|
SVD and Neural Network Based Watermarking Scheme |
|
|
1 | (5) |
|
|
|
|
|
Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms |
|
|
6 | (6) |
|
|
|
Network Management Initialization for Wired and Wireless Communication: A Real Time Study |
|
|
12 | (5) |
|
|
|
|
|
IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network |
|
|
17 | (5) |
|
|
|
An Efficient Multicast Hybrid Routing Protocol for MANETs |
|
|
22 | (6) |
|
|
|
Applications of Graph Theory in Face Biometrics |
|
|
28 | (6) |
|
|
|
|
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map |
|
|
34 | (5) |
|
|
|
Hybrid Activities of AODV for Wireless Ad hoc Sensor Network |
|
|
39 | (6) |
|
|
|
|
|
|
Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm |
|
|
45 | (8) |
|
|
|
Object Location in Cluster Based Mobile Ad Hoc Networks |
|
|
53 | (7) |
|
|
|
|
Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications |
|
|
60 | (5) |
|
|
|
Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks |
|
|
65 | (6) |
|
|
|
|
|
|
A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects |
|
|
71 | (5) |
|
|
|
|
|
|
Wavelet-Domain L∞-Constrained Two-Stage Near-Lossless EEG Coder |
|
|
76 | (5) |
|
|
|
Fuzzy Based Bandwidth Management for Wireless Multimedia Networks |
|
|
81 | (10) |
|
|
|
|
|
A Novel Digital Algorithm for Sobel Edge Detection |
|
|
91 | (5) |
|
|
|
Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison |
|
|
96 | (6) |
|
|
|
|
Recognition of Isolated Indian Sign Language Gesture in Real Time |
|
|
102 | (6) |
|
|
|
|
|
|
Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors |
|
|
108 | (6) |
|
|
|
|
|
|
Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor |
|
|
114 | (6) |
|
|
|
|
Ravishankar Parthasarathy |
|
|
|
Role of Resolution in Noisy Pattern Matching |
|
|
120 | (5) |
|
|
|
Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security |
|
|
125 | (5) |
|
|
|
Bandwidth Estimation Scheme for Mobile Adhoc Network |
|
|
130 | (6) |
|
|
|
|
Multimodal Biometric Invariant Moment Fusion Authentication System |
|
|
136 | (8) |
|
|
|
|
Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography |
|
|
144 | (8) |
|
|
|
|
Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images |
|
|
152 | (5) |
|
|
|
|
Vector Quantization for Tumor Demarcation of Mammograms |
|
|
157 | (7) |
|
|
|
|
Selective Encryption of Video Using Multiple Chaotic Maps |
|
|
164 | (5) |
|
|
|
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks |
|
|
169 | (6) |
|
|
|
Tracking Based Secure AODV Routing Protocol |
|
|
175 | (6) |
|
|
|
|
Study of Visitor Behavior by Web Usage Mining |
|
|
181 | (7) |
|
|
|
|
A Hybrid Routing Protocol for Wireless Sensor Network |
|
|
188 | (6) |
|
|
|
|
Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring |
|
|
194 | (8) |
|
|
|
|
Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks |
|
|
202 | (7) |
|
|
|
|
A Novel Multipath Routing Scheme in Mobile Adhoc Networks |
|
|
209 | (8) |
|
|
|
|
A Novel Security Approach for Detecting Black Hole Attack in MANET |
|
|
217 | (7) |
|
|
|
|
NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database |
|
|
224 | (9) |
|
|
|
A Secure e-Shopping Using Voice Ordering |
|
|
233 | (5) |
|
|
|
|
Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model |
|
|
238 | (7) |
|
|
|
A Concurrent Synchronization Model for Distributed Multimedia Systems |
|
|
245 | (5) |
|
|
|
Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS |
|
|
250 | (8) |
|
|
|
A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System |
|
|
258 | (5) |
|
|
|
|
An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine |
|
|
263 | (6) |
|
|
|
Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata |
|
|
269 | (7) |
|
|
|
Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 80.11s Wireless Mesh Network |
|
|
276 | (5) |
|
|
|
|
Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks |
|
|
281 | (9) |
|
|
|
A Cryptographic Approach to Defend against IP Spoofing |
|
|
290 | (7) |
|
|
|
|
|
Multi-agent Based Network Performance Tuning in Grid |
|
|
297 | (8) |
|
|
|
|
|
|
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs |
|
|
305 | (5) |
|
|
|
|
|
Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information |
|
|
310 | (10) |
|
Manoj V. N. Vadakkepalisseri |
|
|
|
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures |
|
|
320 | (5) |
|
|
|
Iris Recognition Technique Using Gaussian Pyramid Compression |
|
|
325 | (7) |
|
|
|
Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN |
|
|
332 | (5) |
|
|
|
|
Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks |
|
|
337 | (5) |
|
|
|
An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid |
|
|
342 | (7) |
|
|
|
|
|
Reactive Network Monitor for DDoS Attacks |
|
|
349 | (7) |
|
|
|
|
|
|
Statistical Method for English to Kannada Transliteration |
|
|
356 | (7) |
|
|
|
|
RIFMAS: River Flow Management System Using Wireless Sensing Agents |
|
|
363 | (6) |
|
|
|
|
Finite Element Approach to Radial Heat Flow in Human Dermal Tissues |
|
|
369 | (7) |
|
|
An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas |
|
|
376 | (6) |
|
|
|
|
|
|
Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA |
|
|
382 | (3) |
|
|
|
|
|
Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback |
|
|
385 | (3) |
|
|
|
Challenges in Segmentation of Text in Handwritten Gurmukhi Script |
|
|
388 | (5) |
|
|
|
Exploring the Contrasts of VoIP Phone Services |
|
|
393 | (3) |
|
Bala Dhandayuthapani Veerasamy |
|
|
Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET'S |
|
|
396 | (5) |
|
|
|
Impact Factor of E - Learning: Using Secondary Education Case Study |
|
|
401 | (4) |
|
|
|
Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology |
|
|
405 | (6) |
|
|
|
|
|
A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System |
|
|
411 | (6) |
|
|
|
Binary Data Compression Using Medial Axis Transform Algorithm |
|
|
417 | (3) |
|
|
|
Internet Usage Monitoring for Crime Detection |
|
|
420 | (4) |
|
|
|
Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition |
|
|
424 | (6) |
|
|
|
Defending against Node Misbehavior to Discover Secure Route in OLSR |
|
|
430 | (7) |
|
|
|
SIMBIC: Similarity Based Biclustering of Expression Data |
|
|
437 | (5) |
|
|
|
An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System |
|
|
442 | (4) |
|
|
|
Automatic Incorporation of Corrections into Reviewed Documents |
|
|
446 | (6) |
|
|
|
|
Performance Comparison of Multicast Routing Protocols for MANETs |
|
|
452 | (3) |
|
|
|
Traffic Aware LSP Selection Method in MPLS Networks |
|
|
455 | (3) |
|
|
|
|
Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks |
|
|
458 | (3) |
|
|
|
Energy and Fault Aware Management Framework for Wireless Sensor Network |
|
|
461 | (4) |
|
|
|
|
An Image Index Model for Retrieval |
|
|
465 | (3) |
|
|
|
|
Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet |
|
|
468 | (7) |
|
|
|
|
|
Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns |
|
|
475 | (7) |
|
|
|
|
|
Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks |
|
|
482 | (3) |
|
|
|
|
|
|
Separation of Machine Printed Roman and Gurmukhi Script Words |
|
|
485 | (6) |
|
|
FPGA Implementation of AES Co-processor in Counter Mode |
|
|
491 | (6) |
|
|
|
|
Detecting Plagiarism in Text Documents |
|
|
497 | (4) |
|
Shanmugasundaram Hariharan |
|
|
|
Abdul Vadud Mohamed Faisal |
|
|
Sheik Mohamed Azharudheen |
|
|
|
Hiding Relevant Information in an Image |
|
|
501 | (4) |
|
|
|
Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques |
|
|
505 | (3) |
|
|
|
|
Context-Aware System Using .NET Approach |
|
|
508 | (6) |
|
|
|
|
|
Genetic Audio Watermarking |
|
|
514 | (4) |
|
|
|
|
|
|
Hossein Rouhani Zeidanloo |
|
|
Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure |
|
|
518 | (3) |
|
|
|
|
Natural Disaster Impact Assessment Using Genetic Algorithm |
|
|
521 | (6) |
|
|
|
An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition |
|
|
527 | (4) |
|
|
|
A Framework for Priority-Based Inter Vehicle Communication for Highway Safety |
|
|
531 | (4) |
|
|
|
|
Data Compression on Embedded System |
|
|
535 | (3) |
|
|
|
|
A Survey on Preserving Privacy for Sensitive Association Rules in Databases |
|
|
538 | (7) |
|
|
|
|
Boon and Bane of Curvelet Transform |
|
|
545 | (7) |
|
|
|
|
|
|
|
Security in High Performance Computing |
|
|
552 | (5) |
|
|
|
Trust Worthy Architecture for Mobile Ad Hoc Network Environment |
|
|
557 | (4) |
|
|
|
|
A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks |
|
|
561 | (4) |
|
|
|
|
Security Solutions to the Phishing: Transactions Based on Security Questions and Image |
|
|
565 | (3) |
|
|
|
|
CloneManager: A Tool for Detection of Typel and Type2 Code Clones |
|
|
568 | (3) |
|
|
|
|
|
|
Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification |
|
|
571 | (6) |
|
|
|
An Analysis to BER Performances of Differential OFDM Systems |
|
|
577 | (5) |
|
|
MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions |
|
|
582 | (4) |
|
|
|
Team Automata Based Framework for Spatio-Temporal RBAC Model |
|
|
586 | (6) |
|
|
|
|
Knowledge Discovery in Feedback System Using Pixel Oriented Technique |
|
|
592 | (3) |
|
|
|
|
Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level |
|
|
595 | (3) |
|
|
|
|
Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks |
|
|
598 | (3) |
|
|
|
Design Issues for Replacing Credit Card on Mobile Phone |
|
|
601 | (4) |
|
|
|
|
Unknown Key Share Attack on STPKE' Protocol |
|
|
605 | (4) |
|
|
|
An Effective SOA Model for Developing Efficient Systems |
|
|
609 | (4) |
|
|
|
Refactoring Interprocedural Dynamic Slicing for Handling Pointers |
|
|
613 | (4) |
|
|
|
|
Image Segmentaion and Steganography for Secured Information Transmission |
|
|
617 | (4) |
|
|
|
Ant System Embedded with Local Search for Solving Facility Layout Problem |
|
|
621 | (8) |
|
|
Strategic Initiatives and Automated Decision Support with ERP System Environment |
|
|
629 | (7) |
|
|
|
|
A Case Study of Strategic Design Management |
|
|
636 | (5) |
|
|
The Effects of Mannequins on Consumers' Perception and Shopping Attitude |
|
|
641 | (7) |
|
|
|
Knowledge Transfer: Do Instructor Characteristics Matter? |
|
|
648 | (8) |
|
|
|
Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem |
|
|
656 | (4) |
|
|
|
CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment |
|
|
660 | (5) |
|
|
|
HR Roadmap: Becoming a Strategic Business Partner |
|
|
665 | (5) |
|
|
Recent Trends in Indian Technical and Management Education W. R. T. Maharashtra |
|
|
670 | (5) |
|
|
|
|
|
675 | |