Abstract is missing.
- Erratum: A State Variables Analysis for Emerging Nanoelectronic DevicesK. Vaitheki, R. Tamijetchelvy. 1 [doi]
- Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant)Rajat Sheel Jain, Neeraj Kumar, Brijesh Kumar. 1-7 [doi]
- Speech Recognition of Assamese Numerals Using Combinations of LPC - Features and Heterogenous ANNsManash Pratim Sarma, Kandarpa Kumar Sarma. 8-12 [doi]
- Design and Modeling of Power Efficient, High Performance 32-bit ALU through Advanced HDL SynthesisK. Dhanumjaya, G. Kiran Kumar, M. N. Giriprasad, M. Raja Reddy. 13-21 [doi]
- A New Multi-language Encryption Technique for MANETPrasenjit Choudhury, Rajasekhar Gaddam, Rajesh Babu Parisi, Manohar Babu Dasari, Satyanarayana Vuppala. 22-28 [doi]
- Bi-variate Polynomial Approximation of Fuzzy Controller Using Genetic Algorithm for Trajectory Control of PUMA560A. Mona Subramaniam, A. Manju, Madhav J. Nigam. 29-35 [doi]
- Protecting Digital Images Using DTCWT-DCTK. Ramani, E. V. Prasad, S. Varadarajan. 36-44 [doi]
- A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low OffsetSilpakesav Velagaleti, Pavankumar Gorpuni, K. K. Mahapatra. 45-49 [doi]
- VLSI Design of Four Quadrant Analog Voltage-Mode Multiplier and Its ApplicationAnkita Tijare, Pravin Dakhole. 50-54 [doi]
- An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback StrategiesS. Karthik, V. P. Arunachalam, T. Ravichandran, M. L. Valarmathi. 55-61 [doi]
- Designing a Promotor for a Novel Target Site Identified in Caspases for Initiating Apoptosis in Cancer CellsMala S. Kumar, K. L. Lainu, V. Aghila, Dhanya Purushothaman, K. Varun Gopal, P. K. Krishnan Namboori, Vrinda Harishankar. 62-67 [doi]
- Learning Classifier Systems Approach for Automated Discovery of Hierarchical Censored Production RulesSuraiya Jabin. 68-77 [doi]
- Feature Based Watermarking Algorithm by Adopting Arnold TransformS. S. Sujatha, M. Mohamed Sathik. 78-82 [doi]
- Inference of Gene Networks from Microarray Data through a Phenomic ApproachRio G. L. D'Souza, K. Chandra Sekaran, A. Kandasamy. 83-89 [doi]
- A Novel Lattice Based Research Frame Work for Identifying Web User s Behavior with Web Usage MiningV. V. R. Maheswara Rao, V. Valli Kumari. 90-99 [doi]
- A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication SchemeV. Lokanadham Naidu, K. Ramani, D. Ganesh, Sk. Munwar, P. Basha. 108-115 [doi]
- Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic MapI. Shatheesh Sam, P. Devaraj, Raghuvel S. Bhuvaneswaran. 116-123 [doi]
- Network Forensic Analysis by Correlation of Attacks with Network AttributesAtul Kant Kaushik, Emmanuel S. Pilli, Ramesh C. Joshi. 124-128 [doi]
- Robust and Real Time Data Delivery in Wireless Sensor NetworksDeepali Virmani, Satbir Jain. 129-135 [doi]
- Multiple QoS Guided Heuristic for Independent Task Scheduling in GridSameer Singh Chauhan, R. C. Joshi. 136-141 [doi]
- A Framework for Network Forensic AnalysisEmmanuel S. Pilli, Ramesh C. Joshi, Rajdeep Niyogi. 142-147 [doi]
- A New Trust Model Based on Time Series Prediction and Markov ModelSarangthem Ibotombi Singh, Smriti Kumar Sinha. 148-156 [doi]
- A Novel J2ME Service for Mining Incremental Patterns in Mobile ComputingAshutosh K. Dubey, Shishir K. Shandilya. 157-164 [doi]
- CDPN: Communicating Dynamic Petri Net for Adaptive Multimedia PresentationA. P. Sarath Chandar, S. Arun Balaji, G. Venkatesh, Susan Elias. 165-170 [doi]
- Developing a Web Recommendation System Based on Closed Sequential PatternsUtpala Niranjan, R. B. V. Subramanyam, V. Khanaa. 171-179 [doi]
- Nearest Neighbour Classification for Trajectory DataLokesh Kumar Sharma, Om Prakash Vyas, Simon Scheider, Ajaya K. Akasapu. 180-185 [doi]
- Security-Aware Efficient Route Discovery for DSR in MANETSanjeev Rana, Anil Kapil. 186-194 [doi]
- Regression Modeling Technique on Data Mining for Prediction of CRMManisha Rathi. 195-200 [doi]
- Congestion Games in Wireless Channels with Multipacket Reception CapabilityDebarshi Kumar Sanyal, Sandip Chakraborty, Matangini Chattopadhyay, Samiran Chattopadhyay. 201-205 [doi]
- Secure and Revocable Multibiometric Templates Using Fuzzy Vault for Fingerprint and IrisV. S. Meenakshi, G. Padmavathi. 206-214 [doi]
- High Speed Cache Design Using Multi-diameter CNFET at 32nm TechnologyAminul Islam, Mohd. Hasan. 215-222 [doi]
- Dynamic Load Balancer Algorithm for the Computational Grid EnvironmentRajkumar Rajavel, Thamarai Selvi Somasundaram, Kannan Govindarajan. 223-227 [doi]
- Instance-Based Classification of Streaming Data Using Emerging PatternsMohd. Amir, Durga Toshniwal. 228-236 [doi]
- Modified Go-Left Balls and Bins Algorithm for Server Load BalancingPrasun Banerjee, Stephan D Costa, Sukriti Bhattacharya. 237-242 [doi]
- Three Layered Adaptation Model for Context Aware E-LearningMinu M. Das, Manju Bhaskar, T. Chithralekha. 243-248 [doi]
- AFDEP: Agreement Based CH Failure Detection and Election Protocol for a WSNAmarjeet Kaur, T. P. Sharma. 249-257 [doi]
- Problem Area Identification with Secure Data Aggregation in Wireless Sensor NetworksParesh Solanki, Gaurang Raval, Srikant Pradhan. 258-266 [doi]
- Graceful Degradation in Performance of WaveScalar ArchitectureNeha Sharma, Kumar Sambhav Pandey. 274-280 [doi]
- Dual Tree Complex Wavelet Transform Based Video Object TrackingManish Khare, Tushar Patnaik, Ashish Khare. 281-286 [doi]
- Design of New Indexing Techniques Based on Ontology for Information Retrieval SystemsK. Saruladha, G. Aghila, Sathish Kumar Penchala. 287-291 [doi]
- Identifying the Attack Source by IP TracebackK. C. Nalavade, B. B. Meshram. 292-296 [doi]
- An Approach towards Secure and Multihop Time Synchronization in Wireless Sensor NetworkArun Kumar Tripathi, Ajay Agarwal, Yashpal Singh. 297-302 [doi]
- A Novel Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual CorporaTayebeh Mosavi Miangah, Amin Nezarat. 307-312 [doi]
- Evaluation of the Role of Low Level and High Level Features in Content Based Medical Image RetrievalK. S. Arun, K. S. Sarath. 319-325 [doi]
- A Reinforcement Learning Approach for Price Offer in Supplier Selection ProcessVali Derhami, Mohammad Ali Saadatjoo, Fatemeh Saadatjoo. 326-329 [doi]
- Wavelet and Hadamard Transforms for Image Retrieval Using Color ModelsSanjay N. Talbar, Satishkumar L. Varma. 336-338 [doi]
- A Rough Set Integrated Fuzzy C-Means Algorithm for Color Image SegmentationByomkesh Mandal, Balaram Bhattacharyya. 339-343 [doi]
- Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc NetworksK. Gopalakrishnan, V. Rhymend Uthariaraj. 344-349 [doi]
- An Energy Efficient Cluster Based Broadcast Protocol for Mobile Ad Hoc NetworksG. Kalpana, M. Punithavalli. 350-355 [doi]
- A Hybridized Graph Mining ApproachSadhana Priyadarshini, Debahuti Mishra. 356-361 [doi]
- Dynamic Contract Generation and Monitoring for B2B Applications with Composite ServicesKanchana Rajaram, S. Usha Kiruthika. 362-364 [doi]
- Synchronization of Authorization Flow with Work Object Flow in a Document Production Workflow Using XACML and BPELSubrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha. 365-370 [doi]
- Virtual Nodes for Self Stabilization in Wireless Sensor NetworksDeepali Virmani, Satbir Jain. 371-375 [doi]
- Small Square Microstrip AntennaL. Lolit Kumar Singh, Bhaskar Gupta, Partha P. Sarkar. 376-379 [doi]
- Extraction of Optimal Biclusters from Gene Expression DataJ. Bagyamani, K. Thangavel, R. Rathipriya. 380-383 [doi]
- Analysis of Data Warehouse Quality Metrics Using LRRolly Gupta, Anjana Gosain. 384-388 [doi]
- Similar - Dissimilar Victor Measure Analysis to Improve Image Knowledge Discovery Capacity of SOMN. Chenthalir Indra, E. Ramaraj. 389-393 [doi]
- Cluster-Base Directional Rumor Routing Protocol in Wireless Sensor NetworkParvin Eftekhari, Hamid Shokrzadeh, Abolfazl Toroghi Haghighat. 394-399 [doi]
- On the Calculation of Coldness in Iowa, a North Central Region, United States: A Summary on XML Based SchemeSugam Sharma, Shashi K. Gadia, S. B. Goyal. 400-405 [doi]
- Development of a Three Layer Laminate for Better Electromagnetic Compatibility Performance at X-BandC. Dharma Raj, G. Sasibhushana Rao, P. V. Y. Jayasree, B. Srinu, P. Lakshman. 406-410 [doi]
- Low Voltage Low Power Op Amp with Gain Boosting and Frequency Compensation Technique for Battery Powered ApplicationsK. Sarangam, Hameed Zohaib Samad. 417-422 [doi]
- Performance of Clustering in Mobile DomainSoumen Kanrar, Aroop Mukherjee. 423-429 [doi]
- Morphological Analyzer for Telugu Using Support Vector MachineG. Sai Kiranmai, K. Mallika, M. Anand Kumar, V. Dhanalakshmi, K. P. Soman. 430-433 [doi]
- Visualization of State Transition Systems in a Parallel EnvironmentSubbu Ramanathan, Haresh Suresh, Amog Rajenderan, Susan Elias. 434-436 [doi]
- Facilitating Efficient Integrated Semantic Web Search with Visualization and Data Mining TechniquesS. K. Jayanthi, S. Prema. 437-442 [doi]
- Image Object Classification Using Scale Invariant Feature Transform Descriptor with Support Vector Machine Classifier with Histogram Intersection KernelBiplab Banerjee, Tanusree Bhattacharjee, Nirmalya Chowdhury. 443-448 [doi]
- Palmprint Recognition System Using Zernike Moments Feature ExtractionP. Esther Rani, R. Shanmuga Lakshmi. 449-454 [doi]
- A QOS Framework for Mobile Ad-Hoc in Large Scale NetworksA. Boomaranimalany, R. M. Chandrasekaran. 455-457 [doi]
- An Interactive Content Based Image Retrieval Method Integrating Intersection Kernel Based Support Vector Machine and Histogram Intersection Based Similarity Measure for Nearest Neighbor RankingTanusree Bhattacharjee, Biplab Banerjee, Nirmalya Chowdhury. 458-462 [doi]
- Analysis and Prediction of Blocking Probability in a Banyan Based ATM SwitchR. Pugazendi, K. Duraiswamy. 463-468 [doi]
- Performance Evaluation of QoS Aware Routing in OLSR (Optimized Link State Routing Protocol) Using Genetic AlgorithmM. Pushpavalli, A. M. Natarajan. 469-474 [doi]
- Handloom Silk Fabric Defect Detection Using First Order Statistical Features on a NIOS II ProcessorM. E. Paramasivam, R. S. Sabeenian. 475-477 [doi]
- Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole AttacksYogesh Chaba, Yudhvir Singh, Kanwar Preet Singh, Prabha Rani. 478-483 [doi]
- 4T Carry Look Ahead Adder Design Using MIFGP. H. S. T. Murthy, L. Madan Mohan, V. Sreenivasa Rao, V. Malleswara Rao. 490-494 [doi]
- Hand written Text to Digital Text Conversion using Radon Transform and Back Propagation Network (RTBPN)R. S. Sabeenian, M. Vidhya. 498-500 [doi]
- Resource Allocation and Multicast Routing Protocol for Optical WDM NetworksN. Kaliammal, G. Gurusamy. 501-503 [doi]
- An Approximate Algorithm for Solving Dynamic Facility Layout ProblemSurya Prakash Singh. 504-509 [doi]
- Homology Modeling and Protein Ligand Interaction to Identify Potential Inhibitor for E1 Protein of ChikungunyaC. S. Vasavi, Saptharshi, R. Radhika Devi, Lakshmi Anand, Megha. P. Varma, P. K. Krishnan Namboori. 510-513 [doi]
- Tied Mixture Modeling in Hindi Speech Recognition SystemR. K. Aggarwal, M. Dave. 514-519 [doi]
- Propagation Delay Variation due to Process Induced Threshold Voltage VariationKrishan Gopal Verma, Brajesh Kumar Kaushik, Raghuvir Singh. 520-524 [doi]
- Biomedical Image Coding Using Dual Tree Discrete Wavelet Transform and Iterative ProjectionSanjay N. Talbar, Anil K. Deshmane. 525-528 [doi]
- Privacy-Preserving Naïve Bayes Classification Using Trusted Third Party and Offset Computation over Distributed DatabasesB. N. Keshavamurthy, Mitesh Sharma, Durga Toshniwal. 529-534 [doi]
- Extraction of Pose Invariant Facial FeaturesKavita R. Singh, Mukesh A. Zaveri, Mukesh M. Raghuwanshi. 535-539 [doi]
- On the Segmentation of Multiple Touched Cursive Characters: A Heuristic ApproachTanzila Saba, Ghazali Sulong, Shafry Rahim, Amjad Rehman. 540-542 [doi]
- Context Representation and Management in a Pervasive EnvironmentB. Vanathi, V. Rhymend Uthariaraj. 543-548 [doi]
- A Comparative Study and Choice of an Appropriate Kernel for Support Vector MachinesR. Sangeetha, B. Kalpana. 549-553 [doi]
- Color Image Restoration Method for Gaussian Noise RemovalJ. Harikiran, R. Usha Rani. 554-560 [doi]
- A Decision Tree Approach for Design Patterns Detection by Subgraph IsomorphismAkshara Pande, Manjari Gupta, Anil Kumar Tripathi. 561-564 [doi]
- Realisation of Various EBG StructuresB. Bhuvaneswari, K. Malathi. 565-570 [doi]
- Identification of Melanoma (Skin Cancer) Proteins through Support Vector MachineBabita Rathore, Sandeep Kumar Kushwaha, Madhvi Shakya. 571-575 [doi]
- BPNN and Lifting Wavelet Based Image CompressionRenu Singh, Swanirbhar Majumder, U. Bhattacharjee, A. Dinamani Singh. 576-579 [doi]
- Combined Off-Line Signature Verification Using Neural NetworksD. R. Shashi Kumar, R. Ravi Kumar, K. B. Raja, R. K. Chhotaray, Sabyasachi Pattanaik. 580-583 [doi]
- Distribution of Continuous Queries over Data Aggregators in Dynamic Data Dissemination NetworksMahesh Gadiraju, V. Valli Kumari. 584-589 [doi]
- Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDRK. V. Krishnam Raju, V. Valli Kumari, N. Sandeep Varma, K. V. S. V. N. Raju. 590-595 [doi]
- Digital Image Steganography Based on Combination of DCT and DWTVijay Kumar, Dinesh Kumar. 596-601 [doi]
- Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State SpacesJ. Divya Udayan, T. Gireesh Kumar, Roshy M. John, K. J. Poornaselvan, S. A. Lakshmanan. 602-605 [doi]
- Neural Networks Based Detection of Purpose Data in TextP. Kiran Mayee, Rajeev Sangal, Soma Paul. 606-609 [doi]
- Comparative Performance Analysis of QoS-Aware Routing on DSDV, AODV and DSR Protocols in MANETsRajneesh Gujral, Anil Kapil. 610-615 [doi]
- Steering Control of an Automated Vehicle Using Touch Screen with Simulation ResultApeksha V. Sakhare, Vilas M. Thakare, Rajiv Dharaskar. 616-618 [doi]
- A Low Cost GPS Based Vehicle Collision Avoidance SystemSamarth Borker, R. B. Lohani. 619-621 [doi]
- Human Skin Region Identification Using Fusion TechniqueVijayanandh Rajamanickam, Balakrishnan Ganesan. 622-625 [doi]
- Avoidance of Electromagnetic Interference in Modem with Minimal Bit Error Rate Using Tele Typewriter SignalsC. Annadurai, D. MuthuKumaran, C. Charithartha Reddy, M. Kanagasabapathy. 626-631 [doi]
- (paper retracted)K. Vaitheki, R. Tamijetchelvy. 632-637 [doi]
- Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector MachineP. P. Amritha, Anoj Madathil, T. Gireesh Kumar. 638-640 [doi]
- ASSR Fair Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for MANETAhmad Anzaar, Husain Shahnawaz, Chand Mukesh, S. C. Gupta, R. Gowri. 641-646 [doi]
- Secret Sharing Scheme for Image Encryption Using new Transformation MatrixA. Kalai Selvi, M. Mohamed Sathik. 647-650 [doi]
- Measuring the Reusability Level of Software Packages Using Reusability Testing ScriptsR. Kamalraj, A. Rajiv Kannan, P. Ranjani, R. Hemarani. 651-653 [doi]
- Recent Trends in Superscalar Architecture to Exploit More Instruction Level ParallelismRitu Baniwal, Kumar Sambhav Pandey. 660-665 [doi]
- A Neural Network Based Solution to Color Image Restoration ProblemSatyadhyan Chickerur, M. Aswatha Kumar. 666-671 [doi]
- Spline Biorthogonal Wavelet DesignT. Arathi, K. P. Soman, Latha Parameswaran. 672-674 [doi]
- Securing Password File Using Bezier CurvesSunil Khurana, Sunil Kumar Khatri. 675-680 [doi]
- Reading a 4-Bit SLC NAND Flash Memory in 180nm TechnologyNilesh Shah, Rasika Dhavse, Anand Darji. 681-685 [doi]
- Keystroke Dynamics Authentication Using Neural Network ApproachesVenkateswaran Shanmugapriya, Ganapathi Padmavathi. 686-690 [doi]
- Moving Object Tracking Using Object SegmentationSanjay Singh, Srinivasa Murali Dunga, A. S. Mandal, Chandra Shekhar, Anil Vohra. 691-694 [doi]