Abstract is missing.
- Grid Computing: Tenfold Acceleration on the Internet/GridsFrank Zhigang Wang. 1-2 [doi]
- Microwave High Power Amplifiers for Satellite CommunicationRaghuvir Tomar. 3 [doi]
- Throwing of Objects: A New Technology for Factory AutomationHeinz Frank. 4-5 [doi]
- A Fast Method for Detection of Video Shot Boundaries Using Compressed Domain Features of H.264 for PVR Enabled Set Top Boxes: A Novel ApproachTanushyam Chattopadhyay, Ayan Chaki, Utpal Garain. 6-11 [doi]
- An Ultra Wide-Band VCO Using MOS Varactor in 0.35µm SiGe BiCMOS TechnologyH. Mokari, Abbas Ali Lotfi Neyestanak, G. Zandkarimi. 12-16 [doi]
- Refine Crude Corpus for Opinion MiningDebnath Bhattacharyya, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay, Tai-Hoon Kim. 17-22 [doi]
- Dynamic Path Selection Algorithm for Bene-NetworksAmitabha Chakrabarty, Martin Collier, Sourav Mukhopadhyay. 23-28 [doi]
- Rank-Based Genetic Algorithm with Limited Iteration for Grid SchedulingWael Abdulal, Omar Al Jadaan, Ahmad Jabas, S. Ramachandram, Mustafa Kaiiali, C. Raghavendra Rao. 29-34 [doi]
- Integration of Artificial Intelligence and Database Management System: An Inventive Approach for Intelligent DatabasesNeelu Nihalani, Sanjay Silakari, Mahesh Motwani. 35-40 [doi]
- An Application of OPC Data Interaction in the Bag Filter Monitor SystemChao Pan, Qing Wang, Wanlin Gao, Ganghong Zhang, Xinlan Jiang, Wei Shao, Lina Yu. 41-44 [doi]
- Simulation of Coordinating Sniffer Robots for Building Odor MapsNiket Tandon, A. Karthik, Shardul Singh Rana, P. Venkata Krihsna. 45-50 [doi]
- Engineering Case Studies Using Parameterless Penalty Non-dominated Ranked Genetic AlgorithmOmar Al Jadaan, Ahmad Jabas, Wael Abdulal, Lakshmi Rajamani, Essa Zaiton, C. Raghavendra Rao. 51-56 [doi]
- Solar Energy Harvesting for Wireless Sensor NetworksP. T. V. Bhuvaneswari, R. Balakumar, Vijay Vaidehi, P. Balamuralidhar. 57-61 [doi]
- Analog Multiplier with High AccuracyK. Diwakar, C. Senthilpari, Ajay Kumar Singh, Way-Soong Lim. 62-66 [doi]
- An Approach for Interpretation of MEMS Data for Gesture Based Man Machine Interaction in Advanced Set-top BoxTanushyam Chattopadhyay, Soumali Roychowdhury, Mita Nasipuri. 67-72 [doi]
- A New Approach to Task Allocation in Wireless Sensor Actor NetworksHossein Momeni, Mohsen Sharifi, Saeed Sedighian. 73-78 [doi]
- An Eifficient Method for Generating Coherent Digital Sweep SignalsAshraf Samarah, Mohammad Al-Ibrahim, Otmar Loffeld. 79-85 [doi]
- Transmission of Data Using Distinct Intensity Levels in IR RadiationsViranjay M. Srivastava, Nitish Paliwal, Anupam Chahar. 86-89 [doi]
- Fuzzy-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor NetworksAmjad Osmani, Mehdi Dehghan, H. Pourakbar, Payam Emdadi. 90-95 [doi]
- Touch Sensor Assembly Using Infrared Radiations and its ApplicationsVanita Rana, Nitish Paliwal, Anupam Chahar. 96-98 [doi]
- Channel Guard in ROADM NetworksAnuj Malik, Sanjay Choudhary. 99-101 [doi]
- A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor NetworksSushil Kumar Jain, Kumkum Garg. 102-107 [doi]
- Primary Interference Suppression in Secondary Underlay Transmission Using Direct Sequence Spread SpectrumShadi Ebrahimi Asl, Bahman Abolhassani. 108-113 [doi]
- PAPR Reduction for OFDM Scheme by New Partial Transmit Sequence Technique in Wireless Communication SystemsPankaj Kumar Sharma, R. K. Nagaria, T. N. Sharma. 114-118 [doi]
- Wireless System for Monitoring Environmental Variables of Rain Shelter House (RSH)Saiful Farhan M. Samsuri, Robiah Ahmad, Mohamed Hussein, A. Rahman Abdul Rahim. 119-124 [doi]
- Wireless Sensor Network Based Industrial Monitoring & Diagnostic SystemSumeet Gupta, Shekhar Verma, Geetam S. Tomar, Raj Abrol. 125-130 [doi]
- Self-Protection Strategies in WSN Using Geometrical Arrays of Directional Antennas and Incremental RSSI MeasumentsMario Limon Mendoza, Victor Hugo Zárate Silva. 131-136 [doi]
- Evaluation of Self-Organization Architecture for Special WSN Using Geometrical Arrays of NodesMario Limon Mendoza, Victor Hugo Zárate Silva. 137-142 [doi]
- Distributed Energy Efficient Key Distribution for Dense Wireless Sensor NetworksAbhishek Goyal, Navdeep Kaur, Padmavati, Kuldeep, Rammurthy Garimella. 143-148 [doi]
- MAIL: Multi-Hop Adaptive Iterative Localization for Wireless Sensor NetworksS. Kotwal, Shekhar Verma, Geetam S. Tomar, Raj Abrol. 149-154 [doi]
- Electrical Model Simulation for a UHF RFID SystemSara Abou Chakra, Usamah O. Farrukh, Beatriz Amante Garcia. 155-159 [doi]
- RFID Tracking System for Vehicles (RTSV)Anala Aniruddha Pandit, Jyot Talreja, Ankit Kumar Mundra. 160-165 [doi]
- RFID Assisted Vehicular Communication SystemsChirawat Kotchasarn. 166-171 [doi]
- Simplified Application of the IEC 61850 for Distributed Energy ResourcesHeinz Frank, Sidonia Mesentean, Friederich Kupzog. 172-177 [doi]
- A Survey for Designing Attack Resilient and Adaptive Medium Access Control Protocol for Wireless NetworksPiyush Kumar Shukla, Sanjay Silakari, S. S. Bhadouria, Shikha Sharma. 178-183 [doi]
- An Adaptive Medium Access Control Protocol for Computer NetworkPiyush Kumar Shukla, Sanjay Silakari, S. S. Bhadouria, Kavindra Raghuvanshi, Mitesh Bargadiya. 184-189 [doi]
- Joint Radio Resource Management for HSDPA and WiMAX NetworksHesham Mahmoud El Sawy, Hesham Mohamed El Badawy, Khaled Ali Shehata. 190-195 [doi]
- Multi-Objective Optimization of NARX Model for System Identification Using Genetic AlgorithmSayed Mohammad Reza Loghmanian, Robiah Ahmad, Hishamuddin Jamaluddin. 196-201 [doi]
- Utilization of SIP Contact Header for Reducing the Load on Proxy Servers in FoIP ApplicationKetan J. Sarvakar, Kiran R. Amin, Rajendra J. Patel, Menka Patel, Komal A. Maheta, Bhavesh P. Patel. 202-206 [doi]
- C^3 Semantics Modeling-DynamicsJohn Ronczka. 207-212 [doi]
- On Prediction Accuracy of Machine Learning Algorithms for Characterizing Shared L2 Cache Behavior of Programs on Multicore ProcessorsJitendra Kumar Rai, Atul Negi, Rajeev Wankar, K. D. Nayak. 213-219 [doi]
- Saksham: Customizable x86 Based Multi-Core Microprocessor SimulatorAmol Vasudeva, Arvind Kumar Sharma, Ashish Kumar. 220-225 [doi]
- Performance Improvement of Wi-Max IEEE 802.16e in Presence of Different FEC CodesShraddha Bansal, Raksha Upadhyay. 226-229 [doi]
- A Comparative Study between Two Parameter Estimators for the Synthesis of an Electrical Machine Default Detection MechanismSondess Ben Aoun, Nabil Derbil. 230-234 [doi]
- Experimental Analysis of Different Metrics (Object-Oriented and Structural) of SoftwareLalji Prasad, Aditi Nagar. 235-240 [doi]
- An Architecture for Mobile Social Networking ApplicationsJuwel Rana, Johan Kristiansson, Josef Hallberg, Kåre Synnes. 241-246 [doi]
- A Design of Sensor Web Registry for Wireless Sensor Networks with SOA ApproachKamlendu Kumar Pandey, S. V. Patel. 247-252 [doi]
- Models and Transformations in MDAYashwant Singh, Manu Sood. 253-258 [doi]
- Classification Rule Mining for Object Oriented Databases: A Brief ReviewAjita Satheesh, Durgesh Kumar Mishra, Ravindra Patel. 259-263 [doi]
- Design of 1.3 GHz Microstrip Highpass Filter Using Optimum Distributed Short Circuited StubsSubodh Kumar Singhal, Deepak Sharma, Ram Mehar Singh Dhariwal. 264-267 [doi]
- Design of 1.5 GHz Quasilumped Microstrip Highpass FilterDeepak Sharma, Subodh Kumar Singhal, Ram Mehar Singh Dhariwal. 268-270 [doi]
- Prioritization of Scenarios Based on UML Activity DiagramsSapna P. G., Hrushikesha Mohanty. 271-276 [doi]
- Design & Development of Small Linux Operating System for Browser Based Digital Set Top BoxLalit Kumar, Rajesh Kushwaha, Rishi Prakash. 277-281 [doi]
- Dynamic Interaction Analysis of Soil and End Bearing Pile Using Boundary Element Model Coupled with Finite Element ModelPaulus Karta Wijaya. 282-287 [doi]
- Enhanced Authentication Mechanism for Next Generation NetworksMamdouh Gouda, Mohamed Haggag. 288-295 [doi]
- Content-Split Based Effective String-Matching for Multi-Core Based Intrusion Detection SystemsSubramanian Neelakantan, Shrisha Rao. 296-301 [doi]
- Hybrid Spam E-mail FilteringRonald Bhuleskar, Anoop Sherlekar, Anala Pandit. 302-307 [doi]
- A Single Sign-On Model for Web Services Based on Password SchemeLata Kiran, Sandeep K. Sood, Kuldip Singh. 308-313 [doi]
- Shielding against SQL Injection Attacks Using ADMIRE Modelsupriya madan. 314-320 [doi]
- Information Security Risk Assessment in Healthcare: The Experience of an Italian Paediatric HospitalMichele Bava, Domenico Cacciari, Edoardo Sossa, Daniel Zotti, Riccardo Zangrando. 321-326 [doi]
- Correcting Noise in Block CiphersNabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed. 327-331 [doi]
- Design of a Private Credentials Scheme Based on Elliptic Curve CryptographyAditi Yoganand Athavale, Kuldip Singh, Sandeep K. Sood. 332-335 [doi]
- Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion DetectionRaghavan Muthuregunathan, S. Siddharth, R. Srivathsan, S. R. Rajesh. 336-341 [doi]
- An Ethical Way of Image Encryption Using ECCKamlesh Gupta, Sanjay Silakari, Ranu Gupta, Suhel A. Khan. 342-345 [doi]
- Synthetic Aperture Radar Image Processing Based on Piecewise Linear MappingNavneet Agrawal, K. Venugopalan. 346-350 [doi]
- Amplitude Phase Algorithm for SAR Signal ProcessingNavneet Agrawal, K. Venugopalan. 351-356 [doi]
- Probability Based Search Motion Estimation AlgorithmDeepak J. Jayaswal, Mukesh A. Zaveri. 357-362 [doi]
- A New Fast Radix-2 Decimation-in-Frequency Algorithm for Computing the Discrete Hartley TransformGautam Abhaychand Shah, Tejmal Saubhagyamal Rathore. 363-368 [doi]
- Orthogonal Hermite Pulses for Indoor Communication with UWB (S-V) ChannelJoanne Newton Gomes, B. K. Mishra. 369-373 [doi]
- Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission SchemeDebnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim. 374-379 [doi]
- Cyclostationarity-Based Spectrum Sensing for Analog TV and Wireless Microphone SignalsAlfateh M. Alhassan Mossa, Varun Jeoti. 380-385 [doi]
- Adaptive Classified Vector Quantisation of Non-orthogonal Representations of Images and its Application to Image CompressionAbir Jaafar Hussain, Dhiya Al-Jumeily, Paulo J. G. Lisboa. 386-391 [doi]
- Compressed Domain Image Retrieval Using Thumbnails of ImagesVidya R. Khapli, Anjali S. Bhalchandra. 392-396 [doi]
- Multiple Subgroup Data Compression Technique Based on Huffman CodingPiyush Kumar Shukla, Pradeep Rusiya, Deepak Agrawal, Lata Chhablani, Balwant Singh Raghuwanshi. 397-402 [doi]
- Image Clustering Using Color and TextureManish Maheshwari, Sanjay Silakari, Mahesh Motwani. 403-408 [doi]
- High Immunity Triple Channelized Correlation ReceiverMamdouh Gouda. 409-413 [doi]
- Detection and Classification of Moving Objects by Using Real Time Traffic Flux through Differential and Graphical AnalysisH. Mohana, M. Ashwathakumar, G. Shivkumar, K. C. Manjunatha. 414-419 [doi]
- Pseudonym Based Mechanism for Sustaining Privacy in VANETsBrijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar, S. M. Bhaskar. 420-425 [doi]
- Agent Based Replica Placement in a Data Grid EnvironementShaik Naseera, K. V. Madhu Murthy. 426-430 [doi]
- Reducing Feed-Forward Neural Network Processing Time Utilizing Matrix Multiplication Algorithms on Heterogeneous Distributed SystemsAli Kattan, Rosni Abdullah, Rosalina Abdul Salam. 431-435 [doi]
- A Communication-Centric Embedded System Architecture (ACCESA)Radha Guha. 436-441 [doi]
- PASE: P2P Network Based Academic Search and File Sharing ApplicationAmol Vasudeva, J. Sandeepan, Nitin Kumar. 442-447 [doi]
- Semantic Similarity Based Focused CrawlingMehdi Ravakhah, Mohsen Kamyar. 448-453 [doi]
- Fuzzy Two Time-scale Congestion Control AlgorithmMehdi Mohtashamzadeh, Mohsen Soryani, Mahmood Fathy. 454-458 [doi]
- Toward the Intelligent Web SystemsRadha Guha. 459-463 [doi]
- Design of Energy Efficient Scheme for Conducting Secure E-Class Application on MANETEkta Verma, Jibi Abraham, Snehlata Yadav. 464-469 [doi]
- A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc NetworksKrishnan Kumar, J. Nafeesa Begum, V. Sumathy. 470-475 [doi]
- Remote Surveillance System over MANETK. Kathiravan, J. Bathrun, R. Manju, R. Darshana. 476-481 [doi]
- Throughput Enhancement of Multi-hop Static Ad-hoc Networks through Concurrent TransmissionRajesh Verma, Arun Prakash, Rajeev Tripathi, Neeraj Tyagi. 482-485 [doi]
- A Class of ANFIS Based Channel Equalizers for Mobile Communication SystemsK. C. Raveendranathan. 486-491 [doi]
- Call Admission Control Approaches in Beyond 3G Networks Using Multi Criteria Decision MakingH. S. Ramesh Babu, Gowrishankar, P. S. Satyanarayana. 492-496 [doi]
- User Centric Quality of Experience Testing for Video on Demand over IMSAlhad Kuwadekar, Khalid Al-Begain. 497-504 [doi]
- Multimedia Transmission over Wireless LANsK. Kathiravan, R. Ramya, Tinu Sara Titus. 505-510 [doi]
- Performance Evaluation Techniques for Mobile Communication SystemsRanjeet Singh Tomar, Geetam Singh Tomar. 511-515 [doi]