Abstract is missing.
- Global chaos synchronization of Arneodo chaotic system via backstepping controller designSundarapandian Vaidyanathan. 1-6 [doi]
- Host based attack detection using system callsJestin Joy, Anita John. 7-11 [doi]
- Harmony-based feature selection to improve the nearest neighbor classificationAli Adeli, Mehrnoosh Sinaee, M. Javad Zomorodian, Mehdi Neshat. 12-18 [doi]
- CMMI based software metrics to evaluate OOADMeena Sharma, Rajeev G. Vishwakarma. 19-25 [doi]
- Cloud algebra for cloud database management systemMansaf Alam. 26-29 [doi]
- Fusion of gray scale images using Self Organizing Feature MapsAnna Saro Vijendran, G. Paramasivam. 30-36 [doi]
- Implementation of biometrics based security system with integrated techniquesS. Jeyanthi, N. Uma Maheswari, R. Venkatesh. 37-42 [doi]
- Parallelization of Pollard's Rho Integer factorization algorithmG. Harish, G. Punith Kumar, Anjan K. Koundinya, Y. V. Pramod, N. K. Srinath, G. E. Raghavendra Kumar, R. Sandeep, Archit Shukla, Madan Acharya. 43-46 [doi]
- Hybrid network intrusion detection system using expert rule based approachA. S. Aneetha, T. S. Indhu, S. Bose. 47-51 [doi]
- A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distributionArifa Azeez, K. G. Preetha. 52-56 [doi]
- A statistical approach to the relative performance analysis of sorting algorithmsNiraj Kumar Singh, Soubhik Chakraborty. 57-62 [doi]
- Secure Multipoint Relay based Routing in MANETHimadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee. 63-68 [doi]
- Discretization in gene expression data analysis: a selected surveyPriyakshi Mahanta, Hasin Afzal Ahmed, Jugal K. Kalita, Dhruba Kumar Bhattacharyya. 69-75 [doi]
- Low profile printed antenna array for LTE/WWAN with low SART. Thomas, Y. V. B. Reddy, A. M. Prasad, K. Veeraswamy. 76-80 [doi]
- Network module extraction with positive and negative co-regulationT. A. Rahman, D. K. Bhattacharyya. 81-87 [doi]
- A framework for the description, discovery and composition of RESTful semantic web servicesDavis John, M. S. Rajasree. 88-93 [doi]
- Enhancement of job allocation in private Cloud by distributed processingSoumen Kanrar. 94-98 [doi]
- A framework for response-awaiting-service migration in Ubiquitous ComputingIrene Antony Tharayil, M. S. Rajasree. 99-104 [doi]
- Efficient strategy for co-ordinated multirobot explorationSonali Patel, Anupam Shukla, Ritu Tiwari. 105-111 [doi]
- A high-level Fortran interface to parallel matrix algebraMartin Roderus, Alexei V. Matveev, Hans-Joachim Bungartz. 112-119 [doi]
- Trust based secure multipath OLSR routing protocol in MANET using fuzzy theoryS. Geetha, G. Geetha Ramani. 120-125 [doi]
- Elicitation of Security requirements for E-Health system by applying Model Oriented Security Requirements Engineering (MOSRE) FrameworkP. Salini, S. Kanmani. 126-131 [doi]
- Efficient feature fusion, selection and classification technique for Plant Leaf Image Retrieval systemN. Valliammal, S. N. Geethalakshmi. 132-137 [doi]
- Fault tolerance: case studyAbbas Mohammed, Roshan Kavuri, Niraj Upadhyaya. 138-144 [doi]
- Enhancing the security of digital Video Watermarking using watermark encryptionUjan Mukhopadhyay, Souptik Sinha, Poulomi Ghosh, Rilok Ghosh, Dipak Kr. Kole, Aruna Chakroborty. 145-150 [doi]
- On Watson-Crick automataK. G. Subramanian, S. Hemalatha, Ibrahim Venkat. 151-156 [doi]
- Efficient content-based indexing of sequential data with bitmapsRitambhra Korpal. 157-164 [doi]
- Some new properties of lists and a framework of a list theoretic relation modelB. K. Tripathy, S. S. Gantayat. 165-170 [doi]
- Exploring routing with multiple Quality of Service parameters in High-Speed NetworksMonika Jena, Ajay Rana. 171-174 [doi]
- A special purpose integer factorization algorithmChinniah Porkodi, Muthusamy Nagarathnam, Ramalingam Arumuganathan. 175-181 [doi]
- W-PAC: an efficient weighted partitioning around cluster head mechanism for ad hoc networkS. Thirumurugan, E. George Dharma Prakash Raj. 182-188 [doi]
- A re-usability approach to ontology constructionAyesha Banu, Syeda Sameen Fatima, Khaleel Ur Rahman Khan. 189-193 [doi]
- A DDoS attack detection mechanism based on protocol specific traffic featuresHirak Jyoti Kashyap, D. K. Bhattacharyya. 194-200 [doi]
- Geographic routing used in MANET for black hole detectionM. Shobana, R. Saranyadevi, S. Karthik. 201-204 [doi]
- Finite state machine optimization in FPGAsR. Uma, P. Dhavachelvan. 205-211 [doi]
- Low frequency keyword and keyphrase extraction from meeting transcripts with sentiment classification using unsupervised frameworkJ. I. Sheeba, K. Vivekanandan. 212-216 [doi]
- An MRA based image fusion method for sanctuary based on NCSangeeta Gupta, Sujoy Bhattacharya, S. Hemanth Chowdary. 217-222 [doi]
- A novel colorImage steganography using Discrete Wavelet TransformS. Hemalatha, U. Dinesh Acharya, A. Renuka, Priya R. Kamath. 223-226 [doi]
- Continuous Speech Recognition system for Tamil language using monophone-based Hidden Markov ModelV. Radha, C. Vimala, M. Krishnaveni. 227-231 [doi]
- Statistical Normalization techniques for the prediction of COD level for an anaerobic wastewater treatment plantR. Vijayabhanu, V. Radha. 232-236 [doi]
- Performance enhancement for variable block optimization in FGPA synthesis processR. Uma, P. Dhavachelvan. 237-243 [doi]
- Binarization in Magnetic Resonance Images (MRI) of human head scans with intensity inhomogeneityK. Somasundaram, T. Genish. 244-247 [doi]
- Survey of caching and replica placement algorithm for content distribution in Peer to Peer overlay networksAnna Saro Vijendran, S. Thavamani. 248-252 [doi]
- Detecting epileptic seizures using Electroencephalogram: a novel technique for seizure classification using Fast Walsh-Hadamard Transform and Hybrid Extreme Learning MachineG. Geetha. 253-260 [doi]
- Swarm optimization and Flexible Neural Tree for microarray data classificationAruchamy Rajini, Vasantha Kalyani David. 261-268 [doi]
- Graphical method to find optimal cluster centroid for two-variable linear functions of concept-drift categorical dataK. Reddy Madhavi, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju, C. N. Rau. 269-274 [doi]
- Optimized feature extraction and actionable knowledge discovery for Customer Relationship Management (CRM)P. Senthil Vadivu, Vasantha Kalyani David. 275-282 [doi]
- An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithmR. S. Ramya, S. Priyadarshini, S. Karthik. 283-287 [doi]
- An efficient digital mammogram image classification using DTCWT and SVMS. Deepa, V. Subbiah Bharathi. 288-293 [doi]
- Agent based memory management framework for a multi processor environmentK. R. Sarath Chandran, S. Aiswarya, R. Kavitha, T. Suganthi Krishnavathi. 294-300 [doi]
- Survey of cyber crime activities and preventive measuresP. Ramesh, D. Maheswari. 301-305 [doi]
- Automatic brain portion segmentation from T1 and T2-weighted coronal MRI of head scans using Bond Number and Block Truncation methodK. Somasundaram, K. Ezhilarasan. 306-310 [doi]
- Text classification using symbolic similarity measureB. S. Harish, S. Manjunath, D. S. Guru. 311-314 [doi]
- Business workflow growth rate analysis using cellular automataM. Thirumaran, P. Dhavachelvan, D. Aishwarya. 315-321 [doi]
- Synthesis optimization by redesigning FPGA architecture for area-speed optimizationR. Uma, P. Dhavachelvan. 322-327 [doi]
- A survey of techniques for human detection in static imagesT. Santhanam, C. P. Sumathi, S. Gomathi. 328-336 [doi]
- Design of 9-transistor single bit full adderManoj Kumar. 337-340 [doi]
- An application of PCA to rank problem partsK. M. George. 341-345 [doi]
- Image fusion using Bi-dimensional Empirical Mode Decomposition for salt and pepper noise removal in digital imagesM. Prema Kumar, P. Rajesh Kumar. 346-351 [doi]
- Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMVAditya Sinha, Ajay Ry, Sanjay Singh. 352-357 [doi]
- A study on human gait analysisSaman Shahid, Anup Nandy, Soumik Mondal, Maksud Ahamad, Pavan Chakraborty, Gora Chand Nandi. 358-364 [doi]
- Formal verification of the Extensible Authentication Protocol using SPINManu S. Hegde, Hk Jnanamurthy, Sanjay Singh. 365-371 [doi]
- Audio steganography using LSB encoding technique with increased capacity and bit error rate optimizationSangita Roy, Jyotirmayee Parida, Avinash Kumar Singh, Ashok Singh Sairam. 372-376 [doi]
- an approach for mobile device securityM. Sujithra, G. Padmavathi. 377-381 [doi]
- Multimodal pattern-oriented software architecture for self-configuration and self-healing in autonomic computing systemsVishnuvardhan Mannava, T. Ramesh. 382-389 [doi]
- Information Gain Clustering through Prototype-Embedded Genetic K-Mean Algorithm (IGCPGKA): a novel heuristic approach for personalisation of cold start problemMohd Abdul Hameed, S. Ramachandram, Omar Al Jadaan. 390-395 [doi]
- Cross-layer IDS for Rushing attack in Wireless Mesh NetworksK. Ganesh Reddy, P. Santhi Thilagam, Bommena Nageswara Rao. 396-400 [doi]
- A Service Configuration and Composition Design Pattern for autonomic computing systems using Service Oriented ArchitectureVishnuvardhan Mannava, T. Ramesh. 401-407 [doi]
- Storing XML rules in relational storage of XML DTDA. A. Abd El-Aziz, A. Kannan. 408-412 [doi]
- A fuzzy based trustworthy route selection method using LSRP in wireless sensor networks (FTRSP)Arpita Chakraborty, Arnab Raha, Shovan Maity, Mrinal Kanti Naskar, Anupam Karmakar. 413-419 [doi]
- Context similarity measure using Fuzzy Formal Concept AnalysisK. Selvi, R. M. Suresh. 420-426 [doi]
- K-Means with Bi-dimensional Empirical Mode Decomposition for segmentation of microarray imageJ. Harikiran, M. Phanendra, N. N. Swamy, P. V. Lakshmi, R. Kiran Kumar. 427-433 [doi]
- An efficient hybrid algorithm to evolve an Awale playerRandle Oluwarotimi Abayomi. 434-438 [doi]
- Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architectureSanjit Kumar Dash, Debi Pr. Mishra, Ranjita Mishra, Sweta Dash. 439-443 [doi]
- An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protectionN. Sasirekha, M. Hemalatha. 444-451 [doi]
- Format based photo forgery image detectionS. Murali, Govindraj B. Chittapur, H. S. Prabhakara. 452-457 [doi]
- Comparative & Evaluative QA system in tourism domainPinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay. 458-465 [doi]
- Ontological student profileAyesha Ameen, Khaleel Ur Rahman Khan, B. Padmaja Rani. 466-471 [doi]
- Cancer data investigation using variable precision Rough set with flexible classificationSanjiban Sekhar Roy, Anupam Gupta, Anvesha Sinha, Rohit Ramesh. 472-475 [doi]
- K-level based transmission range scheme to alleviate energy hole problem in WSNK. Thanigaivelu, K. Murugan. 476-483 [doi]
- Recent frequent itemsets mining over data streamsS. Pramod, O. P. Vyas. 484-489 [doi]
- Risk chain prediction metrics for predicting fault proneness in object oriented systemsN. Rajasekhar Reddy, Surya Bahadur, K. R. K. Sateesh. 490-496 [doi]
- Edge detection by combined canny filter with scale multiplication & ant colony optimizationT. I. Manish, D. Murugan, T. Ganesh Kumar. 497-500 [doi]
- Performance of detecting defects in textile fabric using Gabor Wavelet with statistical and Morphological filtersS. Anitha, V. Radha. 501-504 [doi]
- Structure based drug design studies on urokinase plasminogen activator inhibitors using AutoDockM. Naresh Babu, R. Bhramaramba, Allam Appa Rao. 505-507 [doi]
- A M2MC based approach for mapping two ADL modelsSai Bharath Kadati, K. K. Baseer, A. Rama Mohan Reddy, C. Shoba Bindu. 508-516 [doi]
- Real time recognition of pedestrian and vehicles from videosS. Gokul, G. Santhosh Kumar, M. Sreeraj. 517-523 [doi]
- A comparative study of two formal specification languages: Z-notation & B-methodArvinder Kaur, Samridhi Gulati, Sarita Singh. 524-531 [doi]
- Polymorphic worms detection using Extended PolyTreeA. Uzma Jabrooth, B. Parvathavarthini. 532-538 [doi]
- Efficient method for feature extraction on video preocessingR. Revathi, M. Hemalatha. 539-543 [doi]
- Performance analysis of decomposition techniques in multilevel secure relational database systemsPooja Sapra, Suresh Kumar, R. K. Rathy. 544-549 [doi]
- Face recognition using facial symmetryAvinash Kumar Singh, G. C. Nandi. 550-554 [doi]
- Reduct generation of microarray dataset using rough set and graph theory for unsupervised learningAsit Kumar Das, Soumen Kumar Pati, Saikat Chakrabarty. 555-561 [doi]
- An ECC based public key infrastructure usable for mobile applicationsSangram Ray, G. P. Biswas. 562-568 [doi]
- Complex-valued neural network using simultaneous perturbation with dynamic tunneling techniqueM. Sornam, P. Thangavel. 569-574 [doi]
- Stationary wavelet transform based audio authentication techniqueTanmay Bhattacharya, Sirshendu Hore, Nilanjan Dey, S. R. Bhadra Chaudhuri. 575-579 [doi]
- Perceptive analysis of query by singing system through query excerptionTrisiladevi C. Nagavi, Nagappa U. Bhajantri. 580-586 [doi]
- An empirical study on various text classifiersB. S. Harish, Ramya M. Hegde, N. Neeti, M. Meghana. 587-593 [doi]
- Feature based classification of dysfluent and normal speechP. Mahesha, D. S. Vinod. 594-597 [doi]
- Web opinion mining for social networking sitesBishas Kaur, Aarpit Saxena, Sanjay Singh. 598-605 [doi]
- An extensive empirical study of feature terms selection for text summarization and categorizationSuneetha Manne, S. Sameen Fatima. 606-613 [doi]
- Interoperability issues in Web ServicesKalpana Johari, Arvinder Kaur. 614-619 [doi]
- Design and development of a desktop monitoring systemVikram Kumar Santhalia, Sanjay Singh. 620-625 [doi]
- A new deferred cleansing technique for effective warehousing of RFIDA. Anny Leema, M. Hemalatha. 626-631 [doi]
- A new approach of voice conversion based on the GMM modelA. Guerid, A. Houacine. 632-636 [doi]
- Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of imagesK. Praveen, Prabaharan Poornachandran, A. S. Remya Ajai. 637-641 [doi]
- Word category disambiguation for malayalam: a language model approachT. Dinesh, V. Jayan, V. K. Bhadran. 642-646 [doi]
- Authenticity check to provide trusted platform in MANET (ACTP)Renu Dalal, Manju Khari, Yudhvir Singh. 647-655 [doi]
- HTB based packet scheduler for cloud computingSoumya Antony, Simy Antony, A. S. Ajeena Beegom, M. S. Rajasree. 656-660 [doi]
- Online handwritten character recognition for MalayalamAmritha Sampath, C. Tripti, V. Govindaru. 661-664 [doi]
- Improved k- means clustering algorithm for two dimensional dataRupali Vij, Suresh Kumar. 665-670 [doi]
- Implementation of Least Significant Bit Steganography and statistical steganalysisV. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy. 671-675 [doi]
- Fast novel image reconstruction Algorithm using Adaptive R-tree based segmentation and Linear Bivariate SplinesAnshul Sood, Monish Kaul, Rajesh Siddavatam. 676-682 [doi]
- Correlation power analysis attack of AES on FPGA using customized communication protocolN. Nalla Anandakumar, S. Dillibabu. 683-688 [doi]
- Dynamic Prefix Caching of videos with Lazy UpdateGaurav Aggarwal, Gaurav Kumar, Divyashikha Sethia. 689-693 [doi]
- Empirical study of Software Quality estimationInderpreet Kaur, Arvinder Kaur. 694-700 [doi]
- A cross layer based reliable route metric for Mobile Ad hoc NetworksGaurav Bhatia, Vivek Kumar. 701-705 [doi]
- Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDVKamaljit Kaur, Gaurav Raj. 706-710 [doi]
- Delay-bounded utility-based event detection in energy harvesting sensor networksYingchi Mao. 711-716 [doi]
- A new methodology for diagnosis of appendicitis using sonographic images in image miningBalu Ramu, Devi Thirupathi. 717-721 [doi]
- Decoding robustness performance comparison for QR and data matrix codeRishabh Kulshreshtha, Ayushi Kamboj, Sanjay Singh. 722-731 [doi]
- Virtualization of virtual memory address spaceNatarajan Meghanathan. 732-737 [doi]
- Estimation of component reusability by identifying quality attributes of component: a fuzzy approachAman Jatain, Deepti Gaur. 738-742 [doi]
- 1 frequency using model based design toolsKota Solomon Raju, Y. Pratap, Virendra Patel, S. M. M. Naidu, Amit Patwardhan, P. Bhanu Prasad. 743-748 [doi]
- Secure transmission of authenticated messages using new encoding scheme and SteganographyKalavathi Alla, G. Gowri Shankar, G. Bala Subrahmanyam. 749-752 [doi]
- A fair spectrum sharing approach in Cognitive Radio NetworksLeila Yousefi. 753-759 [doi]
- Secure message authentication using true random number generator based on Signcryption scheme using ECCAlka Aman, Rajeev G. Vishwakarma. 760-765 [doi]
- Secure image authentication by distibuted source coding using LDPC encodingBrajesh kumar, Anand Rajavat. 766-769 [doi]
- Design and development of an effective ball catching robotic arm with 3DOFKartik Sharma, Gianetan Singh Sekhon. 770-777 [doi]
- Prioritized Height Balanced tree with entropy to find hidden rulesMohd Mahmood Ali, Mohd S. Qaseem, Lakshmi Rajamani, A. Govardhan. 778-784 [doi]