|
|
|
Interestingness Analysis of Semantic Association Mining in Medical Images |
|
|
1 | (10) |
|
|
|
On Improving the Generalization of SVM Classifier |
|
|
11 | (10) |
|
|
|
|
A Practical Rough Sets Analysis in Real-World Examination Timetabling Problem Instances |
|
|
21 | (10) |
|
|
|
|
Mining Association Rules Using Non-Negative Matrix Factorization and Formal Concept Analysis |
|
|
31 | (9) |
|
|
Study of Diversity and Similarity of Large Chemical Databases Using Tanimoto Measure |
|
|
40 | (11) |
|
|
|
|
|
|
Byte Level n-Gram Analysis for Malware Detection |
|
|
51 | (9) |
|
|
|
Integrating ILM, E-Discovery and DPA 1998 for Effective Information Processing |
|
|
60 | (9) |
|
|
|
|
|
|
|
A Novel Ensemble Method for Time Series Classification |
|
|
69 | (6) |
|
|
|
|
Apriori-Based Research Community Discovery from Bibliographic Database |
|
|
75 | (6) |
|
|
|
An Improved l-Diversity Anonymisation Algorithm |
|
|
81 | (6) |
|
|
|
|
Comparison of Performance for Intrusion Detection System Using Different Rules of Classification |
|
|
87 | (6) |
|
|
|
|
|
SR-Match: A Novel Schema Matcher Based on Semantic Relationship |
|
|
93 | (10) |
|
|
|
|
Detection and Prevention of SQL Injection Attacks Using Semantic Equivalence |
|
|
103 | (10) |
|
|
|
|
PCF-Engine: A Fact Based Search Engine |
|
|
113 | (10) |
|
|
|
|
|
|
|
|
Online Identification of Illegitimate Web Server Requests |
|
|
123 | (9) |
|
|
|
Dynamic Generation of Semantic Documents for Web Resources |
|
|
132 | (9) |
|
|
|
Information Propagation on Novel Social Network Model |
|
|
141 | (8) |
|
|
Deontic Based Ontology Matching for Conflict Resolution between Text Documents |
|
|
149 | (6) |
|
|
|
|
|
Improving the Precision and Recall of Web People Search Using Hash Table Clustering |
|
|
155 | (6) |
|
|
|
|
|
|
|
|
Section III Artificial Intelligence |
|
|
|
Video Shot Cut Detection Using Least Square Approximation Method |
|
|
161 | (10) |
|
|
|
Braille Character Recognition Using Generalized Feature Vector Approach |
|
|
171 | (10) |
|
|
|
Kernel Discriminative Embedding Techmique with Entropy Component Analysis for Accurate Face Image Classification |
|
|
181 | (9) |
|
|
|
Convolutional Neural Network Based Segmentation |
|
|
190 | (8) |
|
|
|
An Efficient Preprocessing Methodology for Discovering Patterns and Clustering of Web Users Using a Dynamic ARTl Neural Network |
|
|
198 | (7) |
|
|
|
Moving Object Segmentation Using Fuzzy C-Means Clustering Affine Parameters |
|
|
205 | (6) |
|
|
|
|
Age Estimation Using Gender Information |
|
|
211 | (6) |
|
|
|
|
Section IV Soft Computing |
|
|
|
Robustness of Serial and Parallel Biometric Fusion against Spoof Attacks |
|
|
217 | (9) |
|
|
|
Robust Two-Way Locking Protocol for Key Exchange |
|
|
226 | (7) |
|
|
|
|
Spam Control by Source Throttling Using Integer Factorization |
|
|
233 | (7) |
|
|
|
|
Symmetric Encryption Using Sierpinski Fractal Geometry |
|
|
240 | (6) |
|
|
|
Recent Advances and Future Potential of Computer Aided Diagnosis of Liver Cancer on Computed Tomography Images |
|
|
246 | (6) |
|
|
|
Computational Methods to Locate and Reconstruct Genes for Complexity Reduction in Comparative Genomics |
|
|
252 | (6) |
|
|
|
|
|
|
|
|
|
Section V Software Engineering |
|
|
|
Identifying an Appropriate Requirements Prioritization Methodology Using Fuzzy Decision-Making |
|
|
258 | (11) |
|
|
|
Analyzing Design Patterns for Extensibility |
|
|
269 | (10) |
|
|
|
|
|
Quality Determinants in Offshored IS Projects: A Comparison between Projects Completed Within-Budget and Over-Budget |
|
|
279 | (8) |
|
|
|
|
A Framework for Security Design Engineering Process |
|
|
287 | (7) |
|
|
|
|
Software Piracy Prevention through SMS Gateway |
|
|
294 | (7) |
|
|
|
|
|
|
|
Section VI Computer Communication Networks |
|
|
|
Estimating Strength of a DDoS Attack in Real Time Using ANN Based Scheme |
|
|
301 | (10) |
|
|
|
|
|
Performance Analysis of Multicarrier Code Division Multiple Access Transmission Techniques |
|
|
311 | (9) |
|
|
|
Optical Chaos Synchronization and Spatio-temporal Digital Cryptography |
|
|
320 | (9) |
|
|
|
Statistical Analysis of Network Traffic over LAN through IAMT |
|
|
329 | (7) |
|
|
|
|
|
PT: A Path Tracing and Filtering Mechanism to Defend against DDoS Attacks |
|
|
336 | (6) |
|
|
|
Application of GA in Key Generation for Image Transposition Cipher Algorithm |
|
|
342 | (7) |
|
|
|
A Novel Reversible Data Embedding Method for Source Authentication and Tamper Detection of H.264/AVC Video |
|
|
349 | (7) |
|
|
|
Section VII Wireless Networks |
|
|
|
Ant-CAMP: Ant Based Congestion Adaptive Multi-Path Routing Protocol for Wireless Networks |
|
|
356 | (11) |
|
|
|
|
Man-in-the-Middle Attack and Its Countermeasure in Bluetooth Secure Simple Pairing |
|
|
367 | (10) |
|
|
|
|
On Downlink Inter Cell Interference Modeling in Cellular OFDMA Networks |
|
|
377 | (12) |
|
|
AMul: Adaptive Multicast Routing Protocol for Multi-hop Wireless Networks |
|
|
389 | (7) |
|
|
|
|
Performance Evaluation of Multipath Source Routing Protocols in MANET |
|
|
396 | (7) |
|
|
|
|
Steiner Tree-Based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks |
|
|
403 | (7) |
|
|
|
MFTR: Multipath Fault Tolerant Routing in Wireless Sensor Networks |
|
|
410 | (6) |
|
|
|
|
Authentication in Wireless Sensor Networks Using Zero Knowledge Protocol |
|
|
416 | (6) |
|
|
|
|
Energy Efficient Load Sharing Mechanism for Multipath Routing Protocol in Wireless Sensor Networks |
|
|
422 | (6) |
|
|
|
|
Section VIII Distributed Systems and Storage Networks |
|
|
|
Global Distributed Indexing for In-Network Storage in Sensor Networks |
|
|
428 | (10) |
|
|
|
|
An Efficient Approach for Storage Migration of Virtual Machines Using Bitmap |
|
|
438 | (10) |
|
|
|
Cloud Computing Privacy Issues and User-Centric Solution |
|
|
448 | (9) |
|
|
|
Kerberos Style Authentication and Authorization through CTES Model for Distributed Systems |
|
|
457 | (6) |
|
|
Dharmender Singh Kushwaha |
|
|
Self Monitoring Analysis and Reporting Technology (SMART) Copyback |
|
|
463 | (7) |
|
|
|
Hierarchical DHT to Efficiently Load Balancing in Dynamic Peer-to-Peer Environment |
|
|
470 | (6) |
|
|
|
Remote Scan Using Secure Automated Client Server Model |
|
|
476 | (6) |
|
|
|
Section IX Signal Processing |
|
|
|
A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images |
|
|
482 | (10) |
|
|
|
|
|
New Curvelet Features for Image Indexing and Retrieval |
|
|
492 | (10) |
|
|
|
Expert System Design Based on Wavelet Transform and Linear Feature Selection |
|
|
502 | (9) |
|
|
|
|
Binarization of the Noisy Document Images: A New Approach |
|
|
511 | (10) |
|
|
|
|
|
|
|
Laser Communication Using High Speed Digital Design |
|
|
521 | (6) |
|
|
|
Stability of Electromagnetic Waves in Solid Chiral Materials |
|
|
527 | (6) |
|
|
|
|
Fusion of Cryptographic Watermarking Medical Image System with Reversible Property |
|
|
533 | (8) |
|
|
|
A Comparative Analysis of Multilevel Daubechie Wavelet Based Image Fusion |
|
|
541 | (7) |
|
|
|
|
Automatic Detection of Texture Defects Using Texture-Periodicity and Gabor Wavelets |
|
|
548 | (6) |
|
|
|
|
Facial Emotion Recognition in Curvelet Domain |
|
|
554 | (6) |
|
|
|
Automatic Identification of Instrument Type in Music Signal Using Wavelet and MFCC |
|
|
560 | (6) |
|
|
|
|
|
Design of Fuzzy Logic Based PID Controller for an Unstable System |
|
|
566 | (6) |
|
|
|
|
Section X Image Processing and Pattern Recognition |
|
|
|
Analysis of Spatio-temporal Relationship of Multiple Energy Spectra of EEG Data for Emotion Recognition |
|
|
572 | (10) |
|
|
|
A Study of the Performance of Motion Estimation in Vector Based Color Image Super-Resolution Analysis for Pure Translational Motion |
|
|
582 | (10) |
|
|
|
|
An Innovative Technique for Adaptive Video Summarization |
|
|
592 | (9) |
|
|
|
|
Emotion Recognition from Decision Level Fusion of Visual and Acoustic Features Using Hausdorff Classifier |
|
|
601 | (10) |
|
|
|
|
Efficient Feature Extraction Techniques for Palmprint |
|
|
611 | (10) |
|
|
|
Studying the Elemental Resistivity Profile of Electrical Impedance Tomography (EIT) Images to Assess the Reconstructed Image Quality |
|
|
621 | (10) |
|
|
|
Stereo Correspondence Using Census Based Dynamic Programming and Segmentation |
|
|
631 | (8) |
|
|
|
Unsupervised Color Image Segmentation by Clustering into Multivariate Gaussians |
|
|
639 | (7) |
|
|
|
A Novel Approach to Writer Identification in Malayalam Using Graphemes |
|
|
646 | (6) |
|
|
|
A Linear Manifold Representation for Color Correction in Digital Images |
|
|
652 | (7) |
|
|
|
|
Combining a Content Filtering Heuristic and Sentiment Analysis for Movie Recommendations |
|
|
659 | (6) |
|
|
|
|
Real Time Image Representation for Weather Forecast over Launch Pad |
|
|
665 | (6) |
|
|
|
|
Development of Edge Detection Technique for Images Using Adaptive Thresholding |
|
|
671 | (6) |
|
|
|
Speeded-Up Robust Features Based Moving Object Detection on Shaky Video |
|
|
677 | (6) |
|
|
Author Index |
|
683 | |