Abstract is missing.
- An efficient and modified median root prior based framework for PET/SPECT reconstruction algorithmShailendra Tiwari, Rajeev Srivastava. 1-6 [doi]
- Frequent block access pattern-based replication algorithm for cloud storage systemsT. Ragunathan, Mohammed Sharfuddin. 7-12 [doi]
- Pruned search: A machine learning based meta-heuristic approach for constrained continuous optimizationRuoqian Liu, Ankit Agrawal, Wei-keng Liao, Alok N. Choudhary, Zhengzhang Chen. 13-18 [doi]
- Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domainAshok Kumar Yadav, Rajesh Mehta, Raj Kumar. 19-24 [doi]
- Task behaviour inputs to a heterogeneous multiprocessor schedulerAniruddha Banerjee, Sharan Kumar Allur, Syam Prasad Kuncha. 25-29 [doi]
- Online anomaly detection via class-imbalance learningChandresh Kumar Maurya, Durga Toshniwal, Gopalan Vijendran Venkoparao. 30-35 [doi]
- A workload balanced approach for resource scheduling in cloud computingRitu Kapur. 36-41 [doi]
- Extracting academic social networks among conference participantsTasleem Arif, M. Asger, Majid Bashir Malik, Rashid Ali. 42-47 [doi]
- User verification using safe handwritten passwords on smartphonesTobias Kutzner, Fanyu Ye, Ingrid Bonninger, Carlos M. Travieso, Malay Kishore Dutta, Anushikha Singh. 48-53 [doi]
- Real cepstrums on electroencephalogram biometric identificationMarcos del Pozo-Baños, Carlos M. Travieso, Jaime Roberto Ticay-Rivas, Jesús B. Alonso, Malay Kishore Dutta, Anushikha Singh. 54-58 [doi]
- Automatic classification of frogs calls based on fusion of features and SVMJuan J. Noda Arencibia, Carlos M. Travieso, David Sánchez-Rodríguez, Malay Kishore Dutta, Garima Vyas. 59-63 [doi]
- DNA compression using referential compression algorithmKanika Mehta, Satya Prakash Ghrera. 64-69 [doi]
- An efficient DCT based image watermarking scheme for protecting distribution rightsGaurav Gupta, Amit Mahesh Joshi, Kanika Sharma. 70-75 [doi]
- Cluster based load balancing in cloud computingSurbhi Kapoor, Chetna Dabas. 76-81 [doi]
- Leveraging probabilistic segmentation to document clusteringArko Banerjee. 82-87 [doi]
- An image processing based method to identify and grade conjunctivitis infected eye according to its types and intensityJoydeep Tamuli, Aishwarya Jain, Aaishwarya V. Dhan, Anupama Bhan, Malay Kishore Dutta. 88-92 [doi]
- Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphsAbhishek Jatram, Bhaskar Biswas. 93-96 [doi]
- Designing chaos based strong substitution boxMusheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar. 97-100 [doi]
- Energy conservation and collision avoidance by controlled access protocol in WSNGurkiran Kaur, Rajan Miglani, Gurjot Singh Gaba, Ruchi Pasricha. 101-105 [doi]
- Identifying gamakas in Carnatic musicHarsh M. Vyas, Suma S. M., Shashidhar G. Koolagudi, Guruprasad K. R.. 106-110 [doi]
- Highly advanced cloudlet scheduling algorithm based on Particle Swarm OptimizationDeepika Saxena, Shilpi Saxena. 111-116 [doi]
- Reconstructing h-convex binary images from its horizontal and vertical projections by simulated annealingDivyesh Patel, Tanuja Srivastava. 117-121 [doi]
- Hand written digit recognition system for South Indian languages using artificial neural networksLeo Pauly, Rahul D. Raj, Binu Paul. 122-126 [doi]
- Identification of allied raagas in Carnatic musicPrithvi Upadhyaya, Suma S. M., Shashidhar G. Koolagudi. 127-131 [doi]
- Feature analysis for mispronounced phonemes in the case of alvoelar approximant (/r/) substituted with voiced dental consonant (/∂/)Pravin B. Ramteke, Shashidhar G. Koolagudi, Arun Prabhakar. 132-137 [doi]
- Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zoneSiddharth Gulati, Abhinav Rastogi, Manish K. Thakur. 138-143 [doi]
- Background and skin colour independent hand region extraction and static gesture recognitionPrakhar Mohan, Shreya Srivastava, Garvita Tiwari, Rahul Kala. 144-149 [doi]
- Comparison of various metrics used in collaborative filtering for recommendation systemAnuranjan Kumar, Sahil Gupta, S. K. Singh, K. K. Shukla. 150-154 [doi]
- Novel fuzzy clustering algorithm for fuzzy dataVijyant Agarwal. 155-161 [doi]
- Prediction of click frauds in mobile advertisingMayank Taneja, Kavyanshi Garg, Archana Purwar, Samarth Sharma. 162-166 [doi]
- Inverse analysis of a radial porous fin using genetic algorithmSrikumar Panda, Ranjan Das. 167-170 [doi]
- Feature selection using Artificial Bee Colony algorithm for medical image classificationVartika Agrawal, Satish Chandra. 171-176 [doi]
- A Scientometric analysis of computer science research in IndiaKhushboo Singhal, Sumit Kumar Banshal, Ashraf Uddin, Vivek Kumar Singh 0001. 177-182 [doi]
- Line based extraction of important regions from a cheque imagePrabhat Dansena, K. Pramod Kumar, Rajarshi Pal. 183-189 [doi]
- Identification of gait parameters from silhouette imagesChandra Prakash, Anshul Mittal, Rajesh Kumar, Namita Mittal. 190-195 [doi]
- Human perception based criminal identification through human robot interactionAvinash Kumar Singh, Neha Baranwal, Gora Chand Nandi. 196-201 [doi]
- A linear antenna array failure detection using Bat AlgorithmNarwant Singh Grewal, Munish Rattan, Manjeet Singh Patterh. 202-207 [doi]
- Detection of design pattern using Graph Isomorphism and Normalized Cross CorrelationPrayasee Pradhan, Ashish Kumar Dwivedi, Santanu Kumar Rath. 208-213 [doi]
- Improved recognition rate of language identification system in noisy environmentRandheer Bagi, Jainath Yadav, K. Sreenivasa Rao. 214-219 [doi]
- Multi-stage children story speech synthesis for HindiHarikrishna D. M., Gurunath Reddy M., K. Sreenivasa Rao. 220-224 [doi]
- Analysis and modeling pauses for synthesis of storytelling speech based on discourse modesParakrant Sarkar, K. Sreenivasa Rao. 225-230 [doi]
- Secure data transmission using videoNikita Lemos, Kavita Sonawane, Bidisha Roy. 231-234 [doi]
- Enhanced heuristic approach for Traveling Tournament Problem based on Grey Wolf OptimizerDaya Gupta, Chand Anand, Tejas Dewan. 235-240 [doi]
- Exploring sentiment analysis on twitter dataManju Venugopalan, Deepa Gupta. 241-247 [doi]
- Image based sub-second fast fully automatic complete cardiac cycle left ventricle segmentation in multi frame cardiac MRI images using pixel clustering and labellingVinayak Ray, Ayush Goyal. 248-252 [doi]
- Robust language identification using Power Normalized Cepstral CoefficientsArup Kumar Dutta, K. Sreenivasa Rao. 253-256 [doi]
- Firefly inspired feature selection for face recognitionVandana Agarwal, Surekha Bhanot. 257-262 [doi]
- Analysis and modification of spectral energy for neutral to sad emotion conversionArijul Haque, K. Sreenivasa Rao. 263-268 [doi]
- Smartphone-based colorimetric detection to measure Blood Glucose LevelsSarthak Singhal, Prabhat Ralhan, Nishtha Jatana. 269-274 [doi]
- Cloud detection in all sky ConCam images by Gaussian fitting and valley detection in histogramTushar Jadhav, Aditi Kotibhaskar. 275-278 [doi]
- A comparative gender based evaluation of e-commerce website: A hybrid MCDM approachOshin Anand, Praveen Ranjan Srivastava. 279-284 [doi]
- Emotion analysis of Twitter using opinion miningAkshi Kumar, Prakhar Dogra, Vikrant Dabas. 285-290 [doi]
- ANPR Indian system using surveillance camerasAjay Kumar Singh, Souvik Roy. 291-294 [doi]
- Extraction, summariz ation and sentiment analysis of trending topics on TwitterSrishti Sharma, Kanika Aggarwal, Palak Papneja, Saheb Singh. 295-301 [doi]
- Design of large-scale Content-based recommender system using hadoop MapReduce frameworkS. Saravanan. 302-307 [doi]
- Reduction of congestion and signal waiting timePalki Gupta, Lasit Pratap Singh, Anoop Khandelwal, Kavita Pandey. 308-313 [doi]
- A compact monopole wideband antenna for WiMAX/WLAN/BLUETOOTH/IEEE 802.11y servicesAbhinav Duhan, Bhupendra Singh, Mohd Zayed, Haneet Rana, Gagan Tiwari, Sanjeev Yadav. 314-317 [doi]
- Performance enhancement of distributed K-Means clustering for big Data analytics through in-memory computationShwet Ketu, Sonali Agarwal. 318-324 [doi]
- Privacy preservation and content protection in location based queriesGreeshma Sarath, Megha Lal S. H. 325-330 [doi]
- Congestion control for self similar traffic in wireless sensor networkArpan Kumar Dubey, Adwitiya Sinha. 331-335 [doi]
- A system for compound adverbs MWEs extraction in HindiRakhi Joon, Archana Singhal. 336-341 [doi]
- Neutral to happy emotion conversion by blending prosody and laughterGurunath Reddy M., K. Sreenivasa Rao. 342-347 [doi]
- Dynamic facial emotion recognition from 4D video sequencesSuja P, Kalyan Kumar V. P, Shikha Tripathi. 348-353 [doi]
- An improved approach to English-Hindi based Cross Language Information Retrieval systemEva Katta, Anuja Arora. 354-359 [doi]
- VISORV: Board reading, getting directions through Marker Detection for partially visually impaired peopleAkriti Saini, Nishank Bhatia, Vikas Saxena. 360-364 [doi]
- Human identification using Linear Multiclass SVM and Eye Movement biometricsNamrata Srivastava, Utkarsh Agrawal, Soumava Kumar Roy, U. S. Tiwary. 365-369 [doi]
- Implementing security technique on generic databaseGaurav Dubey, Vikram Khurana, Shelly Sachdeva. 370-376 [doi]
- Pruned feature space for metamorphic malware detection using Markov BlanketJithu Raphel, P. Vinod. 377-382 [doi]
- Heterogeneous feature space for Android malware detectionVarsha M. V, P. Vinod, Dhanya K. A. 383-388 [doi]
- Removing occlusion using even odd interlacing for efficient class room teachingVikas Saxena, Ananya, Juhi Shukla. 389-392 [doi]
- Collaborative teaching in large classes of computer science coursesSanjay Goel, Suma Dawn, G. Dhanalekshmi, Hema N, Sandeep Kumar Singh, Sanchika Gupta, Taj Alam, Prashant Kaushik, Kashav Ajmera. 397-403 [doi]
- Geometric shape drawing using a 3 link planar manipulatorAnil Kumar, Rahul Kala. 404-409 [doi]
- Unified approach for Performance Evaluation and Debug of System on Chip at early design phaseNishit Gupta, Sunil Alag. 410-415 [doi]
- All your Google and Facebook logins are belong to us: A case for single sign-offVaibhav Rastogi, Ankit Agrawal. 416-421 [doi]
- Stochastic model for lifetime improvement of wireless sensor nodeAnuradha Pughat, Vidushi Sharma. 422-427 [doi]
- Priority based congestion control in WBANSapna Gambhir, Vrisha Tickoo, Madhumita Kathuria. 428-433 [doi]
- A novel leakage reduction DOIND approach for nanoscale domino logic circuitsAmbika Prasad Shah, Vaibhav Neema, Shreeniwas Daulatabad. 434-438 [doi]
- DocTool - a tool for visualizing software projects using graph databaseAashik Sadar, Vinitha Panicker J. 439-442 [doi]
- A new paradigm of human gait analysis with KinectAnup Nandy, Pavan Chakraborty. 443-448 [doi]
- Development of a prototype to detect speed limit violation for better traffic managementJoyeeta Goswami, Shirsha Ghosh, Shivaditya Katiyar, Alak Majumder. 449-454 [doi]
- Modeling of DG-Tunnel FET for low power VLSI circuit designSunil Kumar, Balwinder Raj. 455-458 [doi]
- Enhanced page Reclaim for Android devicesBalakrishnan Jayavel, Subbaramaiah Mandava, Jyoti Johri. 459-462 [doi]
- Significance of Clustering Coefficient over Jaccard IndexAnand Kumar Gupta, Neetu Sardana. 463-466 [doi]
- Content aware targeted image manipulation to reduce power consumption in OLED panelsPrafulla K. Choubey, Ashish K. Singh, Raghu B. Bankapur, Vaisakh P. C. SB, Manoj Prabhu B. 467-471 [doi]
- Logging method for high execution frequency paths of Linux kernelKrishna Kishor Jha. 472-475 [doi]
- Characterizing impacts of multi-Vt routers on power and reliability of Network-on-ChipRuby Ansar, Prachi Upadhyay, Manish Singhal, Ashish Sharma, Manoj Singh Gaur. 476-480 [doi]
- Behavior analysis of malware using machine learningArshi Dhammi, Maninder Singh. 481-486 [doi]
- An extension of FMAP for joint actionsAmar Nath, Rajdeep Niyogi. 487-492 [doi]
- Explicit Throughput and Buffer Notification based congestion control: A cross layer approachTapas Kumar Mishra, Sachin Tripathi. 493-497 [doi]
- A GPU based implementation of Needleman-Wunsch algorithm using skewing transformationAnuj Chaudhary, Deepkumar Kagathara, Vibha Patel. 498-502 [doi]
- Two phase sinusoidal power clocked quasi-static adiabatic logic familiesP. Sasipriya, V. S. Kanchana Bhaaskaran. 503-508 [doi]
- Investigating syntactic and semantic inconsistencies in Collaborative Software DevelopmentRitu Arora, Sanjay Goel. 509-515 [doi]
- An efficient undeniable signature scheme using braid groupsPratik Ranjan, Hari Om. 516-520 [doi]
- A cost effective Sign Language to voice emulation systemVidur S. Bhatnagar, Rachit Magon, Rashi Srivastava, Manish K. Thakur. 521-525 [doi]
- Analysis and algebraic construction of S-Box for AES algorithm using irreducible polynomialsBhoopal Rao Gangadari, Shaik Rafi Ahamed. 526-530 [doi]
- Test scenario selection for concurrency testing from UML modelsMahesh Shirole, Rajeev Kumar. 531-536 [doi]
- Analysis of the improved knapsack cipherAshish Jain, Narendra S. Chaudhari. 537-541 [doi]
- N-Hop broadcast and Street Broadcast Reduction algorithm using OMNeT++ and Google Earth pluginDeepti Agarwal, Sagar Anand Sharma, Kavita Pandey. 542-547 [doi]
- Consistency of Java run-time behavior with design-time specificationsSwaminathan Jayaraman, Dinoop Hari, Bharat Jayaraman. 548-554 [doi]
- BNSR: Border Node preferred Social Ranking based Routing Protocol for VANETsBhuvan Mehan, Sanjay Batish, Rajesh Bhatia, Amardeep Dhiman. 555-560 [doi]
- Mitigation of desynchronization attack during inter-eNodeB handover key management in LTEPavan Kumar Reddy K, B. R. Chandavarkar. 561-566 [doi]