Abstract is missing.
- Segmentation of three phase micrograph: an automated approachSiddhartha Banerjee, Subhabrata Datta, Biplab Paul, Sanjoy Kumar Saha. 1-4 [doi]
- A new model for performance evaluation of denoising algorithms based on image quality assessmentPriyanka Srivastava, Prateek Gupta, Satyam Bhardwaj, Vikrant Bhateja. 5-10 [doi]
- Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequencesYuri L. Borissov, Moon Ho Lee. 11-16 [doi]
- An attempt to ensure security of payload by targeting non-linear seed pixel positions in carrier imageSabyasachi Samanta, Saurabh Dutta, Gautam Sanyal. 17-20 [doi]
- Song/instrumental classification using spectrogram based contextual featuresArijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dhara, Sanjoy Kumar Saha. 21-25 [doi]
- A log-ratio based unsharp masking (UM) approach for enhancement of digital mammogramsSiddharth, Rohit Gupta, Vikrant Bhateja. 26-31 [doi]
- A comparative evaluation of various de-speckling algorithms for medical imagesSonam Singh, Akshat Jain, Vikrant Bhateja. 32-37 [doi]
- SVD and PCA features for ANN based detection of diabetes using retinopathyArchana Deka, Kandarpa Kumar Sarma. 38-41 [doi]
- Removal of random-valued impulse noise using overcomplete DCT dictionaryBhabesh Deka, Dipranjan Baishnab. 42-46 [doi]
- Vision based method for object classification and multiple human activity recognition in video survelliance systemAlok Kumar Singh Kushwaha, Maheshkumar H. Kolekar, Ashish Khare. 47-52 [doi]
- Image segmentation using rough set based k-means algorithmAmiya Halder, Avijit Dasgupta. 53-58 [doi]
- A secure approach for SMS in GSM networkNeetesh Saxena, Narendra S. Chaudhari. 59-64 [doi]
- A versatile denoising method for images contaminated with Gaussian noiseAkshat Jain, Vikrant Bhateja. 65-68 [doi]
- Image retrieval system based on feature extraction and relevance feedbackD. N. D. Harini, Dhavala Lalitha Bhaskari. 69-73 [doi]
- Circular sector DCT based feature extraction for enhanced face recognition using histogram based dynamic gamma intensity correctionR. Gagan, Hardik Sanghavi, S. Ramachandran, K. Manikantan. 74-81 [doi]
- Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing techniqueNaveen N. Murthy, R. Raghunandana, K. Manikantan, S. Ramachandran. 82-89 [doi]
- An analytical approach for column generation for one-dimensional cutting stock problemJaya Thomas, Narendra S. Chaudhari. 90-94 [doi]
- Astroid shaped DCT feature extraction for enhanced face recognitionR. Divya, Anwesha Rath, S. Ramachandran, K. Manikantan. 95-101 [doi]
- A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traitsMadhavi Gudavalli, S. Viswanadha Raju, K. S. M. V. Kumar. 102-107 [doi]
- Investigation on tracking system for real time video surveillance applicationsC. Kalaiselvan, A. SivananthaRaja. 108-112 [doi]
- Texture based decision tree classification for ArecanutAjit Danti, M. Suresha. 113-117 [doi]
- Speaker recognition in the case of emotional environment using transformation of speech featuresShashidhar G. Koolagudi, Shan E. Fatima, K. Sreenivasa Rao. 118-123 [doi]
- Iris recognition based security system using RFIDPankaj P. Chitte, J. G. Rana, Sachin Taware. 124-127 [doi]
- Optimized private information retrieval using graphics processing unit with reduced accessibilitySunil B. Mane, Sandip B. Bansode, Pradeep K. Sinha. 128-132 [doi]
- LDC-MAC: low latency DC-MAC protocol for wireless sensor networkSansar Singh Chauhan, M. M. Gore. 133-137 [doi]
- A novel energy efficient routing approach using multipath ring routing and clustering for WSNAnand Pandya, Mrudang Mehta. 138-143 [doi]
- A review of fault management system in wireless sensor networkSiba Mitra, Ajanta De Sarkar, Sarbani Roy. 144-148 [doi]
- An approach of beacon placement and beacon based routing towards mobile sink in WSNAvishek Mukhopadhyay, Sarbani Roy, Nandini Mukherjee. 149-154 [doi]
- Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: a surveyAbhineet Anand, Vikas Kumar Sihag, S. N. Gupta. 155-159 [doi]
- Design and study of VoIP model in cognitive radio network under different simulation platformsTamal Chakraborty, Iti Saha Misra, Salil Kumar Sanyal. 160-165 [doi]
- Performance of a LAN under different ethernet wiring standardsMohammad Wazid, Roshan Singh Sachan, R. H. Goudar. 166-172 [doi]
- Mobile number portability (MNP): service providers perspective (pros & cons)Milind Pande, Vishal Pawar. 173-176 [doi]
- Chirp Parameter Estimation - A New View Through FiltersPooja Soman, Shishir B. Sahay. 177-179 [doi]
- Regional study of telecom technology options for Indian rural education: with special reference to Vidarbha region, Maharashtra, IndiaMilind Pande, Neha Patel. 180-185 [doi]
- High capacity service provider design using GPMLS for IP next generation networksAshish Tanwer, Rishika Mehta, Tauqir Azam. 186-191 [doi]
- Design and verification of flexray to CAN protocol converter nodeR. Harish, L. Swarna Jyothi. 192-197 [doi]
- Energy efficient hybrid architecture and positioning of sensors in WSN for precision agricultureMilind Pande, N. K. Choudhari, Shantanu Pathak. 198-203 [doi]
- Periodic route selection for secure packet deliverySuman Sangwan, Parvinder Singh, R. B. Patel. 204-209 [doi]
- UIVH-algorithm for seamless mobility in heterogeneous wireless networkSuman Sangwan, Parvinder Singh, R. B. Patel. 210-215 [doi]
- Scaling service provider backbone using BGP confederations for next generation networksAshish Tanwer, Rishika Mehta, Tauqir Azam. 216-221 [doi]
- IP v6 secure tunneling mechanismSandeep Shiravale, Sumedha Sirsikar, Debajyoti Mukhopadhyay. 222-225 [doi]
- Rule based system to facilitate the immunity of HIV/AIDS patients using Ayurveda therapySeema Purohit, Krantee Jamdaade. 226-234 [doi]
- Training neural network with zero weight initializationSarfaraz Masood, Pravin Chandra. 235-239 [doi]
- Voice conversion using linear prediction coefficients and artificial neural networkSantosh Kumar Bharti, Shashidhar G. Koolagudi, K. Sreenivasa Rao, Ankur Choudhary, Binod Kumar. 240-245 [doi]
- Neural network based smart vision system for driver assistance in extracting traffic signpostsMeeta Kumar, Jayshree Ghorpade, V. Y. Kulkarni, Rajni Bedi. 246-251 [doi]
- Novel KNN-motivation-PSO and its application to image segmentationMadhumita Kedlaya, Harsha Bhatia, S. Ramachandran, K. Manikantan. 252-258 [doi]
- SOM based dimension reduction techniques for quaternary protein structure predictionSanyukta Chetia, Kandarpa Kumar Sarma. 259-262 [doi]
- Genetic algorithms: concepts, issues and a case study of grammar inductionHari Mohan Pandey, Anurag Dixit, Deepti Mehrotra. 263-271 [doi]
- SVM based Manipuri POS tagging using SVM based identified reduplicated MWE (RMWE)Kishorjit Nongmeikapam, Sivaji Bandyopadhyay. 272-277 [doi]
- Mood classification of Indian popular musicAniruddha M. Ujlambkar, Vahida Z. Attar. 278-283 [doi]
- Classifier Ensemble for Imbalanced Data Stream ClassificationAbhijeet Godase, Vahida Attar. 284-289 [doi]
- Off-line handwritten signature retrievalM. S. Shirdhonkar, Manesh Kokare. 290-293 [doi]
- Recurrent neural network based channel estimation technique for STBC coded MIMO system over Rayleigh fading channelParismita Gogoi, Kandarpa Kumar Sarma. 294-298 [doi]
- Recognition of Assamese phonemes using three different ANN structuresMousmita Sarma, Kandarpa Kumar Sarma. 299-302 [doi]
- ConSim: an enhanced semantic similarity measure to find the relationship between concepts in cross ontologyB. Saleena, S. K. Srivatsa. 303-307 [doi]
- Feature annotation for text categorizationYashodhara V. Haribhakta, Santosh Kalamkar, Parag Kulkarni. 308-313 [doi]
- Unsupervised topic detection model and its application in text categorizationYashodhara V. Haribhakta, Arti Malgaonkar, Parag Kulkarni. 314-319 [doi]
- Modeling BharataNatyam dance steps: art to SMartSangeeta Jadhav, Manish Joshi, Jyoti Pawar. 320-325 [doi]
- A comparative study of parametric coding and wavelet coding based feature extraction techniques in recognizing spoken wordsSonia Sunny, S. David Peter, K. Poulose Jacob. 326-331 [doi]
- CA based cost optimized PRNG for Monte-Carlo simulation of distributed computationArnab Mitra, Anirban Kundu. 332-337 [doi]
- Visualization of road segment for road analysis and designP. Wongthongtham, K. Siripun, P. Jitsangiam. 338-343 [doi]
- Multihop/direct forwarding for 3D wireless sensor networksPreety Sharma, Sansar Singh Chauhan, Sandeep Saxena. 344-349 [doi]
- Automated user interface testing for web applications and TestCompleteSamer Al-Zain, Derar Eleyan, Joy Garfield. 350-354 [doi]
- Prioritization of test scenarios derived from UML activity diagram using path complexityPreeti Kaur, Priti Bansal, Ritu Sibal. 355-359 [doi]
- Complexity metric for multidimensional models for data warehouseSushama Nagpal, Anjana Gosain, Sangeeta Sabharwal. 360-365 [doi]
- Conceptualizing a desktop environment for cognitively challenged peopleShiv Nath Kumar, Sagun Baijal, Leena Chourey, Aparna Ramamurthy, M. Sasikumar. 366-370 [doi]
- NLARE, a natural language processing tool for automatic requirements evaluationCarlos Huertas, Reyes Juárez-Ramírez. 371-378 [doi]
- Automatic detection of printf format string vulnerabilities in software applications using static analysisRadha Vedala, Simhadri Anil Kumar. 379-384 [doi]
- An empirical study to design an effective agile project management frameworkNitin Uikey, Ugrasen Suman. 385-390 [doi]
- Collaboration in software development: a spotlightRitu Arora, Sanjay Goel. 391-396 [doi]
- Phase wise effort estimation for software maintenance: an extended SMEEM modelJitender Choudhari, Ugrasen Suman. 397-402 [doi]
- Sustainable peer-based structure for content delivery networksAparup Khatua, Nabendu Chaki. 403-408 [doi]
- A service oriented life cycle model for educational information systemR. Kamatchi. 409-412 [doi]
- A collaborative framework for evaluation of run-time changes in enterprise web servicesM. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran. 413-418 [doi]
- Oryza Sativa) miRNAs and their potential targets against Rice Tungro Virus using various string matching algorithmsRamamani Tripathy, Debahuti Mishra, Rudra Kalyan Nayak. 419-423 [doi]
- gp) structure using computational approachAnurag Pal, Debahuti Mishra, Shruti Mishra, Sandeep Kumar Satapathy. 424-428 [doi]
- Classifying voice quality via pitch and spectral analysisJames Carmichael. 429-434 [doi]
- Overlapping repetitions in weighted sequenceAli Alatabbi, Maxime Crochemore, Costas S. Iliopoulos, Tewogboye A. Okanlawon. 435-440 [doi]
- Lyndon fountains and the Burrows-Wheeler transformAli Alatabbi, Maxime Crochemore, Jacqueline W. Daykin, Laurent Mouchard. 441-446 [doi]
- DFRS: a domain-based framework for representing semi-structured dataSupriya Chakraborty, Nabendu Chaki. 447-452 [doi]
- Rough-FS: a feature selection method for classification of gene expression data set using rough setRashmi Rekha Sahoo, Smita Prava Mishra, Debahuti Mishra. 453-458 [doi]
- Privacy-preserving deletion to generalization-based anonymous databaseDipalee Shah, Rajesh Ingle. 459-463 [doi]
- An efficient approach to identify n-wMVD for eliminating data redundancySangeeta Viswanadham, Vatsavayi Valli Kumari. 464-469 [doi]
- A survey of data mining applications in water quality managementPrasun Dutta, Rituparna Chaki. 470-475 [doi]
- Implementation of execution history in non-relational databases for feedback-guided job modelingSushan Chakraborty, Madhulina Sarkar, Nandini Mukherjee. 476-482 [doi]
- Prosumer management in socio-technical smart gridA. J. Dinusha Rathnayaka, Vidyasagar Potdar, Monica H. Ou. 483-489 [doi]
- Turnaround time based job scheduling algorithm in dynamic grid computing environmentMonika Choudhary, Sateesh Kumar Peddoju. 490-493 [doi]
- Association rule variation with respect to timeMonica H. Ou, Jérôme Maillot. 494-500 [doi]
- Emotion detection state of the artHaji Binali, Vidyasagar Potdar. 501-507 [doi]
- Alternative methodologies for automated grouping in education and researchLenuta Alboaie, Mircea-Florin Vaida, Diana Pojar. 508-513 [doi]
- Automated matchmaking of student skills and academic course requisitesManish Joshi, Lall Manoj, O. Olugbara Oludayo, Michael M. Modiba, Virendrakumar C. Bhavsar. 514-519 [doi]
- Using HMM for predicting response time of web servicesA. Vani Vathsala, Hrushikesha Mohanty. 520-525 [doi]
- Dental patient records maintenance on cloud computing using data protection modelGauri S. Bhange, Swapnaja R. Hiray. 526-531 [doi]
- Estimating makespan using double trust thresholds for workflow applicationsV. Santhosh Kumar Tangudu, Manoj Mishra. 532-536 [doi]
- TrustGK monitor: 'customer trust as a service' for the cloudGaurangkumar Khalasi, Minubhai Chaudhari. 537-543 [doi]
- 24X7X365: mobile cloud accessKhalid Mohiuddin, Asharul Islam, Aftab Alam, Awais Ali. 544-551 [doi]
- Load balancing and resource monitoring in cloudNitin S. More, Swapnaja R. Hiray. 552-556 [doi]
- Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computingHiren R. Patel, Dhiren Patel, Jagdish Chaudhari, Sachin Patel, Kaushik Prajapati. 557-560 [doi]
- A demand based fault tolerant file replication model for cloudsManu Vardhan, Nidhi Jain, Shakti Mishra, Dharmender Singh Kushwaha. 561-566 [doi]
- An optimal approach of load balancing for grid computingJagdish C. Patni, Nitin Trivedi, Om Prakash Pal, Pradeep Chauhan, Anubhav Sharma. 567-571 [doi]
- A catholic and enhanced study of temporal visual backchannel for dynamically changing events in SNs present in cloudsT. Bharat Kumar, C. Rajendra, A. Srilakshmi, Venu Madhav Kuthadi. 572-578 [doi]
- Situation recognition in sensor based environments using concept latticesSangeeta Mittal, Alok Aggarwal, S. L. Maskara. 579-584 [doi]
- A survey and taxonomy of symmetric key management schemes for wireless sensor networksSuman Bala, Gaurav Sharma, Anil K. Verma. 585-592 [doi]
- Software industry in Okinawa: the critical success factors for the Japanese BangaloreAtsushi Kato. 593-597 [doi]
- Implementing adaptive interfaces: a user model for the development of usability in interactive systemsAndres Mejia, Reyes Juárez-Ramírez, Sergio Inzunza, Rocio Valenzuela. 598-604 [doi]
- Model of knowledge management in an intelligent individual public transport to taxiDiego Edixon Rodriguez Segura, Victor Hugo Medina García. 605-610 [doi]
- Designing an ontology based domain specific web search engine for commonly used products using RDFSukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay. 612-617 [doi]
- The key cornerstones to successful B2C: a case study of an online grocer in ChinaJie Liu. 618-622 [doi]
- A ranking algorithm integrating vector space model with semantic metadataSaurabh Wadwekar, Debajyoti Mukhopadhyay. 623-628 [doi]
- Comparative study and analysis of web personalization frameworks of recommender systems for e-commerceSanjeev Kumar Sharma, Ugrasen Suman. 629-634 [doi]
- Service maps in XMLSupriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar. 635-640 [doi]
- A hybrid graph based framework for integrating information from RDF and topic map: a proposalShiladitya Munshi, Ayan Chakraborty, Debajyoti Mukhopadhyay. 641-646 [doi]
- HENRI: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internetSaurabh Deochake, Suresh Sarode, Shashank Kanth, Vidyasagar Potdar, Subhadip Chakraborty, Debajyoti Mukhopadhyay. 647-652 [doi]
- An approach to manage ontology dynamically based on web service composition requestsDebajyoti Mukhopadhyay, Archana Chougule. 653-658 [doi]
- Using private information retrieval protocol for an e-commerce applicationSunil B. Mane, Suraj T. Sawant, Pradeep K. Sinha. 659-663 [doi]
- Modeling collaborative task execution in social networksA. B. Sagar. 664-669 [doi]
- Item recommender system by incorporating metadata information into ternary semantic analysisAbhinav Kumar Gupta, Glitto Mathew. 670-675 [doi]
- e-learning recommender system for learners in online social networks through association retrievalPragya Dwivedi, Kamal K. Bharadwaj. 676-681 [doi]
- Visualizing semantic webMeera Mudholkar, Jagannath Aghav, Saloni Peswani, Härish Jädhäø, Seema Kela, S. K. Hiremath. 682-687 [doi]
- SEReleC# - C# implementation of SEReleC: a meta search engine based on combinatorial search and search keyword based link classificationVishwas Raval, Padam Kumar, Yogesh Kosta. 688-693 [doi]
- Dependability of social network groupsA. B. Sagar. 694-700 [doi]
- A clustering approach for structural k-anonymity in social networks using genetic algorithmVikas Kumar Sihag. 701-706 [doi]
- Personalization of mobile value added servicesMeera Narvekar, Rashmi Ravikumar, S. S. Mantha. 707-711 [doi]
- Modeling transparency and collaborativeness in distributed work groupsA. B. Sagar. 712-717 [doi]
- An efficient info-gain algorithm for finding frequent sequential traversal patterns from web logs based on dynamic weight constraintRahul Moriwal, Vijay Prakash. 718-723 [doi]
- Spam 2.0Vidyasagar Potdar, Farida Ridzuan, Jaipal Singh. 724-731 [doi]
- How much money do spammers make from your website?Pedram Hayati, Nazanin Firoozeh, Vidyasagar Potdar, Kevin Chai. 732-739 [doi]
- An improved anonymous authentication and key exchange schemeKyung-kug Kim, Myung-Hwan Kim. 740-743 [doi]
- Schur decomposition and dither modulation: an efficient and robust audio watermarking techniqueAnkur Choudhary, S. P. S. Chauhan, M. Afshar Alam, Safdar Tanveer. 744-748 [doi]
- DDoS detection and defense: client termination approachKumar Sourav, Debi Prasad Mishra. 749-752 [doi]
- GPUP. L. V. Vihari, Manoj Mishra. 753-758 [doi]
- Candidate-resolved online voting protocol using distributed ElGamal CryptosystemSandeep Singh, Priyanka Ahlawat. 759-763 [doi]
- Comparison of policy specification languages for access controlSarnali Saha, Asmita Nag. 764-770 [doi]
- Identifying spam e-mail based-on statistical header features and sender behaviorAziz Qaroush, Ismail M. Khater, Mahdi Washaha. 771-778 [doi]
- Trust evaluation in wireless ad hoc networks using fuzzy systemPallavi Khatri, S. Tapaswi, U. P. Verma. 779-783 [doi]
- Fuzzy based privacy preserving classification of data streamsP. Rajesh, G. Narasimha, Ch. Rupa. 784-788 [doi]
- Development and performance analysis of HPC based framework for cryptanalytic attacksDeepika Dutta Mishra, C. S. R. C. Murthy, Kislay Bhatt, A. K. Bhattacharjee, R. S. Mundada. 789-794 [doi]
- Defending against internet worms using honeyfarmPragya Jain, Anjali Sardana. 795-800 [doi]
- Specification and validation of enterprise information security policiesAnirban Sengupta, Chandan Mazumdar, Aditya Bagchi. 801-808 [doi]
- A two-phase quantitative methodology for enterprise information security risk analysisJaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik. 809-815 [doi]
- Weakness and simple improvement of anonymous mutual authentication protocol with link-layerHeasuk Jo, Seungjoo Kim, Dongho Won. 816-819 [doi]
- Detection of fixed length web spambot using REAL (read aligner)Mourad Elloumi, Pedram Hayati, Costas S. Iliopoulos, Solon P. Pissis, Arfaat Shah. 820-825 [doi]
- The changing nature of Spam 2.0Vidyasagar Potdar, Yan Like, Nazanin Firoozeh, Debajyoti Mukhopadhyay, Farida Ridzuan, Dhiren Tejani. 826-831 [doi]
- Watermarking technique for wireless multimedia sensor networks: a state of the artBambang Harjito, Vidyasagar Potdar, Jaipal Singh. 832-840 [doi]
- Design and simulation of adaptive PID controller powered by PWM signals to actuate DC motor drive system used in climbing robotSheetal Devidas Rathod, Kota Solomon Raju, S. A. Akbar. 841-846 [doi]
- Improving network security and design using honeypotsRitu Tiwari, Abhishek Jain. 847-852 [doi]
- Handling the Quality of Service for the data dissemination in Wireless Sensor NetworksVivek S. Deshpande, Jagdish B. Helonde, Vijay Wadhai, Vidyasagar Potdar, A. J. Dinusha Rathnayaka. 853-856 [doi]
- Enhancing performance of AODV against Black hole AttackRajesh Yerneni, Anil K. Sarje. 857-862 [doi]