Abstract is missing.
- A comparative study of UML toolsHeena, Ranjna Garg. 1-4 [doi]
- Study of text based miningRanjna Garg, Heena. 5-8 [doi]
- Educational web sites accessibility design modelJatinder Singh Manhas. 9-12 [doi]
- Automated taxi/cab system using A* algorithmSantosh Kumar, Sumit Kumar. 13-20 [doi]
- Distributed smart camera network and mobile devicesSumit Kumar, Santosh Kumar, Sukumar Nandi. 21-24 [doi]
- Scene flow estimation from stereo video sourceAniket Bera. 25-28 [doi]
- Security policy implementation using connection and event log to achieve network access controlShalvi Dave, Jimit Mahadevia, Bhushan Trivedi. 29-33 [doi]
- Intrusion detection system using honeypots and swarm intelligenceGurdip Kaur, Meenu Khurana, Monika Sethi. 34-38 [doi]
- Analysis of various swarm-based & ant-based algorithmsAnuj K. Gupta, Anil K. Verma, Harsh Sadawarti. 39-43 [doi]
- Performance evaluation on segmentation methods for medical imagesManish Khare, Rajneesh Kumar Srivastava, Ashish Khare. 44-49 [doi]
- DMX in MANETs: major research trends since 2004Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh. 50-55 [doi]
- Efficient fault tolerant consensus using preemptive tokenPoonam Saini, Awadhesh Kumar Singh. 56-60 [doi]
- A hybrid method for 3D face localizationQaim Mehdi Rizvi, Qamar Abbas, Hasan Ahmad. 61-64 [doi]
- Topic tracking techniques for natural language processingKamaldeep Kaur. 65-71 [doi]
- An efficient broker cloud management systemGaurav Raj. 72-76 [doi]
- Integrated design space exploration based on power-performance trade-off using genetic algorithmAnirban Sengupta, Reza Sedaghat, Pallabi Sarkar. 77-81 [doi]
- Application specific processor vs. microblaze soft core RISC processor: FPGA based performance and CPR analysisPallabi Sarkar, Reza Sedaghat, Anirban Sengupta. 82-85 [doi]
- Crank-Nicolson scheme to transient MHD free convective flow through semi-infinite vertical porous plate with constant suction and temperature dependent heat sourceAnil Kumar, C. L. Varshney, Sajjan Lal. 86-92 [doi]
- Security in real time multimedia data based on generalized keysRaj Kumar, Divya Gupta. 93-96 [doi]
- Automatic human activity recognition in video using background modeling and spatio-temporal template matching based techniqueChandra Mani Sharma, Alok Kumar Singh Kushwaha, Swati Nigam, Ashish Khare. 97-101 [doi]
- Elliptic curve cryptography: survey and its security applicationsSheetal Kalra, Sandeep K. Sood. 102-106 [doi]
- Ontology based semantic similarly ranking of documentsS. Thenmalar, T. V. Geetha, S. Renuga Devi. 107-110 [doi]
- Trivial solution for a non-trivial problem in MANETsAwadhesh Kumar Singh, Shantanu Sharma 0001. 111-119 [doi]
- RR based grid scheduling algorithmManjot Bhatia. 120-123 [doi]
- Frontal view gait based recognition using PCASanjeev Sharma, Ritu Tiwari, Anupam Shukla, Vikas Singh. 124-127 [doi]
- Complexity study on "Carry-along Sort" algorithmPrabhakaran Sethuraman, Lakshmi Rajamani. 128-134 [doi]
- A comparative study of ICA algorithms for ECG signal processingMohammad Sarfraz, Francis Li, Mohammad Javed. 135-138 [doi]
- Modeling and designing of machine learning procedures as applied to game playing using artificial intelligenceAvneet Kaur Dhawan, Jaswinder Singh. 139-143 [doi]
- Secured routing over MANET with power managementAshwani Kush, Sunil Taneja. 144-149 [doi]
- Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environmentArpit, Ashwini Kumar. 150-154 [doi]
- RFID enabled cards skimming: enhanced technologyJaspreet Kaur, Narinder Kehar. 155-157 [doi]
- Adapting intelligence in robot using fuzzy logicVaishali Sood. 158-161 [doi]
- Development of traffic light control system based on fuzzy logicSandeep Mehan, Vandana Sharma. 162-165 [doi]
- Fuzzy rule-based controller for binary distillation columnAmit Kumar Singh, Barjeev Tyagi, Vishal Kumar. 166-169 [doi]
- AI based supervised classifiers: an analysis for intrusion detectionGulshan Kumar, Krishan Kumar. 170-174 [doi]
- A model for estimating efforts required to make changes in a software development projectKawal Jeet, Renu Dhir. 175-178 [doi]
- Fuzzy logic based decision support system for loan risk assessmentSangeet Kumar, Nitin Bhatia, Namarta Kapoor. 179-182 [doi]
- A robust multi-objective optimization to workflow scheduling for dynamic gridDarshan Singh, Ritu Garg. 183-188 [doi]
- Forecasting the hourly Ontario energy price by local linear wavelet neural network and ARMA modelsPrasanta Kumar Pany, S. P. Ghoshal. 189-193 [doi]
- Error correction in function point estimation using soft computing techniqueK. Koteswara Rao, G. Svp Raju. 194-198 [doi]
- Wireless machine monitoring embodiment using mobile computingBikramjit Singh, Saurabh Puri, Prateek Kesarwani. 199-203 [doi]
- Artificial intelligent firewallArchana Mishra, Abhishek Agrawal, Rajeev Ranjan. 204-207 [doi]
- Feature extraction based IP traffic classification using machine learningKuldeep Singh, S. Agrawal. 208-212 [doi]
- Architecture for intelligent transport system for automated vehicleNeeraj Sanduja, Pavneet Kaur. 213-215 [doi]
- An efficient job scheduling algorithm for grid computingSarpreet Singh, R. K. Bawa. 216-219 [doi]
- Security threats to mobile agentsSnehi Jyoti, Snehi Manish, Sudha Goyal. 220-222 [doi]
- MGC middleware for grid computing: the Globus ToolkitDeepti Malhotra, Devanand. 223-228 [doi]
- Semantic web services in clouds for semantic computingGurparkash Singh Kang, Jaiteg Singh, Maninderjit Singh Khanna. 229-232 [doi]
- Contemporary study of cloud computing environmentVinay Kukreja, Jaiteg Singh, Anju Sharma. 233-235 [doi]