Abstract is missing.
- Optimization of wright Huang-HYPR low dose reconstruction technique using taguchi methodPriya Powar, V. P. Baligar, Shrinivas Desai, Amreen Kausar Gorvankolla. 1-7 [doi]
- Dynamic data placement and tool assignment for big-data orchestrated bioinformatics workflowsRickey T. P. Nunes, Santosh L. Deshpande. 1-6 [doi]
- Modeling population network activity using lfpsim, spiking neurons and neural mass modelsSandeep Bodda, Radhika K. Palathingal, Vinayak Sankar, Bipin Nair, Shyam Diwakar. 1-6 [doi]
- Computational neuroscience of substantia nigra circuit and dopamine modulation during parkinson's diseaseArathi G. Rajendran, Anuja Thankamani, Nishamol Nirmala, Bipin Nair, Shyam Diwakar. 1-5 [doi]
- Comparison of neural-network learning algorithms for time-series predictionKoshy George, Madhumita Harish, Sneha Rao, Kruthi Murali. 7-13 [doi]
- An efficient solution for multi-label classification problem using apriori algorithm(MLC-A)S. Athira, Kurre Poojitha, Prathibhamol Cp. 14-18 [doi]
- Question bank calibration using unsupervised learning of assessment performance metricsSankaran Narayanan, Vamsi Sai Kommuri, N. Sethu Subramanian, Kamal Bijlani. 19-25 [doi]
- Comparison of reinforcement learning algorithms applied to the cart-pole problemSavinay Nagendra, Nikhil Podila, Rashmi Ugarakhod, Koshy George. 26-32 [doi]
- A novel deep learning based method for retinal lesion detectionBhavani Sambaturu, Bhargav Srinivasan, Sahana Muraleedhara Prabhu, Kumar Thirunellai Rajamani, Thennarasu Palanisamy, Girish Haritz, Digvijay Singh. 33-37 [doi]
- Supervised learning based instance matching system for data linkingGulshakh Kaur, Poonam Saini, Poonam Saini. 38-44 [doi]
- Hardware implementation of support vector machine classifier using reconfigurable architectureSantosh Kumar, J. Manikandan, V. K. Agrawal. 45-50 [doi]
- Prediction of cardiac arrhythmia type using clustering and regression approach (P-CA-CRA)Prathibhamol Cp, Anjana Suresh, Gopika Suresh. 51-54 [doi]
- Stock price prediction using dynamic mode decompositionDeepthi Praveenlal Kuttichira, E. A. Gopalakrishnan, Vijay Krishna Menon, K. P. Soman. 55-60 [doi]
- Applying improved svm classifier for leukemia cancer classification using FCBFK. R. Kavitha, Ajith Gopinath, Midhun Gopi. 61-66 [doi]
- A learning method for coreference resolution using semantic role labeling featuresG. Veena, Deepa Gupta, Anna Neethu Daniel, S. Roshny. 67-72 [doi]
- Statistical class prediction method for efficient microarray gene expression data sample classificationT. Sheela, Lalitha Rangarajan. 73-78 [doi]
- Handling class imbalance problem using oversampling techniques: A reviewAnjana Gosain, Saanchi Sardana. 79-85 [doi]
- Time-aware relation extraction for entities using news headlinesNivedita Sinha, Jayendra Barua, Rajdeep Niyogi, Dhaval Patel. 86-90 [doi]
- Modeling non-equilibrium glides in flying snakesSaroj Harikrishnan Gopi, Divyendu Kishore Valappil, Balajee Ramakrishnananda, T. Rajesh Senthil Kumar, Viswesh Sujjur Balaramraja. 91-96 [doi]
- Solar power prediction using deduced feature of visibility index and artificial neural networkShubham, Kumar Padmanabh. 97-102 [doi]
- Design and verification of a collaborative task execution procedure using bpmn modelerAmar Nath, Rajdeep Niyogi. 103-109 [doi]
- Semi-automated intelligent systemsSrihari Akash Chinam, N. V. Subba Reddy, K. V. Prema. 110-115 [doi]
- Rough K-means and support vector machine based brain tumor detectionAmiya Halder, Oyendrila Dobe. 116-120 [doi]
- Hybrid biogeography algorithm for reducing power consumption in cloud computingSunita Singhal, Jyoti Grover. 121-124 [doi]
- An efficient scheme for on-demand energy replenishment in wireless rechargeable sensor networksAbhinav Tomar, Raj Anwit, Prasanta K. Jana. 125-130 [doi]
- NS-2 extension for interface assignment in AODV routing protocolRashmi Naveen Raj, Ashalatha Nayak, M. Sathish Kumar. 131-136 [doi]
- Performance analysis of IEEE 802.11ac for vehicular networks using realistic traffic scenariosVarun P. Sarvade, S. A. Kulkarni. 137-141 [doi]
- Real time implementation of k fake location generation algorithm to protect location privacy in location based servicesApurva K. Kini, S. A. Kulkarni. 142-148 [doi]
- ProTE: An openflow based traffic engineering mechanism for data center networksNabajyoti Medhi, Dilip Kumar Saikia, Kumar Deep Barman. 149-154 [doi]
- A systematic approach for analyzing hop count and path reliability of mobile Ad Hoc networksB. Venkata SaiKumar, N. Padmavathy. 155-160 [doi]
- An iterative message passing approach for compressive spectrum sensingY. Vasavada, C. Prakash. 161-167 [doi]
- A delay efficient path selection strategy for mobile sink in wireless sensor networksAmar Kaswan, Prasanta K. Jana, Md. Azharuddin. 168-173 [doi]
- Accelerated kerninghan lin algorithm for graph partitioningArchana K. Rajan, Deepika Bhaiya. 174-178 [doi]
- Complete RFID security solution for inventory management systemsSruthi Vattem, Tricha Anjali. 179-183 [doi]
- Detection of pollution content in an urban area using landsat 8 dataJeena Elsa George, J. Aravinth, S. Veni. 184-190 [doi]
- An improved secret key update for multiple intersymbol obfuscation in physical layer securityDeepika Ramnath, Tejas Deepak, Kiran Krishnakumar, S. Vijayaraghavan, R. Ramanathan. 191-197 [doi]
- A big data framework for intrusion detection in smart grids using apache sparkK. Vimalkumar, N. Radhika. 198-204 [doi]
- Adaptive content-aware access control of EPR resource in a healthcare systems. Sharathkumar, G. Jagadamba. 205-210 [doi]
- Scalable and parameterized hardware implementation of elliptic curve digital signature algorithm over prime fieldsBhanu Panjwani. 211-218 [doi]
- On the extension of XOR step construction for optimal contrast grey level visual cryptographyKanakkath Praveen, M. Sethumadhavan. 219-222 [doi]
- Eye blink count and eye blink duration analysis for deception detectionSabu George, M. M. Manohara Pai, Radhika M. Pai, Samir Kumar Praharaj. 223-229 [doi]
- A novel method for intrusion detection in relational databasesRaji Ramachandran, P. Arya, P. G. Jayanthy. 230-235 [doi]
- Long short-term memory based operation log anomaly detectionR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 236-242 [doi]
- Robust multimodal biometric verification system based on face and fingerprintH. D. Supreetha Gowda, G. Hemantha Kumar, Mohammad Imran. 243-247 [doi]
- A steganographic approach to mitigate password attacksIsha Pandya, Surmeet Jhajj, Renuka Pawar. 248-253 [doi]
- Evaluating shallow and deep networks for ransomware detection and classificationR. Vinayakumar, K. P. Soman, K. K. Senthil Velan, Shaunak Ganorkar. 259-265 [doi]
- Evaluating shallow and deep networks for secure shell (ssh)traffic analysisR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 266-274 [doi]
- Ultra-wideband tightly coupled dipole phased array antennaAbhishek Kumar Awasthi, A. R. Harish. 275-278 [doi]
- Bandwidth enhancement of wire-based metamaterial absorber using dielectric capAmit Bhati, Kirankumar R. Hiremath, Vivek Dixit. 279-282 [doi]
- Modified weighted bit flipping algorithm based on intrinsic information for ldpc codesM. Velmurugan, K. Pargunarajan. 283-287 [doi]
- Design and analysis of multiband reconfigurable microstrip patch antenna with switchable elementRajendra Soloni, H. S. Rajappa, D. N. Chandrappa. 288-293 [doi]
- Adaptive threshold multi bit flipping for low density parity check codesP. Seetha Ravi, K. Pargunarajan. 294-298 [doi]
- Channel modeling and estimation of polarized mimo for land mobile satellite systemsM. Aparna, P. V. Vineetha, S. Kirthiga. 299-304 [doi]
- Detection of closely spaced sinusoids in noise using fastica algorithmN. Saideep, Dhanesh. G. Kurup, Shikha Tripathi. 305-309 [doi]
- Adaptive modulation and coding and cooperative ARQ in a cognitive radio systemJ. Hwang, H. Saki, Mohammad Shikh-Bahaei. 310-315 [doi]
- Spectral efficiency of multi-user adaptive cognitive radio networksH. Saki, Mohammad Shikh-Bahaei. 316-324 [doi]
- A low complex turbo decoding algorithm with early iteration terminationC. R. Seethal, B. Yamuna. 325-331 [doi]
- Defect and fault detection in combinational circuits: Techniques and analysisNamita Arya, Amit Prakash Singh. 332-337 [doi]
- A novel approach for image security using reversible watermarkingM. S. Ramya, Pillai Sanjana Soman, L. R. Deepthi. 338-343 [doi]
- Fabrication and study of various characteristics of high performance iii-v mosfets with high-k dielectricsShweta Shree, Umesh Chandra Pancholi. 338-343 [doi]
- Reversible circuit optimization using modified toffoli templatesMridula J. Deshpande, H. V. Jayashree, Vinod Kumar Agrawal. 344-349 [doi]
- A study on spectral occupancy in the north eastern India for rural broadband accessAmar Taggu, Kennong Rina, Khoda Yasina, Ningrinla Marchang. 350-353 [doi]
- Nonlinear state estimation of wind turbineP. Sudev, J. P. Anita, P. Sudheesh. 354-358 [doi]
- Preemptive priority mechanism with hybrid spectrum sensing for cognitive radio networksBhasker Dappuri, Madhu Babu Sikha, T. G. Venkatesh. 359-363 [doi]
- Deep encrypted text categorizationR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 364-370 [doi]
- Comparing chirplet-based classification with alternate feature-extraction approaches for outdoor intrusion detection using a pir sensor platformTarun Choubisa, Mohan Kashyap, Sampad B. Mohanty, P. Vijay Kumar. 371-379 [doi]
- Hyperspectral crop classification using fusion of spectral, spatial features and vegetation indices: Approach to the big data challengeS. Reshma, S. Veni, Jeena Elsa George. 380-386 [doi]
- Assessing short-term social media marketing outreach of a healthcare organization using machine learningNidheesh Melethadathil, Bipin Nair, Shyam Diwakar, Srivardhan Pazhanivelu. 387-392 [doi]
- Automated rating of recorded classroom presentations using speech analysis in kazakhAkzharkyn Izbassarova, Aidana Irmanova, Alex Pappachen James. 393-397 [doi]
- Shuffled multi-population bat algorithm (smpbat)Reshu Chaudhary, Hema Banati. 398-404 [doi]
- An intelligent fragile watermarking scheme based on contourlets for effective detection, localization and recovery of tampered regions in handwritten document imagesK. R. Chetan, S. Nirmala. 405-410 [doi]
- Enhanced rls in smart antennas for long range communication networksPeter Nnabugwu Chuku, Thomas Otieno Olwal, Karim Djouani. 411-417 [doi]
- Smart and secure IOT based child behaviour and health monitoring system using hadoopP. K. Binu, V. Akhil, Vinay Mohan. 418-423 [doi]
- Design and verification of nuclear waste handling systemShashank Urade, Amar Nath, Rajdeep Niyogi. 424-430 [doi]
- Geo tagged internet of things (iot) device for radiation monitoringManigandan Muniraj, Abdul Rehman Qureshi, Divya Vijayakumar, A. R. Viswanathan, N. Bharathi. 431-436 [doi]
- Revenue oriented air quality prediction microservices for smart citiesShajulin Benedict. 437-442 [doi]
- Intelligent soil quality monitoring system for judicious irrigationJ. P. Guruprasadh, A. Harshananda, I K. Keerthana, Rachana, K. Yadu Krishnan, Murali Rangarajan, Shiju Sathyadevan. 443-448 [doi]
- Iot based intelligent poultry management system using Linux embedded systemG. P. Raghudathesh, D. J. Deepak, G. Keerthi Prasad, A. B. Arun, Ravitej Balekai, Vikas C. Yatnalli, S. H. Lata, B. Sampath Kumar. 449-454 [doi]
- Flow based environmental monitoring for smart citiesRavi Kishore Kodali, Snehashish Mandal, S. Shahrukh Haider. 455-460 [doi]
- Low cost implementation of smart home automationRavi Kishore Kodali, Kopulwar Shishir Mahesh. 461-466 [doi]
- Radio data infrastructure for remote monitoring system using lora technologyRavi Kishore Kodali. 467-472 [doi]
- Implementing an efficient lightweight modbus protocol over a wireless sensor networkShantanu Mhapankar, Gauresh Vanjare, Aditya Pappu, Sarthak Gadre, Abhisha Sheth, Ganesh Gore, Jonathan Joshi. 473-479 [doi]
- Obviating capricious behavior in internet of thingsAvani Sharma, Emmanuel S. Pilli, Arka Prokash Mazumdar. 480-486 [doi]
- Highly secure and efficient architectural model for iot based health care systemsP. K. Binu, Karun Thomas, Nithin P. Varghese. 487-493 [doi]
- Distinction between data losses for better communications in iotSofiane Hamrioui, Camil Adam Mohamed Hamrioui, Pascal Lorenz. 494-500 [doi]
- Iot based automated car maintenance assistS. Vijaya Shetty, H. Sarojadevi, K. S. Akshay, Deepthi Bhat, M. N. Thippeswamy. 501-508 [doi]
- Iot based school bus tracking and arrival time predictionR. C. Jisha, Aiswarya Jyothindranath, L. Sajitha Kumary. 509-514 [doi]
- An open-source computational neuroscience virtual laboratory tool for simulating spiking neurons and circuitsJoshy Alphonse, Chaitanya Medini, Bipin Nair, Shyam Diwakar. 527-532 [doi]
- Comparing parallel simulation of single and multi-compartmental spiking neuron models using gpgpuManjusha Nair, Krishnapriya Ushakumari, Athira Ramakrishnan, Bipin Nair. 533-539 [doi]
- Information theoretic visualization of spiking neural networksManjusha Nair, Akshaya Puthenpeedikayil Suresh, Anjana Manoharan, Bipin Nair, Shyam Diwakar. 540-544 [doi]
- Classifying gait features for stance and swing using machine learningChaitanya Nutakki, Jyothisree Narayanan, Aswathy Anitha Anchuthengil, Bipin Nair, Shyam Diwakar. 545-548 [doi]
- Implementation of analog electrical neurons as virtual labs for neuroscience educationNijin Nizar, Rakhi Radhamani, Dhanush Kumar, Bipin Nair, Shyam Diwakar, Krishnashree Achuthan. 549-554 [doi]
- Modeling component and pattern motion selectivity in the mt area of visual cortexAnila Gundavarapu, Karthik Soman, V. Srinivasa Chakravarthy. 561-565 [doi]
- Comparing robotic control using a spiking model of cerebellar network and a gain adapting forward-inverse modelAsha Vijayan, Vivek Gopan, Bipin Nair, Shyam Diwakar. 566-570 [doi]
- Adaptive backstepping control scheme with integral action for quanser 2-dof helicopterRavi Patel, Dipankar Deb, Himani Modi, Sunny Shah. 571-577 [doi]
- Neural network approach for vision-based track navigation using low-powered computers on mavsKhushal Brahmbhatt, Akshatha Rakesh Pai, Sanjay Singh. 578-583 [doi]
- Follow me robot using bluetooth-based position estimationBonda Venna Pradeep, E. S. Rahul, Rao R. Bhavani. 584-589 [doi]
- Energy harvesting relay outage probability analysis of cooperative communication system over small and large scale fading channelsB. Sainath, A. Santosh, K. Jagadeesh. 590-594 [doi]
- Moon slotted circular planar monopole UWB antenna design and analysisAnveshkumar Nella, Abhay Suresh Gandhi. 595-600 [doi]
- Dynamic media selection between WiFi and LTE in telemedicine scenariosSoumya Bhat, Adwitiya Mukhopadhyay, B. K. Sandhya Rani. 601-606 [doi]
- A novel noise floor estimation technique for optimized thresholding in spectrum sensingAnirudh Agarwal, Aditya Singh Sengar, Soumitra Debnath. 607-611 [doi]
- Modified signal design for multistream spatial modulation over spatially correlated channelsG. D. Goutham Simha, Shriharsha Koila, Raghavendra Mans, Udupi Sripati. 612-617 [doi]
- Analytical channel model for double layer metamaterial-improved magnetic induction communicationPriya Sharma, Ram Swaroop Meena, Deepak Bhatia. 618-622 [doi]
- Offline routing and wavelength assignment for identification of regeneration sites in translucent WDM optical networksMarichi Agarwal, Monish Chatterjee, Saravanan Chandran. 623-628 [doi]
- Pipeline-design based FPGA implementation of online sequential learning algorithmRavikant G. Biradar, Rashmi Ugarakhod, Koshy George, Abhishek Chatterjee. 629-634 [doi]
- Programmable multimode twin pump controllerSouvik De, Prasun Chowdhury. 635-640 [doi]
- Word sense disambiguation of polysemy words in kannada languageN. S. Shashank, Jagadish S. Kallimani. 641-644 [doi]
- Document summarization using dictionary learningRemya R. K. Menon, N. Aswathy. 645-650 [doi]
- Extracting quality relations from categorical data using modified qube algorithmSayan Nanda, Rajesh Gopakumar, Sanjay Singh. 651-655 [doi]
- Intelligent context based prediction using probabilistic intent-action ontology and tone matching algorithmHrishikesh Kulkarni. 656-662 [doi]
- A hybrid approach for automatic document summarizationS. Siji Rani, K. Sreejith, Arjun Sanker. 663-669 [doi]
- Contextual advertising for regional language blogsD. S. Jayalakshmi, V. T. Varun, Subrahmanya S. Bhat, K. R. Karthik Kamath. 670-675 [doi]
- Development of speech emotion recognition system using deep belief networks in malayalam languageAthira Chandran, D. Pravena, D. Govind. 676-680 [doi]
- Seamless test environment for distributed embedded wireless networksE. Jubin Sebastian, Joseena M. Jose, Manuel Schappacher, Axel Sikora. 681-686 [doi]
- IHIDS: Introspection-based hybrid intrusion detection system in cloud environmentAmita Kashyap, G. Sravan Kumar, Sunita Jangir, Emmanuel S. Pilli, Preeti Mishra. 687-693 [doi]
- Semantic tourism information retrieval interfaceShilpa S. Laddha, Pradip M. Jawandhiya. 694-697 [doi]
- A preliminary framework using bpnn for performability modelling and analyses of a kerberos serverKamil Dimililer, Yoney Kirsal-Ever, Fulden Ergun. 698-700 [doi]
- Clustering of web users' access patterns using a modified competitive agglomerative algorithmK. M. Veena, Radhika M. Pai. 701-707 [doi]
- A framework for seed user identification across multiple online social networksWaseem Ahmad, Rashid Ali. 708-713 [doi]
- Uniform distribution of energy in wireless sensor network using efficient path searchSmitha N. Pai, H. S. Mruthyunjaya, B. P. Swati, Anusha Hegde. 714-723 [doi]
- A novel green stable evolutionary routing algorithm for energy efficiency in WSNSDamodar Reddy Edla, Vilas Deshmukh, Ramalingaswamy Cheruku, S. D. Saheeka, Brijesh Yadav. 724-728 [doi]
- Keeping the android user aware of past and present network trafficNikhil George, Prabhaker Mateti. 729-735 [doi]
- Topsis based delay sensitive network selection for wireless body area networksR. Latha, P. Vetrivelan. 736-739 [doi]
- On designing lightweight qos routing protocol for delay-sensitive wireless body area networksM. Anand Kumar, C. Vidya Raj. 740-744 [doi]
- Coordinator-based adaptive fault diagnosis algorithm for distributed computing systemsSupriya Kelkar, Deepali G. Yeole, Mayuri B. Sinkar, Priyanka B. Jagtap, Damini S. Zagade. 745-751 [doi]
- Facial emotion recognition using min-max similarity classifierOlga Krestinskaya, Alex Pappachen James. 752-758 [doi]
- Implementation of advanced authentication system using opencv by capturing motion imagesAkanksha Sharma, Deepak Dembla, Shekhar. 759-765 [doi]
- Affective computing using speech processing for call centre applicationsRakshith K. Gowda, Vandana Nimbalker, R. Lavanya, S. Lalitha, Shikha Tripathi. 766-771 [doi]
- An integrated robust approach for fast face tracking in noisy Real-World videos with visual constraintsS. Ranganatha, Y. P. Gowramma. 772-776 [doi]
- A robust reversible watermarking technique based on prediction error expansion using ECCJinal H. Mehta, Vishakha Kelkar, Tuckley Kushal. 777-782 [doi]
- Curved document image rectificationDhanya M. Dhanalakshmy, Hema P. Menon. 783-786 [doi]
- Issues involved in automatic selection and intensity based matching of feature points for mls registration of medical imagesHema P. Menon. 787-792 [doi]
- Support vector machine based classification of medicinal plants using leaf featuresD. Venkataraman, N. Mangayarkarasi. 793-798 [doi]
- Musical notes to MIDI conversionDhanya M. Dhanalakshmy, Hema P. Menon, V. Vinaya. 799-804 [doi]
- Hyperspectral image denoising: A least square approach using wavelet filtersS. Dev Vishnu, Sachin Rajan, V. Sowmya, K. P. Soman. 805-811 [doi]
- Strongly orthogonal sequences and their application to calibration and pointing of satellite beam formerY. Vasavada, P. Amirshahi, B. F. Beidas, D. Roos Y. Antia, L. Lee. 812-817 [doi]
- Medical image segmentation using rough-spatial kernelized FCM algorithmAmiya Halder, Siddhartha Guha. 818-823 [doi]
- A comparative study of two recent word spotting techniques in the run-length compressed domainMohammed Javed, P. Nagabhushan, Bidyut B. Chaudhuri. 824-830 [doi]
- Ubiquitous displays: Spatially augmenting reality via multi-projector agentsAditi Majumderl. 831-840 [doi]
- Design of fuzzy based intelligent controller for autonomous mobile robot navigationAniket D. Adhvaryu, S. Adarsh, K. I. Ramachandran. 841-846 [doi]
- Micro-controller driven wind turbine blade cleaning peripheriesNisarg Brahmbhatt, Mrunal Patel, Dipankar Deb. 847-851 [doi]
- Averaging circuit using graphene FETs: A novel approach for analog and digital signal averagingSrinidhi R. Ganiga, R. N. Nikitha, S. Raghuram. 852-856 [doi]
- Design and fabrication of robotic systems : Converting a conventional car to a driverless carG. Amrithanandha Babu, K. Guruvayoorappan, V. V. Sajith Variyar, K. P. Soman. 857-863 [doi]
- A cable driven parallel robot for coconut farmThejas Narayanan, Rajendran S. Vishnu, Rao R. Bhavani, Vineet Vashista. 864-870 [doi]
- Steering angle estimation for autonomous vehicleVishnu S. Dev, V. V. Sajith Variyar, K. P. Soman. 871-876 [doi]
- Effective utilization and analysis of ros on embedded platform for implementing autonomous car vision and navigation modulesShimil Jose, V. V. Sajith Variyar, K. P. Soman. 877-882 [doi]
- LabVIEW based EMG and blood pressure measurement bio telemetry systemDeepak Karia, Jay Raval, Vivek Sakinala, Nitin Jadhav. 883-887 [doi]
- Jaya optimization algorithm based multiuser detector over Generalized-K fading channelsSravani Yenduri, Vinay Kumar Pamula, Anil Kumar Tipparti. 888-893 [doi]
- Greedy search algorithm based two stage energy saving technique for dense LTE-A HetNetsHarini Narasimhan, Rohit Kashyap, A. V. Vikram, R. C. Deepthi, Prashant Wali. 894-899 [doi]
- An optimization framework for solving RFID reader placement problem using greedy approachN. Rubini, ChambuliVenkata Prasanthi, S. Subanidha, Thota Naga Sai Vamsi, G. Jeyakumar. 900-905 [doi]
- Tool to handle imbalancing problem in software defect prediction using oversampling methodsRuchika Malhotra, Shine Kamal. 906-912 [doi]
- Objective, innovation and impact of the energy-efficient dome microdatacenterRonald P. Luijten, Andreas C. Döring, Stephan Paredes, Ton Engbersen, Fred Buining, Bruno Michel. 913-921 [doi]
- Chunking based malayalam paraphrase identification using unfolding recursive autoencodersR. Praveena, M. Anand Kumar, K. P. Soman. 922-928 [doi]
- Key to crossword solving : NLPA. R. Jobin, Anand G. Menon, Ashwin Sekhar, Vinay Damodaran. 929-933 [doi]
- Digital corpus of santali languageMd. Amir Khusru Akhtar, Gadadhar Sahoo, Mohit Kumar. 934-938 [doi]
- Automata for santali language processingMd. Amir Khusru Akhtar, Mohit Kumar, Gadadhar Sahoo. 939-943 [doi]
- A graph-based relation extraction method for question answering systemG. Veena, S. Athulya, Salma Shaji, Deepa Gupta. 944-949 [doi]
- Kannada spell checker with sandhi splitterRajashekara S. Murthy, A. N. Akshatha, Chandana G. Upadhyaya, P. Ramakanth Kumar. 950-956 [doi]
- Improving the rule based machine translation system using sentence simplification (english to tamil)Kavirajan B, M. Anand Kumar, K. P. Soman, S. Rajendran, S. Vaithehi. 957-963 [doi]
- Detecting stance in kannada social media code-mixed text using sentence embeddingSrinidhi Skanda V, M. Anand Kumar, K. P. Soman. 964-969 [doi]
- Enhanced utility in preserving privacy for multiple heterogeneous sensitive attributes using correlation and personal sensitivity flagsK. Ashoka, B. Poornima. 970-976 [doi]
- Recognition of multilingual text from signage boardsPoonam Salunkhe, Sreebha Bhaskaran, J. Amudha, Deepa Gupta. 977-982 [doi]
- Analysis of linear relation between P-value and co relational value using R programmingNeelakantagouda S. Patil, Megha F. Yaligar. 983-987 [doi]
- Security analysis of group key management schemes of wireless sensor network under active outsider adversary modelB. R. Purushothama, Arun Prakash Verma. 988-994 [doi]
- Instance based human physical activity(hpa) recognition using shimmer2 wearable sensor data setsDoreswamy, K. M. Yogesh. 995-999 [doi]
- A smart transportation system facilitating on-demand bus and route allocationLakshmi Sadanandan, S. Nithin. 1000-1003 [doi]
- Efficient virtual machine placement in cloud environmentKamalesh Karmakar, Sunirmal Khatua, Rajib Kumar Das. 1004-1009 [doi]
- Method level power estimation and optimization in next generation smart phonesHilam Patel, Nagesh Tikare, Meenakshi D. Souza. 1010-1016 [doi]
- A framework for optimization of regression testing of web services using slicingSobhana Sahoo, Abhishek Ray. 1017-1022 [doi]
- Trace-based method for big data memory characteristics researchJianqiao Ma, Qi Yu, Libo Huang, Cheng Qian, Zhiying Wang. 1023-1027 [doi]
- Shuffle phase optimization in sparkVandana, Velamuri Monica, Narendra Kumar Parambalath. 1028-1034 [doi]
- Efficient relocation of mobile sensors for target coverageRitamshirsa Choudhuri, Rajib K. Das. 1035-1041 [doi]
- Performance evaluation of scalable video stream over bandwidth constrained network using software defined networksRoyce Fernandes, M. Ramakrishna, A. K. Karunakar. 1042-1047 [doi]
- Video artifact evaluation based on qos and objective qoe parametersLaura GarcÃa, José Miguel Jiménez, Miran Taha, Jaime Lloret. 1048-1054 [doi]
- Capacity and energy management in massive mimo and heterogeneous small cell networksM. Bala Krishna, Puneet Bansal. 1055-1061 [doi]
- An IoT-based E-parking system for smart citiesPampa Sadhukhan. 1062-1066 [doi]
- Extraction of lung nodules in HRCT images using partial differential equation based modelH. Anitha, A. K. Karunakar, P. Pooja. 1067-1073 [doi]
- Performance analysis of trajectory compression algorithms on marine surveillance dataAshutosh Kumar Singh, Vinay Aggarwal, Pavas Saxena, Om Prakash. 1074-1079 [doi]
- Multi-modality face recognition: An information theoretic approachMusica Supriya, Sanjay Singh. 1080-1084 [doi]
- Application of nyaya inference method for feature selection and ranking in classification algorithmsK. Seena, Rajan Sundaravardhan. 1085-1091 [doi]
- Classification of cognitive state using clustering based maximum margin feature selection frameworkJ. Siva Ramakrishna, Hariharan Ramasangu. 1092-1096 [doi]
- Coarse to fine difference edge detection with binary neural firing modelAnuar Dorzhigulov, Yerlan Berdaliyev, Alex Pappachen James. 1098-1102 [doi]
- Indexing and retrieval of malayalam news videos based on word image matchingManjary P. Gangan, K. Anoop, V. L. Lajish. 1103-1108 [doi]
- A comprehensive study of text classification algorithmsVikas K. Vijayan, K. R. Bindu, Latha Parameswaran. 1109-1113 [doi]
- Epileptic seizure detection based on EEG signal analysis using hierarchy based Hidden Markov ModelDeba Prasad Dash, Maheshkumar H. Kolekar. 1114-1120 [doi]
- An adaptive reconfigurable antenna for cognitive radio systemSonia Sharma, C. C. Tripathi, Rahul Rishi. 1121-1125 [doi]
- Robust classification of MR brain images based on fractal dimension analysisC. C. Benson, V. L. Lajish, Kumar Rajamani. 1135-1140 [doi]
- Reduced keyframes for fast bundle adjustment using point and line features in monoslamChaitra Gajulla Nagaraja, Ik Hyun Jo, Jae Seok Jang, Soon Ki Jung. 1141-1144 [doi]
- An efficient gmm and active contour based unsupervised person re-identificationSwati, Sparha Mishra, Devesh Devendra, Subhamoy Chatterjee, Maheshkumar H. Kolekar. 1145-1150 [doi]
- Implementation of telugu speech synthesis systemGangala Ramya, Nenavath Srinivas Naik. 1151-1154 [doi]
- A reduced-complexity, reduced-power camera system for intrusion classification in an outdoor settingTarun Choubisa, Sampad B. Mohanty, Kodur Krishna Chaitanya, Mohan Kashyap, A. Sridhar, P. Akshay Singh, Vijay Kumar. 1155-1162 [doi]
- Handling workload skew in a consistent hashing based partitioning implementationNarayanan Venkateswaran, Suvamoy Changder. 1163-1169 [doi]
- Study of execution parallelism by resource partitioning in hadoop YARNP. S. Janardhanan, Philip Samuel. 1170-1175 [doi]
- Sign language translator for mobile platformsM. Mahesh, Arvind Jayaprakash, M. Geetha. 1176-1181 [doi]
- A bottom up procedure for text line segmentation of latin scriptHimanshu Jain, Archana Praveen Kumar. 1182-1187 [doi]
- Detection of copper in southern India using hyperion imageryS. Roopa, K. Sathya Narayanan, Sibi Sarvanan, M. Jhanane, J. Aravinth. 1188-1194 [doi]
- A simple recursive backtracking algorithm for knight's tours puzzle on standard 8×8 chessboardDebajyoti Ghosh, Uddalak Bhaduri. 1195-1200 [doi]
- Computer vision based robotic weed control system for precision agricultureMegha P. Arakeri, B. P. Vijaya Kumar, Shubham Barsaiya, H. V. Sairam. 1201-1205 [doi]
- Proxy re-encryption using rectangular integer matrix keysChitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy. 1206-1211 [doi]
- Time-based one-time password for Wi-Fi authentication and securityChandramohan Sudar, S. K. Arjun, L. R. Deepthi. 1212-1216 [doi]
- Improved personalized recommendation system with better user experiencePratik Ghanwat, Anu Chacko. 1216-1221 [doi]
- Applying convolutional neural network for network intrusion detectionR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 1222-1228 [doi]
- Thought-forms patterns identification using histograms of the derivative of intensity outlineRai Sachindra Prasad. 1226-1134 [doi]
- Mp4 video steganography in wavelet domainS. Hemalatha, U. Dinesh Acharya, Shamathmika. 1229-1235 [doi]
- Computational modelling of apoptosis in parkinson's disease using biochemical systems theoryHemalatha Sasidharakurup, Pyaree Dash, Asha Vijayan, Bipin Nair, Shyam Diwakar. 1229-1235 [doi]
- Analysis of latest vulnerabilities in androidUmasankar. 1236-1241 [doi]
- Bounding the diameter of cayley graphs generated by specific transposition treesSeeniya Uthan, Bhadrachalam Chitturi. 1242-1248 [doi]
- Enhancing control system security of power grid using anomaly detection and behaviour analysisVasundhara Gokarn, Vaishali Kulkarni, Zia Saquib. 1249-1255 [doi]
- Secure model for clustering distributed dataSumana Maradithaya, Hareesha K. S.. 1256-1260 [doi]
- An efficient digital signature scheme by using integer factorization and discrete logarithm problemShailendra Kumar Tripathi, Bhupendra Gupta. 1261-1266 [doi]
- Transaction signing on multiple channelsMunalih Ahmad Syarif, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee, Kang Siong Ng. 1267-1272 [doi]
- Learning mechanisms for anomaly-based intruson detection: Updated reviewEl-Sayed M. El-Alfy, Khaled A. Al-Utaibi. 1273-1281 [doi]
- Evaluating effectiveness of shallow and deep networks to intrusion detection systemR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 1282-1289 [doi]
- Fuzzy logic based fault detection of controller area network using microautobox - IIAlpha Tamrakar, S. Adasrh, K. I. Ramachandran. 1290-1295 [doi]
- User centered energy management scheme for smart buildingsK. Athira, Aryadevi Remanidevi Devidas, Maneesha Vinodini Ramesh, Venkat P. Rangan. 1296-1302 [doi]
- Automated system for obstructive sleep apnea detection using heart rate variability and respiratory rate variabilityAnju Prabha, Akta Trivedi, A. Anand Kumar, C. Santhosh Kumar. 1303-1307 [doi]
- Classification of benign and malignant melanocytic lesions: A CAD toolSameena Pathan, P. C. Siddalingaswamy, Lasya Lakshmi, K. Gopalakrishna Prabhu. 1308-1312 [doi]
- Automatic waste segregatorA. Sharanya, U. Harika, N. Sriya, Sreeja Kochuvila. 1313-1319 [doi]
- Forecasting of ozone concentration in smart city using deep learningOsama A. Ghoneim, Doreswamy, B. R. Manjunatha. 1320-1326 [doi]
- Performance evaluation of predictive models for missing data imputation in weather dataDoreswamy, Ibrahim Gad, B. R. Manjunatha. 1327-1334 [doi]
- Energy harvesting using cyclic prefixed OFDMAPrerna Dhull, Anshul Tyagi. 1335-1339 [doi]
- Learning from demonstration algorithm for cloth folding manipulatorBharadwaj Sannapaneni, Marut Shaswat, A. A. Nippun Kumaar. 1339-1398 [doi]
- An empirical approach for optimizing globally distributed software product engineeringBhaskarjyoti Das. 1340-1348 [doi]
- Efficient test scheduling for reusable BIST in 3D stacked ICsNavya Mohan, Maya Krishnan, Sudhir Kumar Rai, M. MathuMeitha, S. Sivakalyan. 1349-1355 [doi]
- Remote software maintenance system for telecom networkPromila Jangra, Soma Das, Sandeep Kumar Khurana. 1356-1359 [doi]
- Localization of an unmanned aerial vehicle for crack detection in railway tracksS. Sushant, S. Anand, Thomas James, V. Aravind, Gayathri Narayanan. 1360-1365 [doi]
- Detection of distributed denial of service attacks using machine learning algorithms in software defined networksNisharani Meti, D. G. Narayan, V. P. Baligar. 1366-1371 [doi]
- Enabling open domain information exploitation for disaster managementBharathi Ramudu, Malay Kumar Nema, Rituraj Kumar. 1372-1376 [doi]
- Evaluation of sampling techniques in software fault prediction using metrics and code smellsKamaldeep Kaur, Parmeet Kaur. 1377-1387 [doi]
- Comparison of sequence diagram from execution against design-time state specificationM. Mithun, Swaminathan Jayaraman. 1387-1392 [doi]
- Multipath routing in mobile Ad-hoc network using meta-heuristic approachJai Agrawal, Ayush Singhal, Ram Narayan Yadav. 1399-1406 [doi]
- Mixed bilingual social media analytics: case study: Live Twitter dataSaurabh Malgaonkar, Aejazul Khan, Abhishek Vichare. 1407-1412 [doi]
- Study of an electromagnetically coupled resonator energized using U-shaped microstrip feedA. Shabina Mol, S. Aiswarya, Sreedevi K. Menon. 1413-1416 [doi]
- Distributed processing across gravitational wave detector streams to determine wave orientationDilip Krishnaswamy. 1417-1423 [doi]
- Resource allocation for device-to-device (d2d) communication in underlaying cellular networkUmang S. Vaishnav, Manoj Panda. 1424-1438 [doi]
- Critical observation on the exponential growth of nature-inspired computationShailendra Singh Yadav, Bhupendra Verma, Prasanta K. Jana. 1431-1437 [doi]
- Significance of exploring pitch only features for the recognition of spontaneous emotions from speech signalsA. Pooja, D. Pravena, D. Govind. 1438-1442 [doi]
- Denoising of phonocardiogram signals using variational mode decompositionV. G. Sujadevi, K. P. Soman, S. Sachin Kumar, Neethu Mohan, A. S. Arunjith. 1443-1446 [doi]
- Comparison of glottal closure instant estimation algorithms for singing voices in Indian contextK. S. Gokul Krishnan, D. Govind. 1447-1452 [doi]
- Least square based image deblurringShimil Jose, Neethu Mohan, V. Sowmya, K. P. Soman. 1453-1457 [doi]
- A novel approach for matching composite sketches to mugshot photos using the fusion of SIFT and SURF feature descriptorR. Kokila, M. S. Sannidhan, Abhir Bhandary. 1458-1464 [doi]
- Iris recognition using savitzky-golay filter energy feature through symbolic data modelingShanmukhappa A. Angadi, Vishwanath C. Kagawade. 1465-1470 [doi]
- Novel hybrid feature selection models for unsupervised document categorizationAmol P. Bhopale, S. Sowmya Kamath. 1471-1477 [doi]
- Natural calamity assessment by innovative methodsAnish Kumar, Arpita Naganur, Nikhil Horakeri, K. Sumant, Shrinivas D. Desai. 1478-1481 [doi]
- Evaluation of instance-based feature subset selection algorithm for maintainability predictionKanika Gupta, Anuradha Chug. 1482-1487 [doi]
- A novel web crawling method for vertical search enginesKolli Pavani, G. P. Sajeev. 1488-1493 [doi]
- Abnormality prediction in high dimensional dataset among semi supervised learning approachesAiswarya Manghat, Asha Ashok. 1494 [doi]
- Hand gesture control of virtual object in augmented realityS. Siji Rani, K. J. Dhrisya, M. Ahalyadas. 1500-1505 [doi]
- Video clip retrieval using serial walk local descriptorK. P. Uma, B. H. Shekar, K. Rahgurama Holla. 1506-1510 [doi]
- Task recommendation in reward-based crowdsourcing systemsAyswarya R. Kurup, G. P. Sajeev. 1511-1518 [doi]
- A proactive intelligent model for identification of reduced factors affecting severity of coronary artery disease and its predictionAakash Bhattacharya, Riju Khatri, Tribikram Pradhan. 1519-1524 [doi]
- Chatbot for university related FAQsBhavika R. Ranoliya, Nidhi Raghuwanshi, Sanjay Singh. 1525-1530 [doi]
- Fitness function to find game equilibria using genetic algorithmsMahathi Gunturu, Giridhar N. Shakarad, Sanjay Singh. 1531-1534 [doi]
- RMSC: Robust modeling of subspace clustering for high dimensional dataK. R. Radhika, C. N. Pushpa, J. Thriveni, K. R. Venugopal. 1535-1539 [doi]
- Voice transformation using pitch and spectral mappingAnisha Yathigiri, Meenalatha Bathula, Susmitha Kothapalli, Susmitha Vekkot, Shikha Tripathi. 1540-1544 [doi]
- A dynamic statistical nonparametric cleaning and enhancement system for highly degraded ancient handwritten modi lipi documentsManisha S. Deshmukh, Manoj P. Patil, Satish R. Kolhe. 1545-1551 [doi]
- An effective way of word-level language identification for code-mixed facebook comments using word-embedding via character-embeddingP. V. Veena, M. Anand Kumar, K. P. Soman. 1552-1556 [doi]
- Automatic summarization and visualisation of healthcare tweetsP. G. Lavanya, Suresha Mallappa. 1557-1563 [doi]
- A novel approach for group formation in collaborative learning using learner preferencesNeetha Joseph, N. Pradeesh, Shiffon Chatterjee, Kamal Bijlani. 1564-1568 [doi]
- GPU accelerated preemptive HAPO (GHAPO-P) for reducing trip time in VANETSVinita Jindal, Punam Bedi. 1569-1575 [doi]
- Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary modelAshwini Chaudhari, Gaurav Pareek, B. R. Purushothama. 1576-1581 [doi]
- Adaptive web personalization system using splay treePayal Das, R. C. Jisha, G. P. Sajeev. 1582-1587 [doi]
- Iot based patient monitoring and diagnostic prediction tool using ensemble classifierR. Ani, S. Krishna, N. Anju, M. Sona Aslam, O. S. Deepa. 1588-1593 [doi]
- Technology enabled teacher training for low-literate, remote and rural multi-grade education centersRadhika Menon, Prema Nedungadi, Raghu Raman. 1594-1599 [doi]
- Comparative study of color iris recognition: DCT vs. vector quantization approaches in rgb and hsv color spacesSuchitra Patil, Ujwala Bhangale, Nilkamal More. 1600-1603 [doi]
- Smart water atm in India using cloud modelR. Madhumathi, Reshma Sultana, R. Dharshana. 1604-1608 [doi]
- Building a common notation for enabling comparison of design and executionK. Aparna, Swaminathan Jayaraman. 1609-1612 [doi]
- Video clip retrieval: An integrated approach based on KDM and LBPVK. P. Uma, B. H. Shekar, L. Smitha M.. 1613-1618 [doi]
- Word based thematic game on Indian mythologySmitha S. Padiyar, Sanjay Singh. 1619-1623 [doi]
- Determination of optimum refactoring sequence using A∗ algorithm after prioritization of classesAnuradha Chug, Sandhya Tarwani. 1624-1630 [doi]
- Analog multipliers for deep neural net architecturesB. N. Deepashree, S. Raghuram. 1638-1642 [doi]
- Stock price prediction using LSTM, RNN and CNN-sliding window modelSreelekshmy Selvin, R. Vinayakumar, E. A. Gopalakrishnan, Vijay Krishna Menon, K. P. Soman. 1643-1647 [doi]
- Faculty rating system based on student feedbacks using sentimental analysisK. S. Krishnaveni, Rohit R. Pai, Vignesh Iyer. 1648-1653 [doi]
- New machine learning based approach for predictive modeling on spatial dataM. Gangappa, C. Kiran Mai, P. Sammulal. 1654-1659 [doi]
- Canfis based robotic navigationK. V. Geedhu, K. I. Ramachandran, S. Adarsh. 1660-1664 [doi]
- Prediction of authorship using various classification algorithmsChandrika Prasad, Jagadish S. Kallimani, Swapnil Jain. 1671-1676 [doi]
- Deep android malware detection and classificationR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 1677-1683 [doi]
- Prediction of factors affecting amlodipine induced pedal edema and its classificationAman Chopra, Ashray Dimri, Tribikram Pradhan. 1684-1689 [doi]
- Abstractive multi-document summarizationN. S. Ranjitha, Jagadish S. Kallimani. 1690-1694 [doi]
- A model for auto-tagging of research papers based on keyphrase extraction methodsM. G. Thushara, M. S. Krishnapriya, Sangeetha S. Nair. 1695-1700 [doi]
- A robust software architecture based on distributed systems in big data healthcareHassan Salavati, Taghi Javdani Gandomani, Rasool Sadeghi. 1701-1705 [doi]
- Authentication of digital visual data using discrete wavelet transform and TLBOA. V. N. Divya Krishna, P. Satyanarayana Murty. 1706-1712 [doi]
- Lateral prediction in adaptive cruise control using adaptive particle filterJattin Badrinath, J. P. Anita, P. Sudheesh. 1713-1718 [doi]
- Misclassifications: The missing linkAbitha Thankaraj, Aparna Jairaj Nair, N. Vasudevan, Vinod Pathari. 1719-1722 [doi]
- Terrorism analytics: Learning to predict the perpetratorDisha Talreja, Jeevan Nagaraj, N. J. Varsha, Kavi Mahesh. 1723-1726 [doi]
- Accurate validation of GCV-based regularization parameter for extreme learning machineShraddha M. Naik, Ravi Prasad K. Jagannath. 1727-1731 [doi]
- Protein structure prediction on 2D square HP lattice with revised fitness functionSandhya Parasnath Dubey, N. Gopalakrishna Kini, S. Balaji, M. Sathish Kumar. 1732-1736 [doi]
- A study on the use of information and communication technology in tourismRomit S. Beed, Sunita Sarkar. 1737-1744 [doi]
- Empirical investigation on the influence of organizational systems mechanisms(OSM) on employees motivation to effectively use human resource information systems: A Case of South African UniversitiesO. A. Randle, A. Coleman, Ray Kekwaletswe. 1745-1750 [doi]
- Improve student placement using job competency modeling and personalized feedbackM. D. Soumya, Thushara Sugathan. 1751-1755 [doi]
- Employ...able: A tool to achieve 7E's of employabilityKalpita Wagaskar, Amiya Kumar Tripathy, Kumkum Chauhan, Aishwarya Malaji, Dharmendra Yadav. 1756-1761 [doi]
- Error-tolerant graph matching using homeomorphismShri Prakash Dwivedi, Ravi Shankar Singh. 1762-1766 [doi]
- A hybrid approach for gait based gender classification using gei and spatio temporal parametersSneha Choudhary, Chandra Prakash, Rajesh Kumar. 1767-1771 [doi]
- Hardware implementation of k-means clustering based spectrum sensing using usrp in a cognitive radio systemAnirudh Agarwal, Himanshu Jain, Ranjan Gangopadhyay, Soumitra Debnath. 1772-1777 [doi]
- A shortest path approach to SPARQL chain query optimisationTanvi Chawla, Girdhari Singh, Emmanuel S. Pilli. 1778 [doi]
- Robust pitch estimation in distant speech signals collected from vehicleDipesh Mudatkar, S. Adarsh, D. Govind. 1784-1791 [doi]
- Classification of states of bi-stable oscillator using deep learningRohit Mohan, E. A. Gopalakrishnan, K. P. Soman. 1792-1796 [doi]
- A survey on in-domain and cross-domain image classification using surf featuresG. S. Veena, Nikhil Dhara Venkata, Manjunath M. Goudar, Akshay P. Sarashetti, Adithya Acharya. 1797-1802 [doi]
- Automatic detection of acute myeloid leukemia from microscopic blood smear imagePreetham Kumar, Shazad Maneck Udwadia. 1803-1807 [doi]
- Big data challenges in airborne hyperspectral image for urban landuse classificationR. Anand, S. Veni, J. Aravinth. 1808-1814 [doi]
- An effective hybrid filter for the removal of Gaussian-impulsive noise in computed tomography imagesJ. J. Madhura, D. R. Ramesh Babu. 1815-1820 [doi]
- Plant health analyserC. V. Giriraja, C. M. Siddharth, Ch. Saketa, M. Sai Kiran. 1821-1825 [doi]
- Information hiding through dynamic text steganography and cryptography: Computing and InformaticsDeepali Bhat, V. Krithi, K. N. Manjunath, Srikanth Prabhu, A. Renuka. 1826-1831 [doi]
- Development and comparison of ASR models using kaldi for noisy and enhanced kannada speech dataThimmaraja G. Yadava, H. S. Jayanna. 1832-1838 [doi]
- Search and rescue operations using robotic darwinian particle swarm optimizationArjun S. Kumar, Manikutty Gayathri, Rao R. Bhavani, Micael S. Couceiro. 1839-1843 [doi]
- Characteristics determination of infected erithrocytes by plasmodium falciparum as a diagnostic of malaria, based on microscopic imagesIzzati Muhimmah, Nani Harniawati, Novyan Lusiyana. 1844-1847 [doi]
- Open source apis for processing the XML result of web servicesSumathi Pawar, Niranjan N. Chiplunkar. 1848-1854 [doi]
- Automotive drive recorder as black box for low end vehiclesSameer Khare, K. P. Peeyush. 1855-1861 [doi]
- Improving model predictive controller by using non-uniform sampled modelS. M. El-Feky, Ahmed Moustafa Zaki, Ayman M. Bahaa Eldin, Mohamed H. El-Shafey. 1862-1868 [doi]
- A quality enhancement through defect reduction using refactoring operationAnuradha Chug, Monika Gupta. 1869-1875 [doi]
- Assessment of forest fire danger using automatic weather stations and MODIS TERRA satellite datasets for the state Madhya Pradesh, IndiaK. V. Suresh Babu, Venkata Sai Krishna Vanama, Arijit Roy, P. Rama Chandra Prasad. 1876-1881 [doi]
- Study of essential personality characteristics for the young Indian millennial: A tobit analysisViswanathan Venkateswaran, Sangeetha Gunasekar, Deepak Gupta. 1882-1887 [doi]
- Gps based navigation system for autonomous carPaul George Parakkal, V. V. Sajith Variyar. 1888-1893 [doi]
- Traffic avoidance and separation systemBalaji Raman Katta, Irfan Madani. 1894-1902 [doi]
- The role of perceived risk on intention to use online banking in vietnamThanh D. Nguyen, Tu C. H. Nguyen. 1903-1908 [doi]
- Abelian codes over eisenstein-jacobi integers for MIMO systemsRaghavendra Mans, G. D. Goutham Simha, Udupi Sripati. 1909-1912 [doi]
- Self-adaptive power management framework for high performance computingSumit Kumar Saurav, H. V. Raghu, Bindhumadhava S. Bapu. 1913-1918 [doi]
- High isolation diplexer for rf circuits using loop resonatorsM. Ranjith, S. Aiswarya, Sreedevi K. Menon. 1919-1922 [doi]
- Design and implementation of 8-bit vedic multiplier using mGDI techniqueShashank S. Meti, C. N. Bharath, Y. G. Praveen Kumar, B. S. Kariyappa. 1923-1927 [doi]
- Vision based closed loop pid controller design and implementation for autonomous carC. K. Chandni, V. V. Sajith Variyar, K. Guruvayurappan. 1928-1933 [doi]
- Parallelizing GA based heuristic approach for TSP over CUDA and OPENMPRahul Saxena, Monika Jain, Sidhharth Bhadri, Suyash Khemka. 1934-1940 [doi]
- Design and implementation of a rf transceiver for 2×2 mimo wlan moduleMohnish Kumar Jain, A. G. Kothari. 1941-1945 [doi]
- Reduction of fwm effect in fiber optic communication system by using dpddmz and circular polarizationNaba Krushna Sabat, B. Srinivas Rao, Bijayananda Patnaik. 1946-1950 [doi]
- Using system analysis modeling language (saml) for validating the critical aerospace model: Short paper: A case-studyK. S. Kushal, J. Jayanthi, Manju Nanda, Shamsundar Dhage. 1951-1959 [doi]
- Design and development of certification compliance tool for airborne systemsB. K. Anusha, Manju Nanda, J. Jayanthi. 1960-1966 [doi]
- A case analysis of node.js I/O performance under Linux environment in various storage mediaJ. Dafni Rose, V. R. L. Survesh. 1967-1973 [doi]
- On free of cost service distribution in cloud computingAnjan Bandyopadhyay, Sajal Mukhopadhyay, Uttam Ganguly. 1974-1980 [doi]
- Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strengthPradeepkumar Bhale, Kangkan Talukdar, Bikramjit Choudhury, Pranav Kumar Singh. 1981-1986 [doi]
- Modified harvest-then-cooperate protocol for relay-assisted cellular networksRishna Patteri, A. V. Babu. 1987-1993 [doi]
- Multi-group message communication on android smartphones via WiFi directSankalp Sunil, Adwitiya Mukhopadhyay, Chandan Gujjar. 1994-1999 [doi]
- All pair shortest path using distributed architecturesSakshi Vaid, Rene Salih, R. G. Gayathri, Jyothisha J. Nair. 2000-204 [doi]
- Alternatives to VM consolidation techniques for energy aware cloud computingArvinder Kaur, Anirudra Diwakar, Rohit Vashisht. 2005-2009 [doi]
- Dynamic and resilient protocol for mutual authentication of nodes in wireless sensor networksAishwarya Vardhan, Muzzammil Hussain. 2010-2015 [doi]
- Enhanced energy optimized cluster based on demand routing protocol for wireless sensor networksB. Sreevidya, M. Rajesh. 2016-2019 [doi]
- A learning-based mapreduce scheduler in heterogeneous environmentsNenavath Srinivas Naik, Atul Negi. 2020-2025 [doi]
- Secure shell (ssh) traffic analysis with flow based features using shallow and deep networksR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 2026-2032 [doi]
- Compac - A pricing model for community cloudLalit Mohan S., Y. Raghu Reddy, G. R. Gangadharan. 2033-2039 [doi]
- Enhanced timing enabled proxy re-encryption model for E-health data in the public cloudRicha Bhateja, Debi Prasanna Acharjya, Naman Saxena. 2040-2044 [doi]
- An investigation of classification algorithms for intrusion detection system - A quantitative approachJosy Elsa Varghese, Balachandra Muniyal. 2045-2051 [doi]
- Novel secured reversible covert communication over encrypted domain using SVM classifierAnitha Devi, K. B. ShivaKumar. 2052-2058 [doi]
- A link prediction based approach for recommendation systemsNitish Talasu, Jonnalagadda Annapurna, S. Sai Akshaya Pillai, Jampani Rahul. 2059-2062 [doi]
- iKnow how you walk - A smartphone based personalized gait diagnosing systemKalyan Sasidhar, Satyam Satyajeet. 2063-2068 [doi]
- Computer based rehabilitation for patients with central vision lossGopinath Madheswaran, Venkatasubbu Ramesh, Shailaja Bhat, K. Ganapathi Nayak, P. C. Siddalingaswamy, Asjad Nabeel. 2069-2072 [doi]
- Sensor based speech production system without use of glottisPalli Padmini, Shikha Tripathi, Kaustav Bhowmick. 2073-2079 [doi]
- Education technology used in education for making student outcomes of engineering graduatesSudhanshu S. Gonge, Preeti S. Joshi, Pranjali R. Kuche, Rupali M. Chopade. 2080-2083 [doi]
- Technologies for visually impaired solutions and possibilitiesSaurav Gandhi, Niketa Gandhi. 2084-2091 [doi]
- Obstacle classification and detection for vision based navigation for autonomous drivingN. Deepika, V. V. Sajith Variyar. 2092-2097 [doi]
- Identification and red blood cell classification using computer aided system to diagnose blood disordersVasundhara Acharya, Preetham Kumar. 2098-2104 [doi]
- Self efficacy, perceived stress and happiness among studentsS. L. L. Naga Shilpa, Rajiv Prasad. 2105-2109 [doi]
- Assessing employability of students using data mining techniquesYogesh Bharambe, Nikita Mored, Manisha Mulchandani, Radha Shankarmani, Sameer Ganesh Shinde. 2110-2114 [doi]
- Characteristics and causes of malnutrition across Indian states: A cluster analysis based on Indian demographic and health survey dataNair Akash Anilkumar, Deepa Gupta, Sangita Khare, Deepika Manippady Gopalkrishna, Amalendu Jyotishi. 2115-2123 [doi]
- A low-cost classroom response systemB. Swetha, Raksha P. Rao, Vidhu Rojit, Viraj Kumar. 2124-2127 [doi]
- Aiding the visually impaired: Developing an efficient braille printerAnubhav Apurva, Palash Thakur, Anupam Misra. 2128-2133 [doi]
- Development of an android application in kannada to enhance picture naming skills in persons with aphasiaRajath Shenoy, Sudhindra Nayak, Mahendra Kumar Hegde, Narasimha Kini, Poornima Panduranga Kundapur, Gopee Krishnan. 2134-2140 [doi]
- A novel approach in sar-adc for variable conversion time using window detectorMohd Iqbal Mohd Hadis, Sudhakar Mande. 2141-2146 [doi]
- Analysis of feature selection and extraction algorithm for loan data: A big data approachGirija Attigeri, M. M. Manohara Pai, Radhika M. Pai. 2147-2151 [doi]
- Fpga implementation of fourier segmentation for empirical wavelet transformN. Pravin, S. K. Shishir, S. Anirudh, R. Srinath, B. Bala Tripura Sundari. 2152-2155 [doi]
- A survey on microstrip antennas for portable wireless communication system applicationsAnveshkumar Nella, A. S. Gandhi. 2156-2165 [doi]
- Data hiding with dual based reversible image using sudoku techniqueM. V. Sravan Kumar, E. Mamatha, C. S. Reddy, V. Mukesh, R. Dasthagiri Reddy. 2166-2172 [doi]
- Underwater communications in the presence of bubbles and Doppler shiftK. Saraswathi, S. Ravishankar, Retd. Cdr Vijay Singh. 2173-2179 [doi]
- Goal-based multi-agent tree formation using reinforcement learningB. K. Swathi Prasad, Hariharan Ramasangu. 2180-2184 [doi]
- Intelligent agriculture mechanism using internet of thingsH. V. Abhijith, Darpan A. Jain, U. Adithya Athreya Rao. 2185-2188 [doi]
- Evolutionary algorithm based structural optimization for patch antenna design and its performance analysisGopika Sudhakaran, Bindu Kandipati, G. Bhuvan Surya, V. Karthikhaa Shree, M. Sivaprasad, M. Jayakumar. 2189-2192 [doi]
- A meta-level hybridization approach to personalized movie recommendationNeeharika Immaneni, Isha Padmanaban, Bagavathy Ramasubramanian, Rajeswari Sridhar. 2193-2200 [doi]
- New results on next fit and first fit on-line algorithms for square and rectangle packingRakesh Mohanty, Pankhuri Kiran. 2201-2207 [doi]
- Secure data migration between cloud storage systemsChetan Gudisagar, Bibhu Ranjan Sahoo, M. Sushma, C. D. Jaidhar. 2208-2212 [doi]
- An effective analysis on intrusion detection systems in wireless mesh networksK. Ganesh Reddy, V. Purushothama Raju, P. Santhi Thilagam. 2213-2220 [doi]
- Bi-directional partitioning approach to frequent item miningVijayakumar Kadappa. 2221-224 [doi]
- Internet of things based approach for open precision farmingC. Kishore Kumar, Mohammed M. Ibrahim, Neerumalla Mani Srikanth, S. Aswin, K. P. Peeyush. 2225-2230 [doi]
- MIMO antenna for mobile terminals with enhanced isolation in LTE bandJ. Prakash, Roshan Vijay, S. Natarajamani. 2231-2234 [doi]
- Wireless voice-controlled multi-functional secure ehomeK. V. Sai Vineeth, Bandla Vamshi, V. K. Mittal. 2235-2240 [doi]
- VLSI implementation of LNS arithmetic unit by LUT partitioningV. Vinod, K. Eswar, P. Vishnuvardhan, G. Srikanth, S. R. Ramesh. 2241-2245 [doi]
- Multiclass classification of Kirlian images using svm techniqueChandrashekhar S. Janadri, B. G. Sheeparamatti, Vishwanath Kagawade. 2246-2250 [doi]
- A hybrid approach to emotion recognition system using multi-discriminant analysis & k-nearest neighbourMonika Jain, Sandeep Saini, vibhor kant. 2251-2256 [doi]
- Iris recognition using radon transform and GLCMKanchan S. Bhagat, Pramod B. Patil, Ratnadeep R. Deshmukh, D. K. Kirange, Swapnil Waghmare. 2257-2263 [doi]
- Imu sensor based self stabilizing cup for elderly and parkinsonismVishnu Vidya, Prabaharan Poornachandran, V. G. Sujadevi, Meher Madhu Dharmana. 2264-2269 [doi]
- Home server and nas using raspberry PIAmit Rakesh Shrivastava, Jayant Gadge. 2270-2275 [doi]
- Programmable high data rate qpsk modulator for space applicationsG. Yeswanthi, M. Kavitha, P. S. Priyanka, Dhanesh G. Kurup. 2276-2278 [doi]
- Design of a novel reversible nlfsrNavaneetha Krishna, V. Murugappan, R. Harish, M. Midhun, E. Prabhu. 2279-2283 [doi]
- An automated vision-based method to detect elephants for mitigation of human-elephant conflictsGowtham Ramesh, Senthilkumar Mathi, Sini Raj Pulari, Vidya Krishnamoorthy. 2284-2288 [doi]
- Securing qr codes by rsa on fpgaPriyanka Gupta, Sandeep Saini, Kusum Lata. 2289-2295 [doi]
- Study of deep learning and CMU sphinx in automatic speech recognitionAbhishek Dhankar. 2296-2301 [doi]
- Enhanced variant of RPL for improved securityPranesh V. Kallapur, Nitish Ranjan, Rohan Vidyarthi, Anshuman, Vishwamitra Singh. 2302-2306 [doi]
- Multiple copy and paste operation in mobile web browsersAnkit Kumar, V. Ajith Kumar, Joy Bose. 2307-2312 [doi]
- Secure and energy efficient routing protocol in wireless sensor network: A surveyNotom Ajaykumar, Mrinal Sarvagya. 2313-2322 [doi]
- Sybil attack in IOT: Modelling and defensesAnjana Rajan, J. Jithish, Sriram Sankaran. 2323-2327 [doi]
- Community mobilization and participation in mobile communities: A case study of a whatsapp blood donation volunteer group in ernakulamR. Seetha Lakshmi, Chitra Ramakrishnan. 2328-2334 [doi]
- Analysis of aes cryptosystem in the existence of hardware trojanSurbhi Chhabra, Kusum Lata. 2335-2341 [doi]
- Restaurant setup business analysis using yelp datasetSindhu Hegde, Supriya Satyappanavar, Shankar Setty. 2342-2348 [doi]
- Narcissism, happiness and self actualizationSykam Vasudha, Rajiv Prasad. 2349-2358 [doi]
- Applying deep learning approaches for network traffic predictionR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 2353-2358 [doi]
- Recognition of Indian license plate number from live stream videosB. Sachin Prabhu, Subramaniam Kalambur, Dinkar Sitaram. 2359-2365 [doi]
- Quality assessment metrics for edge detection and edge-aware filtering: A tutorial reviewDiana Sadykova, Alex Pappachen James. 2366-2369 [doi]
- Aspect based sentiment classication: Svd featuresS. Thara, S. Sidharth. 2370-2374 [doi]
- Exploring the dynamic of gameplay in f2p mmogs: A study of clash of clansVinayak Mohan, Chitra Ramakrishnan. 2375-2381 [doi]
- Automated image segmentation for detecting cell spreading for metastasizing assessments of cancer developmentSholpan Kauanova, Ivan Vorobjev, Alex Pappachen James. 2382-2387 [doi]
- R peak detection and feature extraction for the diagnosis of heart diseasesO. N. Swathi, M. Ganesan, R. Lavanya. 2388-2391 [doi]
- A study to understand the impact of emotional intelligence on employees' team orientation and behaviourM. Manoj, Rajiv Prasad. 2392-2395 [doi]
- Onto-thesaurus for tamil language: Ontology based intelligent system for information retrievalC. Sankaralingam, S. Rajendran, B. Kavirajan, M. Anand Kumar, K. P. Soman. 2396 [doi]
- Power efficient-resource utilization protocol for WDM optical networksP. L. Sindhuja Rao, K. V. V. N. D. Santosh, T. K. Ramesh. 2402-2406 [doi]
- Deep learning model on stance classificationGayathri Rajendran, Prabaharan Poornachandran, Bhadrachalam Chitturi. 2407-2409 [doi]