Abstract is missing.
- Computational Study of Blood Flow Through Elastic Arteries with Porous EffectsAnil Kumar, Shyam P. Agrawal. 1-10 [doi]
- A Modified Shuffled Frog Leaping Algorithm for Long-Term Generation Maintenance SchedulingG. Giftson Samuel, C. Christober Asir Rajan. 11-24 [doi]
- Key-Based Steganographic Textual Secret Sharing for Confidential MessagingNeil Buckley, Atulya K. Nagar, S. Arumugam. 25-34 [doi]
- AnimVSS: Frame-Based Visual Secret SharingNeil Buckley, Atulya K. Nagar, S. Arumugam. 35-44 [doi]
- Searching Partially Bounded Regions with P SystemsHepzibah A. Christinal, Ainhoa Berciano, Daniel Díaz-Pernil, Miguel A. Gutiérrez-Naranjo. 45-54 [doi]
- Power System Stability Enhancement Using Fuzzy Logic Based Power System StabilizerV. K. Tayal, J. S. Lather, Piyush Sharma, S. K. Sinha. 55-68 [doi]
- An Improved Quantum Inspired Firefly Algorithm with Interpolation OperatorA. Manju, Madhav J. Nigam. 69-84 [doi]
- Discrete Wavelet Transform Based Fault Detection and Classification in a Static Synchronous Series Compensated Transmission SystemM. Geethanjali, M. Anju Alias, T. Karpaga Senthil Pandy. 85-94 [doi]
- SVM and Random Forest Classification of Satellite Image with NDVI as an Additional Attribute to the DatasetK. Joshil Raj, S. SivaSathya. 95-107 [doi]
- Bi-directional Pixel-Value Differencing Approach for SteganographyHimakshi, Harsh Kumar Verma, Ravindra Kumar Singh, Charan Kamaljit Singh. 109-120 [doi]
- Unsupervised Classification of Mixed Data Type of Attributes Using Genetic Algorithm (Numeric, Categorical, Ordinal, Binary, Ratio-Scaled)Rohit Rastogi, Saumya Agarwal, Palak Sharma, Uarvarshi Kaul, Shilpi Jain. 121-131 [doi]
- RoHeMaSys: Medical Revolution with Design and Development of Humanoid for Supporting HealthcareDeepshikha Bhargava, Sameer Saxena. 133-142 [doi]
- Synergy of Differential Evolution and Particle Swarm OptimizationKedar Nath Das, Raghav Prasad Parouha. 143-160 [doi]
- Energy Management Routing in Wireless Sensor NetworksVrince Vimal, Sanjeev Maheshwari. 161-168 [doi]
- Axially Symmetric Vibrations of Circular Sandwich Plates of Linearly Varying ThicknessRashmi Rani, Roshan Lal. 169-181 [doi]
- Solve Shortest Paths Problem by Using Artificial Bee Colony AlgorithmP. Mansouri, B. Asady, N. Gupta. 183-191 [doi]
- Speed Control of Three Phase Induction Motor Drive Using Soft Computing TechniqueArunesh Kumar Singh, D. K. Chaturvedi, Jitendra Singh. 193-201 [doi]
- Edge Detection in Images Using Modified Bit-Planes Sobel OperatorRashi Agarwal. 203-210 [doi]
- Application of Rule Based Fuzzy Inference System in Predicting the Quality and Quantity of Potato Crop Yield in AgraDarpan Anand, Manu Pratap Singh, Manish Gupta. 211-223 [doi]
- A Novel Variant of Self-Organizing Migrating Algorithm for Global OptimizationDipti Singh, Seema Agrawal, Nidhi Singh. 225-233 [doi]
- User Ranking by Monitoring Eye Gaze Using Eye TrackerChandan Singh, Dhananjay Yadav. 235-246 [doi]
- Invalidating Security Compromised Nodes by Releasing its Energy in MANETsN. Chandrakant. 247-257 [doi]
- Administrating MANETs Via Brain Computer InterfaceN. Chandrakant. 259-265 [doi]
- Parameter Estimation and Soft Computing TechniquesD. K. Chaturvedi, Mayank Pratap Singh. 267-279 [doi]
- Development of a Genetic Algorithm Toolkit in LabVIEWVineet Kumar 0001, K. P. S. Rana, Amit Kumar, Richa Sharma, Puneet Mishra, Sreejith S. Nair. 281-296 [doi]
- A Soft Calibration Technique for Thermistor Using Support Vector MachineK. V. Santhosh, Binoy Krishna Roy. 297-306 [doi]
- Discrete Cuckoo Search Optimization Algorithm for Combinatorial Optimization of Vehicle Route in Graph Based Road NetworkChiranjib Sur, Anupam Shukla. 307-320 [doi]
- Introducing a Novel Parameter in Generation of Course Timetable with Genetic AlgorithmRavitashaw Bathla, Shubham Jain, Rajeev Singh. 321-332 [doi]
- Application of AI Techniques in Implementing Shunt APF in Aircraft Supply SystemSaifullah Khalid, Bharti Dwivedi. 333-341 [doi]
- Differential Evolution for Supplier Selection Problem: A DEA Based ApproachSunil Kumar Jauhar, Millie Pant, Aakash Deep. 343-353 [doi]
- Social Engineering Prevention by Detecting Malicious URLs Using Artificial Bee Colony AlgorithmTushar Bhardwaj, Tarun Kumar Sharma, Manu Ram Pandit. 355-363 [doi]
- New Lightweight Conditional Encryption Schemes for MultimediaSakshi Dhall, Saibal K. Pal, Kapil Sharma. 365-377 [doi]
- Comparative Study of Controller Optimization Techniques for a Robotic ManipulatorRicha Sharma, K. P. S. Rana, Vineet Kumar 0001. 379-393 [doi]
- Hybridization of P Systems and Particle Swarm Optimization for Function OptimizationGarima Singh, Kusum Deep. 395-401 [doi]
- Image Security Using Cellular Automata RulesManoj Diwakar, Pratibha Sharma, Sandip Swarnakar, Pardeep Kumar. 403-412 [doi]
- Cuckoo Search Algorithm for the Selection of Optimal Scaling Factors in Image WatermarkingMusrrat Ali, Chang Wook Ahn, Millie Pant. 413-425 [doi]
- Identifying and Prioritizing Human Capital Measurement Indicators for Personnel Selection Using Fuzzy MADMRemica Aggarwal. 427-439 [doi]
- Application of ANN to Predict Liquefaction Potential of Soil Deposits for Chandigarh Region, IndiaAbha Mittal, Gayatri Devi, P. K. S. Chauhan. 441-450 [doi]
- Survey of Curve and Surface Reconstruction Algorithms from a Set of Unorganized PointsKavita Khanna, Navin Rajpal. 451-458 [doi]
- Reconstruction of Noisy Bezier Curves Using Artificial Neural NetworksKavita Khanna, Navin Rajpal. 459-466 [doi]
- SBM-DEA Model Based Efficiency Assessment of Public Sector Hospitals in Uttarakhand, IndiaSandeep Kumar Mogha, Shiv Prasad Yadav, S. P. Singh. 467-480 [doi]
- Recognizability of Triangular Picture Languages by Triangular Wang AutomataV. Devi Rajaselvi, T. Kalyani, V. Rajkumar Dare, D. G. Thomas. 481-493 [doi]
- Role of Information Technology in Financial InclusionSatya Narayan Singh, Om Prakash Dubey, Kusum Deep, Ajay Prasad. 495-502 [doi]
- Harmony Search Based Algorithm for Complete Information Equilibrium in Infinite GameRiccardo Alberti, Atulya K. Nagar. 503-511 [doi]
- A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc NetworkMonit Kapoor, Manish Prateek. 513-524 [doi]
- Multi-carrier Based Radar Signal Optimization Using Genetic AlgorithmGabriel Lellouch, Amit Kumar Mishra. 525-534 [doi]
- Additive and Multiplicative Inverse of Generalized Fuzzy Numbers with Different Left Heights and Right HeightsGourav Gupta, Amit Kumar 0003, M. K. Sharma. 535-538 [doi]
- Cryptanalysis of "A New Method of Cryptography Using Laplace Transform"Praneesh Gupta, Prasanna Raghaw Mishra. 539-546 [doi]
- A Design of Longitudinal Control of an Aircraft Using a Fuzzy Logic Based PID ControllerS. N. Deepa, G. Sudha. 547-559 [doi]
- Evaluation of Content Based Spam Filtering Using Data Mining Approach Applied on Text and Image CorpusAmit Kumar Sharma 0006, Prabhjeet Kaur, Sanjay Kumar Anand. 561-577 [doi]
- Comparison of Lattice Form Based and Direct Form Based Complex Adaptive Notch FilterBhawya Kumar, Rahul Vijay, Pankaj Shukla. 579-588 [doi]
- An Ensemble Pruning Approach Based on Reinforcement Learning in Presence of Multi-class Imbalanced DataLida Abdi, Sattar Hashemi. 589-600 [doi]
- Fusion of Fingerprint and Iris Biometrics Using Binary Ant Colony OptimizationMinakshi Gogoi, Dhruba Kr. Bhattacharyya. 601-613 [doi]
- Efficient Resource Allocation Strategies for Video on Demand ServicesAlok Kumar Prusty, Bibhudatta Sahoo. 615-627 [doi]
- A Novel Co-swarm Gravitational Search Algorithm for Constrained OptimizationAnupam Yadav, Kusum Deep. 629-640 [doi]
- An Analytical Investigation on Thermally Induced Vibrations of Non-homogeneous Tapered Rectangular PlateAnupam Khanna, Narinder Kaur. 641-652 [doi]
- Building of a Competent Mobility Model for Ad Hoc Wireless NetworksArvind Kumar Shukla, C. K. Jha, Vimal Kumar Mishra. 653-666 [doi]
- Single Axis Position Control of a Precision GimbalKamna Ashu, Sanoj Kumar, Kanika Chawla. 667-675 [doi]
- An Investigation of Fuzzy PSO and Fuzzy SVD Based RBF Neural Network for Multi-label ClassificationJitendra Agrawal, Shikha Agrawal, Shilpy Kaur, Sanjeev Kumar Sharma. 677-687 [doi]
- A Peer-to-Peer Single Objective Particle Swarm OptimizerHrishikesh Dewan, Raksha B. Nayak, V. Susheela Devi. 689-708 [doi]
- F-FDRPSO: A Novel Approach Based on Hybridization of Fuzzy C-means and FDRPSO for Gene ClusteringArpit Jain, Shikha Agrawal, Jitendra Agrawal, Sanjeev Sharma. 709-719 [doi]
- Metaheuristic Approaches for Multiprocessor SchedulingLakshmi Kanth Munganda, Alok Singh. 721-731 [doi]
- Fuzzy Slack Based Measure of Data Envelopment Analysis: A Possibility ApproachShivi Agarwal. 733-740 [doi]
- Application of Ant Algorithm Variants to Single Track Railway Scheduling ProblemG. S. Raghavendra, N. Prasanna Kumar. 741-753 [doi]
- An ICA Mixture Model Based Approach for Sub-pixel Classification of Hyperspectral DataN. Prabhu, Manoj K. Arora, R. Balasubramanian, Kapil Gupta. 755-765 [doi]
- Network Connectivity in VANETsRanjeet Singh Tomar, Brijesh Kumar Chaurasia, Shekhar Verma, Rajendra Singh Kushwah. 767-775 [doi]
- Proposal and Survey of Various Data Mining Aspects in Mobile Computing EnvironmentHarcharan Singh Pabla, Sukhdeep Singh, Niyati Gupta, Palak Makhija, Prabhjot Kaur, Gurpal Singh. 777-784 [doi]
- Ant Colony Optimization Model for Discrete Tomography ProblemsDivyesh Patel, Tanuja Srivastava. 785-792 [doi]
- Object Recognition Using Gabor Wavelet Features with Various Classification TechniquesDivya Sahgal, Manoranjan Parida. 793-804 [doi]
- Cryptanalytic Attacks and Countermeasures on RSAManish Kant Dubey, Ram Ratan, Neelam Verma, Pramod Kumar Saxena. 805-819 [doi]
- Applications of Genetic Algorithms in CryptologyRam Ratan. 821-831 [doi]
- An Ontology and Pattern Clustering Approach for Activity Recognition in Smart EnvironmentsK. S. Gayathri, Susan Elias, S. Shivashankar. 833-843 [doi]
- A Note on Constructing Fuzzy Homomorphism Map for a Given Fuzzy Formal ContextPrem Kumar Singh, Aswani Kumar Cherukuri. 845-855 [doi]
- Application of Ratio Property in Searching of M-Ambiguous Words and Its GeneralizationAmrita Bhattacharjee, Bipul Syam Purkayastha. 857-865 [doi]
- Two Storage Inventory Model for Deteriorating Items Under Fuzzy EnvironmentS. R. Singh, Anuradha. 867-879 [doi]
- Fuzzy Optimal Solution of Interval-Valued Fuzzy Transportation ProblemsDeepika Rani, T. R. Gulati. 881-888 [doi]
- Comparative Study for Brain Tumor Classification on MR/CT ImagesAnkit Vidyarthi, Namita Mittal. 889-897 [doi]
- Anonymous Remote User Authentication and Key Agreement for Cloud ComputingRaghavendra Mishra. 899-913 [doi]
- Automatic Identification of an Epileptic Spike Pattern in an EEG Signals Using ANNMohd. Zuhair, Sonia Thomas, Anup Kumar Keshri, Rakesh Kumar Sinha, Kirat Pal, Dhrubes Biswas. 915-923 [doi]