Abstract is missing.
- An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Tasks in Multiprocessor System Using Hybrid Quantum-Inspired Genetic AlgorithmDebanjan Konar, Kalpana Sharma, Sri Raj Pradhan, Sital Sharma. 3-11 [doi]
- Equitable Machine Learning Algorithms to Probe Over P2P BotnetsPavani Bharathula, N. Mridula Menon. 13-21 [doi]
- Directed Search-based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor EnvironmentSneha Shriya, R. S. Sharma, Saurav Sumit, Sonu Choudhary. 23-31 [doi]
- JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP ClassifiersSagnik Banerjee, Debjyoti Ghosh, Subhadip Basu, Mita Nasipuri. 35-42 [doi]
- Molecular Computing and Residual Binding Mode in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer MetastasisArundhati Banerjee, Sujay Ray. 43-55 [doi]
- SVM-Based Pre-microRNA Classifier Using Sequence, Structural, and Thermodynamic ParametersK. A. Sumaira, A. Salim, Vinod S. S. Chandra. 57-67 [doi]
- DCoSpect: A Novel Differentially Coexpressed Gene Module Detection Algorithm Using Spectral ClusteringSumanta Ray, Sinchani Chakraborty, Anirban Mukhopadhyay 0001. 69-77 [doi]
- Intelligent Topological Differential Gene NetworksMrityunjay Sarkar, Aurpan Majumder. 79-93 [doi]
- Impact of Threshold to Identify Vocal TractSoumen Kanrar. 97-105 [doi]
- Application of Compressed Sensing in Cognitive RadioNaveen Kumar, Neetu Sood. 107-117 [doi]
- Compressed Sensing-Based NBI Mitigation in Ultra-WideBand Energy DetectorPriyanka G. Patil, Gajanan K. Birajdar. 119-128 [doi]
- A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer SensorYajnaseni Dash, Sanjay Kumar Dubey, V. K. Patle. 131-140 [doi]
- Mining and Ranking Association Rules in Support, Confidence, Correlation, and Dissociation FrameworkSubrata Datta, Subrata Bose. 141-152 [doi]
- Mining Closed Interesting Subspaces to Discover Conducive Living Environment of Migratory AnimalsSirisha G. N. V. G., Shashi M.. 153-166 [doi]
- Frequent Patterns Mining from Data Cube Using Aggregation and Directed GraphKuldeep Singh, Harish Kumar Shakya, Bhaskar Biswas. 167-177 [doi]
- A Modified Parallel Thinning Method for Handwritten Oriya Character ImagesSoumen Bag, Glory Chawpatnaik. 181-189 [doi]
- Offline Signature Verification Using Artificial Neural NetworkChandra Subhash, Maheshkar Sushila, Srivastava Kislay. 191-200 [doi]
- A Simple and Effective Technique for Online Handwritten Bangla Character RecognitionShibaprasad Sen, Ram Sarkar, Kaushik Roy. 201-209 [doi]
- Visual Analytic-Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion FrameworkSk Md Obaidullah, Chayan Halder, Nibaran Das, Kaushik Roy 0004. 211-219 [doi]
- Offline Writer Identification from Isolated Characters Using Textural FeaturesChayan Halder, Sk Md Obaidullah, Kaushik Roy 0004. 221-231 [doi]
- PWDB_13: A Corpus of Word-Level Printed Document Images from Thirteen Official Indic ScriptsSk Md Obaidullah, Chayan Halder, Nibaran Das, Kaushik Roy 0004. 233-242 [doi]
- Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate ConstraintDipayan Guha, Provas Kumar Roy, Subrata Banerjee. 245-257 [doi]
- Optimal Allocation of Distributed Generator Using Chemical Reaction OptimizationSneha Sultana, Santanu Roy, Provas Kumar Roy. 259-272 [doi]
- A Novel Combined Approach of k-Means and Genetic Algorithm to Cluster Cultural Goods in Household BudgetSara Sadat Babaie, Omid Mahdi Ebadati E., Tohid Firoozan. 273-283 [doi]
- A PSO with Improved Initialization Operator for Solving Multiple Sequence Alignment ProblemsRohit Kumar Yadav, Haider Banka. 285-294 [doi]
- Profit Maximization of TSP with Uncertain Parameters Through a Hybrid AlgorithmAditi Khanra, Manas Kumar Maiti, Manoranjan Maiti. 295-314 [doi]
- Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless NetworksShrikant V. Sonekar, Manali M. Kshirsagar. 317-328 [doi]
- Service Provisioning Middleware for Wireless Sensor NetworkS. Sasirekha, S. Swamynathan. 329-343 [doi]
- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor NetworkSonu Choudhary, R. S. Sharma, Sneha Shriya. 345-354 [doi]
- 2-Dimensional 2-Dot 1-Electron Quantum Cellular Automata-Based Dynamic Memory DesignMili Ghosh, Debarka Mukhopadhyay, Paramartha Dutta. 357-365 [doi]
- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular AutomataNeeraj Kumar Misra, Subodh Wairya, Vinod Kumar Singh. 367-378 [doi]
- Design of a Logically Reversible Half Adder Using 2D 2-Dot 1-Electron QCAKakali Datta, Debarka Mukhopadhyay, Paramartha Dutta. 379-389 [doi]
- Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal FormAsma R. Shora, M. Afshar Alam, Ranjit Biswas. 393-404 [doi]
- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related AlgorithmsSumonta Ghosh, Sujit Das. 405-412 [doi]
- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision MakingDebashish Malakar, Sulekha Gope, Sujit Das. 413-423 [doi]
- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-Fuzzy CoefficientsSamir Maity, Arindam Roy, Manoranjan Maiti. 425-440 [doi]
- A Novel Multi-Criteria Multi-Agent-Based Routing Strategy Based on Tarantula Mating BehaviorSusmita Bandyopadhyay, Arindam Kumar Chanda. 443-453 [doi]
- A Tree Based Multicast Routing Protocol Using Reliable Neighbor Node for Wireless Mobile Ad-Hoc NetworksAjay Kumar Yadav, Sachin Tripathi. 455-465 [doi]
- Traffic Grooming in Hybrid Optical-WiMAX Mesh NetworksDeepa Naik, Soumyadeb Maity, Tanmay De. 467-477 [doi]
- Host-Based Intrusion Detection Using Statistical ApproachesSunil Kumar Gautam, Hari Om. 481-493 [doi]
- Secure Remote Login Scheme with Password and Smart Card Update FacilitiesRajeev Kumar, Ruhul Amin, Arijit Karati, G. P. Biswas. 495-505 [doi]
- Generation and Risk Analysis of Network Attack GraphKeshav Prasad, Santosh Kumar, Anuradha Negi, Aniket Mahanti. 507-516 [doi]
- Unsupervised Spam Detection in Hyves Using SALSAMohit Agrawal, R. Leela Velusamy. 517-526 [doi]
- Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information SystemsSandip Roy, Santanu Chatterjee. 527-537 [doi]
- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature SelectionNavaneeth Kumar Kanakarajan, Kandasamy Muniasamy. 539-547 [doi]
- Sentiment Analysis with Modality ProcessingSurabhi Jain, Louella Mesquita Colaco, Okstynn Rodrigues. 551-558 [doi]
- Query-Based Extractive Text Summarization for SanskritSiddhi Barve, Shaba Desai, Razia Sardinha. 559-568 [doi]
- Code Obfuscation by Using Floating Points and Conditional StatementsChandan Kumar Behera, D. Lalitha Bhaskari. 569-578 [doi]
- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional EncryptionSumit Jaiswal, Subhash Chandra Patel, Ravi Shankar Singh. 579-585 [doi]
- Digital Image Watermarking Scheme Based on Visual Cryptography and SVDAjay Kumar Mallick, Priyanka, Sushila Maheshkar. 589-598 [doi]
- Compression of Hyper-Spectral Images and Its Performance EvaluationK. Subhash Babu, K. K. Thyagharajan, V. Ramachandran. 599-609 [doi]
- Hand Gesture Recognition for Sign Language: A Skeleton ApproachY. H. Sharath Kumar, V. Vinutha. 611-623 [doi]
- Modified Cuckoo Search-Based Image EnhancementLalit Maurya, Prasant Kumar Mahapatra, Garima Saini. 625-634 [doi]
- A Novel Iterative Salt-and-Pepper Noise Removal AlgorithmAmiya Halder, Sayan Halder, Samrat Chakraborty. 635-643 [doi]
- Queuing Model for Improving QoS in Cloud Service DiscoveryV. Viji Rajendran, S. Swamynathan. 647-656 [doi]
- Adaptive Multilayer Routing for Incremental Design of an SoCDebasri Saha. 657-665 [doi]
- Analyzing and Modeling Spatial Factors for Pre-decided Route Selection Behavior: A Case Study of Fire Emergency Vehicles of Allahabad CityMainak Bandyopadhyay, Varun Singh. 667-676 [doi]
- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers: EvaluationArchana Sreekumar, V. Radhamani Pillay. 677-689 [doi]
- A Multiagent Planning Algorithm with Joint ActionsSatyendra Singh Chouhan, Rajdeep Niyogi. 691-699 [doi]
- 4-Directional Combinatorial Motion Planning Via Labeled Isotonic Array P SystemWilliams Sureshkumar, Raghavan Rama. 701-709 [doi]
- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table-Based MPPT Algorithm to Overcome Wind and Grid DisturbancesD. V. N. Ananth, G. V. Nagesh Kumar. 711-725 [doi]