, Shitala Prasad, Gohel Bakul. 239-242 [doi]
- Comparative study of switching techniques for network-on-chip architectureYogita A. Sadawarte, Mahendra A. Gaikwad, Rajendra M. Patrikar. 243-246 [doi]
- Multiple object tracking using HSV color spaceS. Saravanakumar, A. Vadivel, C. G. Saneem Ahmed. 247-252 [doi]
- A hierarchical approach for content-based echocardiogram video indexing and retrievalAditi Roy, Shamik Sural, Jayanta Mukherjee, Arun K. Majumdar. 253-258 [doi]
- A complex diffusion based nonlinear filter for speckle reduction from optical coherence tomography (OCT) imagesRajeev Srivastava. 259-264 [doi]
- The effect of different wavelets on speech compressionShijo M. Joseph, Reena Sebastian, P. Babu Anto. 265-268 [doi]
- Computing on multi-core platform: performance issuesM. R. Pimple, S. R. Sathe. 269-272 [doi]
- Bitonic sort in shared SIMD array processorAnukul Chandra Panda, Pankaj Kumar Sa, Banshidhar Majhi. 273-276 [doi]
- CBIR using fuzzy edge detection maskRaju Barskar, Gulfishan Firdose Ahmed. 277-280 [doi]
- Intelligent database for the SOA using BPELAarti M. Karande, V. N. Chunekar, B. B. Meshram. 281-284 [doi]
- Reduct based Q-learning: an introductionPunit Pandey, Deepshikha Pandey. 285-288 [doi]
- Analysis of multimedia forensic techniqueG. R. Talmale, A. V. Talhan, Rajiv V. Dharaskar. 289-294 [doi]
- Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authenticationPradipta K. Banerjee, Jayanta K. Chandra, Asit K. Datta. 295-300 [doi]
- Skin texture analysis for medical diagnosisNabanita Bhattacharjee, Ranjan Parekh. 301-306 [doi]
- Gene expression network discovery: a pattern based biclustering approachDebahuti Mishra, Kailash Shaw, Sashikala Mishra, Amiya Kumar Rath, Milu Acharya. 307-312 [doi]
- Protein feature classification using particle swarm optimization and artificial neural networksBithin Kanti Shee, Swati Vipsita, Santanu Ku. Rath. 313-318 [doi]
- Gender classification using pitch and formantsPawan Kumar, Nitika Jakhanwal, Anirban Bhowmick, Mahesh Chandra. 319-324 [doi]
- Fast and iterative algorithm for iris detection with orthogonal polynomials transformR. Krishnamoorthy, D. Indradevi. 325-330 [doi]
- High capacity digital image watermarking with increased number of blocksAnand Kunwar Singh, Prasanna Kumar Acharya, Basant Kumar. 331-334 [doi]
- Real-time iris segmentation based on image morphologySambit Bakshi, Hunny Mehrotra, Banshidhar Majhi. 335-338 [doi]
- Gender classification by principal component analysis and support vector machineSunita Kumari, Pankaj Kumar Sa, Banshidhar Majhi. 339-342 [doi]
- Relative sub-image based features for leaf recognition using support vector machineShitala Prasad, Krishna Mohan Kudiri, R. C. Tripathi. 343-346 [doi]
- Comparison between different illumination independent change detection techniquesMohammad Imroze Khan, Bibhudendra Acharya, Shrish Verm. 347-350 [doi]
- Low-bit-rate lossless image coding using classified vector quantization with orthogonal polynomials transformR. Krishnamoorthy, K. Rajavijayalakshmi, R. Punidha. 351-354 [doi]
- A real coded MOGA for mining classification rules with missing attribute valuesDipankar Dutta, Paramartha Dutta. 355-358 [doi]
- Document skew estimation: an approach based on waveletsV. N. Manjunath Aradhya. 359-364 [doi]
- Wavelet based information for retrieval and classification of mammographic imagesBikesh Kumar Singh, Jitendra Singh Parihar, Pritish Pal. 365-370 [doi]
- Retrieval of changes in moving objects in multiple and color imagesMohammad Imroze Khan, Bikesh Kumar Singh. 371-376 [doi]
- Restoration of images corrupted with blur and impulse noiseRatnakar Dash, Pankaj Kumar Sa, Banshidhar Majhi. 377-382 [doi]
- A hierarchical design of high performance 8x8 bit multiplier based on Vedic mathematicsSumit R. Vaidya, Deepak R. Dandekar. 383-386 [doi]
- Medical image retrieval, indexing and enhancement techniques: a surveyAmol P. Bhagat, Mohammad Atique. 387-390 [doi]
- Design and implementation of real time secured RS232 link for multiple FPGA communicationSuman Sau, Chandrajit Pal, Amlan Chakrabarti. 391-396 [doi]
- Cube index for unstructured text analysis and miningB. Janet, A. V. Reddy. 397-402 [doi]
- Adaptive color image enhancement based geometric mean filterM. C. Hanumantharaju, M. Ravishankar, D. R. Ramesh Babu, S. Ramachandran. 403-408 [doi]
- Parallel multi-objective genetic algorithms for associative classification rule miningB. S. P. Mishra, A. K. Addy, Rahul Roy, Satchidananda Dehuri. 409-414 [doi]
- Utilization of map-reduce for parallelization of resource scheduling using MPI: PRSLikewin Thomas, B. Annappa. 415-420 [doi]
- Utilization of grey level co-occurrence matrix and Markov random field model for segmentation of colour textured imagesJ. Mridula, Dipti Patra. 421-426 [doi]
- ::::HPGRID::::: a novel architectural model for resource management systemsD. Doreen Hephzibah Miriam, K. S. Easwarakumar. 427-432 [doi]
- Comparing the performance of data mining techniques for oral cancer predictionNeha Sharma. 433-438 [doi]
- Planted (l, d) motif finding with allowable mismatches using kernel based approachAnjali Mohapatra, P. M. Mishra, S. Padhy. 439-442 [doi]
- Minimum distortion clustering technique for orthogonal polynomials transform vector quantizerR. Krishnamoorthy, J. Kalpana. 443-448 [doi]
- Enhancing the learning experience in blended learning systems: a semantic approachP. C. Sherimon, P. V. Vinu, Reshmy Krishnan. 449-452 [doi]
- FPGA based implementation of parallel ECC processorBibhudendu Panda, Pabitra Mohan Khilar. 453-456 [doi]
- Multiobjective optimization to provide service guarantees for window-constrained scheduling using micro-genetic algorithmR. Muthu Selvi, R. Rajaram. 457-461 [doi]
- A new adaptive median filtering technique for removal of impulse noise from imagesPunyaban Patel, Abhishek Tripathi, Banshidhar Majhi, C. R. Tripathy. 462-467 [doi]
- Improvement of bounded-diameter MST instances with hybridization of multi-objective EASoma Saha, Rajeev Kumar. 468-473 [doi]
- New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance securityJ. Vijay Anand, G. D. Dharaneetharan. 474-476 [doi]
- Communication based vulnerabilities and script based solvabilitiesArun Kumar Singh, Pooja Tewari, Shefalika Ghosh Samaddar, Arun K. Misra. 477-482 [doi]
- Physical level implementation of a web data modelAbhijit Sanyal, Soume Sanyal, Sankhayan Choudhury. 483-488 [doi]
- Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETsN. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 489-492 [doi]
- A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing techniqueJayaprakash Kar, Banshidhar Majhi. 493-498 [doi]
- Hybrid security architecture (HSA) for secure execution of mobile agentsHeman Pathak. 499-502 [doi]
- Steganography by using attributes of magic number 9Amol G. Muley. 503-506 [doi]
- You are watching system (YAW system): an agent based secure real-time monitoring, capturing and analysis system for client activities on the expert agent s screenLal Bihari Barik, Bankim Patel, Ankita Barik. 507-510 [doi]
- A novel approach to format based text steganographySangita Roy, Manini Manasmita. 511-516 [doi]
- Detection of HTTP flooding attacks in multiple scenariosDebasish Das, Utpal Sharma, D. K. Bhattacharyya. 517-522 [doi]
- Ant colony based approach for intrusion detection on cluster heads in WSNHarshal A. Arolkar, Shraddha P. Sheth, Vaidehi P. Tamhane. 523-526 [doi]
- A phishing analysis of web based systemsPravin Soni, Shamal Firake, B. B. Meshram. 527-530 [doi]
- NADO: network anomaly detection using outlier approachMonowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. 531-536 [doi]
- A quantitative methodology for information security control gap analysisSulagna Bandopadhyay, Anirban Sengupta, Chandan Mazumdar. 537-540 [doi]
- Image encryption using index based chaotic sequence, M sequence and gold sequenceBibhudendra Acharya, S. Sachin Sunder, M. Thiruvenkatam, Aneesh K. Sajan. 541-544 [doi]
- Password based remote authentication scheme using ECC for smart cardAmutha Prabakar Muniyandi, Rajaram Ramasamy, Indrani. 549-554 [doi]
- An aspect oriented model of efficient and secure card-based payment systemDivya Prakash Nigam, Aparajita Ojha. 559-564 [doi]
- Evaluation of web application security risks and secure design patternsAsish Kumar Dalai, Sanjay Kumar Jena. 565-568 [doi]
- Router based approach to mitigate DOS attacks on the wireless networksL. David, Meenakshi Sood, Mahesh Kumar Kajla. 569-572 [doi]
- A secure keyless image steganography approach for lossless RGB imagesSankar Roy, Ranjan Parekh. 573-576 [doi]
- Image encryption using a new chaos based encryption algorithmAnuja Kumar Acharya. 577-581 [doi]
- A novel simple secure internet voting protocolDeepak Kumar, Rishikesh Sahay, Ganesh R. Hegde, Debasish Jena. 586-589 [doi]
- Security in vehicular adhoc networks: a surveyBharati Mishra, Priyadarshini Nayak, Subhashree Behera, Debasish Jena. 590-595 [doi]
- A novel approach for secret data transfer using image steganography and visual cryptographyD. R. L. Prasanna, L. Jani Anbarasi, M. Jenila Vincent. 596-599 [doi]
- Honeypot in network security: a surveyAbhishek Mairh, Debabrat Barik, Kanchan Verma, Debasish Jena. 600-605 [doi]
- Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matricesBibhudendra Acharya, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad. 606-609 [doi]
- Development of educational ontology for software risk analysisC. R. Rene Robin, G. V. Uma. 610-615 [doi]
- A hypercube novelty model for comparing E-commerce and M-commerceRaj Gaurang Tiwari, Mohd. Husain, Vishal Srivastava, Kuldeep Singh. 616-619 [doi]
- Architectural patterns to design software safety based safety-critical systemsS. Phani Kumar, P. Seetha Ramaiah, V. Khanaa. 620-623 [doi]
- Securing tests in E-learning environmentS. R. Balasundaram. 624-627 [doi]
- Security in Bluetooth, RFID and wireless sensor networksSaroj Kumar Panigrahy, Sanjay Kumar Jena, Ashok Kumar Turuk. 628-633 [doi]