|
Two Stage Histogram Enhancement Schemes to Improve Visual Quality of Fundus Images |
|
|
1 | (11) |
|
|
|
|
A Secure and Efficient Computation Outsourcing Scheme for Multi-users |
|
|
12 | (13) |
|
|
|
Detecting the Common Biomarkers for Early Stage Parkinson's Disease and Early Stage Alzheimer's Disease Associated with Intrinsically Disordered Protein |
|
|
25 | (10) |
|
|
|
Assamese Named Entity Recognition System Using Naive Bayes Classifier |
|
|
35 | (9) |
|
|
|
|
Medical Image Multiple Watermarking Scheme Based on Integer Wavelet Transform and Extraction Using ICA |
|
|
44 | (10) |
|
|
|
|
Recognizing Real Time ECG Anomalies Using Arduino, AD8232 and Java |
|
|
54 | (11) |
|
|
|
Interpretation of Indian Sign Language Using Optimal HOG Feature Vector |
|
|
65 | (9) |
|
|
|
|
Stable Reduced Link Break Routing Technique in Mobile Ad Hoc Network |
|
|
74 | (10) |
|
|
|
Disguised Public Key for Anonymity and Enforced Confidentiality in Summative E-Examinations |
|
|
84 | (11) |
|
|
|
Early Diabetes Prediction Using Voting Based Ensemble Learning |
|
|
95 | (9) |
|
|
|
A System that Performs Data Distribution and Manages Frequent Itemsets Generation of Incremental Data in a Distributed Environment |
|
|
104 | (10) |
|
|
|
Assessing Autonomic Level for Self-managed Systems -- FAHP Based Approach |
|
|
114 | (10) |
|
|
|
|
Bounded Paths for LCR Queries in Labeled Weighted Directed Graphs |
|
|
124 | (10) |
|
|
|
An Efficient Image Fusion Technique Based on DTCWT |
|
|
134 | (10) |
|
|
|
Low-Delay Channel Access Technique for Critical Data Transmission in Wireless Body Area Network |
|
|
144 | (10) |
|
|
|
Lexicon-Based Approach to Sentiment Analysis of Tweets Using R Language |
|
|
154 | (11) |
|
|
|
Twitter Based Event Summarization |
|
|
165 | (10) |
|
|
|
Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image Enhancement |
|
|
175 | (10) |
|
|
|
|
A Novel Load Balancing Algorithm Based on the Capacity of the Virtual Machines |
|
|
185 | (11) |
|
|
|
A Hybrid Approach for Privacy-Preserving Data Mining |
|
|
196 | (12) |
|
|
M. V. P. Chandra Sekhara Rao |
|
|
|
|
Network Traffic Classification Using Multiclass Classifier |
|
|
208 | (10) |
|
|
|
|
|
An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection |
|
|
218 | (10) |
|
|
|
Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection |
|
|
228 | (11) |
|
|
|
Recognition of Handwritten Digits Using DNN, CNN, and RNN |
|
|
239 | (10) |
|
|
|
Evaluating Effectiveness of Color Information for Face Image Retrieval and Classification Using SVD Feature |
|
|
249 | (11) |
|
|
|
|
PDD Algorithm for Balancing Medical Data |
|
|
260 | (10) |
|
|
|
|
|
Digital Mammogram Classification Using Compound Local Binary Pattern Features with Principal Component Analysis Based Feature Reduction Approach |
|
|
270 | (9) |
|
|
|
|
|
|
Assessing the Performance of CMOS Amplifiers Using High-k Dielectric with Metal Gate on High Mobility Substrate |
|
|
279 | (11) |
|
|
|
|
|
The Impact of Picture Splicing Operation for Picture Forgery Detection |
|
|
290 | (12) |
|
|
|
LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images |
|
|
302 | (10) |
|
|
|
|
HEAP- Genus 2 HyperElliptic Curve Based Biometric Audio Template Protection |
|
|
312 | (9) |
|
|
|
|
|
Greedy WOA for Travelling Salesman Problem |
|
|
321 | (10) |
|
|
|
|
|
|
Deterministic Task Scheduling Method in Multiprocessor Environment |
|
|
331 | (11) |
|
|
Performance Comparison of Measurement Matrices in Compressive Sensing |
|
|
342 | (10) |
|
|
|
|
|
A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL) |
|
|
352 | (10) |
|
|
|
Novel Technique for the Test Case Prioritization in Regression Testing |
|
|
362 | (10) |
|
|
|
Extreme Gradient Boosting Based Tuning for Classification in Intrusion Detection Systems |
|
|
372 | (9) |
|
|
|
Relative Direction: Location Path Providing Method for Allied Intelligent Agent |
|
|
381 | (11) |
|
|
|
|
|
|
Sheikh Shah Mohammad Motiur Rahman |
|
|
FPGA Implementation for Real-Time Epoch Extraction in Speech Signal |
|
|
|
|
|
|
Puli Kishore Kumar Privacy |
|
|
Preserving Random Permutation of Image Pixels Enciphered |
|
|
392 | (9) |
|
Model from Cyber Attacks for Covert Operations |
|
|
401 | (10) |
|
|
|
|
|
MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO |
|
|
411 | (10) |
|
|
|
An Improved RDH Model for Medical Images with a Novel EPR Embedding Technique |
|
|
421 | (10) |
|
|
|
|
Machine Learning Based Adaptive Framework for Logistic Planning in Industry 4.0 |
|
|
431 | (8) |
|
|
|
|
|
|
An Analysis of Key Challenges for Adopting the Cloud Computing in Indian Education Sector |
|
|
439 | (10) |
|
|
|
Texture Image Retrieval Based on Block Level Directional Local Extrema Patterns Using Tetrolet Transform |
|
|
449 | (12) |
|
|
|
Development of Transformer-Less Inverter System for Photovoltaic Application |
|
|
461 | (10) |
|
|
|
|
English Text to Speech Synthesizer Using Concatenation Technique |
|
|
471 | (10) |
|
|
|
Text Translation from Hindi to English |
|
|
481 | (8) |
|
|
|
|
|
|
Optical Character Recognition (OCR) of Marathi Printed Documents Using Statistical Approach |
|
|
489 | (10) |
|
|
|
Multi View Human Action Recognition Using HODD |
|
|
499 | (10) |
|
|
|
Segmental Analysis of Speech Signal for Robust Speaker Recognition System |
|
|
509 | (11) |
|
|
|
|
Multimicrophone Based Speech Dereverberation |
|
|
520 | (10) |
|
|
|
Modeling Nonlinear Dynamic Textures Using Isomap with GPU |
|
|
530 | (13) |
|
|
Exploration of Apache Hadoop Techniques: Mapreduce and Hive for Big Data |
|
|
543 | (10) |
|
|
|
Author Index |
|
553 | |