Registered Papers
3 |
Improved Ant Colony Optimization Technique for Mobile Adhoc Networks |
9 |
A Performance Comparison Study of Two Positionbased Routing Protocols and their Improved Versions for Mobile Ad hoc Networks |
13 |
Privacy Preservation in Na�ve Bayes Classification using Trusted Third Party Computation over Distributed Progressive Databases |
14 |
Speech Transaction for Blinds Usingspeech-Text-Speech Conversions |
16 |
Floating-Point Adder in Techology driven High-Level Synthesis |
17 |
Differential Artificial Bee Colony for Dynamic Environment |
22 |
FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element |
24 |
Towards a Software Component Quality Model |
25 |
Colour image encryption scheme based on permutation and substitution techniques |
29 |
An Intelligent System for Web Usage Data Preprocessing |
31 |
Discovery & High Availability of Services in Grid Environment with Load Balancing |
32 |
Physiologically Based Speech Synthesis Using Digital Waveguide Model. |
34 |
Bayes Theorem and Information Gain based Feature Selection for Maximizing the Performance of Classifiers |
36 |
Improving the Performance of Color Image Watermarking Using Contourlet Transform |
37 |
A Comparative Study of Machine Learning Algorithms as Expert Systems in Medical Diagnosis (Asthma) |
38 |
Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers |
39 |
Hybrid Synchronization of Hyperchaotic Qi and L�u Systems by Nonlinear Control |
40 |
A Review of Dynamic Web Service Composition Techniques |
41 |
Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets |
43 |
Output Regulation of Arneodo-Coullet Chaotic System |
45 |
A High-speed, Low-power, Low-latency Pipelined ROM-less DDFS |
46 |
A Mathematical Modeling of Exceptions in Healthcare Workflow |
49 |
An Intelligent Automatic Story Generation System by Revising Proppian�s System |
53 |
A cross-layer Frame Work for Adaptive Video Streaming Over IEEE 802.11 Wireless Networks |
57 |
FIFO Optimization for Energy-Performance Trade-Off in Mesh-of-Tree based Network-on-Chip |
58 |
Outliers Detection as Network Intrusion Detection System
Using Multi Layered Framework |
59 |
A New Routing Protocol For Mobile Ad hoc Networks |
60 |
Remote-Memory based Network Swap for Performance Improvement |
61 |
Design and Implementation of Novel Distributed Memory File System |
62 |
Service Discovery Protocol For Ad Hoc Networks |
63 |
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining |
65 |
Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree |
66 |
Mobile Database Cache Replacement Policies : LRU and PPRRP |
67 |
Collaborative Alert in a Reputation System to Alleviate Colluding Packet Droppers in Mobile Ad Hoc Networks |
68 |
A new defense scheme against DDoS attack in Mobile Ad hoc Networks |
69 |
Spelling Corrector for Indian Languages |
70 |
An Intelligent Network for offline Signature Verification using Chain Code |
71 |
Hierarchical Clustering of Projected Data Streams using Cluster Validity Index |
72 |
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP |
75 |
A Novel Deadlock-free Shortest-path Dimension Order Routing Algorithm for Mesh-of-Tree based Network-on-Chip Architecture |
77 |
2-D DOA estimation of coherent wideband signals using L-shaped sensor array |
78 |
Voltage Collapse Based Critical Bus Ranking Using Composite Index |
79 |
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map |
80 |
Logical Modeling & Verication of a Strength based Multi-Agent Argumentation Scheme using NuSMV |
82 |
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic |
84 |
Key Frame Detection Based Semantic Event Detection And Classification Using Heirarchical Approach For Cricket Sport Video Indexing. |
89 |
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System |
95 |
Multiplexer Based Circuit Synthesis with Area-Power Trade-off |
97 |
Hierarchical Context Representation and Heuristic Based Context Selection in a Pervasive Environment |
98 |
Uncovering the Main Research Themes of Software Validation |
99 |
An Approach towards Lightweight, Reference Based, Tree Structured Time Synchronization Scheme in WSN |
110 |
Face Recognition using Multi-exemplar Discriminative Power Analysis |
112 |
Non Local Means Image Denoising for Color Images using PCA |
114 |
Cluster Based Mobility Considered Routing Protocol for Mobile Ad hoc Networks |
115 |
An Model for Delegation That is based upon both Authentication and Authorization |
117 |
Identification of Encryption Algorithm using Decision Tree |
118 |
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks |
120 |
A Novel Data Mining Approach for Performance Improvement of EBGM based Face Recognition Engine to handle large database |
122 |
Chest X-Ray Analysis for Computer-Aid Diagnostic |
124 |
An Automatic Evolution of Rules to Identify Students Multiple Intelligence |
126 |
RODD: An Effective Reference-based Outlier Detection Approach for Large Datasets |
127 |
Empirical Measurements on the Convergence Nature of Differential Evolution Variants |
128 |
Collecting the Inter Component Interactions in Multithreaded Environment |
132 |
On the Benefit of Quantification in AOP Systems-A Quantitative and a Qualitative Assessment. |
133 |
A Comprehensive View of Software Product Line |
137 |
A Novel Mechanism for Detection of Distributed Denial of Service Attacks |
141 |
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET |
142 |
Steganography Using Version Control System |
143 |
Design Pattern Mining Using State Space Representation of graph matching |
145 |
Min Max Threshold Range (MMTR) Approach In Palmprint Recognition |
146 |
Expert System for Sentence Recognition |
148 |
MST-based Cluster Initialization for K-means |
149 |
Integration Testing of Multiple Embedded Processing Components |
150 |
Geometry and Skin Color Based Hybrid Approach for Face Tracking in Colour Environment |
151 |
Performance Analysis of Block and Non Block Based Approach of Invisible Image Watermarking Using SVD in DCT Domain |
152 |
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity |
153 |
Optimization of Mutimedia Packet Scheduling In AD HOC Networks Using Multiobective Genetic Algoritham |
161 |
A Novel Topographic Feature Extraction Method for Indian Character Images |
163 |
Comprehensive Framework to Human Recognition using Palmprint and Speech Signal |
164 |
Inclusion/Exclusion Protocol for RFID Tags |
166 |
A Survey On Hand Gesture Recognition in context of soft Computing |
167 |
Handwritten Numeral Recognition using Modified BP ANN Structure |
171 |
Efficient Density Based Outlier Handling Technique in Data Mining |
172 |
Exergaming � New Age Gaming for Health Rehabilitation and Education |
173 |
Authenticating and Securing Mobile Applications
Using Microlog |
174 |
Overcoming Social Issues in Requirements Engineering |
175 |
Functional Based Testing In Web Services Integrated Software Applications |
177 |
Assisting Programmers Resolving Vulnerabilities in Java Web Applications |
180 |
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal |
183 |
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment |
184 |
Adoption of Cloud Computing in e-governance |
189 |
Estimating Strength of a DDoS Attack using Multiple Regression Analysis |
190 |
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching |
191 |
Non-Replicated Dynamic Fragment Allocation In Distributed Database Systems |
192 |
A Novel Image Encryption Algorithm Using two Chaotic Maps for Medical Application |
193 |
Quality Analysis of a Chaotic Hopping Based Cipher Image |
196 |
A Sementic Approach To Design An Intelligent Self Organized Search Engine For Extacting Information Relating to Educational Resources |
Accepted Papers
2 |
Efficient Secret Image Sharing Scheme |
3 |
Improved Ant Colony Optimization Technique for Mobile Adhoc Networks |
5 |
An Efficient Compressor for Biological Sequences |
6 |
A Decision Model for Estimating the Effort of Software Projects Byextending FPA by a Markov Chain Monte Carlo Simulation Approach |
8 |
A New Resource scheduling method in grid systems based on Hierarchical
Stochastic Petri net |
9 |
A Performance Comparison Study of Two Positionbased Routing Protocols and their Improved Versions for Mobile Ad hoc Networks |
11 |
Enhanced of Two-Factor User Authentication in Wireless Sensor Networks |
12 |
Geometric Active Contour Detection using Gradient Vector Flow and Shape-Based Image Segmentation |
13 |
Privacy Preservation in Na�ve Bayes Classification using Trusted Third Party Computation over Distributed Progressive Databases |
14 |
Speech Transaction for Blinds Usingspeech-Text-Speech Conversions |
16 |
Floating-Point Adder in Techology driven High-Level Synthesis |
17 |
Differential Artificial Bee Colony for Dynamic Environment |
20 |
Digital Signal Controller TMS320LF2407 in Speed Control of PMDC Motor using PI algorithm |
22 |
FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element |
24 |
Towards a Software Component Quality Model |
25 |
Colour image encryption scheme based on permutation and substitution techniques |
27 |
Value Addtion to A Software Via Reduction of Testingcosts And Verification of an Object Oriented Program |
28 |
One-Reporting Queries |
29 |
An Intelligent System for Web Usage Data Preprocessing |
31 |
Discovery & High Availability of Services in Grid Environment with Load Balancing |
32 |
Physiologically Based Speech Synthesis Using Digital Waveguide Model. |
33 |
The Impact of Mobility and Node Density on MANET Routing Protocols |
34 |
Bayes Theorem and Information Gain based Feature Selection for Maximizing the Performance of Classifiers |
36 |
Improving the Performance of Color Image Watermarking Using Contourlet Transform |
37 |
A Comparative Study of Machine Learning Algorithms as Expert Systems in Medical Diagnosis (Asthma) |
38 |
Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers |
39 |
Hybrid Synchronization of Hyperchaotic Qi and L�u Systems by Nonlinear Control |
40 |
A Review of Dynamic Web Service Composition Techniques |
41 |
Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets |
43 |
Output Regulation of Arneodo-Coullet Chaotic System |
45 |
A High-speed, Low-power, Low-latency Pipelined ROM-less DDFS |
46 |
A Mathematical Modeling of Exceptions in Healthcare Workflow |
48 |
Providing Confidentiality for Data Aggregation in
Wireless Sensor Networks |
49 |
An Intelligent Automatic Story Generation System by Revising Proppian�s System |
53 |
A cross-layer Frame Work for Adaptive Video Streaming Over IEEE 802.11 Wireless Networks |
57 |
FIFO Optimization for Energy-Performance Trade-Off in Mesh-of-Tree based Network-on-Chip |
58 |
Outliers Detection as Network Intrusion Detection System
Using Multi Layered Framework |
59 |
A New Routing Protocol For Mobile Ad hoc Networks |
60 |
Remote-Memory based Network Swap for Performance Improvement |
61 |
Design and Implementation of Novel Distributed Memory File System |
62 |
Secure Service Discovery Protocol For Ad Hoc Networks |
63 |
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining |
64 |
Testing Techniques, Modes and Capabilities in Agile projects |
65 |
Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree |
66 |
Mobile Database Cache Replacement Policies : LRU and PPRRP |
67 |
Collaborative Alert in a Reputation System to Alleviate Colluding Packet Droppers in Mobile Ad Hoc Networks |
68 |
A new defense scheme against DDoS attack in Mobile Ad hoc Networks |
69 |
Spelling Corrector for Indian Languages |
70 |
An Intelligent Network for offline Signature Verification using Chain Code |
71 |
Hierarchical Clustering of Projected Data Streams using Cluster Validity Index |
72 |
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP |
75 |
A Novel Deadlock-free Shortest-path Dimension Order Routing Algorithm for Mesh-of-Tree based Network-on-Chip Architecture |
77 |
2-D DOA estimation of coherent wideband signals using L-shaped sensor array |
78 |
Voltage Collapse Based Critical Bus Ranking Using Composite Index |
79 |
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map |
80 |
Logical Modeling & Verication of a Strength based Multi-Agent Argumentation Scheme using NuSMV |
82 |
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic |
84 |
Key Frame Detection Based Semantic Event Detection And Classification Using Heirarchical Approach For Cricket Sport Video Indexing. |
88 |
Optimum Architectures for Modulo 2n-1 Addition with Two Level Half Adders |
89 |
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System |
92 |
Power Minimization Using Stack Forcing Technique |
93 |
A New Cluster Computing Model |
95 |
Multiplexer Based Circuit Synthesis with Area-Power Trade-off |
97 |
Hierarchical Context Representation and Heuristic Based Context Selection in a Pervasive Environment |
98 |
Uncovering the Main Research Themes of Software Validation |
99 |
An Approach towards Lightweight, Reference Based, Tree Structured Time Synchronization Scheme in WSN |
108 |
White Matter Hyperintensity Segmentation using Multiple Stage FCM |
109 |
UML and UML based Tool for Ontology Engineering |
110 |
Face Recognition using Multi-exemplar Discriminative Power Analysis |
112 |
Non Local Means Image Denoising for Color Images using PCA |
113 |
Radio Network Design for Dismounted Soldiers |
114 |
Cluster Based Mobility Considered Routing Protocol for Mobile Ad hoc Networks |
115 |
An Model for Delegation That is based upon both Authentication and Authorization |
116 |
Focused web crawler with Revisit policy |
117 |
Identification of Encryption Algorithm using Decision Tree |
118 |
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks |
119 |
A Review of Scheduling in Vehicular Delay Tolerant Networks |
120 |
A Novel Data Mining Approach for Performance Improvement of EBGM based Face Recognition Engine to handle large database |
122 |
Chest X-Ray Analysis for Computer-Aid Diagnostic |
123 |
Blind Video Tamper Detection Based on a Novel Information Fusion Approach |
124 |
An Automatic Evolution of Rules to Identify Students Multiple Intelligence |
125 |
Multiclass Microarray Gene Expression Classification Based On Information Fusion in Correlation Subspace |
126 |
RODD: An Effective Reference-based Outlier Detection Approach for Large Datasets |
127 |
Empirical Measurements on the Convergence Nature of Differential Evolution Variants |
128 |
Collecting the Inter Component Interactions in Multithreaded Environment |
132 |
On the Benefit of Quantification in AOP Systems-A Quantitative and a Qualitative Assessment. |
133 |
A Comprehensive View of Software Product Line |
134 |
Fuzzy Neural Petri Net Based Method for Knowledge Representation of Microarray Gene Expression Level |
135 |
A Proposed Method for Increase Security in SCADA Systems |
137 |
A Novel Mechanism for Detection of Distributed Denial of Service Attacks |
138 |
Integration of RIA towards Flexible Web based GUI. |
141 |
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET |
142 |
Steganography Using Version Control System |
143 |
Design Pattern Mining Using State Space Representation of graph matching |
144 |
Palmprint Recognition by Harris Corner Detector and Match by Correlation |
145 |
Min Max Threshold Range (MMTR) Approach In Palmprint Recognition |
146 |
Expert System for Sentence Recognition |
148 |
MST-based Cluster Initialization for K-means |
149 |
Integration Testing of Multiple Embedded Processing Components |
150 |
Geometry and Skin Color Based Hybrid Approach for Face Tracking in Colour Environment |
151 |
Performance Analysis of Block and Non Block Based Approach of Invisible Image Watermarking Using SVD in DCT Domain |
152 |
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity |
153 |
Optimization of Mutimedia Packet Scheduling In AD HOC Networks Using Multiobective Genetic Algoritham |
161 |
A Novel Topographic Feature Extraction Method for Indian Character Images |
163 |
Comprehensive Framework to Human Recognition using Palmprint and Speech Signal |
164 |
Inclusion/Exclusion Protocol for RFID Tags |
165 |
Energy Minimization for Dynamic Real Time System with Dynamic Voltage Scaling |
166 |
A Survey On Hand Gesture Recognition in context of soft Computing |
167 |
Handwritten Numeral Recognition using Modified BP ANN Structure |
171 |
Efficient Density Based Outlier Handling Technique in Data Mining |
172 |
Exergaming � New Age Gaming for Health Rehabilitation and Education |
173 |
Authenticating and Securing Mobile Applications
Using Microlog |
174 |
Overcoming Social Issues in Requirements Engineering |
175 |
Functional Based Testing In Web Services Integrated Software Applications |
176 |
Multiple Ontologies for Semantic Digital Library in Health Domain |
177 |
Assisting Programmers Resolving Vulnerabilities in Java Web Applications |
180 |
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal |
182 |
Application of Artificial Neural Network to Predict Sales in a Telecommunication Industry |
183 |
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment |
184 |
Adoption of Cloud Computing in e-governance |
187 |
Multisource Adaptive Data Distribution and Routing in Wireless Sensor Networks |
188 |
A Morphological-Based License Plate Localization in Complex Scene |
189 |
Estimating Strength of a DDoS Attack using Multiple Regression Analysis |
190 |
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching |
191 |
Non-Replicated Dynamic Fragment Allocation In Distributed Database Systems |
192 |
A Novel Image Encryption Algorithm Using two Chaotic Maps for Medical Application |
193 |
Quality Analysis of a Chaotic Hopping Based Cipher Image |
196 |
A Sementic Approach To Design An Intelligent Self Organized Search Engine For Extacting Information Relating to Educational Resources |
198 |
A Novel Symmetrical Encryption Algorithm With High Security Based On Key Updating |
