Abstract is missing.
- PrefaceChiranjeev Kumar, Haider Banka. [doi]
- Coastal surveillance in multi sensor environment: A design approachAshutosh Kumar Singh, Vinay Aggarwal, Pankaj Tiwari. 1-6 [doi]
- Energy efficient fault tolerant barrier coverage using limited mobility wireless sensorsDinesh Dash. 7-12 [doi]
- CQS: A Conflict-free Query Scheduling Approach in Wireless Sensor NetworksBibudhendu Pati, Joy Lal Sarkar, Chhabi Rani Panigrahi, Rajesh Kumar Verma. 13-18 [doi]
- Outage performance of secondary user in cognitive relay network with multiple PUsShashibhushan Sharma, Binod Prasad, Sanjay Dhar Roy, Sumit Kundu. 19-24 [doi]
- An efficient methodology to solve the K-terminal network reliability problemSandeep Singh, Aman Verma, S. Chatterjee, Venkata Ramana. 25-28 [doi]
- Restoring virtual backbone of Wireless Sensor Network on sensor failureDinesh Dash. 29-34 [doi]
- Candidate core selection for load-balanced multicore shared tree multicastingKoushik Sinha, Bidyut Gupta, Shahram Rahimi, Ansuman Bhattacharya. 35-40 [doi]
- Low power customized new trend remote surveillance system over 3G mobile networkSabyasachi Tiwari, Mainak Chowdhury, Utpal Goswami, Pradip Kumar Sadhu. 41-45 [doi]
- Cooperative spectrum sensing based on dynamic clustering with improved energy detectorKuldeep Yadav, Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu. 46-49 [doi]
- Efficient coverage and connectivity aware data gathering protocol for wireless sensor networksGovind P. Gupta. 50-55 [doi]
- A behavioral study of Sybil attack on vehicular networkAmrit Suman, Chiranjeev Kumar. 56-60 [doi]
- Analysis and QoS measurement for voluminous data flow in Wireless Sensor NetworkPrasanta Kumar Swain, Manas Kumar Rath. 61-64 [doi]
- A modified NCO based LSPF-DPLL Phase Resolver for wireless communicationSabyasachi Bhattacharyya, Aradhana Misra, Kandarpa Kumar Sarma. 65-71 [doi]
- A delay-bound efficient path design algorithm for mobile sink in wireless sensor networksMadhvi Mishra, Kumar Nitesh, Prasanta K. Jana. 72-77 [doi]
- Indegree-based path design for mobile sink in wireless sensor networksPreeti Komal, Kumar Nitesh, Prasanta K. Jana. 78-82 [doi]
- Location and selective-bordercast based enhancement of zone routing protocolShweta R. Malwe, Soniya Rohilla, G. P. Biswas. 83-88 [doi]
- Low complexity secure encoding and joint decoding for distributed compressive sensing WSNsAmit Satish Unde, Ravikumar Malla, P. P. Deepthi. 89-94 [doi]
- Bacterial Foraging Optimization Algorithm for CH selection and routing in wireless sensor networksPraveen Lalwani, Sagnik Das. 95-100 [doi]
- Study of fairness and delay of packet scheduling in IEEE 802.11 based Wireless Mesh NetworkPoulomi Deb, Durgabati Podder, Subhrajyoti Deb, Abhishek Majumder. 101-106 [doi]
- A survey on Wireless Sensor Network for Community Intrusion Detection SystemsNikhil Kumar Mittal. 107-111 [doi]
- Smart low power wireless sensor network for underground mine environment monitoringYogendra Singh Dohare, Tanmoy Maity, P. S. Paul, Hanuman Prasad. 112-116 [doi]
- A novel Vertical Handoff scheme for vehicular ad-hoc networksSadip Midya, Koushik Majumder, Asmita Roy, Debashis De. 117-122 [doi]
- Non-linear fractal analysis of ECG signal collected from Maternal and normal sinus womenMonisha Chakraborty, Tithi Das, Dipak Ghosh. 123-127 [doi]
- A new spectral subtraction method for speech enhancement using adaptive noise estimationShambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal. 128-132 [doi]
- Comparative study of MFDFA technique for isometric and isotonic muscle contractionMonisha Chakraborty, Debanjan Parbat. 133-138 [doi]
- A highly accurate, high-precision sub-pixel motion estimator-interpolator for high-performance Video coding (HEVC) in next generation UHDTV applicationsMani Laxman Aiyar, Ramesha Kenchappa. 139-146 [doi]
- Single notch band UWB BPF using square ring resonatorYatindra Gaurav, Arvind Kumar Pandey, R. K. Chauhan. 147-148 [doi]
- A real-time heartbeat detection technique using TMS320C6713 processor and Multi-Rate Signal ProcessingD. Mandal, M. Ganguly. 149-153 [doi]
- An anti-jamming protocol based on secret reallocation of channelsAnsuman Bhattacharya, Soumyadip Audhya, Koushik Sinha. 154-159 [doi]
- A novel soft set theoretic prisoners' dilemma game modelTuli Bakshi, Arindam Sinharay, Tanmoy Som. 160-163 [doi]
- An introduction towards automated parameterization reduction of soft setTuli Bakshi, Arindam Sinharay, Tanmoy Som. 164-171 [doi]
- Application of twitter in health care sector for IndiaAvinash Kumar Bamwal, Govind Kumar Choudhary, Raj Swamim, Aman Kedia, Saptarsi Goswami, Amit Kumar Das. 172-176 [doi]
- Towards an "Internet of Things" framework for financial services sectorVemula Dineshreddy, G. R. Gangadharan. 177-181 [doi]
- Classification of the Bangla script document using SVMManoj Kumar Shukla, Ajay Rana, Haider Banka. 182-185 [doi]
- Design of a mobile Web crawler for hidden WebManish Kumar, Rajesh Kumar Bhatia. 186-190 [doi]
- A dynamic microtask scheduling approach for SLO based human-augmented computingKoushik Sinha, Pratham Majumder, Geetha Manjunath. 191-196 [doi]
- Using fuzzy c means and multi layer perceptron for data imputation: Simple v/s complex datasetShambeel Azim, Swati Aggarwal. 197-202 [doi]
- A novel flower pollination algorithm for congestion management in electricity marketSumit Verma, V. Mukherjee. 203-208 [doi]
- Design of slot loaded proximity coupled microstrip antennas using knowledge based neural networksRuchi Varma, Jayanta Ghosh. 209-214 [doi]
- Comparison between GA-based LQR and conventional LQR control method of DFIG wind energy systemRavi Bhushan, Kalyan Chatterjee, Ravi Shankar. 214-219 [doi]
- GA based improved frequency regulation characteristics for thermal-hydro-gas & DFIG model in coordination with FACTS and energy storage systemRavi Shankar, S. R. Pradhan, S. B. Sahoo, Kalyan Chatterjee. 220-225 [doi]
- Power and frequency stabilization of an isolated hybrid power system incorporating scaling factor based fuzzy logic controllerTarkeshwar Mahto, V. Mukherjee. 226-231 [doi]
- Heat pipe mass optimization for space applicationsTanweer Alam, U. Upadhyay, S. Azam, R. Kumar. 232-236 [doi]
- Fuzzy gain scheduled intelligent frequency control in an AC microgridMohit Kumar, Ashiwani Yadav, Pankaj Kumar, Nitai Pal. 237-242 [doi]
- Multi-objective Genetic Algorithm setup for feature subset selection in clusteringHimanshu Kashyap, Sohini Das, Jayee Bhattacharjee, Ritu Halder, Saptarsi Goswami. 243-247 [doi]
- FARW: Firefly algorithm for Routing in wireless sensor networksPraveen Lalwani, Isha Ganguli, Haider Banka. 248-252 [doi]
- Optimization of clustering process in WSN with meta-heuristic techniques - a surveyDharmanshu Raval, Gaurang Raval, Sharada Valiveti. 253-258 [doi]
- A novel parallel search technique for optimizationManaar Alam, Soumyajit Chatterjee, Haider Banka. 259-263 [doi]
- Hardware implementation of Naïve Bayes classifier: A cost effective techniqueHimanshu Ranjan Seth, Haider Banka. 264-267 [doi]
- Analysis of size-strength trade-off in green pelletization for manganese concentrate using multiobjective evolutionary algorithm (NSGA-II)Mohammad Nadeem, R. Venugopal. 268-273 [doi]
- Model of a fuzzy autonomation system for a steel wire roll millL. N. Pattanaik, Rajeev Agrawal, Lakshmi Kumari. 274-278 [doi]
- Multi-objective parametric optimization of Green sand moulding properties using genetic algorithmArchana Kumari, Rajkumar Ohdar, Haider Banka. 279-283 [doi]
- Vegetation indices based segmentation for automatic classification of brown spot and blast diseases of riceSantanu Phadikar, Jyotirmoy Goswami. 284-289 [doi]
- Study of scattering parameters and gain of two longitudinal slots of same or different electrical lengths milled on either one or both face of broad wall of a waveguide for shunt slot array antennaHare Ram Jha, Shiva Nand Singh. 290-294 [doi]
- Operation and control of three-phase multilevel inverter with reduced componentRavi Raushan, Bidyut Mahato, Kartick Chandra Jana. 295-299 [doi]
- Comparative study of asymmetrical configuration of multilevel inverter for different levelsBidyut Mahato, Ravi Raushan, Kartick Chandra Jana. 300-303 [doi]
- Study and implementation of synchronization algorithm in three phase grid connected PV systemB. K. Naick, Manisha Das, T. K. Chatterjee, K. Chatterjee. 304-309 [doi]
- Comprehensive study of various configurations of three-phase Multilevel inverter for different levelsChandan Kumar, Bidyut Mahato, Ravi Raushan, Tanmoy Maity, Kartick Chandra Jana. 310-315 [doi]
- Modelling and simulation of photovoltaic system for isolated and grid connected modeKumari Prerna, Gauri Shankar. 316-320 [doi]
- Standalone operation of wind turbine operated self excited induction generatorAsha Rani, Gauri Shankar. 321-325 [doi]
- A novel SIMULINK-based model for comprehensive analysis and comparison of different inverter PWM techniquesSomnath Burman, Tanmoy Maity. 326-330 [doi]
- Active power factor correction for rectifier using micro-controllerKartikesh Kumar Jha, Bidyut Mahato, Prem Prakash. 331-336 [doi]
- Architecture of optical sensing and monitoring for pipelines using FBGAbhinav Gautam, Ritu Raj Singh, Amitesh Kumar, Vishnu Priye. 337-338 [doi]
- A compact tri-band BPF using meandered ring resonatorPriyanka Srivastava, Arvind Kumar Pandey, R. K. Chauhan. 339-341 [doi]
- New approach of authentication method based on profilesR. China Appala Naidu, K. Meghana, P. S. Avadhani, I. Uma Maheswara Rao. 347-352 [doi]
- A novel approach to detect extraneous network traffic from the compromised routerRajendra Patil, Chirag Modi. 352-358 [doi]
- Implementation of secure portable real time display system over ethernet networkSharique Ali, Amit Sardar, Kamal Kumar Patra, Rakesh Barua. 359-364 [doi]
- An improved secure remote login protocol with three-factor authenticationMinu Tiwari, Soumyashree S. Panda, G. P. Biswas. 372-378 [doi]
- Anomaly detection in network traffic using K-mean clusteringR. Kumari, Sheetanshu, M. K. Singh, R. Jha, N. K. Singh. 387-393 [doi]
- An efficient lightweight cryptographic scheme of signcryption based on hyperelliptic curveVani Rajasekar, S. Varadhaganapathy, K. Sathya, J. Premalatha. 394-397 [doi]
- Malicious node detection using ID-based authentication techniqueAnurag Gupta, Prema Mohit, Arijit Karati, Ruhul Amin, G. P. Biswas. 398-403 [doi]
- Design of an enhanced authentication protocol and its verification using AVISPARuhul Amin, S. K. Hafizul Islam, Arijit Karati, G. P. Biswas. 404-409 [doi]
- Offline signature verification based on geometric feature extraction using artificial neural networkSubhash Chandra, Sushila Maheskar. 410-414 [doi]
- SecOMN: Improved security approach for Opportunistic Mobile Networks using cyber foragingSwastik Padhi, Mayank Tiwary, Rojalina Priyadarshini, Chhabi Rani Panigrahi, Rachita Misra. 415-421 [doi]
- Sign language recognitionAnup Kumar, Karun Thankachan, Mevin M. Dominic. 422-428 [doi]
- Image segmentation using region derived triple thresholdingAvik Banerjee, Soumyadeep Bhattacharjee, Sk. Latib. 429-433 [doi]
- A smart phone based app for automated segmentation and counting of plateletsKaushiki Roy, Ratnadeep Dey, Debotosh Bhattacharjee, Mita Nasipuri, Pramit Ghosh. 434-438 [doi]
- Color based human detection and tracking algorithm using a non-Gaussian adaptive Particle filterAashish Sharma, Ajay Singh, Rajesh Rohilla. 439-442 [doi]
- A novel approach to a camera based assisstive aid for visually impairedIshaani Mittal, Apoorva Mittal, S. Indu. 448-452 [doi]
- A novel approach for de-speckling of ultrasound images using bilateral filterSameera V. Mohd Sagheer, Sudhish N. George. 453-459 [doi]
- A survey on automated diagnosis on the detection of Leukemia: A hematological disorderSonali Mishra, Banshidhar Majhi, Pankaj Kumar Sa. 460-466 [doi]
- A novel method for moving object detection based on block based frame differencingSandeep Singh Sengar, Susanta Mukhopadhyay. 467-472 [doi]
- Modified dictionary learning method for sparsity based single image super-resolutionAbdu Rahiman V, Rohit U., Sudhish N. George. 473-477 [doi]
- Class tiling design for ordered ditheringAyush Agrawal, Jitesh Karamchandani, Sushila Maheshkar. 478-482 [doi]
- A contour based procedure for face detection and tracking from videoAniruddha Dey. 483-488 [doi]
- Eye movement based human computer interactionRamsha Fatima, Atiya Usmani, Zainab Zaheer. 489-494 [doi]
- Voice and touch control home automationSushant Kumar, S. S. Solanki. 495-498 [doi]
- Classification of lower limb motor imagery using K Nearest Neighbor and Naïve-Bayesian classifierSanniv Bhaduri, Anwesha Khasnobish, Rohit Bose, D. N. Tibarewala. 499-504 [doi]
- A novel deep learning architecture for sentiment classificationRahul Ghosh, Kumar Ravi 0001, Vadlamani Ravi. 511-516 [doi]
- FOREX Rate prediction using Chaos and Quantile Regression Random ForestDadabada Pradeepkumar, Vadlamani Ravi. 517-522 [doi]
- Domain adaptation for land-cover classification of remotely sensed images using ensemble of Multilayer PerceptronsShounak Chakraborty 0002, Moumita Roy. 523-528 [doi]
- Identification of miRNA signature using Next-Generation Sequencing data of prostate cancerShib Sankar Bhowmick, Indrajit Saha, Ujjwal Maulik, Debotosh Bhattacharjee. 528-533 [doi]
- Investigation on electrical characteristics of FDSOI device for ultra-low power operationManisha Guduri, Sudip Kundu, Aminul Islam. 534-536 [doi]
- A reliability aware application mapping onto mesh based Network-on-ChipNavonil Chatterjee, Sheshivardhan Reddy, Shilpa Reddy, Santanu Chattopadhyay. 537-542 [doi]
- An ILP-based floorplan-aware path synthesis technique for Application-Specific NoC designPriyajit Mukherjee, Santanu Chattopadhyay. 543-548 [doi]
- Mapping Three Step Search algorithm onto a systolic array processor in H.264Ria, Subhash Chandra Yadav. 561-563 [doi]
- Wi-Fi Control Bot with Real-Time Video StreamingR. Chawngsangpuii, R. Lalchhanhima, Ramchandra Regmi, Mayank Srivastava, Rohit Kumar Das. 570-575 [doi]
- Multi-cloud scenario based QoS enhancing virtual resource brokeringDeepsubhra Guha Roy, Debashis De, Md Mozammil Alam, Samiran Chattopadhyay. 576-581 [doi]
- Algorithm of 2D-Voronoi diagram construction with rectangular blockArindam Sinharay, Tanusree Roy, Antara Saha, Vaswar Pande. 582-585 [doi]
- Performance evaluation of MySQL, Cassandra and HBase for heavy write operationVishal Dilipbhai Jogi, Ashay Sinha. 586-590 [doi]
- Green intelligence for cloud data centersC. Karthik, Mayank Sharma, Kirti Maurya, K. Chandrasekaran. 591-597 [doi]
- Data modelling for discrete time series data using Cassandra and MongoDBDharavath Ramesh, Ashay Sinha, Suraj Singh. 598-601 [doi]
- Quad tree based algorithm for building of network model from road layers of vector mapsShibumon Alampatta, Rajesh M. A, Narayan Panigrahi. 602-606 [doi]
- Runoff estimation of Banaras Hindu University South Campus using ArcGIS and HecGeo-HMSNikita Shivhare, Padam Jee Omar, Nitesh Gupta, P. K. S. Dikshit. 607-612 [doi]
- Review of IT enabled technologies in Indian mining industry for improved productivity & safetyDeepanshu R. Singh, Arvind K. Mishra. 613-618 [doi]
- Modified ACO to maintain diversity in regression test optimizationSushant Kumar, Prabhat Ranjan, R. Rajesh. 619-625 [doi]
- Dynamic Software Product Line: An approach to dynamic bindingMahua Banerjee, Reeta Kumari. 626-630 [doi]
- Information retrieval from social networks: A surveyWaseem Ahmad, Rashid Ali. 631-635 [doi]
- Process excellence in IT sector in an emerging economic scenarioSatyajit Mahato, Amit Rai Dixit, Rajeev Agrawal. 636-640 [doi]
- Sentiment classification of Hinglish textKumar Ravi 0001, Vadlamani Ravi. 641-645 [doi]
- Strategic information and communication technology initiatives in hospitality industry to gain sustainable competitive advantage: A framework for evaluating the response lag perspectiveVivek Kumar Verma, Bibhas Chandra. 646-650 [doi]
- Business data extraction from social networkingAsif Uddin Khan, Bikram Kesari Ratha. 651-656 [doi]
- Effectiveness of prioritization of test cases based on FaultsSoumen Nayak, Chiranjeev Kumar, Sachin Tripathi. 657-662 [doi]
- Design and study of three vertically coupled optical unsymmetrical microring resonatorSuchita Lakra, Sanjoy Mandal. 663-666 [doi]
- Comparative study of electrode configurations in different brain tumor geometry for effective ElectrochemotherapyR. Bose, S. Chatterjee. 667-671 [doi]
- HR practices for women employees: A study of information technology (IT) sector in IndiaShubhi Gupta, Govind Swaroop Pathak. 672-676 [doi]
- E-governance and use of Information communication technology in land management system in the Jharkhand state: Problems and prospectsH. K. Singh, Meeta Bhatia. 677-682 [doi]
- Enhanced FSR triple ring resonatorSuman Ranjan, Sanjoy Mandal. 683-686 [doi]
- Construction of amicably resolvable Pairwise Balanced Design from row-regular Williamson type matricesM. K. Singh, Pinky Pandey. 687-690 [doi]
- Computer aided automatic water pipe network analysis by simultaneous loop equation solution methodKailash Jha, Manish Kumar Mishra. 691-696 [doi]
- Tenets of Internet of Things (IoT) application and Java technologyAnkesh Anupam. 697-699 [doi]
- Achieving retention through human resource information system: Developing a frameworkPallavi Pandey, Saumya Singh, Pramod Pathak. 700-704 [doi]