Abstract is missing.
- Two Stage Histogram Enhancement Schemes to Improve Visual Quality of Fundus ImagesFarha Fatina Wahid, K. Sugandhi, Raju G.. 1-11 [doi]
- A Secure and Efficient Computation Outsourcing Scheme for Multi-usersV. Sudarsan Rao, N. Satyanarayana. 12-24 [doi]
- Detecting the Common Biomarkers for Early Stage Parkinson's Disease and Early Stage Alzheimer's Disease Associated with Intrinsically Disordered ProteinSagnik Sen 0002, Ujjwal Maulik. 25-34 [doi]
- Assamese Named Entity Recognition System Using Naive Bayes ClassifierGitimoni Talukdar, Pranjal Protim Borah, Arup Baruah. 35-43 [doi]
- Medical Image Multiple Watermarking Scheme Based on Integer Wavelet Transform and Extraction Using ICAR. Nanmaran, G. Thirugnanam, P. Mangaiyarkarasi. 44-53 [doi]
- Recognizing Real Time ECG Anomalies Using Arduino, AD8232 and JavaPratik Kanani, Mamta Padole. 54-64 [doi]
- Interpretation of Indian Sign Language Using Optimal HOG Feature VectorGarima Joshi, Anu Gaur, Sheenu. 65-73 [doi]
- Stable Reduced Link Break Routing Technique in Mobile Ad Hoc NetworkBhagyashri R. Hanji, Rajashree Shettar. 74-83 [doi]
- Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-ExaminationsKissan G. Gauns Dessai, Venkatesh V. Kamat. 84-94 [doi]
- Early Diabetes Prediction Using Voting Based Ensemble LearningAdil Husain, Muneeb H. Khan. 95-103 [doi]
- A System that Performs Data Distribution and Manages Frequent Itemsets Generation of Incremental Data in a Distributed EnvironmentVinaya Sawant, Ketan Shah. 104-113 [doi]
- Assessing Autonomic Level for Self-managed Systems - FAHP Based ApproachArun Sharma, Deepika Sharma, Mayank Singh 0008. 114-123 [doi]
- Bounded Paths for LCR Queries in Labeled Weighted Directed GraphsBhargavi B., K. Swarupa Rani. 124-133 [doi]
- An Efficient Image Fusion Technique Based on DTCWTSonam, Manoj Kumar. 134-143 [doi]
- Low-Delay Channel Access Technique for Critical Data Transmission in Wireless Body Area NetworkM. Ambigavathi, D. Sridharan 0001. 144-153 [doi]
- Lexicon-Based Approach to Sentiment Analysis of Tweets Using R LanguageNitika Nigam, Divakar Yadav. 154-164 [doi]
- Twitter Based Event SummarizationAmrah Maryam, Rashid Ali. 165-174 [doi]
- Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image EnhancementRashmi Bisht, Ritu Vijay, Shweta Singh. 175-184 [doi]
- A Novel Load Balancing Algorithm Based on the Capacity of the Virtual MachinesS. B. Kshama, K. R. Shobha. 185-195 [doi]
- A Hybrid Approach for Privacy-Preserving Data MiningNagaPrasanthi Kundeti, M. V. P. Chandra Sekhara Rao, Naga Raju Devarakonda, Suresh Thommandru. 196-207 [doi]
- Network Traffic Classification Using Multiclass ClassifierPrabhjot Kaur, Prashant Chaudhary, Anchit Bijalwan, Amit Awasthi. 208-217 [doi]
- An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion DetectionRohini Rajpal, Sanmeet Kaur. 218-227 [doi]
- Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion DetectionSanmeet Kaur, Ishan Garg. 228-238 [doi]
- Recognition of Handwritten Digits Using DNN, CNN, and RNNSubhi Jain, Rahul Chauhan. 239-248 [doi]
- Evaluating Effectiveness of Color Information for Face Image Retrieval and Classification Using SVD FeatureJunali Jasmine Jena, G. Girish, Manisha Patro. 249-259 [doi]
- PDD Algorithm for Balancing Medical DataKaran Kalra, Riya Goyal, Sanmeet Kaur, Parteek Kumar. 260-269 [doi]
- Digital Mammogram Classification Using Compound Local Binary Pattern Features with Principal Component Analysis Based Feature Reduction ApproachMenaxi J. Bagchi, Figlu Mohanty, Suvendu Rup, Bodhisattva Dash, Banshidhar Majhi. 270-278 [doi]
- Assessing the Performance of CMOS Amplifiers Using High-k Dielectric with Metal Gate on High Mobility SubstrateDeepa Anand, M. Swathi, A. Purushothaman, Sundararaman Gopalan. 279-289 [doi]
- The Impact of Picture Splicing Operation for Picture Forgery DetectionRachna Mehta, Navneet Agrawal. 290-301 [doi]
- LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive ImagesN. Sasikaladevi, N. Mahalakshmi, N. Archana. 302-311 [doi]
- HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template ProtectionN. Sasikaladevi, A. Revathi 0001, N. Mahalakshmi, N. Archana. 312-320 [doi]
- Greedy WOA for Travelling Salesman ProblemRishab Gupta, Nilay Shrivastava, Mohit Jain, Vijander Singh, Asha Rani. 321-330 [doi]
- Deterministic Task Scheduling Method in Multiprocessor EnvironmentRanjit Rajak. 331-341 [doi]
- Performance Comparison of Measurement Matrices in Compressive SensingKankanala Srinivas, Nagapuri Srinivas, Puli Kishore Kumar, Gayadhar Pradhan. 342-351 [doi]
- A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL)Deepak A. Vidhate, Parag Kulkarni. 352-361 [doi]
- Novel Technique for the Test Case Prioritization in Regression TestingMampi Kerani, Sharmila. 362-371 [doi]
- Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection SystemsAshu Bansal, Sanmeet Kaur. 372-380 [doi]
- Relative Direction: Location Path Providing Method for Allied Intelligent AgentS. Rayhan Kabir, Mirza Mohtashim Alam, Shaikh Muhammad Allayear, Md Tahsir Ahmed Munna, Syeda Sumbul Hossain, Sheikh Shah Mohammad Motiur Rahman. 381-391 [doi]
- FPGA Implementation for Real-Time Epoch Extraction in Speech SignalNagapuri Srinivas, Kankanala Srinivas, Gayadhar Pradhan, Puli Kishore Kumar. 392-400 [doi]
- Privacy-Preserving Random Permutation of Image Pixels Enciphered Model from Cyber Attacks for Covert OperationsAmit Kumar Shakya, Ayushman Ramola, Akhilesh Kandwal, Vivek Chamoli. 401-410 [doi]
- MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWOJitendra Kumar Seth, Satish Chandra. 411-420 [doi]
- An Improved RDH Model for Medical Images with a Novel EPR Embedding TechniqueJayanta Mondal, Debabala Swain, Devee Darshani Panda. 421-430 [doi]
- Machine Learning Based Adaptive Framework for Logistic Planning in Industry 4.0Krista Chaudhary, Mayank Singh 0008, Sandhya Tarar, D. K. Chauhan, Viranjay M. Srivastava. 431-438 [doi]
- An Analysis of Key Challenges for Adopting the Cloud Computing in Indian Education SectorMayank Singh 0008, Viranjay M. Srivastava. 439-448 [doi]
- Texture Image Retrieval Based on Block Level Directional Local Extrema Patterns Using Tetrolet TransformGhanshyam Raghuwanshi, Vipin Tyagi. 449-460 [doi]
- Development of Transformer-Less Inverter System for Photovoltaic ApplicationShamkumar B. Chavan, Umesh A. Kshirsagar, Mahesh S. Chavan. 461-470 [doi]
- English Text to Speech Synthesizer Using Concatenation TechniqueSai Sawant, Mangesh S. Deshpande. 471-480 [doi]
- Text Translation from Hindi to EnglishIra Natu, Sahasra Iyer, Anagha Kulkarni 0004, Kajol Patil, Pooja Patil. 481-488 [doi]
- Optical Character Recognition (OCR) of Marathi Printed Documents Using Statistical ApproachPritish Mahendra Vibhute, Mangesh Sudhir Deshpande. 489-498 [doi]
- Multi View Human Action Recognition Using HODDSiddharth Bhorge, Deepak Bedase. 499-508 [doi]
- Segmental Analysis of Speech Signal for Robust Speaker Recognition SystemRupali V. Pawar, R. M. Jalnekar, J. S. Chitode. 509-519 [doi]
- Multimicrophone Based Speech DereverberationSeema Vitthal Arote, Mangesh Sudhir Deshpande. 520-529 [doi]
- Modeling Nonlinear Dynamic Textures Using Isomap with GPUPremanand Ghadekar. 530-542 [doi]
- Exploration of Apache Hadoop Techniques: Mapreduce and Hive for Big DataPoonam Rana, Vineet Sharma, P. K. Gupta 0001. 543-552 [doi]