Abstract is missing.
- Computing the Prestige of a journal: A Revised Multiple Linear Regression ApproachNeelam Jangid, Snehanshu Saha, Anand Narasimhamurthy, Archana Mathur. 1-4 [doi]
- Correlation based Feature Selection for Diagnosis of Acute Lymphoblastic LeukemiaVanika Singhal, Preety Singh. 5-9 [doi]
- Integrating Apriori with paired k-means for Cluster fixed mixed dataH. Haripriya, Shaji Amrutha, R. Veena, Prema Nedungadi. 10-16 [doi]
- Attribute Reduction on Continuous Data in Rough Set Theory using Ant Colony Optimization MetaheuristicSrilatha Chebrolu, Sriram G. Sanjeevi. 17-24 [doi]
- Prognosis and Disclosure of Functional Modules from Protein-Protein Interaction NetworkManali R. Modi, K. P. Merry. 25-30 [doi]
- Multi-view Ensemble Learning: A Supervised Feature Set Partitioning for High Dimensional Data ClassificationVipin Kumar, Sonajharia Minz. 31-37 [doi]
- Building Web Personalization System with Time-Driven Web Usage MiningP. T. Ramya, G. P. Sajeev. 38-43 [doi]
- Automatic Book Spine Extraction and Recognition for Library Inventory ManagementM. P. Nevetha, A. Baskar. 44-48 [doi]
- A Novel Data Mining Approach for Detecting Spam Emails using Robust Chi-Square FeaturesMugdha Sharma, Jasmeen Kaur. 49-53 [doi]
- Distributed Multi Class SVM for Large Data SetsAruna Govada, Bhavul Gauri, Sanjay Kumar Sahay. 54-58 [doi]
- Identifying Effective Software Metrics for Categorical Defect Prediction Using Structural Equation ModelingNiketa Gupta, Deepali Singh, Ashish Sharma. 59-65 [doi]
- Fast Modular Artificial Neural Network for the Classification of Breast Cancer DataDoreswamy, M. Umme Salma. 66-72 [doi]
- Design and Implementation of Wireless Robot for Floor Cleaning ApplicationKota Solomon Raju, K. Vijaya Ram Bharadvaj, Sagarika Choudhury. 73-78 [doi]
- A Control Mechanism for Power Management of Electrical Devices Using Android Phone in a Zigbee NetworkArchana Das, Amal Ganesh. 79-86 [doi]
- Detecting Overlapping Communities in LBSNs with Enhanced Location PrivacyK. Sreelekshmi, Pretty Babu. 87-90 [doi]
- Intelligent Information Retrieval Technique for Wireless Sensor NetworksDeepali Virmani, Kaur Savneet, Geetika Malhotra. 91-96 [doi]
- MACO: Modified ACO for reducing travel time in VANETsVinita Jindal, Heena Dhankani, Ruchika Garg, Punam Bedi. 97-102 [doi]
- A Routing Protocol for Detecting Holes in Wireless Sensor Networks with Multiple SinksAnju Arya, Amita Malik, Sanjay Kumar. 103-108 [doi]
- Modeling Evolutionary Group Search Optimization Approach for Community Detection in Social NetworksHema Banati, Nidhi Arora. 109-117 [doi]
- CODES: A COllaborative DEtection Strategy for SSDF Attacks in Cognitive Radio NetworksAmar Taggu, Chukhu Chunka, Ningrinla Marchang. 118-123 [doi]
- Maximizing Fault Tolerance and Minimizing Delay in Virtual Network Embedding using NSGA-IIAngel Bansal, Omprakash Kaiwartya, Ravindra Kumar Singh, Shiv Prakash. 124-130 [doi]
- Session Based Storage finding in Video on Demand SystemSoumen Kanrar, Niranjan Kumar Mandal, Sharmistha Das Kanrar. 131-135 [doi]
- Privacy and Personalization Perceptions of the Indian Demographic with respect to Online SearchesSaraswathi Punagin, Arti Arya. 136-142 [doi]
- Face Recognition Based Person Specific Identification for Video Surveillance ApplicationsS. Kokila, B. Yogameena. 143-148 [doi]
- Subtracted Bit Representation and Frame Number Reduction using Adjacent Pixel Correlation for Video CompressionS. G. Charan, Chaya Reddy. 149-154 [doi]
- Teaching Advanced Algebra to Engineering Majors: Dealing with the classroom challengesSnehanshu Saha, Bhoomika Agarwal, Priyal Mehta. 155-162 [doi]
- Graph Clustering for Large-Scale Text-Mining of Brain Imaging StudiesManisha Chawla, Mounika Mesa, Krishna P. Miyapuram. 163-168 [doi]
- Comparative Study of Pitch Contour for Mentally ImpairedKamakshi Chaudhary, Sumanlata Guatam, Latika Singh. 169-173 [doi]
- Illumination Invariant Text Recognition System Based On Contrast Limit Adaptive Histogram Equalization in Videos/ImagesL. Smitha M., B. H. Shekar. 174-179 [doi]
- A Mobile Crowd Sensing Framework for Toll Plaza Delay OptimizationUsha Mahalingam, P. Leela Manju. 180-185 [doi]
- Blending Concept Maps with Online Labs (OLabs): Case Study with Biological SciencePrema Nedungadi, Mithun Haridas, Raghu Raman. 186-190 [doi]
- Language Modelling and English Speech Prediction System to Aid People with Stuttering DisorderPramati S. Kalwad, Shailja Pattanaik, T. L. Chandana, G. Ram Mohana Reddy. 191-195 [doi]
- Improving the Accuracy of Document Similarity Approach using Word Sense DisambiguationG. Veena, U. B. Umesha Sree Veni. 196-202 [doi]
- Identifying Health Domain URLs using SVMR. Rajalakshmi. 203-208 [doi]
- Comparative Study of Personality Models in Software EngineeringJayati Gulati, Priya Bhardwaj, Bharti Suri. 209-216 [doi]
- An Analogy of F0 Estimation Algorithms Using Sustained VowelV. Prarthana Karunaimathi, Dennis Gladis, D. Balakrishnan. 217-221 [doi]
- Discourse Translation from English to TeluguT. Suryakanthi, Kamlesh Sharma. 222-227 [doi]
- Prioritization of Classes for Refactoring: A Step towards Improvement in Software QualityRuchika Malhotra, Anuradha Chug, Priyanka Khosla. 228-234 [doi]
- Post Release Versions based Code Change Quality MetricsMeera Sharma, Madhu Kumari, V. B. Singh. 235-243 [doi]
- Maestro Algorithm for Sentiment EvaluationDeepali Virmani, Taneja Shweta, Pooja Bhatia. 244-249 [doi]
- Classification and Prediction of Breast Cancer Data derived Using Natural Language ProcessingG. Johanna Johnsi Rani, Dennis Gladis, Joy Mammen. 250-255 [doi]
- Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural NetworkNimisha Sharath, Shivani S. Parikh, K. Chandrasekaran. 256-261 [doi]
- Learning to Grade Short Answers using Machine Learning TechniquesR. Krithika, Jayasree Narayanan. 262-271 [doi]
- Is That Twitter Hashtag Worth ReadingAnusha A., Sanjay Singh. 272-277 [doi]
- Is Stack Overflow Overflowing With Questions and TagsRanjitha R. K., Sanjay Singh. 278-283 [doi]
- Hallmarking Author Style from Short Texts by Multi-Classifier Using Enhanced Feature SetU. Athira, Sabu M. Thampi. 284-289 [doi]
- Primary User Authentication in Cognitive Radio Network using Signal PropertiesSuditi Choudhary, Muzzammil Hussain. 290-296 [doi]
- CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filteringManoj Diwakar, Sonam, Manoj Kumar. 297-302 [doi]
- Seeded Watershed Segmentation Based Proteomics for 2D-Gel Electrophoresis ImagesShrinivas D. Desai, S. D. Savitha. 303-308 [doi]
- Shadow Detection and Removal from Real Images: State of ArtRemya K. Sasi, V. K. Govindan. 309-317 [doi]
- StegTrack: Tracking images with hidden contentVeenu Bhasin, Punam Bedi, Aakarshi Goel, Sukanya Gupta. 318-323 [doi]
- High performance SIFT features clustering of VHR satellite images for disaster managementUjwala M. Bhangale, Surya S. Durbha. 324-329 [doi]
- Gaussian filter based à -trous algorithm for image fusionSusmitha Vekkot, Pancham Shukla. 330-334 [doi]
- Distributed Binary Decision-Based Collaborative Spectrum Sensing in Infrastructure-less Cognitive Radio NetworkRoshni Rajkumari, Ningrinla Marchang. 335-340 [doi]
- Shape Representation and Classification Based on Discrete Cosine Transformation and IDSCB. H. Shekar, Bharathi Pilar. 341-347 [doi]
- Analog BIST for Capacitive MEMS Sensor using PLLFavoureen Swer, V. Pradeep, Siva S. Yellampalli. 348-352 [doi]
- Anomalies in Landsat Imagery and ImputationSoumya Goswami, K. Sangeeta. 353-358 [doi]
- Gabor Moments Based Shot Boundary DetectionB. H. Shekar, K. P. Uma. 359-364 [doi]
- Steganography using Cuckoo Optimized Wavelet CoefficientsAnuradha Singhal, Punam Bedi. 365-370 [doi]
- RosyRecommends: Collaborative Filter Analysis of Listening Behavior Using User Similarity Metrics Based on Timbral ClustersAdarsh Jois, Jasmine Hsu. 371-376 [doi]
- Using PRUSS for Real-Time Applications on Beaglebone BlackAnjitha M. Anand, Balu Raveendran, Shoukath Cherukat, Shiyas Shahab. 377-382 [doi]
- Integrating AI Techniques In SDLC: Design Phase PerspectiveShreta Sharma, S. K. Pandey. 383-387 [doi]
- Off-line Handwritten Modi Numerals Recognition using Chain CodeManisha S. Deshmukh, Manoj P. Patil, Satish R. Kolhe. 388-393 [doi]
- Copy-Move forgery detection based on Harris Corner points and BRISKMeera Mary Isaac, M. Wilscy. 394-399 [doi]
- An Integrated Digital Image Analysis System for Detection, Recognition and Diagnosis of Disease in Wheat LeavesDiptesh Majumdar, Dipak Kumar Kole, Aruna Chakraborty, Dwijesh Dutta Majumder. 400-405 [doi]
- Impedance Cardiography Used For Diagnosis of DiseaseSamrudhi Patil, P. Choudhari. 406-411 [doi]
- Robust and Adaptive Approach for Human Action Recognition Based on Weighted Enhanced Dynamic Time WarpingBharathram Chandrasekaran, S. Chitrakala. 412-418 [doi]
- Gabor Filter Based Face Recognition Using Non-frontal Face ImagesAtrayee Majumder, Srija Chowdhury, Jaya Sil. 419-425 [doi]
- An Efficient Deblurring Algorithm on Foggy Images using Curvelet TransformsMonika Verma, Vandana Dixit Kaushik, Vinay Kumar Pathak. 426-431 [doi]
- A Discrete Wavelet Transform based Adaptive Steganography for Digital ImagesPooja Rai, Sandeep Gurung, Mrinal Kanti Ghose. 432-437 [doi]
- Medical Image Mining System: MIMSNeethu C. Joseph, Aswathy Wilson. 438-444 [doi]
- Comparative Study of Visual Attention Models with Human Eye Gaze in Remote Sensing ImagesJ. Amudha, D. Radha, A. S. Deepa. 445-450 [doi]
- Applying Image Processing for Detecting On-Shelf Availability and Product Positioning in Retail StoresRahul Moorthy, Swikriti Behera, Saurav Verma, Shreyas Bhargave, Prasad Ramanathan. 451-457 [doi]
- An Efficient Way to Determine the Chromatic Number of a Graph Directly from its Input Realizable SequencePrantik Biswas, Chumki Acharya, Nirupam Chakrabarti, Shreyasi Das, Abhisek Paul, Paritosh Bhattacharya. 458-462 [doi]
- A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing EnvironmentMrudula Sarvabhatla, M. Chandra Mouli Reddy, Chandra Sekhar Vorugunti. 463-468 [doi]
- Architecting Solutions for Scalable Databases in CloudGitanjali Sharma, Pankaj Deep Kaur. 469-476 [doi]
- Performance Based Energy Efficient Techniques For VM Allocation In Cloud EnvironmentBela Shrimali, Hiren Patel. 477-486 [doi]
- Truthful Resource Allocation Detection Mechanism for Cloud ComputingSasmita Parida, Suvendu Chandan Nayak, Chitaranjan Tripathy. 487-491 [doi]
- Rainfall Prediction using Artificial Neural Network on Map-Reduce FrameworkK. Namitha, A. Jayapriya, G. Santhosh Kumar. 492-495 [doi]
- Content Based Audiobooks Indexing using Apache Hadoop FrameworkSonal Shetty, Akash Sabarad, Harish Hebballi, Moula Husain, S. M. Meena, Shiddu Nagaralli. 496-501 [doi]
- A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based ServicesSumitra Binu, Mohammed Misbahuddin, Pethuru Raj. 502-509 [doi]
- Physical to Virtual Migration of Ubuntu System on OpenStack CloudPooja Karande, Sonam Gaherwar, Manish Kurhekar. 510-515 [doi]
- Design of Dependable Task Scheduling Algorithm in Cloud EnvironmentSuruchi Sharma, Pratyay Kuila. 516-521 [doi]
- Optimal Time Dependent Pricing Model for Smart Cloud with Cost Based SchedulingChetan Chawla, Inderveer Chana. 522-526 [doi]
- Time and Energy Saving through Computation Offloading with Bandwidth Consideration for Mobile Cloud ComputingApurva Pawar, Vandana Jagtap, Mamta Bhamare. 527-532 [doi]
- Experimental Evaluation of Multipath TCP with MPIKhushi J. Popat, Jigar Raval, Samuel Johnson, Bhavesh Patel. 533-538 [doi]
- A Secure and Light Weight Authentication and Key Establishment Framework for Wireless Mesh NetworkMrudula Sarvabhatla, M. Chandra Mouli Reddy, Chandra Sekhar Vorugunti. 539-544 [doi]
- MoveFree: A ubiquitous system to provide women safetySohini Roy, Abhijit Sharma, Uma Bhattacharya. 545-552 [doi]
- Malware Detection in Android files based on Multiple levels of Learning and Diverse Data SourcesShina Sheen, Anitha Ramalingam. 553-559 [doi]
- A Distributed Cooperative Approach to Detect Gray Hole Attack in MANETsBobby Sharma. 560-563 [doi]
- Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage CostNishat Koti, Esha Keni, Kritika, B. R. Purushothama. 564-572 [doi]
- Secure Session Key Sharing Using Public Key CryptographyAnjali Gupta, Muzzammil Hussain. 573-576 [doi]
- Fusion Mechanism for Multimodal Biometric System-Palmprint and FingerprintBhagyashri Kale, Pravin Gawande. 577-581 [doi]
- A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve CryptosystemMrudula Sarvabhatla, M. Chandra Mouli Reddy, Chandra Sekhar Vorugunti. 582-587 [doi]
- Entropy based content filtering for Mobile Web Page AdaptationNeetu Narwal, Sanjay Kumar Sharma, Amit Prakash Singh. 588-594 [doi]
- A Secure Image-Based Authentication Scheme Employing DNA Crypto and SteganographyMohammed Misbahuddin, C. S. Sreeja. 595-601 [doi]
- Detection of Stealth Process using HookingDeepti Vidyarthi. 602-607 [doi]
- SQAMPS: Secure Quorum Architecture for Mobile Presence Services with End-to-End EncryptionDipti Madankar, Aaradhana Deshmukh, Vaishali Maheshkar, Albena Mihovska. 608-613 [doi]
- Smart Mom: An architecture to monitor children at homeSohini Roy, Uma Bhattacharya. 614-623 [doi]
- Fuzzy based Estimation of Received Signal Strength in a Wireless Sensor NetworkM. Meenalochani, S. Sudha. 624-628 [doi]
- Cognitive Radio for Smart Home EnvironmentT. Sudha, Kiran Selvan, V. Anand, Krishna Anilkumar, V. G. Kavya, K. P. Anagha Madhav. 629-634 [doi]
- A Theoretical Model for Big Data Analytics using Machine Learning AlgorithmsAnanthi Sheshasaayee, J. V. N. Lakshmi. 635-639 [doi]
- Effect of Spam Filter on SPOT AlgorithmAnamika, K. V. L. P. Padmini, Vinela Guduru, K. Sangeeta. 640-643 [doi]
- Smart and Secure Monitoring of Industrial Environments using IoTShruthi Puranik, Jayashree Mohan, K. Chandrasekaran. 644-649 [doi]
- Two Phase Static Analysis Technique for Android Malware DetectionPriyadarshani M. Kate, Sunita V. Dhavale. 650-655 [doi]
- A Multi-Objective Initial Virtual Machine Allocation in Clouds using Divided KD TreeMonica Gahlawat, Priyanka Sharma. 656-660 [doi]
- A Web Metric Collection and Reporting SystemRuchika Malhotra, Anjali Sharma. 661-667 [doi]
- Automatic Generation of Templates using OntologyS. Thenmalar, T. V. Geetha. 668-672 [doi]
- Secure E-ticketing System based on Mutual Authentication using RFIDLekshmi S. Nair, V. S. Arun, Sijo Joseph. 673-677 [doi]
- Multi Layer Versus Functional Link Single Layer Neural Network for Solving Nonlinear Singular Initial Value ProblemsSusmita Mall, S. Chakraverty. 678-683 [doi]
- User intervention based segmentation of Myocardium In cardiac cine MRI imagesHeenakousar Shigli, M. H. Tejas, Lohit Narayan, Shrinivas D. Desai. 684-689 [doi]
- Condition Monitoring in Roller Bearings using Cyclostationary FeaturesS. Sachin Kumar, Neethu Mohan, Prabaharan Poornachandran, K. P. Soman. 690-697 [doi]
- Integrated Energy Management Framework: AatralMuthuraman Thangaraj, S. Anuradha. 698-707 [doi]
- Poster: An Efficient Low Power & High Performance in MPSOCK. Jayasree, B. Naresh Kumar Reddy, B. Srinuvasu Kumar, J. V. N. Ramesh, Pranose J. Edavoor, Mohd Kashif Zia Ansari. 708-711 [doi]
- Applications of Text Detection and its Challenges: A ReviewM. P. Nevetha, A. Baskar. 712-721 [doi]
- Survey on Tag SNP selection methods using soft computing techniquesDivya P. Nair, Keerthana Dayanand, M. V. Judy. 722-728 [doi]
- Mathematics Tutoring Apps for Low-Cost Devices: an Ethnographic Study of RequirementsAishini Sinha, Anupama M. Dhareshwar, L. Saloni Joshi, Viraj Kumar. 729-733 [doi]
- Image Scrambling using Kekre's Walsh Sequency and Non Sinusoidal Transforms in Different Color SpacesTanuja K. Sarode, Pallavi N. Halarnkar. 734-738 [doi]
- An unsupervised approach for morphological segmentation of highly agglutinative Tamil languageAnanthi Sheshasaayee, V. R. Angela Deepa. 739-743 [doi]
- A Computational Approach of Data Smoothening and Prediction of Diabetes DatasetShivani Jakhmola, Tribikram Pradhan. 744-748 [doi]