Abstract is missing.
- An effective e-governance model for financial institutions in IndiaAnil G. Rao, Manish R. Joshi. 1-7 [doi]
- Sentiment dictionary for effective detection of web users' opinionK. M. Anil Kumar, Suresha. 8-15 [doi]
- Semantic broken link detection using structured tagging schemeVishnuprakash Puthiya Kovilakath, S. D. Madhu Kumar. 16-20 [doi]
- A novel framework for enterprise web services change managementM. Thirumaran, Dhavachelvan Ponnurangam, G. Naga Venkata Kiran, A. Divya. 21-27 [doi]
- Efficient evaluation of partial path queries over a XML compact storage structureSindhu Sudhakaran, Radha Senthilkumar. 28-32 [doi]
- Error encoding and decoding model over communication channel for synthesis of proteins from DNA sequencesPrajna Paramita Debata, Satyabrata Das, Debahuti Mishra, Sashikala Mishra, Kailash Shaw, Gayatri Mahapatro. 33-37 [doi]
- Finding gene coherent patterns using PATSUB+Hasin Afzal Ahmed, Priyakshi Mahanta, D. K. Bhattacharyya. 38-44 [doi]
- Detection and measurement of bimalleolar fractures using Harris cornerNilanjan Dey, Anamitra Bardhan Roy, Achintya Das. 45-51 [doi]
- CASH: context aware scheduler for HadoopK. Arun Kumar, Vamshi Krishna Konishetty, Kaladhar Voruganti, G. V. Prabhakara Rao. 52-61 [doi]
- Resource optimization for processing of stream data in data warehouse environmentM. Asif Naeem, Gillian Dobbie, Imran Sarwar Bajwa, Gerald Weber. 62-68 [doi]
- Evaluation of approaches for designing secure data warehouseIndu Singh, Manoj Kumar 0002. 69-73 [doi]
- Distributed frequent itemset mining framework for incremental data using MPI-style WSRF servicesHarish Verma, Durga Toshniwal, Sateesh Kumar Peddoju. 74-81 [doi]
- Detecting dependencies in an anonymized datasetSandeep Varma Nadimpalli, Valli Kumari Vatsavayi. 82-89 [doi]
- Dominators vs pure dominators on the accuracy of a classifier with a multi objective cultural algorithmSujatha Srinivasan, Sivakumar Ramakrishnan. 90-96 [doi]
- Sampling correctly for improving classification accuracy: a hybrid higher order neural classifier (HHONC) approachPrem Pujari Pati, Kaberi Das, Debahuti Mishra, Shruti Mishra, Lipismita Panigrahi. 97-101 [doi]
- An algorithm for fuzzy-based sentence-level document clustering for micro-level contradiction analysisR. Vasanth Kumar Mehta, B. Sankarasubramaniam, S. Rajalakshmi. 102-105 [doi]
- Far efficient K-means clustering algorithmBikram Keshari Mishra, Amiya Kumar Rath, Nihar Ranjan Nayak, Sagarika Swain. 106-110 [doi]
- A self learning rough fuzzy neural network classifier for mining temporal patternsR. Sethukkarasi, U. Keerthika, A. Kannan. 111-117 [doi]
- Clustering and classifying informative attributes using rough set theoryRudra Kalyan Nayak, Debahuti Mishra, Satyabrata Das, Kailash Shaw, Sashikala Mishra, Ramamani Tripathy. 118-123 [doi]
- Identification of optimal cluster centroid of multi-variable functions for clustering concept-drift categorical dataK. Reddy Madhavi, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju. 124-128 [doi]
- Identity anonymization and secure data storage using group signature in private cloudK. Govinda, Perla Ravitheja. 129-132 [doi]
- A framework for preserving privacy in cloud computing with user service dependent identitySyed Mujib Rahaman, Mohammad Farhatullah. 133-136 [doi]
- Scheduling using improved genetic algorithm in cloud computing for independent tasksPardeep Kumar, Amandeep Verma. 137-142 [doi]
- Pricing models and pricing schemes of IaaS providers: a comparison studyM. K. Mohan Murthy, H. A. Sanjay, J. P. Ashwini. 143-147 [doi]
- V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioningSathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen. 148-154 [doi]
- Authenticated and persistent skip graph: a data structure for cloud based data-centric applicationsT. P. Shabeera, Priya Chandran, S. D. Madhu Kumar. 155-160 [doi]
- Flexible power consumption management in smart homesAnandalakshmi Thevampalayam Kaliappan, Swamidoss Sathiakumar, Nandan Parameswaran. 161-167 [doi]
- A novel software system to facilitate better and easier communication for people with speaking disabilitiesUsha Banerjee, Gaurav Bora, Gaurav Batra, Ayush Agarwal. 168-173 [doi]
- Genetic algorithm based airlines booking terminal open/close decision systemAloysius George, B. R. Rajakumar, D. Binu. 174-179 [doi]
- Active machine learning technique for named entity recognitionAsif Ekbal, Sriparna Saha 0001, Dhirendra Singh. 180-186 [doi]
- FPGA based computing displacement of moving object in a real time videoKota Solomon Raju, Gargi Baruah, Manipati Rajesham, Palash Phukan. 187-192 [doi]
- Text extraction from videos using a hybrid approachA. Thilagavathy, K. Aarthi, A. Chilambuchelvan. 193-199 [doi]
- Object detection in video using Lorenz information measure and discrete wavelet transformC. Lakshmi Devasena, M. Hemalatha. 200-206 [doi]
- VLSI architectures for lifting based DWT: a detailed surveyUsha Bhanu Nageswaran, A. Chilambuchelvan. 207-214 [doi]
- Time based agent garbage collection algorithm for multicore architecturesG. Muneeswari, K. L. Shunmuganathan. 215-219 [doi]
- Formal verification methodology considerations for network on chipsBalaji Venu, Ashwani Singh. 220-225 [doi]
- Low power energy efficient pipelined multiply-accumulate architectureR. Sakthivel, K. Sravanthi, Harish M. Kittur. 226-231 [doi]
- Current differencing buffered amplifier an active element: a review of recent developmentsGagandeep Kaur, MOHAMMAD AYOUB KHAN. 232-236 [doi]
- Advanced adaptive call admission control for mobile cellular networks: cell breathing, load shedding and bandwidth degradationSatinder Singh Gill, Brent R. Petersen. 237-243 [doi]
- Evaluation of mobile games using playability heuristicsAditya Ponnada, Ajaykumar Kannan. 244-247 [doi]
- Tuning transmission opportunity (TXOP) limits for providing bit-based fairness in IEEE 802.11p V2I networksV. P. Harigovindan, Anchare V. Babu, Lillykutty Jacob. 248-254 [doi]
- Temporal characteristics of clustering in mobile ad hoc networkJyoti Prakash Singh, Paramartha Dutta, Amlan Chakrabarti. 255-261 [doi]
- A rate adaptive and multipath routing protocol to support video streaming in MANETsChhagan Lal, Vijay Laxmi, Manoj Singh Gaur. 262-268 [doi]
- Load balancer for energy efficient clustering protocol in MANETsR. Deepa, S. Swamynathan. 269-274 [doi]
- Wireless charging of lighting gadgets using low Q resonant couplingHema Ramachandran, G. R. Bindu. 275-278 [doi]
- Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANETSulata Mitra, Atanu Mondal. 279-286 [doi]
- A hybrid defense mechanism for DDoS attacks using cluster analysis in MANETP. Devi, A. Kannammal. 287-291 [doi]
- Modified weight function based network selection algorithm for 4G wireless networksAmali Chinnappan, Ramachandran Balasubramanian. 292-299 [doi]
- On energy consumption analysis for ad hoc routing protocolsVishwanath Pratap Singh, Arka Prokash Mazumdar, Ashok Singh Sairam. 300-306 [doi]
- A novel algorithm for PAPR reduction in LTE systemOsama A. Omer, Ahmed Abdel Reheem. 307-311 [doi]
- Adaptive time synchronization for VHT wireless LANNanda Kishore Chavali, Venkata Krishna Reddy Pilli. 312-317 [doi]
- Enhanced emergency communication using mobile sensing and MANETManeesha V. Ramesh, Anoop Jacob, Aryadevi R. Devidas. 318-324 [doi]
- Higher layer issues in cognitive radio networkSaed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh. 325-330 [doi]
- Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiationRinnymol Babu, Babu Av. 331-336 [doi]
- A framework for optimizing GCC for ARM architectureP. R. Mahalingam, Shimmi Asokan. 337-342 [doi]
- An efficient sleep protocol for lifetime enhancement in multi covered and multi connected WSNsShovan Maity, Arnab Raha, Souvik Kumar Mitra, Victor Seal, Mrinal Kanti Naskar, Amitava Mukherjee. 343-347 [doi]
- Performance analysis of cross layer protocols for wireless sensor networksSachin Gajjar, Shrikant N. Pradhan, Kankar Dasgupta. 348-354 [doi]
- Diversity coded directed diffusion for WSNGitanjali Shinde, Swati Joshi, Shami Jhodge. 355-359 [doi]
- An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor networkIpsita Dutta, Rajib Banerjee, Tamaghna Acharya, DasBit Sipra. 360-366 [doi]
- A swarm intelligence based distributed localization technique for wireless sensor networkManeesha V. Ramesh, P. L. Divya, Raghavendra V. Kulkarni, Rekha Manoj. 367-373 [doi]
- Performance comparison and node failure assessment of energy efficient two level balanced and progressive sensor networksManeesha V. Ramesh, A. G. Sreedevi, Kamalanathan Kandasamy, P. Venkat Rangan. 374-381 [doi]
- A fault tolerant approach for data aggregation in wireless sensor networksJitendra Pradhan, Anil Sarje. 382-386 [doi]
- Hexagonal groups based key management using deployment knowledge in wireless sensor networksSabu M. Thampi, Nithya Aniyan, K. Chitharanjan. 387-391 [doi]
- Analysis of IEEE 802.11 DCF for ad hoc networks under nonsaturation conditionsAsh Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy. 392-398 [doi]
- Extensions to wireless M-Bus protocol for smart metering and smart grid applicationAxel Sikora, Pancraç Villalonga, Klaus Landwehr. 399-404 [doi]
- Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structureG. Sreenu, P. M. Dhanya. 405-408 [doi]
- Efficient dynamic itinerary and memory allocation for mobile agentsM. Vigilson Prem, S. Swamynathan. 409-415 [doi]
- Online differential charging for blended services using service capability interaction manager in IMS networkRaghavendra Sunku, Debabrata Das. 416-420 [doi]
- A novel approach for developing JXTA peer-to-peer computing systems using aspect-oriented programming methodologiesVishnuvardhan Mannava, T. Ramesh. 421-427 [doi]
- Task scheduling using ACO-BP neural network in computational gridsK. R. Remesh Babu, P. Mathiyalagan, S. N. Sivanandam. 428-432 [doi]
- Sybil resilient identity distribution in P2P networksJissy Liz Jose, Jayasudha Js, Sabu M. Thampi. 433-439 [doi]
- Cloud computing: from hype to reality: fast tracking cloud adoptionRamkumar Dargha. 440-445 [doi]
- The role of psychophysics laws in quality of experience assessment: a video streaming case studySajad Khorsandroo, Rafidah Md Noor, Sayid Khorsandroo. 446-452 [doi]
- Implementing private cloud at IIT Roorkee: an initial experienceSusmita Horrow, Sanchika Gupta, Anjali Sardana. 453-458 [doi]
- An improved biased random sampling algorithm for load balancing in cloud based systemsSheeja S. Manakattu, S. D. Madhu Kumar. 459-462 [doi]
- Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanismsHarkeerat Singh Bedi, Sajjan Shiva. 463-469 [doi]
- State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environmentMadhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, M. Sai Manoj, P. Revathy. 470-476 [doi]
- Cloud-based B2B systems integration for small-and-medium-sized enterprisesNarasimha Bolloju, San Murugesan. 477-480 [doi]
- Implementation of next-generation traffic sign recognition system with two-tier classifier architectureKeerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues. 481-487 [doi]
- A new algorithm based on complex wavelet transform for protein sequence classificationLi Liu, Cheng Zhang, Haojie Wang. 488-492 [doi]
- A linear after-load model for a cardio-vascular pulse duplicatorAdathala Rajeev, Natarajan Sivakumaran, Sreedharan Sujesh, Chirathodi Vayalappil Muraleedharan. 493-497 [doi]
- An evaluation of hospital information systems integration approachesNazanin Sabooniha, Danny Toohey, Kevin Lee. 498-504 [doi]
- Methodology to visualize electronic health record for chronic diseases on small display screensSoubhik Paul, Jayanta Mukhopadhyay, Arun K. Majumdar, Bandana Majumdar, S. Das Bhattacharya. 505-510 [doi]
- A study on damping profile for prosthetic kneeAnup Nandy, Soumik Mondal, Lokesh Rai, Pavan Chakraborty, Gora Chand Nandi. 511-517 [doi]
- A comprehensive machine learning approach to prognose pulmonary disease from homeKomathy Karuppanan, Abinaya Sree Vairasundaram, Manjula Sigamani. 518-523 [doi]
- Simulation of respiratory system under normal, hypoxia and hypercapnia conditionsTanmay Pal, Srinivasu Maka. 524-532 [doi]
- An effective unsupervised network anomaly detection methodMonowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. 533-539 [doi]
- Certificateless strong designated verifier multisignature scheme using bilinear pairingsS. K. Hafizul Islam, G. P. Biswas. 540-546 [doi]
- An efficient DoG based fingerprint enhancement schemeShila Samantaray, Sambit Bakshi, Pankaj K. Sa. 547-550 [doi]
- Error management and detection in computer networks using Bloom filtersParia Ghanbari, Mahmood Ahmadi, Arash Ahmadi. 551-556 [doi]
- Securing fingerprint images using a hybrid techniqueRoli Bansal, Priti Sehgal, Punam Bedi. 557-565 [doi]
- Genetic algorithm combined with support vector machine for building an intrusion detection systemSriparna Saha 0001, Ashok Singh Sairam, Amulya Yadav, Asif Ekbal. 566-572 [doi]
- A DCT-SVD based robust watermarking scheme for grayscale imageSoumya Mukherjee, Arup Kumar Pal. 573-578 [doi]
- Synthesis of sustainability and secureness of software in public applications using deductive-nomological modelC. K. Raju, Ashok Mishra, P. B. S. Bhadoria. 579-588 [doi]
- Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approachR. K. N. Sai Krishna, Tummalapalli J. V. R. K. M. K. Sayi, Ravi Mukkamala, Pallav K. Baruah. 589-595 [doi]
- Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithmN. Jaisankar, S. Ganapathy, A. Kannan. 596-601 [doi]
- Secret information display based authentication technique towards preventing phishing attacksGaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi. 602-608 [doi]
- Protecting web applications from SQL injection attacks by using framework and database firewallYakkala V. Naga Manikanta, Anjali Sardana. 609-613 [doi]
- FPGA based sliding window architecture for RC5 encryptionA. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi. 614-618 [doi]
- Resource efficient survivability approach for resilient WDM optical networksDinesh Kumar Tyagi, Virendra Singh Shekhawat, V. K. Chaubey. 619-624 [doi]
- Privacy rights management in multiparty multilevel DRM systemDheerendra Mishra, Sourav Mukhopadhyay. 625-631 [doi]
- A novel AES-256 implementation on FPGA using co-processor based architectureSuman Sau, Rourab Paul, Tanmay Biswas, Amlan Chakrabarti. 632-638 [doi]
- Layered approach for intrusion detection using naïve Bayes classifierNeelam Sharma, Saurabh Mukherjee. 639-644 [doi]
- Network intrusion detection system using genetic network programming with support vector machineP. Kola Sujatha, C. Suba Priya, A. Kannan. 645-649 [doi]
- A novel framework for preserving privacy of data using correlation analysisAnimesh Tripathy, Matrubhumi Pradhan. 650-655 [doi]
- A secure packet marking scheme for IP traceback in IPv6Animesh Tripathy, Jayanti Dansana, Debi Prasad Mishra. 656-659 [doi]
- A classification based framework for privacy preserving data miningAnimesh Tripathy, Jayanti Dansana, Ranjita Mishra. 660-666 [doi]
- Exploiting second order statistics of the received signals in AF relay cooperative network for compound channel estimationCibile K. Kanjirathumkal, S. M. Sameer, Lillykutty Jacob. 667-672 [doi]
- Performance comparison of M-DCSK schemes in MIMO Nakagami channels with and without diversity combiningSangeetha Manoharan, Vidhyacharan Bhaskar. 673-677 [doi]
- Capacity analysis of LMF channels under different adaptation policies with and without diversity combiningVivek G. Rajendran, Vidhyacharan Bhaskar. 678-682 [doi]
- Image retrieval using local and global properties of image regions with relevance feedbackE. R. Vimina, K. Poulose Jacob. 683-689 [doi]
- Optimized trace transform based content based image retrieval algorithmRahul Bankapur, B. V. Bhoomaraddi, Meena S. Maralappanavar, B. V. Bhoomaraddi. 690-696 [doi]
- Detecting epileptic seizures using electroencephalogram: a novel frequency domain feature extraction technique for seizure classification using fast ANFISG. Geetha, S. N. Geethalakshmi. 697-703 [doi]
- Towards improving automatic image annotation using improvised fractal SMOTE approachT. Sumadhi, M. Hemalatha. 704-709 [doi]
- Recognition of vocal emotions from acoustic profileKrishna Asawa, Vikrant Verma, Ankit Agrawal. 710-716 [doi]
- Monogenic scale space based region covariance matrix descriptor: an efficient and accurate face recognition algorithmM. Sharmila Kumari, B. H. Shekar, N. Harivinod, K. Raghurama Holla. 717-720 [doi]
- A particle swarm optimization method for tuning the parameters of multiscale retinex based color image enhancementM. C. Hanumantharaju, V. N. Manjunath Aradhya, M. Ravishankar, A. Mamatha. 721-727 [doi]
- Handwritten character recognition system using a simple featureBindu S. Moni, G. Raju. 728-734 [doi]
- Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal momentsM. A. Leo Vijilious, S. Ganapathy, V. Subbiah Bharathi. 735-739 [doi]
- PAPR reduction for OFDM systems using clipping and square rooting techniquesT. Deepa, R. Kumar. 740-744 [doi]
- Directional line edge binary pattern for texture image indexing and retrievalSibendu Samanta, R. P. Maheshwari, Manoj Tripathy. 745-750 [doi]
- Fractional Fourier transform: a surveyB. T. Krishna. 751-757 [doi]
- Improving the energy efficiency of power line communications by spectrum sensingHongjian Sun, Arumugam Nallanathan, Jing Jiang. 758-762 [doi]
- Implementation of dictation system for Malayalam office documentP. Shobana Devi, Jose Stephen, G. Sulochana Kurambath, R. Ravindra Kumar. 763-767 [doi]
- Generating OLAP queries from natural language specificationM. Asif Naeem, Imran Sarwar Bajwa. 768-773 [doi]
- Reformulation of Telugu web query using word semantic relationshipsRamakrishna Kolikipogu, B. Padmaja Rani, Vijayalaxmi Kakulapati. 774-780 [doi]
- The study of different similarity measure techniques in recognition of handwritten charactersC. Naveena, V. N. Manjunath Aradhya, S. K. Niranjan. 781-787 [doi]
- Divergence patterns in machine translation between Malayalam and EnglishV. Jayan, R. Sunil, G. Sulochana Kurambath, R. Ravindra Kumar. 788-794 [doi]
- Novel approach based feature extraction for Marathi continuous speech recognitionSantosh Gaikwad, Bharti Gawali, S. C. Mehrotra. 795-804 [doi]
- A compact feature set for recognition of handwritten numerals and vowels in the Kanarese scriptR. Santhosh, Gowri Srinivasa. 805-811 [doi]
- A new combined method for character recognizing in Farsi printed scripts using principal component analysisShahrouz Gashmard, Alireza Mehri Dehnavi, Hossein Rabbani. 812-815 [doi]
- Morphar+: an Arabic morphosyntactic analyzerZouhir Zemirli, Yahya O. Mohamed Elhadj. 816-823 [doi]
- Subject and object identification in Malayalam textSaranya D. Krishnan, R. R. Rajeev, Mary Priya Sebastian, Sherly Elizabeth. 824-827 [doi]
- Morphological analyzer and generator for Tulu language: a novel approachP. J. Antony, Hemant B. Raj, B. S. Sahana, Dimple Sonal Alvares, Aishwarya Raj. 828-834 [doi]
- Active learning technique for biomedical named entity extractionSriparna Saha 0001, Asif Ekbal, Mridula Verma, Utpal Kumar Sikdar, Massimo Poesio. 835-841 [doi]
- Analysis and evaluation of stemming algorithms: a case study with AssameseNavanath Saharia, Utpal Sharma, Jugal Kalita. 842-846 [doi]
- A deconverter framework for MalayalamMisiriya Shahul Hameed, C. N. Subalalitha, T. V. Geetha, Ranjani Parthasarathi. 847-856 [doi]
- An approach to summarizing Bengali news documentsKamal Sarkar. 857-862 [doi]
- Example-based single image enhanced up-samplingParuvelli Sreedevi, Wen-Liang Hwang. 863-872 [doi]
- A review on binarization algorithms for camera based natural scene imagesRajesh K. Bawa, Ganesh K. Sethi. 873-878 [doi]
- Shift-invariant texture retrieval using P- contourletJiuwen Zhang, Jincai Mi, Tongfeng Zhang. 879-883 [doi]
- Improved edge preserving lossy image compression using wavelet transformA. Benjamin Joseph, R. Baskaran. 884-888 [doi]
- Ranking importance based information on the world wide webAkshay Kumar Maan, Alex Pappachen James. 889-897 [doi]
- A three phase approach for mental task classification using EEGAkshansh Gupta, R. K. Agrawal, Baljeet Kaur. 898-904 [doi]
- Feature based retrieval for animation videoPranali Kosamkar, Madhuri Potey. 905-909 [doi]
- Towards a unified 3D animated dictionary for Saudi sign languageYahya O. Mohamed Elhadj, Zouhir Zemirli, Basma Al-faraj. 910-917 [doi]
- Palmprint identification based on wide principal linesHemantha Kumar Kalluri, Munaga V. N. K. Prasad, Arun Agarwal. 918-924 [doi]
- The current state of art: handwriting a behavioral biometric for person identification and verificationSharada Kore, Shaila Apte. 925-930 [doi]
- Multi-normalization: a new method for improving biometric fusionS. M. Anzar, P. S. Sathidevi. 931-937 [doi]
- Performance evaluation of subspace methods to tackle small sample size problem in face recognitionNitin Kumar, Ajay Jaiswal, Ramesh K. Agrawal. 938-944 [doi]
- Cloudpress 2.0: a next generation news retrieval system on the cloud with a built-in summarizerArockia Anand Raj, T. Mala. 945-951 [doi]
- N-ary tree based key distribution in a network as a service provisioning modelAnand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo. 952-960 [doi]
- Web data mining trends and techniquesUjwala Manoj Patil, J. B. Patil. 961-965 [doi]
- Web analytics and metrics: a surveyLakhwinder Kumar, Hardeep Singh, Ramandeep Kaur. 966-971 [doi]
- Skin melanoma segmentation by morphological approachArlete Teresinha Beuren, Rodrigo Janasieivicz, Gomes Pinheiro, Neusa Grando, Jacques Facon. 972-978 [doi]
- Neuro-fuzzy expert system for breast cancer diagnosisManisha Arora, Dinesh Tagra. 979-985 [doi]
- Capacity planning of telemedicine network through molecular assemblySami J. Habib, Paulvanna Nayaki Marimuthu. 986-989 [doi]
- Use of higher order spectrum in characterizing nonlinear interactions in human brain signalsSusant Kumar Jena, Cuachy Pradhan, N. M. Elango, N. Pradhan. 990-996 [doi]
- Mining of classification patterns in clinical data through data mining algorithmsShomona Gracia Jacob, R. Geetha Ramani. 997-1003 [doi]
- Removal and interpolation of missing values using wavelet neural network for heterogeneous data setsLipismita Panigrahi, Ruchi Ranjan, Kaberi Das, Debahuti Mishra. 1004-1009 [doi]
- Implementation and evaluation of scalable data structure over HBaseVamshi Krishna Konishetty, K. Arun Kumar, Kaladhar Voruganti, G. V. Prabhakara Rao. 1010-1018 [doi]
- Parameter-lite clustering algorithm based on MST and fuzzy similarity mergingBhupathiraju V. S. Ramakrishnam Raju, Vatsavayi Valli Kumari. 1019-1026 [doi]
- Hierarchically clustered technical blogsGodfrey Winster Sathianesan, Swamynathan Sankaranarayanan. 1027-1033 [doi]
- Applicability of data mining algorithms for recommendation system in e-learningSunita B. Aher, Louis Lobo. 1034-1040 [doi]
- Selection of evolutionary approach based hybrid data mining algorithms for decision support systems and business intelligencePardeep Kumar, Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal. 1041-1046 [doi]
- Efficient two dimensional clustering of microarray gene expression data by means of hybrid similarity measureR. Priscilla, S. Swamynathan. 1047-1053 [doi]
- An evaluation of clustering technique over intrusion detection systemG. V. Nadiammai, M. Hemalatha. 1054-1060 [doi]
- An efficient approach for generating frequent patterns without candidate generationG. LakshmiPriya, Shanmugasundaram Hariharan. 1061-1067 [doi]
- Experiments on POS tagging and data driven dependency parsing for Telugu languageMayana Humera Khanam, Palli Suryachandra, Kv Madhumurthy. 1068-1073 [doi]
- On-line Hindi handwritten character recognition for mobile devicesG. Keerthi Prasad, Imran Khan, Naveen Chanukotimath. 1074-1078 [doi]
- Neighbour based structural proximity measures for ontology matching systemsK. Saruladha, G. Aghila, B. Sathiya. 1079-1085 [doi]
- SenSim: sentence similarity based on the concept of relevanceRaja Sunkara, Aditya Achanta, Vatsavayi Valli Kumari, Kvsvn Raju. 1086-1092 [doi]
- Correlation based multi-document summarization for scientific articles and news groupJ. Jayabharathy, S. Kanmani, N. Sivaranjani. 1093-1099 [doi]
- Analysis of double edge triggered clocked storage elementsImran Ahmed Khan, Danish Sheikh, Mirza Tariq Beg. 1100-1103 [doi]
- High speed VLSI implementation of lifting based DWTUsha Bhanu Nageswaran, A. Chilambuchelvan. 1104-1110 [doi]
- FPGA design and implementation of truncated multipliers using bypassing techniqueS. Balamurugan, Balakumaran Srirangaswamy, R. Marimuthu, P. S. Mallick. 1111-1117 [doi]
- Hardware-software co-design of AES on FPGASaambhavi Baskaran, Pachamuthu Rajalakshmi. 1118-1122 [doi]
- A hybrid embedded steganography technique: optimum pixel method and matrix embeddingNithyanandam Pandian, Ravichandran Thangavel. 1123-1130 [doi]
- Symmetric key based blocked oriented digital envelopingShyamalendu Kandar, Nabarun Das, Subhabrata Barman. 1131-1135 [doi]
- An improved secure code encryption approach based on indexed tableN. Sasirekha, M. Hemalatha. 1136-1142 [doi]
- An efficient and secure key agreement scheme using physiological signals in body area networksR. Thalapathi Rajasekaran, V. Manjula, V. Kishore, T. M. Sridhar, C. Jayakumar. 1143-1147 [doi]
- Multi-modal biometric approach to enable high security in mobile adhoc networkS. Deepan Chakravarthy, P. Infant Kingsly, Mahendran Sadhasivam, C. Jayakumar. 1148-1154 [doi]
- Ultra low power device to track environmental sensitive items in transitChandan Maity, Chaitanya Garg, Ashutosh Gupta. 1155-1162 [doi]
- Locating and monitoring emergency responder using a wearable deviceAbishek Thekkeyil Kunnath, Preeja Pradeep, Maneesha Vinodini Ramesh. 1163-1168 [doi]
- Control of computer process using image processing and computer vision for low-processing devicesShitala Prasad, Abhay Prakash, Sateesh Kumar Peddoju, Debashis Ghosh. 1169-1174 [doi]
- Efficient method for noise removal techniques and video object segmentation using color based fuzzy c meansM. Hemalatha, R. Revathi. 1175-1181 [doi]
- Intelligent tutoring systems: a new proposed structureHossam Meshref, Isbudeen Noor Mohamed. 1182-1186 [doi]
- Auto-clever fuzzy (ACF) based intelligent system for monitoring and controlling the hydrocarbons -air toxics emitted by the vehicle motorsJaya Sudha Natarajan, Lakshmi Sevukamoorthy. 1187-1192 [doi]
- An approach towards dynamic assembling of learning objectsK. Sathiyamurthy, T. V. Geetha, M. Senthilvelan. 1193-1198 [doi]
- n-Gram modeling of relevant features for lip-readingPreety Singh, Vijay Laxmi, Manoj Singh Gaur. 1199-1204 [doi]
- Upper and lower bound analysis of the OFDM system impaired by CFO over slow fading channelsPorselvi Soundararajan, Vidhyacharan Bhaskar. 1205-1209 [doi]
- Microstrip patch antenna combining crown and Sierpinski fractal-shapesYogesh Bhomia, Ashvini Chaturvedi, Yogesh Kumar Sharma. 1210-1213 [doi]
- A new multi-agent system for video objects segmentation and tracking based on spatio-temporal descriptorMohamed Chakroun, Ali Wali, Adel M. Alimi. 1214-1218 [doi]
- Medical image thresholding using WQPSO and maximum entropyAnusuya Venkatesan, Latha Parthiban. 1219-1224 [doi]
- Enhancement of co-authorship networks with content-similarity informationS. Sendhilkumar, G. S. Mahalakshmi, Dilip S. Sam. 1225-1228 [doi]
- Block PIC technique for synchronous CI/MC-CDMA system using neural networkSumanta Hati, Santi P. Maity. 1229-1235 [doi]
- Multimodal pattern-oriented software architecture for self-optimization and self-configuration in autonomic computing system using multi objective evolutionary algorithmsVishnuvardhan Mannava, T. Ramesh. 1236-1243 [doi]
- Fixed point results of transcendental superior antifractalsShafali Agarwal, Ashish Negi. 1244-1248 [doi]
- Performance evaluation of motion estimation in H.264/AVC encoderVani Rajamanickam, Sangeetha Marikkannan. 1249-1253 [doi]
- Lifetime extension of wireless sensor network by selecting two cluster heads and hierarchical routingB. Meenakshi, P. Anandhakumar. 1254-1260 [doi]
- A survey on various improvements of hybrid zone routing protocol in MANETDhanya Sudarsan, G. Jisha. 1261-1265 [doi]
- Performance evaluation of regular cycle non-binary LDPC codes in AWGN channelAmeenudeen Pe, A. V. Babu. 1266-1270 [doi]
- Source based trusted AODV routing protocol for mobile ad hoc networksA. Pravin Renold, R. Parthasarathy. 1271-1275 [doi]