Abstract is missing.
- SVD and Neural Network Based Watermarking SchemeSwanirbhar Majumder, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar. 1-5 [doi]
- Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-TermsAkshi Kumar, M. P. S. Bhatia. 6-11 [doi]
- Network Management Initialization for Wired and Wireless Communication: A Real Time StudyNavneet Tiwari, Siddarth Jain, Saifuddin Tariwala, Ankit Salgia. 12-16 [doi]
- IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 NetworkJ. Gnana Jayanthi, S. Albert Rabara. 17-21 [doi]
- An Efficient Multicast Hybrid Routing Protocol for MANETsSrinivas Sethi, Siba K. Udgata. 22-27 [doi]
- Applications of Graph Theory in Face BiometricsDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing. 28-33 [doi]
- Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat MapAnil Kumar, M. K. Ghose. 34-38 [doi]
- Hybrid Activities of AODV for Wireless Ad hoc Sensor NetworkSrinivas Sethi, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath N. Sahoo. 39-44 [doi]
- Design and Evaluation of a Fuzzy-Based CPU Scheduling AlgorithmShatha J. Kadhim, Kasim M. Al-Aubidy. 45-52 [doi]
- Object Location in Cluster Based Mobile Ad Hoc NetworksPrasad Naik Hamsavath, G. V. Singh, Sanjay Kumar Dhurandher. 53-59 [doi]
- Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast ApplicationsAlok Joshi, Davinder S. Saini. 60-64 [doi]
- Fast OVSF Code Assignment Scheme for WCDMA Wireless NetworksDavinder S. Saini, Vipin Balyan, Kanika Mittal, Mansi Saini, Manika Kishore. 65-70 [doi]
- A Closed Form Slew Evaluation Approach Using Burr s Distribution Function for High Speed On-Chip RC InterconnectsRajib Kar, Vikas Maheshwari, Md. Maqbool, A. K. Mal, A. K. Bhattacharjee. 71-75 [doi]
- Wavelet-Domain ::::L::::::: ∞ :::-Constrained Two-Stage Near-Lossless EEG CoderK. Srinivasan, M. Ramasubba Reddy. 76-80 [doi]
- Fuzzy Based Bandwidth Management for Wireless Multimedia NetworksJayashree Mallapur, Syed Abidhusain, Soumya S. Vastrad, Ajayakumar Katageri. 81-90 [doi]
- A Novel Digital Algorithm for Sobel Edge DetectionJagadish H. Pujar, D. S. Shambhavi. 91-95 [doi]
- Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance ComparisonB. Kavitha, S. Karthikeyan, B. Chitra. 96-101 [doi]
- Recognition of Isolated Indian Sign Language Gesture in Real TimeAnup Nandy, Jay Shankar Prasad, Soumik Mondal, Pavan Chakraborty, Gora Chand Nandi. 102-107 [doi]
- Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP ProcessorsMegalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel. 108-113 [doi]
- Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 ProcessorMegalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham. 114-119 [doi]
- Role of Resolution in Noisy Pattern MatchingAlex Pappachen James, Sima Dimitrijev. 120-124 [doi]
- Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid SecurityV. Ruckmani, G. Sudha Sadasivam. 125-129 [doi]
- Bandwidth Estimation Scheme for Mobile Adhoc NetworkDeepak Vidhate, Anita Patil, Supriya Sarkar. 130-135 [doi]
- Multimodal Biometric Invariant Moment Fusion Authentication SystemP. Viswanathan, P. Venkata Krishna, S. Hariharan. 136-143 [doi]
- Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing ImagesBikesh Kr. Singh, G. R. Sinha, Imroze Khan. 152-156 [doi]
- Vector Quantization for Tumor Demarcation of MammogramsH. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge. 157-163 [doi]
- Selective Encryption of Video Using Multiple Chaotic MapsL. M. Varalakshmi, G. Florence Sudha. 164-168 [doi]
- Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor NetworksNeeta S. Bosamiya, Devesh C. Jinwala. 169-174 [doi]
- Tracking Based Secure AODV Routing ProtocolParma Nand, S. C. Sharma, Rani Astya. 175-180 [doi]
- Study of Visitor Behavior by Web Usage MiningV. V. R. Maheswara Rao, V. Valli Kumari, K. V. S. V. N. Raju. 181-187 [doi]
- A Hybrid Routing Protocol for Wireless Sensor NetworkN. Sengottaiyan, Rm. Somasundaram, Balasubramanie. 188-193 [doi]
- Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast RingD. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju. 194-201 [doi]
- Investigation on Effectiveness of Simulation Results for Wireless Sensor NetworksA. K. Dwivedi, V. K. Patle, O. P. Vyas. 202-208 [doi]
- A Novel Multipath Routing Scheme in Mobile Adhoc NetworksN. Jaisankar, R. Saravanan, K. Durai Swamy. 209-216 [doi]
- A Novel Security Approach for Detecting Black Hole Attack in MANETN. Jaisankar, R. Saravanan, K. Durai Swamy. 217-223 [doi]
- NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed DatabaseNeera Batra, A. K. Kapil. 224-232 [doi]
- A Secure e-Shopping Using Voice OrderingSaroj Kumar Panigrahy, Debasish Jena, Sanjay Kumar Jena. 233-237 [doi]
- Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic ModelManoj Kr. Dutta, Vinod Kumar Chaubey. 238-244 [doi]
- A Concurrent Synchronization Model for Distributed Multimedia SystemsJanani Arthanari, A. Kannan. 245-249 [doi]
- Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETSRajneesh Gujral, Anil Kapil. 250-257 [doi]
- A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed SystemShakti Mishra, Dharmender Singh Kushwaha, Arun Kumar Misra. 258-262 [doi]
- An Improved Three Pattern Huffman Compression Algorithm for Medical Images in TelemedicineDivya Mohandass, J. Janet. 263-268 [doi]
- Encryption Algorithm for Block Ciphers Based on Programmable Cellular AutomataAbhishek Ray, Debasis Das. 269-275 [doi]
- Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh NetworkDhaval K. Patel, S. K. Shah, Minesh P. Thaker. 276-280 [doi]
- Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor NetworksDeepali Virmani, Satbir Jain. 281-289 [doi]
- A Cryptographic Approach to Defend against IP SpoofingMangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan. 290-296 [doi]
- Multi-agent Based Network Performance Tuning in GridC. Valliyammai, S. Thamarai Selvi, R. Satheesh Kumar, E. Pradeep, K. Naveen. 297-304 [doi]
- Finding Discriminative Weighted Sub-graphs to Identify Software BugsSaeed Parsa, Somaye Arabi Naree, Neda Ebrahimi, Mojtaba Vahidi-Asl. 305-309 [doi]
- Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key InfrastructuresBalachandra, K. V. Prema. 320-324 [doi]
- Iris Recognition Technique Using Gaussian Pyramid CompressionG. Savithiri, A. Murugan. 325-331 [doi]
- Coverage of Access Points Using Particle Swarm Optimization in Indoor WLANLeena Arya, S. C. Sharma, Millie Pant. 332-336 [doi]
- Energy Conservation of Multicast Key Distribution in Mobile Adhoc NetworksDevaraju Suganya Devi, Ganapathi Padmavathi. 337-341 [doi]
- An Optimal Trust Based Resource Allocation Mechanism for Cross Domain GridP. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi. 342-348 [doi]
- Reactive Network Monitor for DDoS AttacksP. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha. 349-355 [doi]
- Statistical Method for English to Kannada TransliterationP. J. Antony, V. P. Ajith, K. P. Soman. 356-362 [doi]
- RIFMAS: River Flow Management System Using Wireless Sensing AgentsR. B. Patel, Deepika Jain, Bhanu Kaushik. 363-368 [doi]
- Finite Element Approach to Radial Heat Flow in Human Dermal TissuesNeha Jain. 369-375 [doi]
- An Efficient Auction Based Ticket Booking Scheme for Indian CinemasSajal Mukhopadhyay, Roshan Kumar Singh, D. Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee. 376-381 [doi]
- Supervised Learning Approach for Predicting the Quality of Cotton Using WEKAM. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli. 382-384 [doi]
- Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance FeedbackK. Latha, R. Manivelu. 385-387 [doi]
- Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET SShaily Mittal, Prabhjot Kaur. 396-400 [doi]
- Impact Factor of E - Learning: Using Secondary Education Case StudyTamanna Siddiqui, Munior Ahmad Wani. 401-404 [doi]
- Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted OntologySanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary. 405-410 [doi]
- A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition SystemChandrashekar M. Patil, Sudarshan Patilkulkarni. 411-416 [doi]
- Binary Data Compression Using Medial Axis Transform AlgorithmJagadish H. Pujar, Pallavi S. Gurjal. 417-419 [doi]
- Internet Usage Monitoring for Crime DetectionSandeep A. Thorat, Samadhan R. Manore. 420-423 [doi]
- Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet DecompositionS. Gunasekaran, K. Revathy. 424-429 [doi]
- Defending against Node Misbehavior to Discover Secure Route in OLSRSanjeev Rana, Anil Kapil. 430-436 [doi]
- SIMBIC: SIMilarity Based BIClustering of Expression DataJ. Bagyamani, K. Thangavel. 437-441 [doi]
- An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling SystemNeera Batra, A. K. Kapil. 442-445 [doi]
- Automatic Incorporation of Corrections into Reviewed DocumentsD. S. Guru, B. Vijaya Kumari, S. K. Lathamba. 446-451 [doi]
- Performance Comparison of Multicast Routing Protocols for MANETsMaya Mohan, S. Mary Saira Bhanu. 452-454 [doi]
- Traffic Aware LSP Selection Method in MPLS NetworksRavindra Kumar Singh, Kanak Saxena, Reena Singh. 455-457 [doi]
- Context-Aware Intrusion Detection in Mobile Ad-Hoc NetworksR. S. Ambili Chandran, S. Mary Saira Bhanu. 458-460 [doi]
- Energy and Fault Aware Management Framework for Wireless Sensor NetworkV. R. Sarma Dhulipala, V. Aarthy, R. M. Chandrasekaran. 461-464 [doi]
- An Image Index Model for RetrievalB. Janet, A. V. Reddy, S. Domnic. 465-467 [doi]
- Trust Based Strategy to Resist Collaborative Blackhole Attack in ManetN. Bhalaji, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam. 468-474 [doi]
- Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction PatternsS. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj. 475-481 [doi]
- Throughput Analysis of HWMP Routing Protocol in Wireless Mesh NetworksSahil Seth, Anil Gankotiya, Gurdit Singh, Vishal Kumar, Amit Kumar Jaiswal. 482-484 [doi]
- FPGA Implementation of AES Co-processor in Counter ModeBalwinder Singh, Harpreet Kaur, Himanshu Monga. 491-496 [doi]
- Detecting Plagiarism in Text DocumentsShanmugasundaram Hariharan, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman. 497-500 [doi]
- Hiding Relevant Information in an ImageMadhusmita Das, Mahamaya Mohanty. 501-504 [doi]
- Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing TechniquesG. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya. 505-507 [doi]
- Context-Aware System Using .NET ApproachArun Mishra, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra. 508-513 [doi]
- Genetic Audio WatermarkingMazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo. 514-517 [doi]
- Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data StructureKeyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia. 518-520 [doi]
- Natural Disaster Impact Assessment Using Genetic AlgorithmN. Bhalaji, Nandini Sundara Raman. 521-526 [doi]
- An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris RecognitionChandrashekar M. Patil, Sudarshan Patilkulkarni. 527-530 [doi]
- A Framework for Priority-Based Inter Vehicle Communication for Highway SafetyA. Kumar, R. K. Chauhan, Rajan Vohra. 531-534 [doi]
- Data Compression on Embedded SystemP. S. Revankar, Vijay B. Patil, W. Z. Gandhare. 535-537 [doi]
- A Survey on Preserving Privacy for Sensitive Association Rules in DatabasesChirag Modi, Udai Pratap Rao, Dhiren R. Patel. 538-544 [doi]
- Boon and Bane of Curvelet TransformG. Geetha, V. Ragavi, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya. 545-551 [doi]
- Security in High Performance ComputingUrvashi Chugh, Amit Chugh. 552-556 [doi]
- Trust Worthy Architecture for Mobile Ad Hoc Network EnvironmentV. R. Sarma Dhulipala, B. Vishnu Prabha, R. M. Chandrasekaran. 557-560 [doi]
- A Cross Layer Approach for Fault Management Framework in Wireless Sensor NetworksV. R. Sarma Dhulipala, K. Kavitha, R. M. Chandrasekaran. 561-564 [doi]
- Security Solutions to the Phishing: Transactions Based on Security Questions and ImageAruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala. 565-567 [doi]
- CloneManager: A Tool for Detection of Type1 and Type2 Code ClonesE. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya. 568-570 [doi]
- An Analysis to BER Performances of Differential OFDM SystemsInderjeet Kaur. 577-581 [doi]
- MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational InstitutionsS. Britto R. Kumar, S. Albert Rabara. 582-585 [doi]
- Team Automata Based Framework for Spatio-Temporal RBAC ModelN. Jaisankar, S. Veeramalai, A. Kannan. 586-591 [doi]
- Knowledge Discovery in Feedback System Using Pixel Oriented TechniqueMalay Bhatt, Rituraj Jain, C. K. Bhensdadia. 592-594 [doi]
- Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron LevelN. K. Shukla, Shilpi Birla, R. K. Singh. 595-597 [doi]
- Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc NetworksBalachandra, K. V. Prema. 598-600 [doi]
- Design Issues for Replacing Credit Card on Mobile PhoneSukhwant Kaur, H. K. Kaura, Mritunjay Ojha. 601-604 [doi]
- Unknown Key Share Attack on STPKE ProtocolR. Padmavathy, Chakravarthy Bhagvati. 605-608 [doi]
- An Effective SOA Model for Developing Efficient SystemsSasmita Pani, Mahamaya Mohanty. 609-612 [doi]
- Refactoring Interprocedural Dynamic Slicing for Handling PointersSantosh Kumar Pani, Priya Arundhati, Mahamaya Mohanty. 613-616 [doi]
- Image Segmentaion and Steganography for Secured Information Transmissionmamta juneja, Parvinder Singh Sandhu. 617-620 [doi]
- Ant System Embedded with Local Search for Solving Facility Layout ProblemSurya Prakash Singh. 621-628 [doi]
- Strategic Initiatives and Automated Decision Support with ERP System EnvironmentAsim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb. 629-635 [doi]
- The Effects of Mannequins on Consumers' Perception and Shopping AttitudeN. Anitha, C. Selvaraj. 641-647 [doi]
- Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location ProblemPriyanka Verma, R. R. K. Sharma. 656-659 [doi]
- CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare EnvironmentRitu Sinha, Chandrashekhar Kaushik. 660-664 [doi]