| |
|
| |
Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory
(B. K. Tripathy, Adhir Ghosh and G.K.Panda ) |
| |
A Node Stability Index-based Connected Dominating Set Algorithm for Mobile Ad hoc Networks (Natarajan Meghanathan ) |
| |
Adaptive MMSE Equalizer through LMS algorithm based CMA Channel Equalization
(TARA.SAIKUMAR R. NIRMALA DEVI And KISHNA RAO) |
|
A Link Distance Ratio based Stable Multicast Routing Protocol for Mobile Ad hoc Networks
(Natarajan Meghanathan) |
|
Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata
(Himadri Nath Saha ,Debika Bhattacharyya ,P. K.Banerjee) |
|
A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN)
(Indrajit Das) |
|
A logical Topology to find alternate routes in WDM lightwave network
(Santosh Das, Abhijit Makhal) |
| |
Diameter Single Sign On - Secure and Personalized Service Provision via Authentication and Authorization Mechanisms
(Robayet Nasim) |
|
Mobile Agent in InVANET - Traffic Management
(V.Arun and K.Shunmuganathan) |
|
A New Approach To Steganography
(Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal and Abhinava Roy) |
|
Handover Latency Measurement of Mobile IPv6 in a Testbed Environment
(Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar Abdul Hanan Abdullah, Mahesh Nair and Rashid Hafeez Khokhar) |
|
Soft Computing Technique Based Call Admission Control Decision Mechanism
(Ramesh Babu H.S, Mahesh.G, Gowrishankar and Satyanarayana P.S) |
| |
An Optimal Rpc Based Approach To Increase Fault In Wireless Ad-Hoc Network
(Rabindra Kumar shial,K Hemant Ku.Reddy,K.L.Narayana) |
| |
Throughput Analysis of Next-Hop Forwarding Method for Non-Linear Vehicular Ad Hoc Networks
(Ram Shringar Raw and D.K. Lobiyal) |
| |
And Security In Digital Networks From The Perspective Of Modeling And Software Development
( Erich Ortner ) |
| |
Developing Software Metrics for Analysis & Design Artifacts in Unified Process ( Sharma Meena and Vishwakarma Rajeev ) |
| |
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining
( Saroj, Kapila, Dinesh Kumar and Kanika ) |
| |
A Novel Face Recognition Method Using PCA, LDA And Support Vector Machine
( Raghavendra U, Mahesh.P.K and Anjan Gudigar ) |
|
| |
Enhancing E-Learning through Cognitive Structures for Learning Sports
( MuthuLakshmi S, Nagasundari S, Surender Nath S.P and Uma G.V ) |
| |
SecureWear: A Framework for Securing Mobile Social Networks
(Baishakhi Ray and Richard Han) |
| |
Radix-4 Modified Interleaved Modular Multiplier Based on Sign Detection
( Mohamed A. Nassar and Layla A. A. El-Sayed ) |
| |
Classification of MRI Brain Images Using Cosine-modulated Wavelets( Yogita K. Dubey and Milind M. Mushrif ) |
| |
A novel algorithm for prediction of protein coding DNA from non-coding DNA in microbial genomes using genomic composition and dinucleotide compositional skew ( Baharak Goli , Aswathi B. L and Achuthsankar S. Nair ) |
| |
A Heuristic Approach for Community Detection in Protein Networks ( Sminu Izudheen and Sheena Mathew ) |
| |
Virtual Interactive Prototyping ( Kurien Zacharia, Eldo P. Elias and Surekha Mariam Varghese ) |
| |
Location Service Management Protocol for Vehicular Ad Hoc Network Urban Environment
( Salim M. Zaki, M. A. Ngadi, Shukor Abd Razak, Maznah Kamat and Johan Mohamad Shariff ) |
| |
Key Dependent Feature Point Based Image Watermarking Scheme
( Ramesh Kumar Surapathi, Kamalika Datta and I. Sengupta ) |
| |
Unique-minimum conflict-free coloring for chain of rings ( Einollah Pira ) |
| |
Encouraging the Usage of Neural Network in Video Text Detection Application
( Suresh Kumar Balasubramaniyan, Praveen Kumar Mani, Arun Kumar Karthikeyan and Ganesh Shankar ) |
| |
Use of Augmented Reality in Serious Game for Training Medical Personnel
( Arun Kumar Karthikeyan, Praveen Kumar Mani, Suresh Kumar Balasubramaniyan and Praveen Jelish Panneer Selvam ) |
| |
Proposed Software Development Model for Small Organization and its Explanation ( Vinish Kumar and Sachin Gupta ) |
| |
Opinion Mining from Weblogs and its Relevance for Socio-political Research
( Vivek Kumar Singh, Nisha Tiwari, Shekhar Garg, Mousumi Mukherjee and Ghanshyam Kumar Mehta ) |
| |
Cognitive Symmetric Key Cryptographic Algorithm ( Y.RA. Kannan, S. Aravind Prasad and P. Varalakshmi ) |
| |
Design of Fractional order Digital Differentiator Using Inverse Multiquadric Radial Basis Function
( Nitin Kumar. and Tarun Kumar Rawat ) |
| |
A Framework for Transparency in Shgs
( A B Sagar ) |
| |
User-centric Situation Awareness in Ubiquitous Computing Environments
(Gautham Pallapa and Sajal K. Das) |
| |
Adaptive QoS-Aware Web Service Composition ( Deivamani Mallayya and Baskaran Ramachandran ) |
| |
An Authenticated BSS Methodology for Data Security Using Steganography
( Ravi Kumar. B, Murti. P. R. K and Hemanth Kumar. B ) |
| |
Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network
( K.Ramesh and K.Somasundaram ) |
| |
Calculation of the minimum time complexity based on information entropy ( Xue WU ) |
| |
A Comparative Analysis of Watermarking Techniques for Copy Protection of Digital Images ( Dolley Shukla and Manisha Sharma ) |
| |
A Distributed OFDM Polarizing Transmission via Broadcast Switching ( Ying Guo ) |
| |
Spanning tree based Reliable Data Transmission in LEACH ( Neeranjan Chitare, Rashmi M, Shalini R. Urs and Srinivas Sampalli ) |
| |
Requirements Volatility in Software Maintenance ( D.Kavitha and Ananthi Sheshasaayee ) |
| |
A New Encryption Method for Secured Message Passing by Sorting Technique ( S. Muthusundari and S.Santhosh Baboo ) |
| |
Wireless Sensor Network Security ( Saurabh Sharma, Amit Sahu, Ashok Verma and Santosh Vishwakarma ) |
| |
Key Management for Group based Mobile Ad hoc Networks
( Kamal Kumar Chauhan and Amit Kumar Singh Sanger ) |
| |
Finite State Transducers Framework for Monitors Conflict Detection and Resolution ( Soha Hussein ) |
| |
Real Time Facial Expression Recognition ( Saumil Srivastava ) |
| |
A non-revisiting Genetic Algorithm with adaptive mutation for Function Optimization ( Saroj and Devraj ) |
| |
Intersection area based geocasting protocol (IBGP) for Vehicular Ad hoc Networks ( Sanjoy Das and D. K. lobiyal ) |
| |
|