Abstract is missing.
- Human Action Recognition Using Trajectory-Based Spatiotemporal DescriptorsChandni Dhamsania, Tushar Ratanpara. 1-9 [doi]
- Mathematical Modeling of Specific Fuel Consumption Using Response Surface Methodology for CI Engine Fueled with Tyre Pyrolysis Oil and Diesel BlendSaumil C. Patel, Pragnesh K. Brahmbhatt. 11-19 [doi]
- Ensemble Learning for Identifying Muscular Dystrophy Diseases Using Codon Bias PatternK. Sathyavikasini, M. S. Vijaya. 21-29 [doi]
- Basic Arithmetic Coding Based Approach to Compress a Character StringIpsita Mondal, Subhra J. Sarkar. 31-38 [doi]
- Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware DetectionAbhishek Bhattacharya, Radha Tamal Goswami. 39-49 [doi]
- Feature Optimality-Based Semi-supervised Face Recognition ApproachTaqdir, Renu Dhir. 51-68 [doi]
- Fuzzy-Based Algorithm for Resource AllocationGurpreet Singh Saini, Sanjay Kumar Dubey, Sunil Kumar Bharti. 69-77 [doi]
- Agreement-Based Interference-Aware Dynamic Channel Allocation in Cognitive Radio Network (CRN)Diksha, Poonam Saini. 79-88 [doi]
- Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud ComputingSurbhi Malik, Poonam Saini, Sudesh Rani. 89-97 [doi]
- Accent Recognition System Using Deep Belief Networks for Telugu Speech SignalsKasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman. 99-105 [doi]
- Text Document Classification with PCA and One-Class SVMB. Shravan Kumar, Vadlamani Ravi. 107-115 [doi]
- Data Mining Approach to Predict and Analyze the Cardiovascular DiseaseAnurag Bhatt, Sanjay Kumar Dubey, Ashutosh Kumar Bhatt, Manish Joshi. 117-126 [doi]
- A Hybrid Genetic Algorithm for Cell Formation Problems Using Operational TimeBarnali Chaudhuri, R. K. Jana, P. K. Dan. 127-134 [doi]
- Efficient and Parallel Framework for Analyzing the SentimentAnkur Sharma, Gopal Krishna Nayak. 135-145 [doi]
- Content-Aware Video Retargeting by Seam CarvingShrinivas D. Desai, Mahalaxmi Bhille, Namrata D. Hiremath. 147-157 [doi]
- Intelligence System Security Based on 3-D ImageK. Anish, N. Arpita, H. Nikhil, K. Sumant, S. Bhagya, S. D. Desai. 159-167 [doi]
- PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed NetworksKanaka Raju Gariga, A. Rama Mohan Reddy, N. Sambasiva Rao. 169-179 [doi]
- Evaluation of Barriers of Health Care Waste Management in India - A Gray Relational Analysis ApproachSuchismita Swain, Kamalakanta Muduli, Jitendra Narayan Biswal, Sushanta Tripathy, Tushar Kanti Panda. 181-188 [doi]
- Privacy-Preserving Association Rule Mining Using Binary TLBO for Data Sharing in Retail Business CollaborationG. Kalyani, M. V. P. Chandra Sekhara Rao, B. Janakiramaiah. 189-197 [doi]
- Performance Analysis of Compressed Sensing in Cognitive Radio NetworksNamburu Swetha, Panyam Narahari Sastry, Y. Rajasree Rao, G. Murali Divya Teja. 199-207 [doi]
- Robust Multiple Composite Watermarking Using LSB TechniqueS. Rashmi, Priyanka, Sushila Maheshkar. 209-217 [doi]
- FOREX Rate Prediction: A Hybrid Approach Using Chaos Theory and Multivariate Adaptive Regression SplinesDadabada Pradeepkumar, Vadlamani Ravi. 219-227 [doi]
- Gray Scale Image Compression Using PSO with Guided Filter and DWTNamrata Vij, Jagjit Singh. 229-240 [doi]
- Graph Partitioning MethodsTanvi Prabhu Dessai, Okstynn Rodrigues, Sonia Fernandes. 241-249 [doi]
- Smart and Accountable Water Distribution for Rural DevelopmentIshaani Priyadarshini, Jay Sarraf. 251-258 [doi]
- Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring ParametersSubhra J. Sarkar, Nabendu Kumar Sarkar, Ipsita Mondal. 259-266 [doi]
- Color Image Visual Cryptography Scheme with Enhanced SecurityPrachi Khokhar, Debasish Jena. 267-279 [doi]
- A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic SystemBabita Panda, Bhagabat Panda, P. K. Hota. 281-290 [doi]
- Fault Mitigation in Five-Level Inverter-Fed Induction Motor Drive Using Redundant CellB. Madhu Kiran, B. V. Sanker Ram. 291-301 [doi]
- A Web-of-Things-Based System to Remotely Configure Automated Systems Using a Conditional Programming ApproachDebajyoti Mukhopadhyay, Sourabh Saha, Rajdeep Rao, Anish Paranjpe. 303-311 [doi]
- On the Security of Chaos-Based Watermarking Scheme for Secure CommunicationMusheer Ahmad, Hamed D. Al-Sharari. 313-321 [doi]
- Neighborhood Topology to Discover Influential Nodes in a Complex NetworkChandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad. 323-332 [doi]
- Venn Diagram-Based Feature Ranking Technique for Key Term ExtractionNeelotpal Chakraborty, Sambit Mukherjee, Ashes Ranjan Naskar, Samir Malakar, Ram Sarkar, Mita Nasipuri. 333-341 [doi]
- Bangla Handwritten City Name Recognition Using Gradient-Based FeatureShilpi Barua, Samir Malakar, Showmik Bhowmik, Ram Sarkar, Mita Nasipuri. 343-352 [doi]
- Shortest Path Algorithms for Social Network StrengthsAmreen Ahmad, Tanvir Ahmad, Harsh Vijay. 353-361 [doi]
- Improvised Symbol Table StructureNarander Kumar, Shivani Dubey. 363-371 [doi]
- Digital Watermarking Using Enhanced LSB TechniqueNarander Kumar, Jaishree. 373-385 [doi]
- Fuzzy-Based Adaptive IMC-PI Controller for Real-Time Application on a Level Control LoopUjjwal Manikya Nath, Chanchal Dey, Rajani K. Mudi. 387-395 [doi]
- Face Recognition Using PCA and Minimum Distance ClassifierShalmoly Mondal, Soumen Bag. 397-405 [doi]
- A Soft Computing Approach for Modeling of Nonlinear Dynamical SystemsRajesh Kumar, Smriti Srivastava, J. R. P. Gupta. 407-415 [doi]
- Optimization of Workload Scheduling in Computational GridSukalyan Goswami, Ajanta Das. 417-424 [doi]
- Cloud Security and Jurisdiction: Need of the HourTamanna Jena, J. R. Mohanty. 425-433 [doi]
- A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image SegmentationSunanda Das, Sourav De. 435-443 [doi]
- Skill Set Development Model and Deficiency Diagnosis Measurement Using Fuzzy LogicSmita Banerjee, Rajeev Chatterjee. 445-454 [doi]
- A Study on Various Training Programmes and Their Effects Offered by the IT FirmsPattnaik Manjula, Pattanaik Balachandra. 455-463 [doi]
- Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc NetworkAshima Rout, Anurupa Kar, Srinivas Sethi. 465-474 [doi]
- A Secure and Lightweight Protocol for Mobile DRM Based on DRM Community Cloud (DCC)Hisham M. Alsaghier, Shaik Shakeel Ahamad, Siba K. Udgata, L. S. S. Reddy. 475-483 [doi]
- Cloud Based Malware Detection TechniqueSagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty. 485-495 [doi]
- Abnormal Network Traffic Detection Using Support Vector Data DescriptionJyostna Devi Bodapati, N. Veeranjaneyulu. 497-506 [doi]
- Real-Time Automotive Engine Fault Detection and Analysis Using BigData PlatformsYedu C. Nair, S. Sachin Kumar, K. P. Soman. 507-514 [doi]
- Load Flow Analysis of Distribution System Using Artificial Neural NetworksM. Suresh, T. S. Sirish, T. V. Subhashini, T. Daniel Prasanth. 515-524 [doi]
- An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-GrowthK. Divyavarma, M. Remya, G. Deepa. 525-532 [doi]
- Implementing Anti-Malware as Security-as-a-Service from CloudDeepak H. Sharma, C. A. Dhote, Manish M. Potey. 533-539 [doi]
- Recognize Online Handwritten Bangla Characters Using Hausdorff Distance-Based FeatureShibaprasad Sen, Ram Sarkar, Kaushik Roy 0004, Naoto Hori. 541-549 [doi]
- A Framework for Dynamic Malware Analysis Based on Behavior ArtifactsT. G. Gregory Paul, T. Gireesh Kumar. 551-559 [doi]
- Evaluation of Machine Learning Approaches for Change-Proneness Prediction Using Code SmellsKamaldeep Kaur, Shilpi Jain. 561-572 [doi]
- Snort Rule Detection for Countering in Network AttacksVenkateswarlu Somu, D. B. K. Kamesh, J. K. R. Sastry, S. N. M. Sitara. 573-583 [doi]
- Trust and Energy-Efficient Routing for Internet of Things - Energy Evaluation ModelCarynthia Kharkongor, T. Chithralekha, Reena Varghese. 585-597 [doi]
- READ - A Bangla Phoneme Recognition SystemHimadri Mukherjee, Chayan Halder, Santanu Phadikar, Kaushik Roy 0004. 599-607 [doi]
- Information Fusion in Animal Biometric IdentificationGopal Chaudhary, Smriti Srivastava, Saurabh Bhardwaj, Shefali Srivastava. 609-617 [doi]
- Small World Network Formation and Characterization of Sports NetworkParamita Dey, Maitreyee Ganguly, Priya Sengupta, Sarbani Roy. 619-627 [doi]
- UWB BPF with Notch Band for Satellite Communication Using Pseudo-Interdigital StructureYatindra Gaurav, R. K. Chauhan. 629-634 [doi]
- Finding Clusters of Data: Cluster Analysis in RTulika Narang. 635-640 [doi]
- A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm OptimisationSandipan Choudhuri, Nibaran Das, Mita Nasipuri. 641-651 [doi]
- Analysis of Pancreas Histological Images for Glucose Intolerance Identification Using Wavelet DecompositionTathagata Bandyopadhyay, Sreetama Mitra, Shyamali Mitra, Luis Miguel Rato, Nibaran Das. 653-661 [doi]
- A Systematic Review on Materialized View SelectionAnjana Gosain, Kavita Sachdeva. 663-671 [doi]
- SQLI Attacks: Current State and Mitigation in SDLCDaljit Kaur, Parminder Kaur. 673-680 [doi]
- Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional ModelAnjana Gosain, Rakhi Gupta. 681-691 [doi]
- Paving the Future of Vehicle Maintenance, Breakdown Assistance and Weather Prediction Using IoT in AutomobilesSowmya B. J, Chetan, D. Pradeep Kumar, K. G. Srinivasa. 693-702 [doi]
- Cognitive Architectural Model for Solving Clustering ProblemMeenakhi Sahu, Hima Bindu Maringanti. 703-710 [doi]
- Action Classification Based on Mutual Difference ScoreShamama Anwar, G. Rajamohan. 711-719 [doi]
- Preprocessing and Feature Selection Approach for Efficient Sentiment Analysis on Product ReviewsMonalisa Ghosh, Gautam Sanyal. 721-730 [doi]
- BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant NetworkAfreen Fatimah, Shri Rahul Johari. 731-739 [doi]
- Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNsMd. Khaja Mohiddin, V. B. S. Srilatha Indra Dutt. 741-751 [doi]
- An Automated Approach to Prevent Suicide in Metro StationsAnindya Mukherjee, Bavrabi Ghosh. 753-765 [doi]
- B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP PathsA. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, Manu R. Krishnan, P. Hrudya. 767-775 [doi]
- Active Steganalysis on SVD-Based Embedding AlgorithmP. P. Amritha, Rithu P. Ravi, M. Sethumadhavan. 777-785 [doi]
- Handwritten Mixed-Script Recognition System: A Comprehensive ApproachPawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri. 787-795 [doi]
- A Rule-Based Approach to Identify Stop Words for Gujarati LanguageRajnish M. Rakholia, Jatinderkumar R. Saini. 797-806 [doi]