Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion |
|
1 | (10) |
|
|
|
|
Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm |
|
11 | (10) |
|
|
|
|
A Rotation Based Encryption Technique Using Symmetric Key Method |
|
21 | (8) |
|
|
|
|
An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing |
|
29 | (12) |
|
|
|
Noval Asynchronous Addition Architectures for Portable Applications |
|
41 | (12) |
|
|
Reliability Analysis of Exponential Models Based on Skewness and Kurtosis |
|
53 | (8) |
|
|
Missing Value Imputation with Unsupervised Kohonen Self Organizing Map |
|
61 | (16) |
|
|
|
|
An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy |
|
77 | (10) |
|
|
|
|
Energy and Current Consumption Analysis for Classic Bluetooth and Bluetooth Low Energy (BLE) |
|
87 | (10) |
|
|
|
Design and Evaluation of BER for Ultra-Wide-Band System for Different Modulation Schemes |
|
97 | (12) |
|
|
Image Denoising Using Multiresolution Analysis with Local Pixel Grouping and Principal Component Analysis |
|
109 | (10) |
|
|
|
Path Planning and Controlling of Autonomous Robot |
|
119 | (8) |
|
|
A New Approach of Compression of Large Community Graph Using Graph Mining Techniques |
|
127 | (10) |
|
|
|
Application of Linear Search Algorithm in Control of TRMS |
|
137 | (16) |
|
|
|
Discrete Cosine Transform Features in Automated Classification of Cardiac Arrhythmia Beats |
|
153 | (10) |
|
|
|
|
|
|
|
|
Trust Based Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks |
|
163 | (12) |
|
|
Enhancing Security of Banking Locker System Using Secret Sharing Scheme Based on Random Grids |
|
175 | (8) |
|
|
|
|
Double Auction Mechanism for Spectrum Trading in Combinatorial Domain |
|
183 | (20) |
|
|
|
|
ORPT: Probabilistic Modelling of Optimal Routing in Peak Traffic in Optical Network |
|
203 | (10) |
|
|
Linear Congruential Sequences: Feedback and Recurrent Neural Networks |
|
213 | (10) |
|
|
SABR: Secure Authentication-Based Routing in Large Scale Wireless Sensor Network |
|
223 | (8) |
|
|
Novel Key-Management to Resist Illegitimate Intrusion from Rogue Access Points in WLAN |
|
231 | (8) |
|
|
Performance Investigation of Energy Aware Routing Protocol for Heterogeneous WSNs |
|
239 | (14) |
|
|
|
Use of NoSQL Database for Handling Semi Structured Data: An Empirical Study of News RSS Feeds |
|
253 | (12) |
|
|
|
|
MLO: Multi-level Optimization to Enhance the Network Lifetime in Large Scale WSN |
|
265 | (8) |
|
|
A Technique for Multi-tier Key Distribution for Securing Group Communication in WSN |
|
273 | (8) |
|
|
Real-Time Energy Dissipation Model for Mobile Devices |
|
281 | (8) |
|
|
Network Intrusion Detection in Cloud Computing |
|
289 | (8) |
|
An Optimized & On-Demand Time Synchronization in Large Scale Wireless Sensor Network: OOD-TS |
|
297 | (8) |
|
|
Lossless Compression of Medical Image to Overcome Network Congestion Constraints |
|
305 | (8) |
|
|
Natural Language Compiler for English and Dravidian Languages |
|
313 | (12) |
|
|
|
|
|
An Efficient Session Initiation Protocol for Secure Communication in Vehicular Ad Hoc Networks |
|
325 | (10) |
|
|
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks |
|
335 | (10) |
|
|
CALS: Collaborative Architecture of Learning System for Sentiment Analysis |
|
345 | (10) |
|
Ramesh Laxmanrao Shahabadkar |
|
An Integrated Xbee Arduino and Flower Pollen Algorithm Approach for Localization in Wireless Sensor Networks |
|
355 | (8) |
|
|
|
Spectral Estimation Using Improved Recursive Least Square (RLS) Algorithm: An Investigational Study |
|
363 | (14) |
|
|
RAICB: Robust Authentication Immunity Cloud Bucket for Secure Cloud Storage System |
|
377 | (18) |
|
|
An Intelligent Road Navigator for Visually Impaired Persons Using MSER |
|
395 | (12) |
|
C.V. Sreejith Embranthiri |
|
|
|
Microbenchmark Based Performance Evaluation of GPU Rendering |
|
407 | (10) |
|
|
|
|
High Capacity Wet Pixel Based Steganography with Improved Security |
|
417 | (12) |
|
|
An Approach of DDOS Attack Detection Using Classifiers |
|
429 | (10) |
|
Khundrakpam Johnson Singh |
|
|
Enhancing Privacy Preservation of Stature System Through Homomorphic System |
|
439 | (12) |
|
|
Simple, Secure, Efficient, Lightweight and Token Based Protocol for Mutual Authentication in Wireless Sensor Networks |
|
451 | (12) |
|
|
A Novel Graph-Based Technique to Enhance Video Compression Algorithm |
|
463 | (6) |
|
|
Leakage Reduction by Integrating IVC and ALS Technique in 65 nm CMOS One Bit Adder Circuit |
|
469 | (8) |
|
|
Lifetime Enhancement of Wireless Sensor Networks Using Fermat Point and Data Aggregation Mechanism |
|
477 | (8) |
|
|
Monitoring OpenStack Services Using Nagios |
|
485 | (12) |
|
|
|
|
Centralized Control Signature-Based Firewall and Statistical-Based Network Intrusion Detection System (NIDS) in Software Defined Networks (SDN) |
|
497 | (10) |
|
|
|
Discovering and Summarizing Online Movie Reviews Through Opinion Mining |
|
507 | (12) |
|
|
Topic Sensitive Web Page Ranking Through Graph Database |
|
519 | (10) |
|
|
|
Identifying Inattentive Audience by Finding Approximate Head Orientations in Non-intrusive Monocular Environment |
|
529 | (12) |
|
|
FUZZY: Intelligent Fuzzy Controller-Based Broadcast Protocol for Vehicular Ad Hoc Networks |
|
541 | (10) |
|
|
Discovering Learning Models in MOOCs Using Empirical Data |
|
551 | (18) |
|
|
|
Smart Structure for Automated Rangoli |
|
569 | (10) |
|
|
Author Index |
|
579 | |