Abstract is missing.
- Recommender System for E-Learning through Content and Profile Based ApproachS. Venugopalan, M. V. Srinath, Paul Rodrigues. [doi]
- An Efficient Approach for Wormhole detection in MANETRicha Mudgal, Rohit Gupta. [doi]
- Simulation of Digital Signal Processor-FFT for Communication System ApplicationsPrasad Kulkarni, B. G. Hogade, Vidula Kulkarni. [doi]
- Key Diffusion Approach for AVK based CryptosystemShaligram Prajapat, Ramjeevan Singh Thakur. [doi]
- Counting Clusters in Twitter PostsAndrew Bates, Jugal Kalita. [doi]
- Denial of Service Attack Detection using Multivariate Correlation AnalysisNazrul Hoque, D. K. Bhattacharyya, Jugal K. Kalita. [doi]
- Analysis of Several Image Steganography Techniques in Spatial Domain: A SurveyMunesh Chandra Trivedi, Shivani Sharma, Virendra Kumar Yadav. [doi]
- Performance Augmentation of 2: 1 Mux Using Transmission GateMohit Vyas, Shyam Akashe. [doi]
- Evaluation and Comparison of Entity based search Implied by SVM and Neural NetworkAnant Kumar Malani, Mukesh Kumar. [doi]
- A GCM and GPS Based Approach to Health ServiceNabish Kumar, Nitish Kumar, Pradeep Karki, Ashwini Jarali. [doi]
- Hop Count Analysis of IE-DIR Protocol for VANETs in Wider City Traffic ScenarioVarun Prabahkar, Annapurna Singh, Ram Shringar Raw. [doi]
- Segmented Crypto AlgorithmSmita Paira, Sourabh Chandra, Sk. Safikul Alam. [doi]
- A Hybrid Clustering Based Collaborative Filtering (CF) ApproachS. S. Agrawal, G. R. Bamnote, S. L. Satarkar. [doi]
- A New Approach for the Security of VPNKuwar Kuldeep V. V. Singh, Himanshu Gupta. [doi]
- Quality Evaluation Framework for Component Based SoftwarePrasenjit Banerjee, Anirban Sarkar. [doi]
- Hybrid Channel Allocation with GA and PSO to reduce Call Blocking Probability in Cellular NetworkSharada Narsingrao Ohatkar, Dattatraya S. Bormane. [doi]
- Towards Sentiment Orientation Data Set EnrichmentSreecharan Sankaranarayanan, Dayanand Ingale, Ranveer Bhambhu, K. Chandrasekaran. [doi]
- Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce SiteP. S. Lokhande, B. B. Meshram. [doi]
- A Fast Gene Expression Analysis using Parallel Biclustering and Distributed Triclustering ApproachTulika Kakati, Hasin Afzal Ahmed, Dhruba K. Bhattacharyya, Jugal K. Kalita. [doi]
- Performance Based Analysis of Novel Equilin ClusteringA. Joy Christy, S. Hari Ganesh. [doi]
- Human Gait Recognition using Deep Neural NetworksDeepjoy Das, Alok Chakrabarty. [doi]
- AB-EUIDE: An approach to the design of ergonomic user interfaces for Cloud ComputingS. Ravi Kumar 0003, Md. Abdul Muqsit Khan, Y. K. Sundara Krishna, K. Chandra Sekharaiah. [doi]
- Power and Area Efficient Capacitor Multiplier Technique for Multi-Fin Two Stage OpampAditya Raj, Shyam Akashe. [doi]
- Performance Analysis of Fault Tolerant Advanced Irregular Shuffle Exchange Network (AISEN)Shobha Arya, Nipur. [doi]
- Removing Flaming Problems from Social Networking Sites using Semi-Supervised Learning ApproachVishakha Mal, A. J. Agrawal. [doi]
- Performance Evaluation of Text Independent Automatic Speaker Recognition using VQ and GMMSumita Nainan, Vaishali Kulkarni. [doi]
- Optimization Techniques in Wireless Sensor NetworksSurjit Singh, Rajeev Mohan Sharma. [doi]
- POS tagger for Urdu using Stochastic approachesVaishali Gupta, Nisheeth Joshi, Iti Mathur. [doi]
- Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern AutomobilesAishwarya, Farha Syed, Jaya Nupur, Aishwarya Vichare, Arun Mishra. [doi]
- Leakage Power Reduction Technique by using FinFET TechnologyAjay Kumar Dadoria, Kavita Khare, R. P. Singh. [doi]
- Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping ClustersRonald Ashley Dkhar, Keshab Nath, Swarup Roy, Dhruba K. Bhattacharyya, Sukumar Nandi. [doi]
- An Alert System Based on Shared Score for Online Social NetworksT. Shanmughapriya, S. Swamynathan. [doi]
- Software Effort Estimation of GSD Projects Using Calibrated Parametric Estimation ModelsS. Ramacharan, K. Venu Gopala Rao. [doi]
- Performance Evaluation of Path Length based Routing Strategies for Survivable WDM NetworkDinesh Kumar Tyagi, V. K. Chaubey. [doi]
- Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSRNaman Vaishnav, Hardik Upadhyay. [doi]
- Study and Implementation of Record De-duplication AlgorithmsVaishali Wangikar, Sachin Deshmukh, Sunil Bhirud. [doi]
- Google Analytics: A Tool to make websites more RobustLoveleen Gaur, Gurinder Singh, Jeyta, Shubhankar Kumar. [doi]
- Food Security and Safety using advanced Information and Communication Technologies (ICTs)Rachita Gupta. [doi]
- Secure Sum Computation for Insecure NetworksRashid Sheikh, Durgesh Kumar Mishra. [doi]
- Cross Layer Approach Energy Efficient Transmission of Multimedia Data over Wireless Sensor NetworksVinod B. Durdi, P. T. Kulkarni, K. L. Sudha. [doi]
- Advance Persistent Threat: BotnetBhavik Thakar, Chandresh Parekh. [doi]
- A Framework for Detecting External Plagiarism from Monolingual Documents: Use of Shallow NLP and N-gram Frequency ComparisonRitambhra Korpal, Saugata Bose. [doi]
- Movie Recommendation System Employing Latent Graph Features in Extremely Randomized TreesMit Shah, Dhruvesh Parikh, Bharat Deshpande. [doi]
- Power efficient optimal Operational Transconductance Amplifier Using Source Degeneration TechniquePrateek Tiwari, Ranjeet Singh Tomar, Shyam Akashe. [doi]
- Word Sense Disambiguation in Software Requirement Specifications Using WordNet and Association Mining RuleMoh. Shahid Husain, M. Akheela Khanum. [doi]
- A Study on Agent Based Ergonomic and Intelligent User Interface Design in Cloud ComputingS. Ravi Kumar 0003, Md. Abdul Muqsit Khan, K. Chandra Sekharaiah, Y. K. Sundara Krishna. [doi]
- Design of low power 3-bit TIQ based ADC by using FinFET TechnologyDevansh Sinha, Shyam Akashe. [doi]
- Emerging Applications Perspective for Internet of ThingsAasheesh Tandon, Vishwa Shah, Sachin Gajjar. [doi]
- Software Architecture for Smart Card: ICT Solution for Healthcare Industry for Sustainable DevelopmentDinesh Kumar Saini, Lakshmi Sunil Prakash, Hemant Gaur. [doi]
- Big-data Transportation in Orchestrated Bioinformatics Workflows: An Analysis and HypothesisRickey T. P. Nunes, Santosh L. Desphpande, Sattanathan Subramanian. [doi]
- Caught Hacker: Curing DDOS AttackRajneesh Tanwar, Purushottam Sharma. [doi]
- High Performance Computation Analysis for Medical Images using High Computational MethodsAshwini Shewale, Nayan Waghmare, Anuja Sonawane, Utkarsha Teke. [doi]
- Self Similarity Effect of RTT and RTO in Network Congestion Control MechanismSanjay Kumar Patra, Sarojananda Mishra. [doi]
- A Wormhole Attack in Mobile Ad-hoc Network: Detection and PreventionAshka Shastri, Jignesh Joshi. [doi]
- Analysis of Angle Based Opportunistic Routing Protocol for Vehicular Ad-Hoc NetworksHarsh Kumar Singh, Ram Shringar Raw, Sanjeev Kumar, Arvind Kumar Singh, S. K. Soni. [doi]
- Deciding Admission Criteria For Master of Computer Applications Program in India using Chi-Square TestShanti Verma. [doi]
- Link Prediction in Social Networks: A Similarity score based Neural Network ApproachUpasana Sharma, Bhawna Minocha. [doi]
- Energy Aware Heuristic Scheduling of Variable Class Constraint Resources in Cloud Data CentresK. Hemant Kumar Reddy, Geetika Mudali, Diptendu Sinha Roy. [doi]
- Analysis of Nature driven Routing Protocol in MANETSShikha Choudhary, H. S. Mewara. [doi]
- Security Challenges of Virtualization in Cloud ComputingManjeet Gupta, Devesh Kumar Srivastava, Durg Singh Chauhan. [doi]
- Prediction of next Mobile Access Gateway by Tracking Locations of Mobile NodeNitesh M. Tarbani, A. S. Alvi, G. R. Bamnote, S. V. Pattalwar. [doi]
- Localization Adaptive Secure Routing for Ad-Hoc Cloud Networks Based on Synchronized Timestamp ApproachNiroj Kumar Pani, Bikram Keshari Rath, Sarojananda Mishra. [doi]
- A Novel and Integrated Semantic Recommendation System for E-Learning using OntologyMugdha Sharma, Laxmi Ahuja. [doi]
- Security, Privacy Issues and challenges In Cloud Computing: A SurveyLahar Singh Nishad, Akriti, Jaya Paliwal, Roli Pandey, Sumitra Beniwal, Sarvesh Kumar. [doi]
- Smart Cities: A Secure Data Transmission ModelManju Khari, Manoj Kumar, Sonakshi Vij, Priyank Pandey, Vaishali. [doi]
- A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANETDivya Patidar, Jigyasu Dubey. [doi]
- K-AMOA: K-Anonymity Model for Multiple Overlapped AttributesBhakti Maheshwarkar, Pawan Patidar, M. K. Rawat, Nidhi Maheshwarkar. [doi]
- The Cyber Security Issues over Emergency ManagementJayanthi G. Prisilla. [doi]
- Enhancing the capabilities of Student Result Prediction SystemPamela Chaudhury, Sushruta Mishra, Hrudaya Kumar Tripathy, Brojo Kishore Mishra. [doi]
- Comparative Performance of Fault-Prone Prediction Classes with K-means Clustering and MLPSatwinder Singh, Rozy Singla. [doi]
- Wi-MAX: Connecting PeopleRobin Swamy, Vidushi Singhal. [doi]
- A language based comparison of different similarity functions and classifiers using web based Bilingual Question Answering System developed using Machine Learning ApproachKrishma Singla, Mohit Dua, Garima Nanda. [doi]
- A Behavioral Metrics Suite for Modular OntologiesNiyati Baliyan, Sandeep Kumar. [doi]
- Word Sense Disambiguation on Dravidian Languages: A SurveySreelakshmi Gopal, Rosna P. Haroon. [doi]
- Implementation and Analysis of Blackhole Attack in AODV Routing ProtocolRashmi Chaudhary, Prakash Rao Ragiri. [doi]
- Enhancement of Hybrid Tagger by using Rule Based ApproachPratik K. Agrawal, Abrar S. Alvi, G. R. Bamnote. [doi]
- Proposed Frame Work of e-Learning Services Through CloudSonia Duggal, M. K. Sharma. [doi]
- Analysis of Association rule in Data MiningSachin Sharma, Shaveta Bhatia. [doi]
- A Model for ROI of IT investment in e-Governance projectsDebendra Kumar Mahalik. [doi]
- Parallel Computing of Load Flow AnalysisChayan Bhatt, Rahul Saxena, D. P. Sharma. [doi]
- Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm OptimizationSamadrita Guha, Dipti Kapoor Sarmah. [doi]
- A Novel Approach for Web Service RecommendationPriyanshi Barod, M. S. Bhamare, Ruhi Patankar. [doi]
- Operating Systems for Internet of Things: A Comparative StudyTej Bahadur Chandra, Pushpak Verma, A. K. Dwivedi. [doi]
- Reliability Assessment of Energy Monitoring Service for a Futuristic Smart CityRanjit Kumar Behera, K. Hemant Kumar Reddy, Diptendu Sinha Roy. [doi]
- Modified Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic PatientSuhas Machhindra Gaikwad, Rahul Raghvendra Joshi, Shishir Machhindra Gaikwad. [doi]
- Linked Open Data Search EngineHiteshwar Kumar Azad, Akshay Deepak, Kumar Abhishek 0004. [doi]
- American Static Signs Recognition Using Leap Motion SensorRajesh B. Mapari, Govind Kharat. [doi]
- Low Noise Rim Preserving FilterAnila Dhingra, Varsha Joshi. [doi]
- Finding Similar Classes in OntologiesHimanshi Yaduwanshi, Vijaya Padmadas. [doi]
- Multispectral Medical Image Fusion using PCA in Wavelet DomainAisha Moin, Vikrant Bhateja, Anuja Srivastava. [doi]
- A Critical Study of Factors Promoting Cyberloafing in OrganizationsSoham Banerjee, Sanjeev Thakur. [doi]
- Relevance of Cloud Computing in Namibia: A Case StudyDharm Singh Jat, Michael S. Haodom, Anicia Peters. [doi]
- Research and Analysis of Lightweight Cryptographic Solutions for Internet of ThingsIsha Batra, Ashish Kr. Luhach, Nisrag Pathak. [doi]
- Classification and Performance Analysis of Intra-domain Mobility Management Schemes for Wireless Mesh NetworkAbhishek Majumder, Subhrajyoti Deb, Sudipta Roy 0001. [doi]
- SIUQAPTT: SQL Injection Union Query Attacks Prevention Using Tokenization TechniqueBhakti Maheshwarkar, Nidhi Maheshwarkar. [doi]
- A Review of Automatic Signature VerificationKamlesh Kumari, V. K. Shrivastava. [doi]
- Confidentiality Enhanced Security Model for Cloud EnvironmentAnurag Jain, Rajneesh Kumar. [doi]
- An Analytical Study of "Digital Image Watermarking in Frequency Domain"Rachana V. Mahule, Chitra A. Dhawale. [doi]
- Multimedia Security through LSB MatchingRupali Bhardwaj. [doi]
- Low-Power High Speed 1-bit Full Adder Circuit DesignShailesh Dwivedi, Kavita Khare, Ajay Kumar Dadoria. [doi]
- Towards National Integration by Analyzing a Case Study of CyberCrimesB. Tirupathi Kumar, K. Chandra Sekharaiah, D. Suresh Babu. [doi]
- Test Suite Reduction by Mutation Testing Mapped to Set Cover ProblemNishtha Jatana, Bharti Suri, Prateek Kumar 0003, Bimlesh Wadhwa. [doi]
- Evolution of Payments Bank and Impact From M-PESA: A Case of Mobile Banking Services in IndiaGourav Vyas, Loveleen Gaur, Gurinder Singh. [doi]
- Storageless Credentials And Secure LoginBinay Kumar, Sadanand Yadav. [doi]
- Factors Affecting the Adoption of ICT in Hospitality & Tourism IndustryM. P. Sharma. [doi]
- An Integrated Model for Prediction of Loading Packets in Network TrafficTheyazn H. H. Aldhyani, Manish R. Joshi. [doi]
- 90nm Node 1T Floating Gate Embedded Flash Memory with Precharge NMOS TransistorPadma Prasada, Sathisha, H. D. Ranjith. [doi]
- Pentest Ninja: XSS And SQLi Takeover ToolKunal Relan, Vidushi Singhal. [doi]
- Development and Performance Analysis of Cloud and MVC Based Web applicationManisha Jailia, Ashok Kumar, Himani Singhal, Manisha Agarwal. [doi]
- Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing DatasetSheetal Bairwa, Jyoti Gajrani, Satyanarayan Tazi. [doi]
- The Effect of Internet Usage on the Psychological States of Adolescents and Young AdultsPoonam Dhaka, Dharm Singh Jat, Isaac Nhamu, Charu Singh. [doi]
- An Image Processing Approach to Intelligent Traffic Management SystemWaris Hooda, Pradeep Kumar Yadav, Amogh Bhole, Deptii D. Chaudhari. [doi]
- A Novel Approach towards Authentication by Generating Strong PasswordsVijay B. Gadicha, A. S. Alvi. [doi]
- An Improved Fitness Based Differential Evolution Algorithm (IFBDEA)Hitesh Sharma, V. P. Sharma, Akrati Sharma, Prakash Meena. [doi]
- Computational Methods for Detecting Functional Modules from Gene Regulatory NetworkHazel Nicolette Manners, Monica Jha, Pietro H. Guzzi, Pierangelo Veltri, Swarup Roy. [doi]
- A Study On Malayalam Machine TranslationT. A. Shaharban, Rosna P. Haroon. [doi]
- Opinion based trusted AODV routing protocol for MANETRashmi Hinge, Jigyasu Dubey. [doi]
- Smart Interaction Using Hand Gesture RecognitionSuneel Kumar, Neha Bansal, Sankalp Nath Singh. [doi]
- Geometry based Inter Vehicle Distance Estimation for Instantaneous GPS Failure in VANETsAhmed Nazar Hassan, Omprakash Kaiwartya, Abdul Hanan Abdullah, Dalya Khalid Sheet, Shiv Prakash. [doi]
- Resource Management Through Fuzzy Assignment Problem in Cloud Computing EnvironmentNarander Kumar, Diksha Shukla. [doi]
- A Major Threat to Big Data: Data SecurityArunima Dubey, Satyajee Srivastava. [doi]
- Requirements Prioritization: Parameters of Relevance - An empirical Study across 3 datasetsSita Devulapalli, O. R. S. Rao, Akhil Khare. [doi]
- Neutralizing Cross-Site Scripting Attacks Using Open Source TechnologiesG. Rama Koteswara Rao, R. Satya Prasad, M. Ramesh. [doi]
- Automatic Text Classification in Information retrieval: A SurveySanjay K. Dwivedi, Chandrakala Arya. [doi]
- Use of Proxy Signature in e-GovernanceAparna Bannore, Satish R. Devane. [doi]
- Elliptic Curve Based Proxy Re-EncryptionV. Thangam, K. Chandrasekaran 0001. [doi]
- A Study on effects of multi-dimension reduction on Three-Dimensional wireless sensor network localizationBhagwan Sahay Meena, K. Hemachandran, Shaine Hussain Laskar. [doi]
- A Review of Cloud Computing Capabilities Towards Building Virtual Learning CentresAttlee Munyaradzi Gamundani, Deada O. Kandjii. [doi]
- Performance Analysis of Secure Localization Techniques in Wireless Sensor NetworkDeepak Prashar, Dilip Kumar, Kiran Jyoti. [doi]
- Automatic Evaluation of Ontology MatchersIti Mathur, Nisheeth Joshi, Hemant Darbari, Ajai Kumar. [doi]
- Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc NetworksPradeep Kamboj, Ram Shringar Raw, A. K. Gautam. [doi]
- Reinforcement Learning based Routing for Cognitive Network on ChipYogendra Gupta, Lava Bhargava. [doi]
- Impact of variable probability level and nutrient concentration on animal diet formulationPratiksha Saxena, Neha Khanna, Raj Kumar. [doi]
- Seamless VANET Connectivity through Heterogeneous Wireless Network on Rural HighwaysShilpy Agrawal, Neeraj Tyagi, Arun Kumar Misra. [doi]
- A SDDG FinFET Based Op Amp with DSB CircuitJainendra Tripathi, Ranjeet Singh Tomar, Shyam Akashe. [doi]
- Cluster Based Authentication Scheme for Wireless Multimedia Sensor Networks Basavaraj Patil, S. R. Biradar. [doi]
- Pseudo Random Bit Generator using Logistic and Bernoulli MapsP. Jhansi Rani. [doi]
- Principals of Energy Efficiency in Wireless Mesh NetworkVeenu Mor, Harish Kumar. [doi]
- Scheduling Real-Time task using dynamic Preemption ThresholdS. A. Bhura, A. S. Alvi, S. Y. Amdani. [doi]
- Biometric Template Protection with Fuzzy Vault and Fuzzy CommitmentShubhangi Sapkal, R. R. Deshmukh. [doi]
- Fuzzy and ANN based mining approach testing for Social network analysisAnupriya Jain, M. K. Sharma. [doi]
- Hadoop based collaborative recommendation systemHarsh Varudkar. [doi]
- Agent based Security Model for Cloud Big DataSunil Kumar, Jayant Shekhar, Himanshu Gupta. [doi]
- Towards m-gov in Solid Waste Management Sector Using RFID, Integrated technologiesSuchit S. Purohit, Vinod M. Bothale, Savita R. Gandhi. [doi]
- Comparative analysis of different statistical and neural network based forecasting tools for prediction of stock dataHiral Patel, Satyen Parikh. [doi]
- Digital Video Watermarking using DWT and Singular ValuesS. Bhargavi Latha, D. Venkata Reddy, A. Damodaram. [doi]
- Quality Estimation of English-Hindi Machine Translation SystemsNisheeth Joshi, Iti Mathur, Hemant Darbari, Ajai Kumar. [doi]
- Selective Encryption of Video Frames Using Bezier Curve Over Galois Field GF (P^m)B. V. Srividya, S. Akhila. [doi]
- Novel Gating Technique in D-Latch for Low Power ApplicationAkanksha Singh, Ayushi Marwah, Shyam Akashe. [doi]
- An Efficient Edge Detection Technique Using Filtering and Morphological Operations for Underwater Acoustic ImagesPriyadharsini Ravisankar, T. Sree Sharmila, V. Rajendran. [doi]
- A Single Database Scan Approach for Mining Temporally Similar Association PatternsVangipuram Radhakrishna, Puligadda Veereswara Kumar, Vinjamuri Janaki. [doi]
- NWCA: A New Weighted Clustering Algorithm to form Stable Cluster in VANETDinesh Singh, Ranvijay, Rama Shankar Yadav. [doi]
- A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in CloudPriti Narwal, Deepak Kumar 0007, Mayank Sharma. [doi]
- Intellectualizing TRUST for Medical WebsitesHimani Singal, Shruti Kohli. [doi]
- Nano Sensors and Pattern Recognition for Detection of Hidden ExplosivesN. L. Manasa. [doi]
- Compression & Security in MongoDB without affecting EfficiencyHitesh Hasija, Dinesh Kumar. [doi]
- Centralized Approach towards Intelligent Traffic Signal ControlBhushan S. Atote, Mangesh Bedekar, Suja S. Panicker. [doi]
- Predictive Approach of Case Base Reasoning in Artificial Intelligence: In Case of Astrological Predictions About Famous PersonalitiesNeelam Chaplot, Praveen Dhyani, O. P. Rishi. [doi]
- Performance Measurement of Virtual Machine Migration Using Pre-copy Approach in cloud computingMegha R. Desai, Hiren B. Patel. [doi]
- A Comparison of Existing Tools for Evaluation of Programming ExercisesMaxwell Christian, Bhushan Trivedi. [doi]
- Intrusion Detection System Using Genetic Algorithm for CloudTanya Singh, Seema Verma, Vartika Kulshrestha, Sumeet Katiyar. [doi]
- Unique Constrained Class labeled Association Rule MiningL. Greeshma, G. Pradeepini. [doi]
- Implementing and Analyzing Big Data Techniques withSpring Frame Work in Java& J2EEBased ApplicationAnkur Saxena, Neeraj Kaushik, Nidhi Kaushik. [doi]
- Static structural dependency analysis for parallelization of Java programsMonali Patil, Vandana Jagtap. [doi]
- PDComp: An Effective PPI complex Finding MethodPriyakshi Mahanta, Dhruba K. Bhattacharyya, Ashish Ghosh. [doi]
- Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud EnvironmentsAkashdeep Bhardwaj, G. V. B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry. [doi]
- Speaker Identification and Authentication System using Energy based Cepstral Data TechniqueS. Shanthi Therese, Chelpa Lingam. [doi]
- Acceleration of Bullet Physics Physical Simulation Library Using GPU and Demonstration on a Set-Top Box PlatformB. Balamurugan, Anil Skariah, G. NaliniPriya, K. G. Maheswari, Malathi V.. [doi]
- An Alternative Framework of Anisotropic Diffusion for Image DenoisingSubit K. Jain, Rajendra K. Ray. [doi]
- Improving JPEG Image Anti-forensicsPriya Makarand Shelke, Rajesh S. Prasad. [doi]
- Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSAPrerna Mohit, G. P. Biswas. [doi]
- Matrix Transposition Based Cryptographic Code With Two Dimensional Parity CheckingBidisha Mandal, Sourabh Chandra, Sk. Safikul Alam. [doi]
- A Novel Multi Pattern String Matching Algorithm with While ShiftChinta Someswara Rao, S. Viswanadha Raju. [doi]
- Big data and ICT applications: A studyRachita Misra, Bijayalaxmi Panda, Mayank Tiwary. [doi]
- A Hybrid Approach for Detection of Plagiarism using Natural Language ProcessingTakshak Desai, Udit Deshmukh, Mihir Gandhi, Lakshmi Kurup. [doi]
- An Analysis of Types of Protocol Implemented in Internet of Things Based on Packet Loss RatioM. Prakash, C. J. KavithaPriya. [doi]
- Virtual Machine Provisioning for Cloud Scenarios: A Survey of Approaches and ChallengesLincolin Nhapi, Arun Kumar Yadav 0004, Ram Shringar Rao. [doi]
- Non-Relational Databases in Big DataSharvari Tamane. [doi]
- Thermal Analysis of Active Electronic Component with Thermal ImagingShrikant S. Akole, Vinayak B. Kulkarni. [doi]
- Blended e-Learning Training (BeLT): Enhancing Railway Station Controller KnowledgeAditya Khamparia, Monika Rani, Babita Pandey, O. P. Vyas 0001. [doi]
- FFT based detection of Diabetic Retinopathy in Fundus Retinal ImagesAmol Prataprao Bhatkar, Govind Ukhandrao Kharat. [doi]
- Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc NetworksSunil Kumar Jangir, Naveen Hemrajani. [doi]
- Frame Based Biometric Authentication System for HealthcareU. Vigneshwaran, S. Suresh. [doi]
- Implications of Supervised Learning on Word Sense Disambiguation for HindiAjai Kumar, Iti Mathur, Hemant Darbari, G. N. Purohit, Nisheeth Joshi. [doi]
- Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO TechniqueGagandeep Singh, Sandeep Kad. [doi]
- Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributesAbdul Muqusit Alam, Smita Roy. [doi]
- A Comparative Study of Various Supervised Feature Selection Methods for Spam ClassificationShrawan Kumar Trivedi, Shubhamoy Dey. [doi]
- ID Based Encryption in Modern CryptographyGurjeet Singh Puri, Himanshu Gupta. [doi]
- Patient Data Dissemination in Wireless Body Area Network: A Qualitative AnalysisFasee Ullah, Abdul Hanan Abdullah, Omprakash Kaiwartya, Shiv Prakash. [doi]
- Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit StuffingNarander Kumar, Priyanka Chaudhary. [doi]
- An MSE (mean square error) based analysis of deconvolution techniques used for deblurring/restoration of MRI and CT ImagesPoonam Sharma, Saloni Sharma, Ayush Goyal. [doi]
- An Integrated Method for Outlier Detection with Analytical Study of Distance Based and Angle Based ApproachesDeepti Mishra, Devpriya Soni. [doi]
- MoveRL: A Movement Region Based Location Discovery Protocol for Wireless Sensor NetworksHamzah Ali Abdulrahman Qasem, Ash Mohammad Abbas. [doi]
- Dynamic Deployment of Wireless Sensor Network using PBB-BC AlgorithmR. S. Uppal, Shakti Kumar. [doi]
- A Framework to protect multiple applications in java using synchronizationAnkur Saxena, Abhishek Sanyal, Gyanesh Kumar, Saurabh Chandra Singh. [doi]
- A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information SystemsTrupil Limbasiya, Nishant Doshi. [doi]
- Dependency Parser for Telugu LanguageG. Nagaraju, Nimmala Mangathayaru, B. Padmaja Rani. [doi]
- A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc NetworksPraveen Gupta, Pratosh Bansal. [doi]
- Best practices for web applications to improve performance of QoSMore Swami Das, A. Govardhan, D. Vijayalakshmi. [doi]
- A Digital Forensics Investigation Model for Social Networking SiteAnkita R. Jadhao, Avinash J. Agrawal. [doi]
- Automatic Segmentation and Classification of Dysfluencies in Stuttering SpeechP. Mahesha, D. S. Vinod. [doi]
- VIP: Verification and Identification Protective data handling layer implementation to achieve MVCC in cloud computingAjay Jangra, Niharika Singh, Upasana Lakhina. [doi]
- Symmetric Cryptography using Multiple Access Circular Queues (MACQ)Sona Phull, Subhranil Som. [doi]
- Emerging opportunities in Domain Specific SearchVekhande Neha Eknath, Gogate Uttara Dhananjay. [doi]
- AgroSearch: A Web Based Search Tool for Pomegranate Diseases and Pests Detection Using Image ProcessingSunil More, Mininath Nighot. [doi]
- Survey on Development of Expert System from 2010 to 2015Haider Khalaf Jabbar, Rafiqul Zaman Khan. [doi]
- Analysis of Message Propagation for Intelligent Disaster Management through Vehicular Cloud NetworkRam Shringar Raw, Loveleen, Arvind Kumar, Arushi Kadam, Nanhay Singh. [doi]
- A Rigorous Framework for Verification & Validation of Dynamic Aspect of Safety Critical SystemMonika Singh, Ashok Kumar Sharma, Ruhi Saxena. [doi]
- Artificial Multimodal Vein Biometric Template Creation for Enhanced SecurityVikram Singh Chauhan, Sarika Khandelwal, Saurabh Maheshwari. [doi]
- Analyzing DNA Strings using Information Theory ConceptsGeetika, M. Hanmandlu, Deepti Gaur. [doi]
- A Scalable Record Retrieval Methodology Using Relational Keyword Search SystemNaveen Kumar, Jaya Kumar, Rishikesh B. Salunkhe, Aniket D. Kadam. [doi]
- Automated Verification in Cryptography SystemN. Immanuel Jebadurai, Himanshu Gupta. [doi]
- Bernoulli Keyed Hash Function for Authenticating the data over Virtual Private NetworkP. Jhansi Rani. [doi]
- A Comparative study on Parallel Data Mining Algorithms using Hadoop Map Reduce: A SurveyY. V. Lokeswari, Shomona Gracia Jacob. [doi]
- Design of Low Power Memristor Non-Volatile Dram Cell with Footer SwitchPeter Bukelani Musiiwa, Shyam Akashe. [doi]
- Cha-Cha 20: Stream Cipher Based Encryption for Cloud Data CentreDharavath Ramesh, Rahul Mishra, Bhukya Shankar Nayak. [doi]
- Analysis of Decision Support Systems implemented for Suggesting a course for higher educationAnkita Kanojiya, Viral Nagori. [doi]
- Implementation of Hardware Efficient Chaotic Generators for Signal Security in Portable SystemsIzharuddin, Omar Farooq, M. Qasim Rafiq. [doi]
- A Critical Analysis of the Cyber Contract Using Electronic MailBiswajit Tripathy. [doi]
- A Novel Approach for Software Test Data Generation using Cuckoo AlgorithmManju Khari, Prabhat Kumar 0001. [doi]
- Non-Partitioning Merge-Sort: Performance Enhancement by Elimination of Division in Divide-and-Conquer AlgorithmAsra Aslam, Mohammad Samar Ansari, Shikha Varshney. [doi]
- A DWT based Attack Resistant Video SteganographyShikha Sharma, Devendra Somwanshi. [doi]
- A Critical Assessment of ICT Infrastructures for Certain Demand Response Applications in Smart GridSnehasree Behera, K. Hemant Kumar Reddy, Diptendu Sinha Roy. [doi]
- An implementation of Feature ranking using Machine learning techniques for Diabetes disease predictionSushruta Mishra, Pamela Chaudhury, Brojo Kishore Mishra, Hrudaya Kumar Tripathy. [doi]
- Performance Evaluation of Classifiers on WISDM Dataset for Human Activity RecognitionK. H. Walse, Rajiv V. Dharaskar, Vilas M. Thakare. [doi]
- A Survey on IoT Privacy Issues and Mitigation TechniquesBirju Tank, Hardik Upadhyay, Hirenc Patel. [doi]
- Design and Analysis of Anti-Aliasing Filters for Rendering of Graphical EntitiesPrachi Rohit Rajarapollu, Vijay R. Mankar. [doi]
- Adaptive Slot Sharing based TDMA Technique for Routing in an Obstructed Wireless Sensor NetworkSupantha Das, Indrajit Banerjee, Mainak Chatterjee, Tuhina Samanta. [doi]
- Open Source Software Reliability Growth Models for Distributed Environment Based on Component-Specific Testing-EffortsPrashant Johri, Md. Nasar, Sanjoy Das, Mithun Kumar. [doi]
- Efficient Resource Allocation Strategy to Improve Energy Consumption in Cloud Data CentersKhyati Patel, Nimisha Patel, Hiren Patel. [doi]
- Securing SQL with Access Control for Database as a Service ModelJay Dave, Manik Lal Das. [doi]
- Feedback based Trust Management for Cloud EnvironmentSandip Machhi, G. B. Jethava. [doi]
- Prioritization of Security Measures at the Junction of MANET and IoTMamata Rath, Chhabi Rani Panigrahi. [doi]
- Malware Analysis: Tools and TechniquesRakesh Singh Kunwar, Priyanka Sharma. [doi]
- Object Detection using a Handheld Android Device for Processing Image Data in Real TimeIshan Agarwal, Bansidhar Joshi, Shalabh Kumar. [doi]
- A New Algorithm for Privacy Preservation in Utility Mining Using Genetic AlgorithmSugandha Rathi, Rishi Soni, Virendra Singh Kushwah. [doi]
- Realization of Schmitt Trigger in Low Power SRAM CellNilotpal Arjun, Ayushi Marwah, Shyam Akashe. [doi]
- Hybrid Image Fusion Algorithm Using Laplacian Pyramid and PCA MethodShiv Kumar Verma, Manpreet Kaur, Rohit Kumar. [doi]
- An Innovative Approach for Imputation and Classification of Medical Records for Efficient Disease PredictionYelipe UshaRani, P. Sammulal. [doi]
- A Toolkit on Mobile Apps for Business Growth: Insights from Design and DevelopmentP. Vigneswara Ilavarasan, Han Ei Chew. [doi]
- Semi-Automatic Domain Ontology Graph Generation System in PunjabiRajveer Kaur, Saurabh Sharma. [doi]
- Performance Improvement: Audio Steganography Technique Parity Bit Combined With CryptographyPrutha Bhalde. [doi]
- Vertical Handoff Mechanisms in VANET: A SurveySadip Midya, Koushik Majumder, Asmita Roy, Debashis De. [doi]
- Named Entity Recognition in Hindi Using Conditional Random FieldsDeepti Chopra, Nisheeth Joshi, Iti Mathur. [doi]
- A Secure Protocol for Trust Management in OLSRDhanshree Toradmalle, Kumudhan Cherarajan, Mayur Shedage, Nitesh Dogra, Sanket Gawde. [doi]
- A Generic Defect Aware Heuristic Approach for Droplet Routing in a Digital Microfluidic Biochip with Minimal Pin AssignmentSubhamita Mukherjee, Indrajit Pan, Tuhina Samanta. [doi]
- Causes of Human Errors in Early Risk assesment in Software Project ManagementSeema Sharma, Babu Ram. [doi]
- Multiplicative Data Perturbation Using Fuzzy Logic in Preserving PrivacyThanveer Jahan, Gugulothu Narsimha, C. V. Guru Rao. [doi]
- Multi Strategy Selection in E- Negotiation: A Proposed ArchitectureSuraj Kumar Awasthi, Sheetal Vij, Debajyoti Mukhopadhyay, Avinash J. Agrawal. [doi]
- Information Theoretic Approaches for Detecting Causality in Gene Regulatory NetworksKangkan Medhi, Syed Sazzad Ahmed, Swarup Roy, Dhruba K. Bhattacharyya, Jugal K. Kalita. [doi]
- Smartphone Security: Review of Challenges and SolutionVikash Singh, Kavita Sharma 0001. [doi]
- A Review on 0-day Vulnerability Testing in Web ApplicationPratap Kumar, Ravi K. Sheth. [doi]
- Big Data Analytics Based on In-Memory Infrastructure On Traditional HPC: A SurveyNikkita Shekhar, Ambika V. Pawar. [doi]
- An Approach to identify semantic relations between user's queries in text retrievalKamlesh Makvana, Patel Jay, Parth Shah, Amit Thakkar. [doi]
- Novel Driver Behavior Model Analysis using Hidden Markov Model to increase Road Safety in Smart CitiesDisha Bhatt, Shilpa Gite. [doi]
- Data Vault: A Security Model for Preventing Data Theft in CorporateAshka Shastri, Priyanka Sharma. [doi]
- Design and Analysis of New Efficient Multifin Low Leakage Switch Mode Power SupplyShubham Kumar, Prateek Jain 0006, Shyam Akashe. [doi]
- An Approach for Efficient Many Keywords Findings over Encrypted Cloud InformationRajeshwari P. Patil, Santosh Kumar. [doi]
- Designing a Secure Network Interface By Thwarting Mac Spoofing AttacksDebi Prasad Mishra, Prajnya Priyadarsini Satapathy, Biswajit Mishra. [doi]
- Push Recovery for Humanoid Robot in Dynamic Environment and Classifying the Data Using K-MeanAnubha Parashar, Apoorva Parashar, Somya Goyal, Bharat Sahjalan. [doi]
- Optimal Cluster Head Election Algorithm for Mobile Wireless Sensor NetworksAarti Singh, Kavita Gupta. [doi]
- Predictive Analytics for Breast Cancer Survivability: A Comparison of Five Predictive ModelsSmita Jhajharia, Seema Verma, Rajesh Kumar. [doi]
- SIP Based Intrusion Detection System for VoIP based ApplicationsBela Shah, Kinjal Dave. [doi]
- An Efficient And Economical Solution For Future Traffic Management System Using RFIDSiddhant Chouksey, Sumedha Sirsikar. [doi]
- A Survey of Open Source Protocols XMPP and SIP for Instant Messaging SystemRuturaj Shelat, Nirav Patel, Chintan Bhatt. [doi]
- An optimal approach for extraction of Web Contents using Semantic Web frameworkShabina Dhuria, Harmunish Taneja, Kavita Taneja. [doi]
- Clustering Algorithms for Intrusion Detection: A Broad VisualizationK. S. Anil Kumar, Anitha Mary M. O. Chacko. [doi]
- Audio Steganography using ZDT: Encryption using Indexed Based Chaotic SequenceShivani Sharma, Virendra Kumar Yadav, Munesh Chandra Trivedi, Avadesh Gupta. [doi]
- Mining Outlier Temporal Association PatternsVangipuram Radhakrishna, Puligadda Veereswara Kumar, Vinjamuri Janaki. [doi]
- Finding of Review Spam through "Corleone, Review Genre, Writing Style and Review Text Detail Features"Rupesh Kumar Dewang, Pushpendra Bahadur Singh, Anil Kumar Singh. [doi]
- A Survey of Financial Losses Due to MalwareMaitri Amin. [doi]
- Query Processing over Large RDF using SPARQL in Big DataPriti A. Khodke, Saurabh Lawange, Amol P. Bhagat, Kiran A. Dongre, Chetan Ingole. [doi]
- Centralized Message Reporting System in Wireless Sensor NetworksAyushi Gupta, Ayushi Gupta, Deepali Virmani. [doi]
- An approach to identify user interest by reranking personalize webPatel Jay, Pinal Shah, Kamlesh Makvana, Parth Shah. [doi]
- Fuzzy Based Hybrid Mobile Recommendation SystemAngira Amit Patel, Jyotindra N. Dharwa. [doi]
- Key Author Analysis in Research Professionals' Collaboration Network based on MST using Centrality MeasuresAnand Bihari, Sudhakar Tripathi, Manoj Kumar Pandia. [doi]
- Behavior Analysis of Twitter Feed using Dymamic Synonym and Abbreviation Mapping Modules on top of a Trained Naïve Bayes ClassifierB. N. Shankar Gowda, Siddharth Mark Joseph, Vibha Lakshmikantha. [doi]
- Usage of Hybrid Mechanisms to Reduce Energy Consumption while Preserving Green SLA in Cloud EnvironmentMili Patel, Hiren Patel, Nimisha Patel. [doi]
- Resource Management using Feed Forward ANN-PSO in Cloud Computing EnvironmentNarander Kumar, Pooja Patel. [doi]
- Design a New Middleware for Communication in Ad Hoc Network of Android Smart DevicesTanweer Alam, Mohammed Aljohani. [doi]
- ICTS2016-SS27-07: A Peek into Web Applications SecurityShrey Sethi, Vidushi Singhal. [doi]
- An Elucidation on Steganography and CryptographySunita Chaudhary, Meenu Dave, Amit Sanghi, Jaideep Manocha. [doi]
- Text Mining Predictive Modeling Algorithm for classifying Attitudes of customers with Accuracy EstimationKaruna C. Gull, Akshata B. Angadi. [doi]
- Architecture of Cloud Server with Cache on ServerBharat Singh Deora, Sushma Satpute. [doi]
- A Unique Word Prediction System for Text Entry in HindiNiti N. Shah, Nikita Bhatt, Amit Ganatra. [doi]
- Effect of TLB on system performanceManisha Agarwal, Manisha Jailia. [doi]
- Developing Novel Skin Detection on ODROID XU4 Heterogeneous Multi-Processing DeviceG. Josemin Bala, Steven Lawrence Fernandes. [doi]
- A Review on Crowd Behavior Analysis Methods for Video SurveillanceSaurabh Maheshwari, Surbhi Heda. [doi]
- A Methodological Review Based Version Control System with Evolutionary Research for Software ProcessesN. Rama Rao, K. Chandra Sekharaiah. [doi]
- Rigorous Design of Moving Sequencer Atomic Broadcast in Distributed SystemsPrateek Srivastava, Akhilesh Sharma. [doi]
- Classification of Medical MRI Brain Images based on HadoopAbhay Palle, R. B. Kulkarni. [doi]