Abstract is missing.
- DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic CarriersRahul Johari, Neelima Gupta, Sandhya Aneja. 1-15 [doi]
- Integrated Approach for Multicast Source Authentication and Congestion ControlKaran Singh, Rama Shankar Yadav. 16-30 [doi]
- Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network ParameterRajeev Agrawal, Amit Sehgal. 31-41 [doi]
- Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2)Gayatri Sakya, Vidushi Sharma. 42-51 [doi]
- Routing Protocols in Mobile Ad-Hoc Network: A ReviewBahuguna Renu, Mandoria Hardwari lal, Tayal Pranavi. 52-60 [doi]
- Carrier Aggregation for Enhancement of Bandwidth in 4G SystemsJolly Parikh, Anuradha Basu. 61-74 [doi]
- A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc NetworksAnubhuti Roda Mohindra, Charu Kumar. 75-85 [doi]
- Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor NetworksChandan Kumar Sonkar, Om Prakash Sangwan, Arun Mani Tripathi. 86-103 [doi]
- SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNsRaju Pal, Ritu Sindhu, Ajay K. Sharma. 104-114 [doi]
- Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor NetworkAnil Kumar Sagar, D. K. Lobiyal. 115-127 [doi]
- HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor NetworksTamoghna Ojha, Sudip Misra. 128-140 [doi]
- Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor NetworksPuneet Azad, Vidushi Sharma. 141-154 [doi]
- Key Pre-distribution in a Non-uniform Network Using Combinatorial DesignSarbari Mitra, Sourav Mukhopadhyay. 155-170 [doi]
- FLAME: A Flexible and Low-Power Architecture for Wireless Mesh NetworksSeyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala. 171-184 [doi]
- Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSARajesh Duvvuru, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju. 185-196 [doi]
- The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading ChannelsPrabhat Kumar Sharma, Parul Garg. 197-206 [doi]
- Power Efficient MAC Protocol for Mobile Ad Hoc NetworksSohan Kumar Yadav, D. K. Lobiyal. 207-217 [doi]
- Fault Tolerant Range Grouping Routing in Dynamic NetworksAkanksha Bhardwaj, Prachi Badera, K. Rajalakshmi. 218-227 [doi]
- Deployment of Sensors in Regular Terrain in Form of Interconnected WSN UnitsArup Kr. Chattopadhyay, Chandan Kr. Bhattacharyya. 228-237 [doi]
- 3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNsSamayveer Singh, Satish Chand, Bijendra Kumar. 238-247 [doi]
- A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor NetworksManish Kumar, Itika Gupta, Sudarshan Tiwari, Rajeev Tripathi. 248-260 [doi]
- Mobile Based Attendance System in Distributed LAN ServerRatnesh Prasad Srivastava, Hardwari Lal Mandoria, Rajesh Nautiyal. 261-272 [doi]
- An Improved Method for Contrast Enhancement of Real World Hyperspectral ImagesShyam Lal, Rahul Kumar, Mahesh Chandra. 273-282 [doi]
- Wavelet Analysis of Electrical Signals from Brain: The ElectroencephalogramRohtash Dhiman, Priyanka, J. S. Saini. 283-289 [doi]
- Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN ApplicationSanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi, Sudarshan Tiwari. 290-297 [doi]
- Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVMP. Mahesha, D. S. Vinod. 298-308 [doi]
- RoboGardner: A Low-Cost System with Automatic Plant Identification Using MarkersReema Aswani, N. Hema. 309-324 [doi]
- 6H-SiC Based Power VJFET and Its Temperature DependenceAmir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani. 325-332 [doi]
- Change Detection from Satellite Images Using PNNAkansha Mehrotra, Krishna Kant Singh, Kirat Pal, M. J. Nigam. 333-340 [doi]
- Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load ModelsRajendra P. Payasi, Asheesh K. Singh, Devender Singh. 341-357 [doi]
- Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit CellIndrasen Singh, Sanjeev Jain, Vijay Shanker Tripathi, Sudarshan Tiwari. 358-364 [doi]
- Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping SystemBhavnesh Kumar, Yogesh K. Chauhan, Vivek Shrivastava. 365-376 [doi]
- Design of Low Power FSM Using Verilog in VLSIHimani Mittal, Dinesh Chandra, Arvind Tiwari. 377-386 [doi]
- Pruning Search Spaces of RATA Model for the Job-Shop SchedulingFarid Arfi, Jean-Michel Ilié, Djamel-Eddine Saïdouni. 387-401 [doi]
- Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite GraphsGoutam Datta, Bushan L. Raina. 402-414 [doi]
- Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous NetworksSuddhasil De, Diganta Goswami, Sukumar Nandi. 415-430 [doi]
- Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power FilterAjay Kumar Maurya, Yogesh K. Chauhan. 431-440 [doi]
- Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft ProcessorManoj Pandey, Dorothi Borgohain, Gargi Baruah, J. S. Ubhi, Kota Solomon Raju. 441-450 [doi]
- Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length SelectionAsutosh Kar, Mahesh Chandra. 451-460 [doi]
- An Efficient and Secure Micro-payment Transaction Using Shell CryptographyMayank Tiwari, Rajeshwar Kumar, Shaivya Jindal, Pankaj Sharma, Priyanshu. 461-469 [doi]
- High Speed Reconfigurable FPGA Based Digital FilterNavaid Z. Rizvi, Raaziyah Shamim, Rajesh Mishra, Sandeep Sharma. 470-478 [doi]
- Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection SystemSanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna, N. Saraf, A. Gupta, Rajesh Mishra. 479-484 [doi]
- NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole AttackKumar Chanchal, D. K. Lobiyal. 485-495 [doi]
- A Privacy Preserving Representation for Web Service Communicators' in the CloudD. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan. 496-506 [doi]
- Detailed Dominant Approach Cloud Computing Integration with WSNNiranjan Lal, Shamimul Qamar, Mayank Singh. 507-516 [doi]
- Secret Image Sharing Scheme Based on Pixel ReplacementTapasi Bhattacharjee, Jyoti Prakash Singh. 517-526 [doi]
- An Application of Defeasible Logic Programming for Firewall Verification and ReconfigurationPritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari. 527-542 [doi]
- Threats and Challenges to Security of Electronic Health RecordsShalini Bhartiya, Deepti Mehrotra. 543-559 [doi]
- On Second-Order Nonlinearities of Two Classes of Cubic Boolean FunctionsDeep Singh, Maheshanand Bhaintwal. 560-567 [doi]
- A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management SystemDheerendra Mishra, Sourav Mukhopadhyay. 568-577 [doi]
- GAS: A Novel Grid Based Authentication SystemNarayan Gowraj, Srinivas Avireddy, Sruthi Prabhu. 578-590 [doi]
- Multiplicative Watermarking of Audio in Spectral DomainJyotsna Singh, Parul Garg, Alok Nath De. 591-605 [doi]
- A Comparative Analysis of Various Deployment Based DDoS Defense SchemesKaranbir Singh, Navdeep Kaur, Deepa Nehra. 606-616 [doi]
- WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart DevicesXinxin Fan, Kalikinkar Mandal, Guang Gong. 617-632 [doi]
- Protecting PLM Data Throughout Their LifecycleRohit Ranchal, Bharat K. Bhargava. 633-642 [doi]
- Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID ApplicationsKalikinkar Mandal, Guang Gong. 643-657 [doi]
- Performance Analysis of Cryptographic Acceleration in Multicore EnvironmentYashpal Dutta, Varun Sethi. 658-667 [doi]
- A Review on Wireless Network SecuritySandeep Sharma, Rajesh Mishra, Karan Singh. 668-681 [doi]
- Improved Proxy Signature Scheme without Bilinear PairingsSahadeo Padhye, Namita Tiwari. 682-688 [doi]
- Enhanced Block Playfair CipherArvind Kumar, Pawan Singh Mehra, Gagan Gupta, Manika Sharma. 689-695 [doi]
- Ciphertext-Policy Attribute-Based Encryption with User Revocation SupportA. Balu, K. Kuppusamy. 696-705 [doi]
- A Proposal for SMS Security Using NTRU CryptosystemAshok Kumar Nanda, Lalit Kumar Awasthi. 706-718 [doi]
- Analysis and Improvement of an Authentication Scheme Using Smart CardsSonam Devgan Kaul, Amit K. Awasthi. 719-728 [doi]
- A Review on Remote User Authentication Schemes Using Smart CardsKeerti Srivastava, Amit K. Awasthi, R. C. Mittal. 729-749 [doi]
- Outlier Detection and Treatment for Lightweight Mobile Ad Hoc NetworksAdarsh Kumar, Krishna Gopal, Alok Aggarwal. 750-763 [doi]
- Image Secret Sharing in Stego-Images with AuthenticationAmitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. 764-770 [doi]
- On Generalized Nega-Hadamard TransformAnkita Chaturvedi, Aditi Kar Gangopadhyay. 771-777 [doi]
- Design of High Performance MIPS Cryptography ProcessorKirat Pal Singh, Shivani Parmar, Dilip Kumar. 778-793 [doi]
- Design of an Edge Detection Based Image Steganography with High Embedding CapacityArup Kumar Pal, Tarok Pramanik. 794-800 [doi]
- Trust Management Method for Vehicular Ad Hoc NetworksRiaz Ahmed Shaikh, Ahmed Saeed Alzahrani. 801-815 [doi]
- Feature and Future of Visual Cryptography Based SchemesDhiraj Pandey, Anil Kumar, Yudhvir Singh. 816-830 [doi]
- A Novel Framework for Users' Accountability on Online Social NetworksGambhir Mohit, Doja M. N., Moinuddin. 831-841 [doi]
- Network Security Using ECC with BiometricDindayal Mahto, Dilip Kumar Yadav. 842-853 [doi]
- Hybrid Key Management Technique for WSN'sRavi Kishore Kodali, Sushant Chougule. 854-865 [doi]
- DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor NetworkNagaraj Ambika, G. T. Raju. 866-878 [doi]
- Security Improvement in Group Key ManagementManisha Manjul, Rakesh Kumar, Rajesh Mishra. 879-893 [doi]
- Detailed Dominant Approach Cloud Computing Integration with WSNNiranjan Lal, Shamimul Qamar, Mayank Singh. 894-903 [doi]
- Secure Real Time Scheduling on Cluster with Energy MinimizationRudra Pratap Ojha, Rama Shankar Yadav, Sarsij Tripathi. 904-914 [doi]
- Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding VegetationB. S. Paul, S. Rimer. 915-927 [doi]
- Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-PeerRemani Naga Venkata Jagan Mohan, Vegi Srinivas, Kurra Rajasekhara Rao. 928-938 [doi]
- Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved ReliabilityMohd Ashraf, Rajesh Mishra. 939-950 [doi]
- Evaluation of Understandability of Object-Oriented DesignDevpriya Soni. 951-961 [doi]
- Safety Analysis of Automatic Door Operation for Metro Train: A Case StudyAjeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith. 962-974 [doi]
- A Generalized Model for Internet-Based Access Control Systems with Delegation SupportUtharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee. 975-988 [doi]
- QoS Support Downlink for WiMAX NetworkPooja Gupta, Brijesh Kumar, B. L. Raina. 989-997 [doi]
- A Framework of Service Selection and Composition for Flexible Network ArchitectureAkhilendra Pratap Singh, O. P. Vyas, Shirshu Varma. 998-1007 [doi]