Abstract is missing.
- A novel cost effective access control and auto filling form system using QR codeDinesh Khandal, Devendra Somwanshi. 1-5 [doi]
- Adapting the beacon interval for opportunistic network communicationsSalem Sati, Kalman Graffi. 6-12 [doi]
- Reliable prediction of channel assignment performance in wireless mesh networksSrikant Manas Kala, Ranadheer Musham, M. Pavan Kumar Reddy, Bheemarjuna Reddy Tamma. 13-19 [doi]
- Scheduling in dynamic spectrum access networks using graph coloringNavin Kumar H. S., Mainak Chatterjee. 20-23 [doi]
- Spectrum auctions in the secondary market with multiple bidsShobbana Santhoshini J. R., Mainak Chatterjee. 24-27 [doi]
- Radio co-location aware channel assignments for interference mitigation in wireless mesh networksSrikant Manas Kala, M. Pavan Kumar Reddy, Ranadheer Musham, Bheemarjuna Reddy Tamma. 28-37 [doi]
- Prototype for multiple applications using Near Field Communication (NFC) technology on android deviceSubhasini Dwivedi, Jason Roger D'Souza. 38-43 [doi]
- Characterization of mmWave link for outdoor communications in 5G networksSheeba Kumari M., Sudarshan A. Rao, Navin Kumar. 44-49 [doi]
- A concurrent dual band LNA using frequency transformation based matching network for WCDMA and navigational C-band applicationBandgar Prashant V., Khobragade Sanjay V.. 50-56 [doi]
- Mobile applications: Analyzing private data leakage using third party connectionsPradeep Kumar, Maninder Singh. 57-62 [doi]
- Design of robust adaptive controller for a four wheel omnidirectional mobile robotVeer Alakshendra, Shital S. Chiddarwar. 63-68 [doi]
- A survey based analysis of propagation models over the seaSumayya Balkees P. A., Kalyan Sasidhar, Sethuraman Rao. 69-75 [doi]
- Novel UWB Swastika slot antenna with concentric circular slots and modified ground plane with inverted L-shaped slotsSeera Dileep Raju, Bojja Haranath, Lakhan Panwar. 76-81 [doi]
- A comparative study of different notches for WLAN rejection in a planar UWB antennaDivyanshu Upadhyay, Indranil Acharya. 82-85 [doi]
- An experimental evaluation of impact of synchronization on GSM network performanceR. K. Manjunath, K. Nagabhushan Raju. 86-91 [doi]
- A mixed strategy game theoretic approach to dynamic load balancing in cellular networksAnshul Mittal, Manish Kumar Sharma. 92-96 [doi]
- Channel coding performance of optical MIMO indoor visible light communicationMahesh Kumar Jha, Anusha Addanki, Y. V. S. Lakshmi, Navin Kumar. 97-102 [doi]
- Resource sharing in D2D communication underlaying cellular LTE-A networksAjay Pratap, Rajiv Misra. 103-109 [doi]
- Resource aware traffic grooming with shared protection at connection in WDM mesh networksAsima Bhattacharya, Marichi Agarwal, Sana Tabassum, Monish Chatterjee. 110-115 [doi]
- A high gain 2-element Microstrip array antenna with Circular Polarisation for RFID ApplicationsBhushan Bhimrao Dhengale, Deepak C. Karia. 116-120 [doi]
- Multilevel digital sonar power amplifier with modified unipolar SPWMBineesh P. Chacko, V. N. Panchalai, N. Sivakumar. 121-125 [doi]
- Performance evaluation of band-limited LPC vocoder and band-limited RELP vocoder in adaptive feedback cancellationAnkita Anand, Richa Bhatia. 126-132 [doi]
- Multiband circularly polarized symmetrical fractal boundary microstrip antenna for microwave applicationsY. Navya Sree, P. V. Avinash Reddy, K. Ajay Kumar, P. Gokul Krishna, J. Lakshmi Narayana. 133-136 [doi]
- Study of preprocessing sensitivity on laser induced breakdown spectroscopy (LIBS) spectral classificationTapan Kumar Sahoo, Atul Negi, Manoj Kumar Gundawar. 137-143 [doi]
- Synchronization in IEEE 802.15.4 Zigbee transceiver using Matlab SimulinkKavya Gorantla, V. V. Mani. 144-148 [doi]
- Design and implementation of multipurpose single channel bio signal amplifierSandesh R. S., Nithya Venkatesan. 149-153 [doi]
- Three-dimensional geometrical channel modeling with different scatterer distributionsPriyashantha Tennakoon, Chandika B. Wavegedara. 154-160 [doi]
- On spectrum utilization in CRN using sequential sensing applying adaptive weighting in time varying channelAmit Baghel, Aditya Trivedi. 161-165 [doi]
- A novel variable step-size feedback Filtered-X LMS algorithm for acoustic noise removalAshok Behuria, B. P. Mishra, Pankaj Goel, Asutosh Kar, Shibalik Mohapatra, Mahesh Chandra. 166-171 [doi]
- Performance of DP-QPSK transmission for a Nyquist-WDM system using all Raman amplification and spectral inversion techniqueR. Jee, S. Chandra. 172-177 [doi]
- An unique adaptive noise canceller with advanced variable-step BLMS algorithmMonali Dhal, Monalish Ghosh, Pankaj Goel, Asutosh Kar, Shibalik Mohapatra, Mahesh Chandra. 178-183 [doi]
- Multiple predictors based RW scheme with adaptive image partitioningHirak Kumar Maity, Santi P. Maity. 184-189 [doi]
- Performance analysis of MIMO systems under multipath fading channels using linear equalization techniquesKhushboo Pachori, Amit Mishra. 190-193 [doi]
- Sign language recognition through kinect based depth images and neural networkVarun Tiwari, Vijay Anand, Avinash G. Keskar, Vishal R. Satpute. 194-198 [doi]
- RTWPCAMARM: A dynamic real time weather prediction system with 8 neighborhood hybrid cellular automata and modified association rule miningPokkuluri Kiran Sree, N. S. S. S. N. Usha Devi N.. 199-202 [doi]
- Cloud Hopfield neural network: Analysis and simulationNarotam Singh, Amita Kapoor. 203-209 [doi]
- A parallel GWO technique for aligning multiple molecular sequencesJ. Jayapriya, Michael Arock. 210-215 [doi]
- An integrated approach for robot training using Kinect and human arm kinematicsAbhishek Jha, Shital S. Chiddarwar, Mayur V. Andulkar. 216-221 [doi]
- Extraction of relevant dataset for support vector machine training: A comparisonAdeena K. D., Remya R.. 222-227 [doi]
- Mining the impact of object oriented metrics for change prediction using Machine Learning and Search-based techniquesRuchika Malhotra, Megha Khanna. 228-234 [doi]
- Tsallis entropy and particle swarm optimization-based cyclone image vortex localizationHarish Anil Jamakhandi, Tilak D., Manikantan K., Seetharaman Ramachandran. 235-244 [doi]
- Opposition based Particle Swarm Optimization with exploration and exploitation through gbestBiplab Mandal, Tapas Si. 245-250 [doi]
- A technique for associating political alignment to usersRishi Singh, Rajdeep Niyogi. 251-257 [doi]
- Centroid based Binary Tree Structured SVM for multi classificationAruna Govada, Bhavul Gauri, Sanjay Kumar Sahay. 258-262 [doi]
- A model for controlling variance in the Artificial Bee Colony algorithmSatish Chandra, Vivek Kothari, Mudita Sharma. 263-269 [doi]
- Mining defect reports for predicting software maintenance effortRajni Jindal, Ruchika Malhotra, Abha Jain. 270-276 [doi]
- Improve the channel performance of Wireless Multimedia Sensor Network using MIMO propertiesArjav A. Bavarva, Preetida V. Jani. 277-282 [doi]
- Modeling pattern abstraction in cerebellum and estimation of optimal storage capacityAsha Vijayan, Anjana Palolithazhe, Bipin Nair, Chaitanya Medini, Bhagyalakshmi Muralidharan, Shyam Diwakar. 283-289 [doi]
- Identification of motor imagery movements from EEG signals using Dual Tree Complex Wavelet TransformSyed Khairul Bashar, Ahnaf Rashik Hassan, Mohammed Imamul Hassan Bhuiyan. 290-296 [doi]
- Performance analysis of adaptive filtering algorithms for denoising of ECG signalsNasreen Sultana, Yedukondalu Kamatham, Bhavani Kinnara. 297-302 [doi]
- Historical document enhancement using Shearlet Transform and mathematical morphological operationsRanganatha D., Ganga Holi. 303-307 [doi]
- Clustering of dynamic functional connectivity features obtained from functional Magnetic Resonance Imaging dataVajarala Ashikh, Gopikrishna Deshpande, D. Rangaprakash, D. Narayana Dutt. 308-312 [doi]
- The effect of DC coefficient on mMFCC and mIMFCC for robust speaker recognitionDiksha Sharma, Israj Ali. 313-317 [doi]
- Brain tumor extraction from MRI brain images using marker based watershed algorithmBenson C. C., Lajish V. L., Kumar Rajamani. 318-323 [doi]
- Low power amplifier for biopotential signal acquisition systemK. Pratyusha, Sanjeev Kumar, Anita Kumari. 324-329 [doi]
- Brain computer interface based assistive deviceRamesh C. R., Lyla B. Das. 330-334 [doi]
- Pyranone Benzene complexes as potential nano-flippers: A DFT studyBindu P. Nair, T. K. Manojkumar, Sreedhar K. M., Asraf V. Mohamed, Zainul Hukuman. 335-338 [doi]
- Exploration of carboxyl functionalized eugenol for preventing metastasis of pancreatic cancerP. S. Arun, Lekshmysree S. Nair, Karlhik Manogaran, Vidya Vinodini M. D., T. K. Manojkumar. 339-342 [doi]
- Parallelization of searching and mining time series data using Dynamic Time WarpingAhmed Shabib, Anish Narang, Chaitra Prasad Niddodi, Madhura Das, Rachita Pradeep, Varun Shenoy, Prafullata Auradkar, Vignesh TS., Dinkar Sitaram. 343-348 [doi]
- Comparative analysis of scheduling algorithms for grid computingShyna Sharma, Amit Chhabra, Sandeep Sharma. 349-354 [doi]
- MR-VSM: Map Reduce based vector Space Model for user profiling-an empirical study on News dataAnjali Gautam, Punam Bedi. 355-360 [doi]
- Client-side verifiable accounting in infrastructure cloudVarun Bhardwaj, Anamika Sharma, Gaurav Somani. 361-366 [doi]
- A stackelberg game to incentivize cooperation in BitTorrentDoshi Chintan Ketankumar, K. Chandrasekaran. 367-373 [doi]
- Co-operation based game theoretic approach for resource bargaining in cloud computing environmentGopal Kirshna Shyam, Sunilkumar S. Manvi. 374-380 [doi]
- CAB: Cloudlets as Agents of Cloud BrokersChhabi Rani Panigrahi, Mayank Tiwary, Bibudhendu Pati, Rachita Misra. 381-386 [doi]
- Cascket: A binary protocol based c client-driver for Apache CassandraSarang Karpate, Abhishek Joshi, Javed Dosani, Jibi Abraham. 387-393 [doi]
- Pre processing of evidences from cloud components for effective forensic analysisSaibharath S., G. Geethakumari. 394-399 [doi]
- A Neural Data Security Model: Ensure high confidentiality and security in cloud datastorage environmentS. Jegadeeswari, P. Dinadayalan, N. Gnanambigai. 400-406 [doi]
- A new hybrid scheduling in cloud environmentKomal, Arvinder Kaur. 407-411 [doi]
- An efficient resource allocation (ERA) mechanism in Iaas cloudRajalakshmi Shenbaga Moorthy. 412-417 [doi]
- Shamir's key based confidentiality on cloud data storageD. Kamalraj, B. Balamurugan, S. Jegadeeswari, M. Sugumaran. 418-423 [doi]
- Secured fast prediction of cloud data stream with balanced load factor using Ensemble Tree ClassificationB. Balamurugan, D. Kamalraj, S. Jegadeeswari, M. Sugumaran. 424-430 [doi]
- A new hybrid approach for overlay construction in P2P live streamingKunwar Pal, M. C. Govil, Mustaq Ahmed. 431-437 [doi]
- A novel secure cloud storage architecture combining proof of retrievability and revocationDeepnarayan Tiwari, G. R. Gangadharan. 438-445 [doi]
- Cloud based Dual Auction (DA) and A* and IDA* Searching models using BH - Strategy for resource allocation in e-marketsM. N. Faruk, K. Lakshmi Prasad, P. Srinivasulu. 446-452 [doi]
- Energy efficient and high performance 64-bit Arithmetic Logic Unit using 28nm technologyShruti Murgai, Ashutosh Gupta, Gayathri Muthukrishnan. 453-456 [doi]
- Effective design of logic gates and circuit using quantum cellular automata (QCA)Libi Balakrishnan, Thiagarajan Godhavari, Sujatha Kesavan. 457-462 [doi]
- FSMD RTL design manipulation for clock interface abstractionSyed Saif Abrar, Maksim Jenihhin, Jaan Raik. 463-468 [doi]
- Optimizing response time and synchronization in User Virtualization via adaptive memory compressionMayank Kulkarni, Rushikesh Ghatpande, Nikunj Karnani, Jibi Abraham. 469-477 [doi]
- Efficient don't-care filling method to achieve reduction in test powerSinduja V., Siddharth Raghav, Anita J. P.. 478-482 [doi]
- Gating techniques for 6T SRAM cell using different modes of FinFETDeeksha Anandani, Anurag Kumar, V. S. Kanchana Bhaaskaran. 483-487 [doi]
- Network on chip based multi-function image processing system using FPGAZalak Dave, Shivank Dhote, Jonathan Joshi, Abhay Tambe, Sachin R. Gengaje. 488-492 [doi]
- FPGA implementation of reconfigurable modulation systemMangala J., Manikandan J.. 493-500 [doi]
- Scaling number of cores in GPGPU: A comparative performance analysisWinnie Thomas, Rohin D. Daruwala. 501-507 [doi]
- Memory array with complementary resistive switch with memristive characteristicsSneha Mohan Patil, S. R. S. Prabhaharan. 508-513 [doi]
- A novel design of optical logic gate AND, OR and NOT with Polyvinyl-Chloride Multiwalled Carbon Nano TubeMihir Desani, Arjav Bavarva, Vishal Sorathiya. 514-520 [doi]
- VLSI architecture of Pairwise Linear SVM for facial expression recognitionSumeet Saurav, Anil K. Saini, Sanjay Singh, Ravi Saini, Shradha Gupta. 521-527 [doi]
- VLSI architecture of exponential block for non-linear SVM classificationShradha Gupta, Sumeet Saurav, Sanjay Singh, Anil K. Saini, Ravi Saini. 528-532 [doi]
- Implementing a cloud based Xilinx ISE FPGA design platform for integrated remote labsJinalkumar Doshi, Pratiksha Patil, Zalak Dave, Ganesh Gore, Jonathan Joshi, Reena Sonkusare, Surendra S. Rathod. 533-537 [doi]
- Memristor load current mirror circuitOlga Krestinskaya, Irina Fedorova, Alex Pappachen James. 538-542 [doi]
- An efficient approach for design and testing of FPGA programming using Lab VIEWB. Naresh Kumar Reddy, N. Suresh, J. V. N. Ramesh, T. Pavithra, Y. Krupa Bahulya, Pranose J. Edavoor, S. Janaki Ram. 543-548 [doi]
- FPGA implementation of multiplication algorithms for ECCRavi Kishore Kodali, Lakshmi Boppana, A. V. Saikiran, Chandana N. Amanchi. 549-554 [doi]
- Performance analysis of low power microcode based asynchronous P-MBISTYasha Jyothi M. Shirur, Bilure Chetana Bhimashankar, Veena S. Chakravarthi. 555-560 [doi]
- Low power analog VLSI implementation of cortical neuron with threshold modulationEthoti Radhika, Sanjeev Kumar, Anita Kumari. 561-566 [doi]
- Design of digital down converter using Computation sharing multiplier architectureAvinash M., Sumanth Sakkara. 567-570 [doi]
- Optical theremin based true Random Number Generation (TRNG) systemRahul Sharma, Ramya Ullagaddimath, Amit Baran Roy, Apratim Halder, Veena Hegde. 571-575 [doi]
- Design of Vedic-multiplier using area-efficient Carry Select AdderG. R. Gokhale, P. D. Bahirgonde. 576-581 [doi]
- Spice algorithm implementation for optical network analysisSoumya Sajjan, Anant Kulkarni, Vikram Seshasai. 582-587 [doi]
- Microcontroller based RR-Interval measurement using PPG signals for Heart Rate Variability based biometric applicationNazneen Akhter, Sumegh Tharewal, Hanumant Gite, K. V. Kale. 588-593 [doi]
- A node scheduling approach in community based routing in social Delay Tolerant NetworksNikhil Gondaliya, Mehul Shah, Dhaval Kathiriya. 594-600 [doi]
- Analysis of power transfer capability of a long transmission line using FACTS devicesS. Bagchi, R. Bhaduri, P. N. Das, S. Banerjee. 601-606 [doi]
- Dynamics and control system design of a polar low-earth orbit nano-satellite 'Parikshit'Raunaq Rakesh, Smit Kamal, Carina Pereira, Naman Saxena, Revathi Ravula, Faraz Haider, Siddhath Mayya, Karun Potty. 607-613 [doi]
- Onboard processor validation for space applicationsSavitha A., Rajiv R. Chetwani, M. Ravindra, K. M. Bharadwaj. 614-617 [doi]
- Direct torque control of induction motor drive with flux optimizationHadhiq Khan, Shoeb Hussain, Mohammad Abid Bazaz. 618-623 [doi]
- Super twisting controller for the position control of Stewart platformRamesh Kumar P., B. Bandyopadhyay. 624-629 [doi]
- Control system design to counter the effect of tether ejection system on a nano-satelliteRaunaq Rakesh, Smit Kamal, Carina Pereira, Naman Saxena, Revathi Ravula, Faraz Haider, Siddharth Mayya, Karun Potty. 630-635 [doi]
- An empirical analysis of implicit trust metrics in recommender systemsSwati Gupta, Sushama Nagpal. 636-639 [doi]
- Frequency estimator to improve short range accuracy in FMCW radarAnuja Chaudhari, Sapna U. Prabhu, Raymond Pinto. 640-644 [doi]
- Observations from study of pre-islanding behaviour in a solar PV system connected to a distribution networkShashank Vyas, Rajesh Kumar, Rajesh G. Kavasseri. 645-650 [doi]
- Multilevel converter for excitation of underwater transducersAnand Sreekumar, V. N. Panchalai, Bineesh P. Chacko, Preethi Thekkath. 651-655 [doi]
- A key based security mechanism for payment status in cloud service access control systemGagandeep Kaur, Arvinder Kaur. 656-661 [doi]
- Error propagation in linear and non-linear systems for False Data Injection AttackSindhuja Mangalwedekar, Sunil K. Surve, H. A. Mangalvedekar. 662-667 [doi]
- Design and evaluation of FPGA based frequency demodulatorsSenthilkumar E., J. Manikandan, V. K. Agrawal. 668-674 [doi]
- Dependence of radius of cylindrical ground plane on the performance of coplanar based microstrip patchTarun S. Cousik, Ameer Banu K., Harsha Pillai H., Jayakumar M.. 675-679 [doi]
- Design and performance analysis of Substrate Integrated Waveguide based cavity backed slot antenna for MIMO configurationArya Madathil, Ashwita Nair, Chaitra Satish, Neha R. Nair, Nivedha Priyadarsini P. V., Jayakumar M.. 680-683 [doi]
- Two Dimensional Array of Layered Metal-Dielectric Sandwich Structures for Terahertz ApplicationsSrinikethan M. S., Aravind S., Avinash N., Shanmugha Sundaram G. A.. 684-688 [doi]
- 3-D stack of waveguide structures with hour-glass slot structure for terahertz antenna applicationsHarish S., Srinivasan S., Srinikethan M. S., Shanmugha Sundaram G. A.. 689-693 [doi]
- An architecture of baseband data handling system for deep space mission and realization for Mars Orbiter MissionK. H. Jeeja, Keerthi K., Lakshmi A., Shantala S. H., Jothy Soman, P. S. Sura, Valarmathi N.. 694-699 [doi]
- Adaptive filtering a descreening approach for color scanned halftonesApeksha M. Gopale, Tanuja K. Sarode. 700-706 [doi]
- Detecting the network attack vectors on SCADA systemsRam Sandesh Ramachandruni, Prabaharan Poornachandran. 707-712 [doi]
- Data cleaning: An abstraction-based approachDileep Kumar Koshley, Raju Halder. 713-719 [doi]
- Simulation of flow past a wing inspired by flying snakesVertika Saxena, Balajee Ramakrishnananda, T. Rajesh Senthil Kumar. 720-725 [doi]
- Exploring effect of preprocessing on classifier ensembles in imbalanced dataset classificationUma R. Salunkhe, Suresh N. Mali. 726-731 [doi]
- Novel self-learning based crawling and data mining for automatic information extractionArun Kumar A. V., Hemant Kumar Rath, Shameemraj M. Nadaf, Anantha Simha. 732-738 [doi]
- Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?Sethuraman Srinivas, Archana Nair. 739-744 [doi]
- A hybrid approach for recommendation system with added feedback componentKavinkumar V., Rachamalla Rahul Reddy, Rohit Balasubramanian, Sridhar M., Sridharan K., D. Venkataraman. 745-752 [doi]
- An efficient approach for privacy preserving distributed mining of association rules in unsecured environmentChirag Modi, Ashwini R. Patil, Nishant Doshi. 753-758 [doi]
- Automatic detection of k with suitable seed values for classic k-means algorithm using DEChayan Bala, Tripti Basu, Abhijit Dasgupta. 759-765 [doi]
- User interest expansion using spreading activation for generating recommendationsPunam Bedi, Richa Sharma. 766-771 [doi]
- Component based reliability assessment from UML modelsVaishali Chourey, Meena Sharma. 772-778 [doi]
- Sub pixel level arrangement of spatial dependences to improve classification accuracySuresh Merugu, Arun Kumar Rai, Kamal Jain. 779-786 [doi]
- Privacy-preserving frequent itemset mining in outsourced transaction databasesIyer Chandrasekharan, Pallav K. Baruah, Ravi Mukkamala. 787-793 [doi]
- An automated approach for classification of plant diseases towards development of futuristic Decision Support System in Indian perspectiveYogesh Dandawate, Radha Kokare. 794-799 [doi]
- Analysis of data management and query handling in social networks using NoSQL databasesAnita Brigit Mathew, S. D. Madhu Kumar. 800-806 [doi]
- Efficiency analysis of kernel functions in uncertainty based c-means algorithmsDishant Mittal, B. K. Tripathy. 807-813 [doi]
- Email forensic analysis based on k- means clusteringArya P. Nampoothiri, Minu Lalitha Madhavu. 814-817 [doi]
- Personalization of Web Search based on privacy protected and auto-constructed user profileRasika M. Kaingade, Hemant A. Tirmare. 818-823 [doi]
- Generating and visualizing topic hierarchies from microblogs: An iterative latent dirichlet allocation approachAnoop V. S., Prem Sankar C., Asharaf S., Zonin Alessandro. 824-828 [doi]
- Spam filtering using hybrid local-global Naive Bayes classifierRohit Kumar Solanki, Karun Verma, Ravinder Kumar. 829-833 [doi]
- Twitter sentiment classification using machine learning techniques for stock marketsMohammed Qasem, Ruppa Thulasiram, Parimala Thulasiram. 834-840 [doi]
- Normalized weighted and reverse weighted correlation based Apriori algorithmAmimul Ehsan, Nagamma Patil. 841-847 [doi]
- Knowledge representation and assessment using concept based learningNandu C. Nair, Archana J. S., Shiffon Chatterjee, Kamal Bijlani. 848-854 [doi]
- Factors affecting inflation in India: A cointegration approachAnusree Mohan, P. Balasubramanian. 855-858 [doi]
- Study on inter sector association rules in national stock exchange, IndiaShona Ulagapriya, P. Balasubramanian. 859-865 [doi]
- Impact of grading of IPOs in short run price performance in India: A regression model approachNeeraja S., P. Balasubramanian. 866-868 [doi]
- Anti-scraping application developmentAfzalul Haque, Sanjay Singh. 869-874 [doi]
- Influence of customer acceptance of online sales channel on firm profits under channel competitionRofin T. M., Biswajit Mahanty. 875-881 [doi]
- An expert system for the mauritian family lawSameerchand Pudaruth, Kharuna Mooneapillay. 882-886 [doi]
- Concept mapping and assessment of virtual laboratory experimental knowledgeKrishnashree Achuthan, Lakshmi S. Bose. 887-893 [doi]
- Optimizing ATM placement using game theoryRaja Rathnam, Naidu Kanapaka, Raghu-Kisore Neelisetti. 894-900 [doi]
- Information Security concerns in Digital Services: Literature review and a multi-stakeholder approachHimanshu Singhal, Arpan Kumar Kar. 901-906 [doi]
- Learners and educators attitudes towards mobile learning in higher education: State of the artMostafa Al-Emran, Khaled F. Shaalan. 907-913 [doi]
- Work in Progress - an approach for mapping of auto generated questions to related topics in the curriculumSyaamantak Das, Rajeev Chatterjee. 914-918 [doi]
- Simulating consequences of smoking with Augmented RealityB. Remya Mohan, Kamal Bijlani, R. Jayakrishnan. 919-924 [doi]
- The impact of online advertising by educational institutions on the studentsAnjali Harikumar. 925-928 [doi]
- Impact of learner motivation on MOOC preferences: Transfer vs. made MOOCsDoraisamy Gobu Sooryanarayan, Deepak Gupta. 929-934 [doi]
- Efficient bandwidth utilization during message dissemination among authentic vehicles in VANETBidisha Bhabani, Sulata Mitra. 935-941 [doi]
- 3BR: Genetic algorithm based energy efficient and energy balanced routing algorithm for Wireless Sensor NetworksRam N. Shukla, Arvind S. Chandel, Suneet K. Gupta, J. Jain, A. Bhansali. 942-947 [doi]
- Middle Position Dynamic Energy Opportunistic Routing for Wireless Sensor NetworksMayank Sharma, Yashwant Singh. 948-953 [doi]
- Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in Wireless Sensor NetworksPavithra Bhat, K. Satyanarayan Reddy. 954-958 [doi]
- Energy efficient routing in multi-level LEACH for WSNsRavi Kishore Kodali. 959-965 [doi]
- Energy efficient QoS aware MAC layer time slot allocation scheme for WBASNTamanna Puri, Rama Krishna Challa, Navneet Kaur Sehgal. 966-972 [doi]
- Energy efficient m- level LEACH protocolRavi Kishore Kodali, Venkata Sai Kiran A., Shikha Bhandari, Lakshmi Boppana. 973-979 [doi]
- Low Power Wireless Health Monitoring SystemVinayak Kini, Chinmay Patil, Siddhesh Bahadkar, Sharvil Panandikar, Akhilesh Sreedharan, Abhay Kshirsagar. 980-986 [doi]
- Energy efficient cognitive cross-layer MAC protocolDeepti Singhal, Rama Murthy Garimella. 987-992 [doi]
- A fault tolerant approach to extend network life time of wireless sensor networkRavindra V. Kshirsagar, Ashish B. Jirapure. 993-998 [doi]
- Cross Layer Best effort QoS aware routing protocol for Ad Hoc NetworkMahadev A. Gawas, Lucy J. Gudino, K. R. Anupama. 999-1005 [doi]
- Weightage based Secure Energy Efficient Clustering algorithm in MANETKanwaljeet Kaur, Jaspinder Singh, Himani. 1006-1012 [doi]
- Addressing node isolation attack in OLSR protocolBalaji S. Shivanakar, Sandeep A. Thorat. 1013-1019 [doi]
- Energy, link stability and queue aware OLSR for Mobile Ad hoc NetworkRohit B. Patil, Ashwini B. Patil. 1020-1025 [doi]
- Automated Surveillance of Computer Monitors in LabsKhalid Babutain, Saied Alaklobi, Anwar Alghamdi, Sreela Sasi. 1026-1030 [doi]
- Recognition of stonefish from underwater videoHattan Ashour, Sreela Sasi. 1031-1036 [doi]
- Novel leases for IaaS cloudSanjaya K. Panda, Prasanta K. Jana. 1037-1043 [doi]
- Estimator based controllers for hybrid systems with uncertainties - an experimental validationShijoh Vellayikot, M. V. Vaidyan. 1044-1051 [doi]
- A modified MFCC feature extraction technique For robust speaker recognitionDiksha Sharma, Israj Ali. 1052-1057 [doi]
- Hybrid carrier based space vector modulation for PV fed asymmetric cascaded multilevel inverterSujitha N., Krithiga S.. 1058-1064 [doi]
- Classification and clustering for neuroinformatics: Assessing the efficacy on reverse-mapped NeuroNLP data using standard ML techniquesNidheesh Melethadathil, Priya Chellaiah, Bipin Nair, Shyam Diwakar. 1065-1070 [doi]
- Approximate radial gradient transform based face recognitionB. H. Shekar, D. S. Rajesh. 1071-1077 [doi]
- An adaptive method for mining frequent itemsets efficiently: An improved header tree methodO. Jamsheela, Raju G.. 1078-1084 [doi]
- Design, simulation and implementation of cascaded path tracking controller for a differential drive mobile robotVinod Raj N., Abraham T. Mathew. 1085-1090 [doi]
- Securing the contents of document images using knight moves and genetic approachJalesh kumar, S. Nirmala. 1091-1095 [doi]
- On selection of attributes for entropy based detection of DDoSSidharth Sharma, Santosh Kumar Sahu, Sanjay Kumar Jena. 1096-1100 [doi]
- Hardware-software co-design of elliptic curve digital signature algorithm over binary fieldsBhanu Panjwani, Deval C. Mehta. 1101-1106 [doi]
- Boiler efficiency estimation from hydrogen content in fuelChayalakshmi C. L., D. S. Jangamshetti, Savita Sonoli. 1107-1110 [doi]
- An approach for feature-level bug prediction using test casesPrateek Anand. 1111-1117 [doi]
- Mobile cloud integration for industrial data interchangePinku Hazarika, Sanath Shenoy, Seshu Babu Tolety, Naresh Kalekar. 1118-1122 [doi]
- Acute ischemic stroke detection using wavelet based fusion of CT and MRI imagesPraveen R. Mirajkar, Kishan Ashok Bhagwat, ArunVikas Singh, Ashalatha M. E.. 1123-1130 [doi]
- Quantitative assessment of applications for cloud burstingKrishna Kumar Gopinathan, Raghu P. Pushpakath, Sachin Kanoth Madakkara. 1131-1136 [doi]
- Morphology based radon processed neural network for transmission line fault detectionVinayesh Sulochana, Anish Francis, Andrew Tickle. 1137-1143 [doi]
- Globally accessible machine automation using Raspberry pi based on Internet of ThingsV. Sandeep, K. Lalith Gopal, S. Naveen, A. Amudhan, L. S. Kumar. 1144-1147 [doi]
- Design and implementation of sample and hold circuit in 180nm CMOS technologyPrakruthi T. G., Siva Yellampalli. 1148-1151 [doi]
- Bus bandwidth monitoring, prediction and controlNitin Chaudhary, Thummala Pallavi, Zaheer Sheriff K.. 1152-1158 [doi]
- Machine learning for seizure prediction: A revamped approachSai Kumar A., Lavi Nigam, Deepthi Karnam, Sreerama K. Murthy, Petro Fedorovych, Vasu Kalidindi. 1159-1164 [doi]
- Enhancement of unambiguous DOA estimation for Phase Comparison Monopulse radarVandana AR., Vinod Kumar Jaysaval, C. R. Byra Reddy. 1165-1169 [doi]
- Interfacing ICRH DAC system with WEBRamesh Joshi, H. M. Jadav, S. V. Kulkarni. 1170-1173 [doi]
- Train rolling stock segmentation with morphological differential gradient active contoursP. V. V. Kishore, Ch. Raghava Prasad. 1174-1178 [doi]
- A vision based motion estimation in underwater imagesPushpendra Kumar, Sanjeev Kumar, R. Balasubramanian. 1179-1184 [doi]
- Adaptive digital scan variable pixelsSherin Sugathan, Reshma Scaria, Alex Pappachen James. 1185-1188 [doi]
- Feature extraction and LDA based classification of lung nodules in chest CT scan imagesTaruna Aggarwal, Asna Furqan, Kunal Kalra. 1189-1193 [doi]
- Fractal image compression for HD images with noise using wavelet transformsPrashanth N., Arun Vikas Singh. 1194-1198 [doi]
- Image segmentation using thresholding for cell nuclei detection of colon tissueArchana A. Nawandhar, Lakshmi Yamujala, Navin Kumar. 1199-1203 [doi]
- De-noising of ultrasound image using discrete wavelet transform by symlet wavelet and filtersAshwani Kumar Yadav, R. Roy, Archek Parveen Kumar, Ch. Sandesh Kumar, Shailendra Kr. Dhakad. 1204-1208 [doi]
- Crowd Density Analysis and trackingP. V. V. Kishore, R. Rahul, K. Sravya, A. S. C. S. Sastry. 1209-1213 [doi]
- Offline handwritten Signature Verification using low level stroke featuresMohitkumar A. Joshi, Mukesh M. Goswami, Hardik H. Adesara. 1214-1218 [doi]
- Method for characterize landslide caused by heavy rainfall by using smoothing methodSayali Kokane, Rohini Agawane. 1219-1224 [doi]
- A Quantum Bi-Directional Self-Organizing Neural Network (QBDSONN) for binary image denoisingDebanjan Konar, Siddhartha Bhattacharyya, Nibaran Das, Bijaya Ketan Panigrahi. 1225-1230 [doi]
- Classification of handwritten Gujarati numeralsArchana N. Vyas, Mukesh M. Goswami. 1231-1237 [doi]
- Latent Fingerprint preprocessing: Orientation field correction using region wise dictionarySachin Kumar, R. Leela Velusamy. 1238-1243 [doi]
- DPCM Block-based Compressed sensing with frequency domain filtering and Lempel-Ziv-Welch compressionSoham Bhattacharjee, Saikat Kundu Choudhury, Shrayan Das, Ankita Pramanik. 1244-1249 [doi]
- An efficient hybrid scheme for key frame extraction and text localization in videoMonika Singh, Amanpreet Kaur. 1250-1254 [doi]
- Generation & analysis of association rules from android application clonesUmang Saini, Shilpa Verma. 1255-1262 [doi]
- A compact multichannel data acquisition and processing system for IoT applicationsMaria George, Akash J. B., Azad Hussain, Sreedharan Pillai Sreelal. 1263-1267 [doi]
- A fuzzy-timestamp based adaptive gateway discovery protocol in integrated Internet-MANETAnshu Pandey, Arun Bajpai, Deepak Singh, Rakesh Kumar. 1268-1273 [doi]
- Interactive email system based on blink detectionAnjusree V. K., Gopu Darsan. 1274-1277 [doi]
- Directional captcha: A novel approach to text based CAPTCHAAditya Kaushal Ranjan, Binay Kumar. 1278-1283 [doi]
- Multi-agent planning with joint actionsSatyendra Singh Chouhan, Ashutosh Singh, Rajdeep Niyogi. 1284-1290 [doi]
- Web page ranking using domain based knowledgeSutirtha Kumar Guha, Anirban Kundu, Rana Dattagupta. 1291-1297 [doi]
- Enhancing statistical semantic networks with concept hierarchiesSofia Francis Xavier, Lakshmi Priyanka Selvaraj, Vidhya Balasubramanian. 1298-1307 [doi]
- A new approach for mixed bandwidth deterministic communication using EthernetAsif S., C. M. Ananda, Pradeep Kumar B., Nagamani K.. 1308-1313 [doi]
- Multicasting and broadcasting of data through TURN serverKiran Kumar Guduru, Usha J.. 1314-1319 [doi]
- EEG based detection of area of interest in a web pageDivya Bansal, Joy Bose, Ankit Kumar. 1320-1325 [doi]
- An affordable approach for detecting drivers' drowsiness using EEG signal analysisA. S. Abdel-Rahman, Ahmed Farag Seddik, Doaa M. Shawky. 1326-1332 [doi]
- Trimiti - a real-time stereoscopic vision system for neurosurgery training using surgical microscopePritam Prakash Shete, Ashish Suri, Dinesh Madhukar Sarode, Mohini Laghate, Surojit Kumar Bose. 1333-1339 [doi]
- UI design for Language Translator Module in Swasthya slate (m-Health tool)Sangeetha Rajesh, Lifna C. S.. 1340-1344 [doi]
- TCmed - A secure telecollaboration network for medical professionals including workflow support and patient participationMartin Staemmler, Klaus-Dieter Luitjens, Thomas van Bommel, Ulrich Hafa, Uwe Engelmann, Heiko Münch, Johannes Sturm. 1345-1351 [doi]
- A service oriented collaborative model for cattle health care systemAjay Parikh, Kanubhai Patel, Bhairavi Shah. 1352-1356 [doi]
- Cardiogenic shock monitoring system for ambulanceSuma K. V., Sandeep S., Vikram S., Karthik Hanjar, Sudharshan S. M.. 1357-1360 [doi]
- Wavelet based non local means filter for despeckling of intravascular ultrasound imageDebarghya China, Pabitra Mitra, Chandan Chakraborty, K. M. Mandana. 1361-1365 [doi]
- Multi-modal evolutionary ensemble classification in medical diagnosis problemsSøren Atmakuri Davidsen, M. Padmavathamma. 1366-1370 [doi]
- A statistically resilient method of weight initialization for SFANNApeksha Mittal, Pravin Chandra, Amit Prakash Singh. 1371-1376 [doi]
- Glottal pathology discrimination using ANN and SVMAshwini Visave, Pramod H. Kachare, Amutha Jeyakumar, Alice Cheeran, Jagannath H. Nirmal. 1377-1381 [doi]
- Prototyping an NFC based Personal Health DeviceJavaid Nabi, Abhijit R. D., Raghav Lakhoia. 1382-1387 [doi]
- Statistical features based epileptic seizure EEG detection - an efficacy evaluationGopika Gopan K., Neelam Sinha, Dinesh Babu J.. 1394-1398 [doi]
- Integrating contemporary technologies with Ayurveda: Examples, challenges, and opportunitiesOge Marques. 1399-1407 [doi]
- Classification of distorted text and speech using projection pursuit featuresRajesh Asthana, Neelam Verma, Ram Ratan. 1408-1413 [doi]
- Multi-band sum of spectrogram based audio fingerprinting of Indian film songs for multi-lingual song retrievalS. Sri Ranjani, K. Karthik, P. K. Bora, V. Abdulkareem. 1414-1420 [doi]
- Detection of purple fringing aberration patterns and its application to forensic analysis of spliced imagesParveen Malik, Kannan Karthik. 1421-1427 [doi]
- Logarithmic dyadic wavelet transform based face recognitionB. H. Shekar, D. S. Rajesh, M. Sharmila Kumari. 1428-1435 [doi]
- Text localization in video/scene images using Kirsch Directional MasksB. H. Shekar, L. Smitha M.. 1436-1440 [doi]
- Improving performance analysis of multimedia Wireless sensor network: A surveyAnupama S. Budhewar, Ravindra C. Thool. 1441-1448 [doi]
- Robust Audio steganography based on Advanced Encryption standards in temporal domainAniruddha Kanhe, G. Aghila, Ch. Yaswanth Sai Kiran, Ch. Hanuma Ramesh, Gabbar Jadav, M. Gowtham Raj. 1449-1453 [doi]
- An efficient shadow removal method using HSV color space for video surveillanceShraddha Singh, Tushar Patnaik. 1454-1460 [doi]
- Dissolve detection in videos using an ensemble approachHrishikesh Bhaumik, Siddhartha Bhattacharyya, Manideepa Chakraborty, Susanta Chakraborty. 1461-1467 [doi]
- Text normalization of code mix and sentiment analysisShashank Sharma, PYKL Srinivas, Rakesh Chandra Balabantaray. 1468-1473 [doi]
- AGRI-QAS question-answering system for agriculture domainSharvari Gaikwad, Rohan Asodekar, Sunny Gadia, Vahida Z. Attar. 1474-1478 [doi]
- Relative clause based text simplification for improved English to Hindi translationSandeep Saini, Umang Sehgal, Vineet Sahula. 1479-1484 [doi]
- Children story classification based on structure of the storyHarikrishna D. M., K. Sreenivasa Rao. 1485-1490 [doi]
- Raga identification based on Normalized Note Histogram featuresR. Pradeep, Prasenjit Dhara, K. S. Rao, Pallab Dasgupta. 1491-1496 [doi]
- A synchronised tree adjoining Grammar for English to Tamil Machine TranslationVijay Krishna Menon, S. Rajendran, K. P. Soman. 1497-1501 [doi]
- A hybrid Parts Of Speech tagger for Malayalam languageAnisha Aziz T., Sunitha C.. 1502-1507 [doi]
- Kannada text summarization using Latent Semantic AnalysisGeetha J. K., Deepamala N.. 1508-1512 [doi]
- Voice conversion: Wavelet based residual selectionPramod H. Kachare, Alice Cheeran, Jagganath Nirmal, Mukesh Zaveri. 1513-1518 [doi]
- Author identification based on word distribution in word spaceBarathi Ganesh H. B., Reshma U., Anand Kumar M.. 1519-1523 [doi]
- Statistical Tagger for Bhojpuri (employing Support Vector Machine)Srishti Singh, Girish Nath Jha. 1524-1529 [doi]
- A novel approach in channel independent speaker verification system for Malayalam database using GMM-SVM frame workGayathri S., Anish Babu K. K.. 1530-1534 [doi]
- Classification of offline gujarati handwritten charactersSwital J. Macwan, Archana N. Vyas. 1535-1541 [doi]
- Transcription of Telugu TV news using ASRM. Ram Reddy, P. Laxminarayana, A. V. Ramana, Markandeya J. L., J. N. V. S. Indu Bhaskar, B. Harish, S. Jagadheesh, E. Sumalatha. 1542-1545 [doi]
- Automated Question Generation tool for structured dataA. Shirude, S. Totala, S. Nikhar, V. Attar, J. Ramanand. 1546-1551 [doi]
- Breast cancer staging using Natural Language ProcessingJohanna Johnsi Rani G., Dennis Gladis, Marie Therese Manipadam, Gunadala Ishitha. 1552-1558 [doi]
- An information retrieval system for Malayalam using query expansion techniqueArjun Babu, Sindhu L.. 1559-1564 [doi]
- Machine translation from English to Malayalam using transfer approachAasha V. C., Amal Ganesh. 1565-1570 [doi]
- A computational framework for Tamil document classification using Random Kitchen SinkSanjanasri J. P., Anand Kumar M.. 1571-1577 [doi]
- Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection systemVani K., Deepa Gupta. 1578-1584 [doi]
- Multi-secret sharing threshold access structureL. Siva Reddy, Munaga V. N. K. Prasad. 1585-1590 [doi]
- Palmprint retrieval based on match scores and decision-level fusionIlaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati. 1591-1595 [doi]
- Information retrievable from an image in natural lightLev B. Levitin, Tommaso Toffoli. 1596-1598 [doi]
- Automatic classification of cotton boll using signature curve and boundary descriptorsSandeep Kumar Jain, Manish Kashyap, Yogesh Choudhary, Swaraj Singh Pal, Mahua Bhattacharya. 1599-1605 [doi]
- A proposed model of Graph Based Chain Code Method for identifying printed & handwritten Bengali characterArindam Pramanik, Sreeparna Banerjee. 1606-1612 [doi]
- Computer based RR-Interval detection system with ectopy correction in HRV dataNazneen Akhter, Hanumant Gite, Sumegh Tharewal, K. V. Kale. 1613-1618 [doi]
- Spike encoding for pattern recognition: Comparing cerebellum granular layer encoding and BSA algorithmsChaitanya Medini, Ritu Maria Zacharia, Bipin Nair, Asha Vijayan, Lekshmi Priya Rajagopal, Shyam Diwakar. 1619-1625 [doi]
- Adaptive visual tracking on Euclidean space using PCAShreenandan Kumar, Suman Kumari, Sucheta Patro, Tushar Shandilya, Anuja Kumar Acharya. 1626-1630 [doi]
- An approach for reducing morphological operator dataset and recognize Optical Character based on significant featuresAshis Pradhan, Mohan P. Pradhan, Amit Prasad. 1631-1638 [doi]
- Analyzing hardware constraints of Gabor filtering operation for Facial Expression Recognition SystemSumeet Saurav, Ravi Saini, Sanjay Singh, Anil K. Saini, Nidhi Sharma. 1639-1645 [doi]
- Finger vein recognition using Discrete Wavelet Packet Transform based featuresSantosh P. Shrikhande, H. S. Fadewar. 1646-1651 [doi]
- Features based classification of hard exudates in retinal imagesAnup V. Deshmukh, Tejas G. Patil, Sanika S. Patankar, Jayant V. Kulkarni. 1652-1655 [doi]
- Performance comparison of SOAP and REST based Web Services for Enterprise Application IntegrationSmita Kumari, Santanu Kumar Rath. 1656-1660 [doi]
- Fragile video watermarking for tampering detection and localizationRupali D. Patil, Shilpa Metkar. 1661-1666 [doi]
- Games as nonliterary narratives: A temporal view of Aarseth's ontic dimensionsAnjana Anil, Chitra Ramakrishnan. 1667-1671 [doi]
- VLSI implementation of bit serial architecture based multiplier in floating point arithmeticJitesh R. Shinde, Suresh S. Salankar. 1672-1677 [doi]
- A hierarchical approach to adaptive distributed scheduling in cloudPrashant Misra, Shashank Srivastava, Nishant Narang, Sonu Goel, Prasenjit Maity, Aditya Saxena. 1678-1687 [doi]
- Object oriented accountability approach in cloud for data sharing with patchy image encryptionSwapnil Dattatraya Taru, Vikas B. Maral. 1688-1693 [doi]
- Multi-objective optimization for VLSI implementation of Artificial Neural NetworkJitesh R. Shinde, S. Salankar. 1694-1700 [doi]
- Hybrid approach to crime prediction using deep learningJazeem Azeez, D. John Aravindhar. 1701-1710 [doi]
- Virtual group study rooms for MOOCSDivya Mahadevan, Ashwini Kumar, Kamal Bijlani. 1711-1714 [doi]
- Analyzing impact of image scaling algorithms on viola-jones face detection frameworkHimanshu Sharma, Sumeet Saurav, Sanjay Singh, Anil K. Saini, Ravi Saini. 1715-1718 [doi]
- Disaster analysis through tweetsHimanshu Shekhar, Shankar Setty. 1719-1723 [doi]
- Consensus based ensemble model for spam detectionParitosh Pantola, Anju Bala, Prashant Singh Rana. 1724-1727 [doi]
- Influence of learners' motivation on responses to Facebook promotions of online coursesRahul Ramesh, Deepak Gupta. 1728-1733 [doi]
- Ensemble approach to detect profile injection attack in recommender systemAshish Kumar, Deepak Garg, Prashant Singh Rana. 1734-1740 [doi]
- Telemedicine for emergency care management using WebRTCVidul A. P., Shibin Hari, Pranave K. P., Vysakh K. J., Archana K. R.. 1741-1745 [doi]
- A novel multi metric QoS routing protocol for MANETPrakash Srivastava, Rakesh Kumar. 1746-1752 [doi]
- Paradigm shift in mobile communication carriersManish Kumar, Kapil Kant Kamal, Bharat Varyani, Sumit Barwad. 1753-1756 [doi]
- An investigation of fractal antenna arrays for side lobe reduction with a fractal distribution of currentV. A. Sankar Ponnapalli, P. V. Y. Jayasree. 1757-1761 [doi]
- Realizing cooperative beamforming scenario with MIMO-OFDM DF relay channels and performance comparison based on modulation scheme and energy efficiencyAnunchitha. 1762-1765 [doi]
- Hybrid intelligent access control framework to protect data privacy and theftJignesh C. Doshi, Bhushan Trivedi. 1766-1770 [doi]
- Low complexity channel estimation using fuzzy Kalman Filter for fast time varying MIMO-OFDM systemsVinod Gutta, Kamal Kanth Toguru Anand, Teja Sri Venkata Saidhar Movva, Bhargava Rama Korivi, Santosh Killamsetty, Sudheesh Padmanabhan. 1771-1774 [doi]
- A status quo of WSN systems for agricultureVijo T. Varghese, Kalyan Sasidhar, Rekha P.. 1775-1781 [doi]
- Efficient Multicast Algorithm for Dynamic Intra Cluster Device-to-Device communication for small world model paperM. Pushpalatha, N. V. Shruthi, T. K. Ramesh, Sandeep Kumar Konda. 1782-1786 [doi]
- Periodic channel-hopping sequence for rendezvous in cognitive radio networksRam Narayan Yadav, Rajiv Misra. 1787-1792 [doi]
- A novel method for error correction using Redundant Residue Number System in digital communication systemsJilu James, Ameenudeen Pe. 1793-1798 [doi]
- Third order wideband bandpass filter for ISM band using stepped and hairpin compositeMangesh J. Joshi, A. B. Nandgaonkar. 1799-1802 [doi]
- Remote monitoring and control of a mobile robot system with obstacle avoidance capabilityDhiraj Sunehra, Ayesha Bano, Shanthipriya Yandrathi. 1803-1809 [doi]
- Experimental study on wide band FM receiver using GNURadio and RTL-SDRKhyati Vachhani, Rao Arvind Mallari. 1810-1814 [doi]
- Design of a novel microstrip-fed UWB fractal antenna for Wireless Personal Area communicationsSusila M., T. Rama Rao. 1815-1818 [doi]
- An optimized hyper kurtosis based modified duo-histogram equalization (HKMDHE) method for contrast enhancement purpose of low contrast human brain CT scan imagesSabyasachi Mukhopadhyay, Nirmalya Ghosh, Ritwik Burman, Prasanta K. Panigrahi, Sawon Pratiher, M. Venkatesh 0002, Soham Mandal, Satyasaran Changdar. 1819-1821 [doi]
- CFS performance improvement using Binomial HeapShirish Singh, Praveen Kumar. 1822-1824 [doi]
- Security analysis of tree and non-tree based group key management schemes under strong active outsider attack modelPurushothama B. R., Nishat Koti. 1825-1829 [doi]
- Fingerprint fuzzy vault using hadamard transformationDeepika Bansal, Sanjeev Sofat, Manvjeet Kaur. 1830-1834 [doi]
- Real-time swara recognition system in Indian Music using TMS320C6713M. S. Sinith, Shikha Tripathi, K. V. V. Murthy. 1835-1838 [doi]
- Is Viral Marketing an effective and reliable method of advertising and branding? A perspective of Gen- Y of IndiaUditi Rawat, Rajiv Prasad. 1839-1842 [doi]
- Cloud-based Integrated Medication Management SystemJoseph Mathew, Paul Philip. 1843-1847 [doi]
- Advanced algorithm for gender prediction with image quality assessmentAnusree Bhaskar, Aneesh R. P.. 1848-1855 [doi]
- 3D face recognition using optimised directional faces and fourier transformNaveen S., Shilpa S. Nair, R. S. Moni. 1856-1861 [doi]
- Security Requirements Elicitation and Assessment Mechanism (SecREAM)Rajat Goel, M. C. Govil, Girdhari Singh. 1862-1866 [doi]
- Evaluating the theoretical feasibility of an SROP attack against OxymoronZubin Mithra, Vipin P.. 1872-1876 [doi]
- Permutation based image encryption algorithm using block cipher approachAditya Rawat, Ipshita Gupta, Yash Goel, Nishith Sinha. 1877-1882 [doi]
- A secure SMS protocol for implementing digital cash systemN. Raghu Kisore, Supriya Sagi. 1883-1892 [doi]
- Using photomosaic and steganographic techniques for hiding information inside image mosaicsArthe Henriette Pascaline, Li Chun Fong Christopher, Maleika Heenaye-Mamode Khan, Sameerchand Pudaruth. 1893-1897 [doi]
- Implementing high interaction honeypot to study SSH attacksM. Solomon Zemene, P. S. Avadhani. 1898-1903 [doi]
- Trust analysis of execution platform for self protected mobile codeShashank Srivastava, Divya Kumar, Shuchi Chandra. 1904-1909 [doi]
- New secret sharing scheme for multipartite access structures with threshold changeabilityAppala Naidu Tentu, Banita Mahapatra, V. Ch. Venkaiah, V. Kamakshi Prasad. 1910-1916 [doi]
- A novel approach for circular random grid with share authenticationSandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose. 1917-1923 [doi]
- Extended visual cryptography for general access structures using random gridsSonu K. Mishra, Kumar Biswaranjan. 1924-1929 [doi]
- Security improvement in fingerprint authentication system using virtual biometricAthira Ram A., Jyothis T. S.. 1930-1932 [doi]
- Design of efficient ID-based group key agreement protocol suited for Pay-TV applicationAbhimanyu Kumar, Sachin Tripathi, Priyanka Jaiswal. 1940-1944 [doi]
- Improving attack detection in self-organizing networks: A trust-based approach toward alert satisfactionManuel Gil Pérez, Félix Gómez Mármol, Gregorio MartÃnez Pérez. 1945-1951 [doi]
- Analytical study of Cognitive Radio Networks (CRNs): An exploration for optimum utilization of spectrum holeNitul Dutta, Hiren Kumar Deva Sarma. 1952-1959 [doi]
- A multipath routing protocol for Cognitive Radio AdHoc Networks (CRAHNs)Nitul Dutta, Hiren Kumar Deva Sarma, Ashish Kr. Srivastava. 1960-1965 [doi]
- Saliency based image steganography with varying base SDS and multi-objective genetic algorithmRam Prakash Sharma, Rajarshi Pal. 1966-1974 [doi]
- Exploiting curse of diversity for improved network securityGhanshyam S. Bopche, Babu M. Mehtre. 1975-1981 [doi]
- Data hiding scheme based on octagon shaped shellSujitha Kurup, Anjana Rodrigues, Archana Bhise. 1982-1986 [doi]
- Handling cold start problem in Recommender Systems by using Interaction Based Social Proximity factorPunam Bedi, Chhavi Sharma, Pooja Vashisth, Deepika Goel, Muskan Dhanda. 1987-1993 [doi]
- Image watermarking on degraded compressed sensing measurementsAnirban Bose, Santi P. Maity, Seba Maity. 1994-2000 [doi]
- An efficient classification model for detecting advanced persistent threatSaranya Chandran, Hrudya P., Prabaharan Poornachandran. 2001-2009 [doi]
- XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applicationsMukesh Kumar Gupta, Mahesh Chandra Govil, Girdhari Singh, Priya Sharma. 2010-2015 [doi]
- Identifying metamorphic virus using n-grams and Hidden Markov ModelShiva Prasad Thunga, Raghu-Kisore Neelisetti. 2016-2022 [doi]
- Network intrusion detection system using J48 Decision TreeShailendra Sahu, B. M. Mehtre. 2023-2026 [doi]
- Inter-domain role based access control using ontologyS. Chandra Mouliswaran, Ch. Aswani Kumar, C. Chandrasekar. 2027-2032 [doi]
- Provable secure protected designated proxy signature with revocationDeepnarayan Tiwari, G. R. Gangadharan, Maode Ma. 2033-2041 [doi]
- A secure non-blind block based digital image watermarking technique using DWT and DCTRanjan Kumar Arya, Shalu Singh, Ravi Saharan. 2042-2048 [doi]
- Variable strength interaction test set generation using Multi Objective Genetic AlgorithmsSangeeta Sabharwal, Manuj Aggarwal. 2049-2053 [doi]
- Security on MANETs using block codingSyed Jalal Ahmad, P. Radha Krishna. 2054-2060 [doi]
- Secure neighbour discovery in wireless mesh networks using connectivity informationP. Subhash, S. Ramachandram. 2061-2066 [doi]
- Ciphertext policy-hiding attribute-based encryptionUmesh Chandra Yadav, Syed Taqi Ali. 2067-2071 [doi]
- A novel 3-4 image secret sharing schemeRituraj Roy, Sayantani Bandyopadhyay, Shyamalendu Kandar, Bibhas Chandra Dhara. 2072-2075 [doi]
- An overhearing based routing scheme for Wireless Sensor NetworksRiddhiman Sett, Indrajit Banerjee. 2076-2082 [doi]
- A grouping based prioritized sensor data fusion algorithm for deciding the state of a coal mineAnibroto Sarkar, Indrajit Banerjee. 2083-2088 [doi]
- A preemptive approach to reduce average queue length in VANETsPunam Bedi, Vinita Jindal, Ruchika Garg, Heena Dhankani. 2089-2095 [doi]
- A novel routing protocol using heterogeneous Zigbee modules for mobile sensor networkRupam Some, Indrajit Banerjee. 2096-2102 [doi]
- Increasing traffic safety during single lane passing using wireless sensor networksUnnikrishnan H., Vishnu Narayanan B., Alin Devassy Ananyase, Anand Ramachandran. 2103-2107 [doi]
- Bandwidth Efficient Hybrid Synchronization for Wireless Sensor NetworkDnyaneshwar Mantri, Neeli Rashmi Prasad, Ramjee Prasad. 2108-2113 [doi]
- SNR Based Master-Slave Dynamic Device to Device communication in underlay cellular networksGiriraja C. V., T. K. Ramesh. 2114-2117 [doi]
- Composite interference mapping model for Interference Fault-Free Transmission in WSNBeneyaz A. Begum, N. V. Satyanarayana. 2118-2125 [doi]
- LoENA: Low-overhead encryption based node authentication in WSNPritam Banerjee, Tanusree Chatterjee, Sipra Das Bit. 2126-2132 [doi]
- A vehicular dynamics based technique for efficient traffic managementShagun Aggarwal, Rasmeet S. Bali. 2133-2138 [doi]
- Cross layer routing and rate adaptation for video transmission in multi-radio Wireless Mesh NetworksKiran Patil, D. G. Narayan, Uma Mudenagudi, Jyoti Amboji. 2139-2144 [doi]
- Performance analysis of erasure coding based data transfer in Underwater Acoustic Sensor NetworksGeethu K. S., Babu A. V.. 2145-2151 [doi]
- A switched beam antenna array with butler matrix network using substrate integrated waveguide technology for 60 GHz communicationsNishesh Tiwari, T. Rama Rao. 2152-2157 [doi]
- Secure communication in mobile underwater wireless sensor networksAnjana P. Das, Sabu M. Thampi. 2164-2173 [doi]
- Small bowel image classification using dual tree complex wavelet-based cross co-occurrence features and canonical discriminant analysisGuangyi Chen, Sridhar Krishnan. 2174-2179 [doi]
- Remote sensing image fusion using Hausdorff fractal dimension in shearlet domainBiswajit Biswas, Abhishek Dey, Kashi Nath Dey. 2180-2185 [doi]
- Remote sensing image fusion using Statistical Univariate Finite Mixture Model in Shearlet DomainBiswajit Biswas, Abhishek Dey, Kashi Nath Dey. 2186-2191 [doi]
- 2D non-linear state optimization using evolutionary techniquesRaiiv Kapoor, Ashish Dhiman, Akshay Uppal. 2192-2196 [doi]
- Significance of implementing polarity detection circuits in audio preamplifiersB. Deepak, D. Govind. 2197-2200 [doi]
- A modified approach in CBIR based on combined edge detection, color and discrete Wavelet TransformNooby Mariam, Rejiram R.. 2201-2205 [doi]
- Pause duration model for Malayalam TTSJesin James, Deepa P. Gopinath. 2206-2210 [doi]
- Continuous dynamic Indian Sign Language gesture recognition with invariant backgroundsKumud Tripathi, Neha Baranwal, Gora Chand Nandi. 2211-2216 [doi]
- Autonomous control of Flapping Wing Vehicles using graphical user interfaceS. Sankarasrinivasan, E. Balasubramanian, L. J. Yang, F. Y. Hsiao. 2217-2220 [doi]
- Phase congruency and morphology based approach for text localization in videosB. H. Shekar, L. Smitha M.. 2221-2225 [doi]
- Spectral-spatial hyperspectral image compression based on measures of central tendencyGayatri Deore, Srividya Rajaraman, Rujuta Awate, Saili Bakare. 2226-2232 [doi]
- Detection of Retinopathy of Prematurity using multiple instance learningPriya Rani, Elagiri Ramalingam Rajkumar, Kumar T. Rajamani, Melih Kandemir, Digvijay Singh. 2233-2237 [doi]
- On the classification of sleep states by means of statistical and spectral features from single channel ElectroencephalogramAhnaf Rashik Hassan, Syed Khairul Bashar, Mohammed Imamul Hassan Bhuiyan. 2238-2243 [doi]
- Comparative evaluation of age classification from facial imagesRaunak M. Borwankar, Gaurav S. Pednekar, Saurabh A. Deshpande, Purva S. Sawant, Satishkumar S. Chavan. 2244-2249 [doi]
- Boosting retrieval efficiency with image replacement based relevance feedbackE. R. Vimina, K. Poulose Jacob, Navya Nandakumar. 2250-2255 [doi]
- Phase unwrapping with Kalman filter based denoising in digital holographic interferometryP. Ram Sukumar, Rahul G. Waghmare, Rakesh Kumar Singh, G. R. K. S. Subrahmanyam, Deepak Mishra. 2256-2260 [doi]
- A novel dimensionality reduction method for cancer dataset using PCA and Feature RankingNitika Sharma, Kriti Saroha. 2261-2264 [doi]
- Noise sensitivity of Teager-Kaiser energy operators and their ratiosPradeep Kr. Banerjee, Nirmal B. Chakrabarti. 2265-2271 [doi]
- An improved approach for automatic denoising and binarization of degraded document images based on region localizationGarima Chutani, Tushar Patnaik, Vimal Dwivedi. 2272-2278 [doi]
- A comparative analysis of various image enhancement techniques for facial imagesNeha Sharma, Sumeet Saurav, Sanjay Singh, Ravi Saini, Anil K. Saini. 2279-2284 [doi]
- Detection of high-risk macular edema using texture features and classification using SVM classifierAditya Kunwar, Shrey Magotra, M. Partha Sarathi. 2285-2289 [doi]
- A study of F0 estimation based on RAPT framework using sustained vowelV. Prarthana Karunaimathi, Dennis Gladis, Usha Dalvi. 2290-2295 [doi]
- A noval method on action recognition based on region and speed of skeletal end pointsGeetha M., Aparna Suresh B., Rohith P., Gayathri Unni, Harsha M. P.. 2296-2301 [doi]
- Gait Recognition using skeleton dataPrathap C., Sumanth Sakkara. 2302-2306 [doi]
- Activity detection with dendrite threshold modelDaniyar Bakirov, Anuar Dorzhigulov, Swathikiran Sudhakaran, Alex Pappachen James. 2307-2310 [doi]
- An improved content aware image resizing algorithm based on a novel adaptive seam detection techniqueBinita Saha, Tanmoy Dasgupta, Samar Bhattacharya. 2311-2316 [doi]
- On compressed sensing image reconstruction using linear prediction in adaptive filteringSheikh Rafiul Islam, Santi P. Maity, Ajoy Kumar Ray. 2317-2323 [doi]
- Socio-physical interaction network (SPIN)Sobin C. C., Alark Sharma, Deepak S., Vaskar Raychoudhary. 2324-2330 [doi]
- Application of IoT in detecting health risks due to flickering artificial lightsSandip Das, Manojit Ballav, Saheli Karfa. 2331-2334 [doi]
- Smart Cities in developing economies: A literature review and policy insightsSheshadri Chatterjee, Arpan Kumar Kar. 2335-2340 [doi]
- A method for community recommendation for social networksSoumyajyoti Banerjee, Rajdeep Niyogi. 2341-2347 [doi]
- Architecture for Internet of Things to minimize human interventionRupali Shanbhag, Radha Shankarmani. 2348-2353 [doi]
- Machine learning approach for detection of cyber-aggressive comments by peers on social media networkVikas S. Chavan, Shylaja S. S.. 2354-2358 [doi]
- Predicting the next move: Determining mobile user location using semantic informationNitin Bhyri, Gautham V. Kidiyoor, Varun S. K., Subramaniam Kalambur, Dinkar Sitaram, Chid Kollengode. 2359-2365 [doi]
- Smart WSN-based ubiquitous architecture for smart citiesSatyanarayana V. Nandury, Beneyaz A. Begum. 2366-2373 [doi]
- A novel scheme for Compiler Optimization FrameworkN. A. B. Sankar Chebolu, Rajeev Wankar. 2374-2380 [doi]
- Sentiment Analysis of Malayalam film review using machine learning techniquesDeepu S. Nair, Jisha P. Jayan, R. R. Rajeev, Elizabeth Sherly. 2381-2384 [doi]
- Behavioral analysis of Safety Critical Systems using formal methodsShreesha Rao P., Manju Nanda, J. Jayanthi. 2385-2391 [doi]
- An approach for decomposing requirements into analysis pattern using problem frames (DRAP-PF)Kumar Kannan, Saravanaguru RA. K.. 2392-2396 [doi]
- "Resuscitation of syllogism within unified modeling language levels through the renovation of object diagram"Shivanand M. Handigund, Shakuntala Sajjanar, B. N. Arunakumari. 2397-2401 [doi]
- Analysis of Java programs using Joana and Java SDG APIRanjan Kumar, Subhrakanta Panda, Durga Prasad Mohapatra. 2402-2408 [doi]
- CPU temperature aware scheduler a study on incorporating temperature data for CPU scheduling decisionsChandra Mohan Velpula, Jayant, Vishal Shahi. 2409-2413 [doi]
- Building a parallel Corpora: Translation issues and remedial caseArchana G. P., Jithesh V. S., Remya L. B., Elizabeth Sherly. 2414-2417 [doi]
- Genre Specific Aspect Based Sentiment Analysis of Movie ReviewsViraj Parkhe, Bhaskar Biswas. 2418-2422 [doi]