A Compact Triple, and Quadruple Band Antenna for Bluetooth/VViMAX/VVLAN/X-Band Applications |
|
1 | (10) |
|
|
|
DDA: An Approach to Handle DDoS (Ping Flood) Attack |
|
11 | (14) |
|
|
|
Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform |
|
25 | (10) |
|
|
|
|
Apache Hadoop Yarn MapReduce Job Classification Based on CPU Utilization, and Performance Evaluation on Multi-cluster Heterogeneous Environment |
|
35 | (10) |
|
|
Faster Load Flow Analysis |
|
45 | (10) |
|
|
|
Fuzzy Link Based Analysis for Mining Informational Systems |
|
55 | (8) |
|
|
Teaching-Learning-Based Optimization (TLBO) Approach to Truss Structure Subjected to Static, and Dynamic Constraints |
|
63 | (10) |
|
|
Enforcing Indexing Techniques in Berkeley DB Using Implementation of Hilbert Tree Algorithm |
|
73 | (8) |
|
|
|
An Improvement in Performance of Optical Communication System Using Linearly Chirped Apodized Fiber Bragg Grating |
|
81 | (8) |
|
|
Enhancement of Minimum Spanning Tree |
|
89 | (8) |
|
|
Feasibility Study of Proposed Architecture for Automatic Assessment of Use-Case Diagram |
|
97 | (8) |
|
|
|
Extraction of Web Content Based on Content Type |
|
105 | (10) |
|
|
|
|
User Based Collaborative Filtering Using Bloom Filter with MapReduce |
|
115 | (10) |
|
|
ICT-Based Facilities Management Tools for Buildings |
|
125 | (10) |
|
|
Study the Effect of Packet Drop Attack in AODV Routing, and MANET, and Detection of Such Node in MANET |
|
135 | (8) |
|
|
UDP Flooding Attack Detection Using Information Metric Measure |
|
143 | (12) |
|
|
|
|
Generalized MCDM-Based Decision Support System for Personnel Prioritization |
|
155 | (14) |
|
|
A Proactive Dynamic Rate Control Scheme for AIMD-Based Reactive TCP Variants |
|
169 | (8) |
|
Investigating Varying Time Black Hole Attack on QoS over MANET |
|
177 | (8) |
|
|
|
Hybrid Approach to Reduce Time Complexity of String Matching Algorithm Using Hashing with Chaining |
|
185 | (10) |
|
|
|
INDTime: Temporal Tagger—First Step Toward Temporal Information Retrieval |
|
195 | (10) |
|
|
A Secure Text Communication Scheme Based on Combination of Compression, Cryptography,, and Steganography |
|
205 | (10) |
|
|
|
A Comparative Analysis of Feature Selection Methods, and Associated Machine Learning Algorithms on Wisconsin Breast Cancer Dataset (WBCD) |
|
215 | (10) |
|
|
ACE (Advanced Compression Encryption) Scheme for Image Authentication |
|
225 | (8) |
|
|
An Efficient, and Interactive Approach for Association Rules Generation by Integrating Ontology, and Filtering Technique |
|
233 | (10) |
|
|
Detection of Wormhole Attack in Wireless Sensor Networks |
|
243 | (8) |
|
|
Comparative Analysis of MCML Compressor with, and Without Concept of Sleep Transistor |
|
251 | (10) |
|
|
|
|
Design, and Analysis of Ultracompact Four-Band Wavelength Demultiplexer Based on 2D Photonic Crystal |
|
261 | (8) |
|
|
|
Designing, and Optimization of Nano-ring Resonator-Based Photonic Pressure Sensor |
|
269 | (10) |
|
|
|
Classifying Nodes in Social Media Space |
|
279 | (10) |
|
|
A Novel Hexagonal Shape-Based Band-Stop Frequency-Selective Surface with Multiband Applications |
|
289 | (10) |
|
|
AXSM: An Automated Tool for XML Schema Matching |
|
299 | (10) |
|
|
Development of Web Map Service for OpenStreetMaps (OSM) Data |
|
309 | (10) |
|
|
Improved Indoor Positioning Using RSS, and Directional Antenna Integrating with RFID, and Wireless Technology |
|
319 | (10) |
|
|
Secured Cloud Data Storage—Prototype Trust Model for Public Cloud Storage |
|
329 | (10) |
|
|
A Semicircular Monopole Antenna for Ultra-wideband Applications |
|
339 | (8) |
|
|
|
|
Security Analyses of Different LFSR-Based Ciphers to Propose a Novel Approach Compatible with Parallel Computing Platform, Providing Resistance Against Various LFSR-Based Attacks |
|
347 | (14) |
|
|
Microstrip Patch Antenna for IEEE 802.11a WLAN (5.25 GHz) Application |
|
361 | (8) |
|
|
|
Support Vector Machine-Based Model for Host Overload Detection in Clouds |
|
369 | (8) |
|
|
A Hybrid Face Recognition Scheme Using Contour, and Gabor Wavelet |
|
377 | (10) |
|
|
|
Data Dissemination Techniques, and Publish/Subscribe Architecture in Vehicular Ad Hoc Networks |
|
387 | (10) |
|
|
Data Acquisition with FPGA Using Xilinx, and LabVIEW |
|
397 | (10) |
|
|
|
|
SRR, and R-CSRR Loaded Reconfigurable Antenna with Multiband Notch Characteristics |
|
407 | (10) |
|
|
|
Wireless Resonant Power Transmission |
|
417 | (10) |
|
|
Fuzzy Clustering-Based Efficient Classification Model for Large TCP Dump Dataset Using Hadoop Framework |
|
427 | (12) |
|
|
|
|
System-Related Characteristic-Based Leader Election Protocol for Cognitive Radio Networks |
|
439 | (8) |
|
Passive Image Manipulation Detection Using Wavelet Transform, and Support Vector Machine Classifier |
|
447 | (10) |
|
|
Intrusion Detection System with Snort in Cloud Computing: Advanced IDS |
|
457 | (10) |
|
|
|
Rural E-Health Care Model |
|
467 | (8) |
|
An Implementation Model for Privacy Aware Access Control in Web Services Environment |
|
475 | (10) |
|
|
Comprehensive Review on Eye Close, and Eye Open Activities Using EEG in Brain—Computer Interface |
|
485 | (8) |
|
|
|
Design of High Data Rate, and Multipath Efficient Underwater Acoustic Communication System Using OFDM—DQPSK |
|
493 | (10) |
|
|
A Hybrid Approach for Big Data Analysis of Cricket Fan Sentiments in Twitter |
|
503 | (10) |
|
|
|
|
|
|
Performance Analysis of Medical Image Compression Techniques |
|
513 | (10) |
|
|
Integrated Framework Using Frequent Pattern for Clustering Numeric, and Nominal Data Sets |
|
523 | (8) |
|
|
|
|
Image Encryption by Using Block-Based Symmetric Transformation Algorithm (International Data Encryption Algorithm) |
|
531 | (10) |
|
|
|
Content-Based Watermarking Using MCA |
|
541 | (12) |
|
|
Image Enhancement Based on Log-Gabor Filter for Noisy Fingerprint Image |
|
553 | (8) |
|
|
Computational Performance Analysis of Ant Colony Optimization Algorithms for Travelling Sales Person Problem |
|
561 | (10) |
|
|
Evaluating Performance of Reactive, and Hybrid Routing Protocol in Mobile Ad Hoc Network |
|
571 | (10) |
|
|
Sentiment-Based Data Mining Approach for Classification, and Analysis |
|
581 | (16) |
|
|
Of line Handwritten Sanskrit Simple, and Compound Character Recognition Using Neural Network |
|
597 | (10) |
|
|
Need of ICT for Sustainable Development of Power Sector |
|
607 | (8) |
|
|
|
|
Development of Optical Impairment Minimization Technique for Radio Over Fiber Link |
|
615 | (10) |
|
|
Mobile Waste Management for Smart Cities: Monitoring Sanitation Through Living Labs |
|
625 | (10) |
|
|
|
|
|
|
Optimized Implementation of Location-Aware, and Network-Based Services for Power-Efficient Android Applications |
|
635 | (12) |
|
|
|
Power Consumption, and Congestion Control of Rendezvous Node for Wireless Biosensor Network |
|
647 | (10) |
|
|
|
Comparison of Different Similarity Functions on Hindi QA System |
|
657 | (8) |
|
|
|
Preventing Faults: Fault Monitoring, and Proactive Fault Tolerance in Cloud Computing |
|
665 | (10) |
|
|
Evolving the Reliability for Cloud System Using Priority Metric |
|
675 | (10) |
|
|
|
Multilevel Priority-Based Task Scheduling Algorithm for Workflows in Cloud Computing Environment |
|
685 | (10) |
|
|
Efficient DNA-Based Cryptographic Mechanism to Defend, and Detect Blackhole Attack in MANETs |
|
695 | (12) |
|
|
|
Sentiment Classification of Context Dependent Words |
|
707 | (10) |
|
|
Opinion Mining Classification Based on Extension of Opinion Mining Phrases |
|
717 | (8) |
|
|
|
Facial Expression Recognition Using Variants of LBP, and Classifier Fusion |
|
725 | (8) |
|
|
|
FLSU-Based Energy Efficient Protocol Design for WSN with Mobile Sink |
|
733 | (12) |
|
|
Goal-Based Constraint Driven Dynamic RESTful Web Service Composition Using AI Techniques |
|
745 | (10) |
|
|
|
Author Index |
|
755 | |