|
Theme-1 Grid and Cloud Computing |
|
|
|
|
1 | (8) |
|
|
|
An Overview on Soft Computing Techniques |
|
|
9 | (15) |
|
|
|
A Novel Approach for Task Processing through NEST Network in a Grid |
|
|
24 | (6) |
|
|
|
TCP/IP Security Protocol Suite for Grid Computing Architecture |
|
|
30 | (6) |
|
|
|
Security Issues in Cloud Computing |
|
|
36 | (10) |
|
|
|
|
Classification of Software Quality Attributes for Service Oriented Architecture |
|
|
46 | (6) |
|
|
|
|
Energy Efficiency for Software and Services on the Cloud |
|
|
52 | (4) |
|
|
|
|
|
|
Evaluation of Grid Middleware Frameworks for Execution of MPI Applications |
|
|
56 | (6) |
|
|
|
Virtualization as an Engine to Drive Cloud Computing Security |
|
|
62 | (5) |
|
|
|
|
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control Protocol |
|
|
67 | (12) |
|
|
|
Efficient Task Scheduling Algorithms for Cloud Computing Environment |
|
|
79 | (5) |
|
|
|
"Cloud Computing: Towards Risk Assessment" |
|
|
84 | (8) |
|
|
|
Efficient Grid Scheduling with Clouds |
|
|
92 | (11) |
|
|
|
|
Security Concerns in Cloud Computing |
|
|
103 | (10) |
|
|
|
Cloud Computing - The Future |
|
|
113 | (6) |
|
|
|
Cloud Computing: A Need for a Regulatory Body |
|
|
119 | (7) |
|
|
|
|
Clustering Dynamic Class Coupling Data to Measure Class Reusability Pattern |
|
|
126 | (5) |
|
|
|
Cloud Computing in Education: Make India Better with the Emerging Trends |
|
|
131 | (9) |
|
|
|
|
Enhancing Grid Resource Scheduling Algorithms for Cloud Environments |
|
|
140 | (5) |
|
|
|
Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative Study |
|
|
145 | (5) |
|
|
|
|
|
150 | (4) |
|
|
|
Creating Information Advantage in Cloudy World |
|
|
154 | (5) |
|
|
|
Theme-2 High Performance Architecture |
|
|
|
Design of CMOS Energy Efficient Single Bit Full Adders |
|
|
159 | (10) |
|
|
|
|
Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive Analytics |
|
|
169 | (10) |
|
|
|
|
Bio-enable Security for Operating System by Customizing Gina |
|
|
179 | (7) |
|
|
|
A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous Environment |
|
|
186 | (6) |
|
|
|
|
Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service Applications |
|
|
192 | (9) |
|
|
|
Composition of Composite Semantic Web Services Using Abductive Event Calculus |
|
|
201 | (13) |
|
|
|
Ant Colony Optimization Based Congestion Control Algorithm for MPLS Network |
|
|
214 | (10) |
|
|
|
|
Low Power Optimized Array Multiplier with Reduced Area |
|
|
224 | (9) |
|
|
|
|
Simulink Library Development and Implementation for VLSI Testing in Matlab |
|
|
233 | (8) |
|
|
|
Processing of Image Data Using FPGA-Based MicroBlaze Core |
|
|
241 | (6) |
|
|
|
|
|
Parametric Analysis of Zone Routing Protocol |
|
|
247 | (5) |
|
|
|
|
Vision of 5G Communication |
|
|
252 | (5) |
|
|
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform |
|
|
257 | (8) |
|
|
|
Computational Analysis of Availability of Process Industry for High Performance |
|
|
265 | (10) |
|
|
|
|
A Preprocessing Technique for Recognition of Online Handwritten Gurmukhi Numerals |
|
|
275 | (7) |
|
|
|
A Framework for Vulnerability Analysis during Software Maintenance |
|
|
282 | (6) |
|
|
|
Performance Optimization for Logs of Servers |
|
|
288 | (5) |
|
|
|
|
Ontology Based Information retrieval for Learning Styles of Autistic People |
|
|
293 | (6) |
|
|
|
Analyze the Performance of New Edge Web Application's over N-Tiers Layer Architecture |
|
|
299 | (7) |
|
|
|
|
|
Self-Configurable Scheduling Algorithm for Heterogeneous Computing Systems |
|
|
306 | (10) |
|
|
|
Performance Analysis of Proposed Maes Cryptographic Techniques |
|
|
316 | (6) |
|
|
|
|
|
Analysis of Core-Level Scale-Out Efficiency for OpenMP Programs on Multi-core Processors |
|
|
322 | (5) |
|
|
|
|
SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services |
|
|
327 | (11) |
|
|
|
|
|
Analysis and Study of Incremental K-Means Clustering Algorithm |
|
|
338 | (4) |
|
|
|
Computational Model for Prokaryotic and Eukaryotic Gene Prediction |
|
|
342 | (7) |
|
|
|
|
Detection of Malicious Node in Ad Hoc Networks Using Statistical Technique Based on CPU Utilization |
|
|
349 | (8) |
|
|
|
|
|
Optimum Controller for Automatic Generation Control |
|
|
357 | (7) |
|
|
|
|
Abstraction of Design Information From Procedural Program |
|
|
364 | (9) |
|
|
|
|
Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent Interface |
|
|
373 | (12) |
|
|
|
|
Autonomous Robot Motion Control Using Fuzzy PID Controller |
|
|
385 | (6) |
|
|
A Multiresolution Technique to Despeckle Ultrasound Images |
|
|
391 | (6) |
|
|
|
Theme-3 Information Management and Network Security |
|
|
|
Design and Analysis of the Gateway Discovery Approaches in MANET |
|
|
397 | (9) |
|
|
|
|
Wireless Sensor Network Security Research and Challenges: A Backdrop |
|
|
406 | (11) |
|
|
|
|
Automated Test Case Generation for Object Oriented Systems Using UML Object Diagrams |
|
|
417 | (7) |
|
|
|
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO) |
|
|
424 | (6) |
|
|
|
|
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments |
|
|
430 | (5) |
|
|
|
|
Analysis of Digital Forensic Tools and Investigation Process |
|
|
435 | (7) |
|
|
|
|
Evaluation of Normalized Routing Load for MANET |
|
|
442 | (7) |
|
|
|
Reliabilty and Performance Based Resource Selection in Grid Environment |
|
|
449 | (6) |
|
|
|
Elliptic Curve Cryptography: Current Status and Research Challenges |
|
|
455 | (6) |
|
|
|
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor Networks |
|
|
461 | (9) |
|
|
|
|
Study and Analysis of Incremental Apriori Algorithm |
|
|
470 | (3) |
|
|
|
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony System |
|
|
473 | (12) |
|
|
|
Implementing Key Management for Security in Ad Hoc Network |
|
|
485 | (5) |
|
|
|
|
|
|
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLAN |
|
|
490 | (7) |
|
|
|
|
Key Authentication for MANET Security |
|
|
497 | (8) |
|
|
|
|
Biometric Encryption: Combining Fingerprints and Cryptography |
|
|
505 | (10) |
|
|
|
Node Architectures and Its Deployment in Wireless Sensor Networks: A Survey |
|
|
515 | (12) |
|
|
|
|
New Innovations in Cryptography and Its Applications |
|
|
527 | (12) |
|
|
|
Competitive Equilibrium Theory and Its Applications in Computer Science |
|
|
539 | (9) |
|
|
|
|
A Novel Approach for Information Dissemination in Vehicular Networks |
|
|
548 | (9) |
|
|
|
Understanding the Generation of Cellular Technologies |
|
|
557 | (11) |
|
|
|
|
|
Evaluation of Routing Schemes for MANET |
|
|
568 | (6) |
|
|
|
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc Networks |
|
|
574 | (6) |
|
|
|
|
Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor Networks |
|
|
580 | (8) |
|
|
|
Simulative Analysis of Bidirectional WDM/TDM-PON Using NRZ and RZ Downstream Signals and Narrowband AWG |
|
|
588 | (6) |
|
|
|
|
|
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks |
|
|
594 | (9) |
|
|
|
|
An Image Steganography Approach Based upon Matching |
|
|
603 | (6) |
|
|
|
From Calculus to Number Theory Paves Way to Break OSS Scheme |
|
|
609 | (3) |
|
|
|
Digital Image Watermarking Technique Based on Dense Descriptor |
|
|
612 | (5) |
|
|
|
Novel Face Detection Using Gabor Filter Bank with Variable Threshold |
|
|
617 | (9) |
|
|
|
|
|
626 | (5) |
|
|
|
|
|
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs) |
|
|
631 | (9) |
|
|
|
|
|
Agile Software: Ensuring Quality Assurance and Processes |
|
|
640 | (9) |
|
|
|
Measure Complexity in Heterogeneous System |
|
|
649 | (8) |
|
Author Index |
|
657 | |