Article
ID |
Article Details
|
2 |
Soft-Clustering for Segmenting Touching Characters in Printed Scripts
Keshab Nath and Swarup Roy |
3 |
The Internet of Things: Vision, Architecture & Applications
Prajakta Deshpande, Anuja Damkonde, and Vaibhav Chavan |
6 |
A Hybrid Approach to Address IP Traceback Problem Using Nature Inspired Algorithm
Amrita Saini, Challa Ramakrishna, and Sachin Kumar |
11 |
Note Transcription from Carnatic Music
Suma S.M., Shashidhar G. Koolagudi, Pravin B. Ramteke, and K.S. Rao |
12 |
Image Compression by Transformation of 2D Image Vector in to Linear Vector and Restoration of an Image with Quality Enhancement
Siva Kumar K. and Janaki K. |
13 |
Estimation of Tyre Pressure from the Characteristics of the Wheel: An Image Processing approach
V.B. Vineeth Reddy, Ananda Rao H., A. Yeshwanth, Pravin Bhaskar Ramteke, and Shashidhar G. Koolagudi |
18 |
Encryption and Decryption Algorithm Using Divide and Conquer Strategy
Vaishnavi Ketan Kamat |
24 |
Enhancing Redundant Content Elimination Algorithm Using Processing Power of Multi Core Architecture
Monika Jain and Rahul Saxena |
26 |
An Optimized OpenMP Based Genetic Algorithm Solution to Vehicle Routing Problem
Rahul Saxena and Monika Jain |
27 |
Parallelization of Data Buffering and Processing Mechanism in Mesh Wireless Sensor Network for IOT Applications
Monika Jain, Rahul Saxena, Siddharth Zaidka, and Mayank Kumar Jhamb |
31 |
A Robust and Blind Watermarking for Color Videos Using Redundant Wavelet Domain and SVD
S. Prasanth Vaidya and P.V.S.S.R. Chandra Mouli |
34 |
Objective Assessment of Pitch Accuracy in Equal-Tempered Vocal Music Using Signal Processing Approaches
Roshni Biswas, Y. V. Srinivasa Murthy, Shashidhar G. Koolagudi, and Swaroop G. Vishnu |
36 |
Protein Sequence Classification involving Data Mining Technique: A Review
Suprativ Saha and Tanmay Bhattacharya |
37 |
Detection of Diseases via Blood Analysis Using Image Processing Techniques
Kajal Jewani, Krishna Boddu, Pratik Gurnani, Kalyani Karmarkar, and Kiran Solapure |
39 |
A Model Based Scheduling Approach for Selection of Real Time Scheduling Algorithm on Basis of Different Parameters
Ajitesh Kumar, Mona Kumari, and Sanjay Kumar Gupta |
40 |
Improved Real-Time Scheduling Algorithm for Mixed Task Set with Constraint of Harvesting Energy
Mona Kumari and Ajitesh Kumar |
42 |
A Feed Forward Based Smart Link Management Scheme for Future Generation Network
Satyanarayan Padaganur and J.D. Mallapur |
44 |
Feature Subset Selection Using Agglomerative Clustering
Priyansh Jain and Anuradha Purohit |
45 |
Sentence Based Dialect Identification Using Extreme Gradient Boosting Algorithm
Nagaratna B. Chittaragi and Shashidhar G. Koolagudi |
46 |
Detection of Tropical Cyclones from Satellite Imagery Using Convolutional Neural Network
Swagoto Roy, Mukta Mani, Yajnaseni Dash, S.K. Mishra, and B.K. Panigrahi |
49 |
Survey on Security Issues in Mobile Cloud Computing and its Prevention Measures
Rahul Neware |
53 |
Optimized Object Detection Technique in Video Surveillance System Using Depth Images
Md. Shahzad Alam, Ashwin T.S., and G. Ram Mohana Reddy |
56 |
Modular Rook (MR) : A Modular Data Center Network Architecture Based on Rook's Graph
Nabajyoti Medhi and Riju Das |
57 |
Hybrid Approach for Multimodal Medical Image Fusion
K. Vanitha, D. Satyanarayana, and M.N. Giri Prasad |
58 |
Characterization of Consonant Sounds Using Features Related to Place of Articulation
Pravin Bhaskar Ramteke, Srishti Hegde, and Shashidhar G. Koolagudi |
67 |
e-Learning Web Services and Their Composition Strategy in SOA
Praveen Kumar, Pankaj Keserwani, and Shefalika Ghosh Samaddar |
72 |
Gibbs Sampled Hierarchical Dirichlet Mixture Model Based Approach for Clustering Scientific Articles
G.S. Mahalakshmi, G. Muthuselvi, and S. Sendhilkumar |
80 |
A Robust Lightweight ECC-based Three-way Authentication Scheme for IoT in Cloud
Sayantan Chatterjee and Shefalika Ghosh Samaddar |
81 |
Cache Memory Architectures for Handling Big-Data Applications: A Survey
Purnendu Das |
84 |
Better Quality Classifiers for Social Media Content: Crowdsourcing with Decision Trees
Ian McCulloh, Rachel Cohen, and Richard Takacs |
93 |
An IoT Based Smart Plant Monitoring System
Mitali Solanki, Arati Sapkal, Ananya Gawande, Sayali Chaudhari, and S.V. Athawale |
94 |
Predicting Manufacturing Feasibility using Context Analysis
Vivek Kumar, Dilip Kumar Sharma, and Vinay Kumar |
96 |
Anomaly Based Detection of System Level Threats and Statistical Analysis
Himanshu Mishra and Ram Kumar Karsh |
97 |
A Survey on Various Handoff Methods in Mobile Ad-Hoc Network Environment
Libin Thomas, J. Sandeep, Bhargavi Goswami, and Joy Paulose |
98 |
A Privacy Approach of Data Sharing in Clusters
Anurag Singh, Santosh Kumar Chauhan, and Manish Kumar |
99 |
Cancer Mediating Genes Recognition using Restricted Boltzmann Machine - An Application on Human Leukemia
Sougata Sheet, Anupam Ghosh, Amlan Chakrabarti, and Ranjan Ghosh |
101 |
Experimental Evaluation of Dynamic Typing Mechanism: A Case Study
K. Indra Gandhi and K. Induja |
102 |
Evidence Based Image Registration and its Effect on Image Fusion
Ujwala Patil, Ramesh Ashok Tabib, Rohan Raju Dhanakshirur, and Uma Mudenagudi |
103 |
A New Modified Version of Standard RSA Cryptography Algorithm
Sudhansu Bala Das, Sugyan Kumar Mishra, and Anup Kumar Sahu |
105 |
User Location Based Adaptive Resource Allocation for ICI Mitigation in MIMO-OFDMA
Suneeta V. Budihal, Beena Kumari, and Saroja V. Siddamal |
106 |
A Novel Computationally Bounded Oblivious Transfer with Non-trivial Communication
Radhakrishna Bhat and N.R. Sunitha |
107 |
Improving the Network Lifetime through Energy Balancing in Depth Based Routing Protocol for Underwater Sensor Network
Rakesh Kumar and Manas Kumar Mishra |
110 |
Two Stream Convolutional Neural Networks for Anomaly Detection in Surveillance Videos
Adarsh Jamadandi, Sunidhi Kotturshettar, and Uma Mudenagudi |
111 |
Integrating Digital Forensics and Digital Discovery to Improve E-mail Communication Analysis in Organisations
Mithileysh Sathiyanarayanan and Odunayo Fadahunsi |
112 |
Free Space Optical Communication Channel Modeling with PIN Receiver
Suman Debnath, Bishanka Brata Bhowmik, and Mithun Mukherjee |
114 |
Special Pedestrian Detection and Head Pose Detection for Autonomous Vehicles Using Ensemble Learning
Sachin S. Shetty, Meena S.M., Uday Kulkarni, and Harish Hebballi |
116 |
FCAAC: A Fast Channel Assignment Algorithm for Critical Data Transmission in Wireless Body Area Network
Ambigavathi and D. Sridharan |
119 |
Efficient Document Classification using Phrases Generated by Semi Supervised Hierarchical Latent Dirichlet Allocation
Rohit Agarwal, A.S. Jalal, and Subhash Chandra Agrawal |
120 |
News Driven Web Research
Akoramurthy B., Rubina Begum, Kanimozhi P., and Arthi J. |
131 |
Speaker Verification Systems: A Comprehensive Review
Ujwala Baruah, Rabul Hussain Laskar, and Biswajit Purkayastha |
134 |
Secure and Privacy Preserving Mail Servers using Modified Homomorphic Encryption (MHE) Scheme: A Technique for Privacy Preserving Big Data Search
Lija Mohan and Sudeep Elayidom M. |
136 |
A Fast Method for Segmenting ECG Waveforms
Dipjyoti Bisharad, Debakshi Dey, and Brinda Bhowmick |
139 |
A Novel Load Balancing Algorithm Based On the Capacity of the Virtual Machines
Kshama S.B. and Shobha K.R. |
140 |
Detection and Classification of Road Signs Using HOG-SVM Method
Anant Dubey, Nidhi Shukla, and Divya Kumar |
148 |
OpenFlow Based Multi-Controller Model for Fault-tolerant and Reliable Control Plane
Nabajyoti Medhi and Dilip Kumar Saikia |
150 |
Function Point Based Estimation of Effort and Cost in Agile Software Development
Anupam Yadav and Ashish Sharma |
151 |
A Predictive Model for Heart Disease Diagnosis Using Fuzzy Logic and Decision Tree
Asim Kumar Pathak and J. Arul Valan |
152 |
An Efficient Clustering and Routing Algorithm for Wireless Sensor Networks Using GSO and KGMO Algorithms
Asha G.R. and Gowrishankar |
154 |
Named Entity Recognition using Part-of-Speech Rules for Telugu
Saikiranmai Gorla, Sriharshitha Velivelli, Dipak Kumar Satpathi, N.L. Bhanu Murthy, and Aruna Malapati |
155 |
Real Time Monitoring of Crop in Agriculture Using Wireless Sensor Networks
Kirankumar Bendigeri and Jayashree D. Mallapur |
156 |
Self Calibrating Thermocouple Using Neural Network Algorithm for Improved Sensitivity and Fault Identification
Santhosh K.V. |
159 |
Segmentation of Calcified Plaques in Intravascular Ultrasound Images
Tara Chand Ulli and Deep Gupta |
162 |
Copy-Move Attack Detection from Digital Images: An Image Forensic Approach
Badal Soni, Pradip K. Das, Dalton Meitei Thounaojam, and Debalina Biswas |
163 |
Minutiae Triangulation Based Fingerprint Template
Amit Kumar Trivedi, Dalton Meitei Thounaojam, and Shyamosree Pal |
166 |
A Comparative Study of Reversible Video Watermarking Using Adaptive-Feedback and Non-Feedback based DE Method
Subhajit Das and Arun Kumar Sunaniya |
167 |
Sensor Selection and Data Fusion Approach for IoT Applications
Ishita Chakraborty, Anannya Chakraborty, and Prodipto Das |
170 |
A Wavelet Based Digital Image Watermarking for Broadcast Monitoring using Genetic Algorithm
Sridevi Tumula and Rahul Chandra Nagu |
171 |
SGMM-based modeling classifier for Punjabi Automatic Speech Recognition System
Virender Kadyan and Mandeep Kaur |
172 |
Dr. Hadoop Cures In-memory Data Replication System
Ripon Patgiri, Sabuzima Nayak, Dipayan Dev, and Samir Kumar Borgohain |
175 |
Skin Cancer Detection Using Advanced Imaging Techniques
Shivani Pal and M. Monica Subashini |
176 |
On Ensuring Correctness of Cold Scheduler
Aparna Barik, Nabamita Deb, and Santosh Biswas |
177 |
Detection of White Ear-head of Rice Crop Using Image Processing and Machine Learning Techniques
Prabira Kumar Sethy, Smitanjali Gouda, Nalinikanta Barpanda, and Amiya Kumar Rath |
180 |
A study on Fog Computing Technology Implementing Internet of Things (IoT)
Sumanta Banerjee, Shyamapada Mukherjee, and Biswajit Purkayastha |
181 |
Augmenting a Description Logic with Probability for Motion Patterns within QSTR
Upasana Talukdar, Rupam Barua, and Shyamanta M. Hazarika |
182 |
Auto Associative Neural Network Based Concrete Crack Detection
A. Diana Andrushia and N. Anand |
183 |
Image Filter Selection, Denoising and Enhancement based on Statistical Attributes of Pixel Array
Vihar Kurama and T. Sridevi |
184 |
Hash Code Based Image Authentication Using Rotation Invariant Local Phase Quantization
Umamaheswar Reddy, Utkarsh Arya, Ram Kumar Karsh, and Rabul Hussain Laskar |
189 |
Formants and Prosody based Automatic Tonal and Non-tonal Language Classification of North East Indian Languages
Chuya China Bhanja, Mohammad Azharuddin Laskar, and Rabul Hussain Laskar |
190 |
Enhanced Security Credentials for Image Steganography Using QR Code
Prajith Kesava Prasad, Kalpanasonika R., R. Jenice Aroma, and Balamurugan A. |
191 |
Clustering Based Melanoma Detection in Dermoscopy Images Using ABCD Parameters
J. Jacinth Poornima, J. Anitha, and H. Asha Gnana Priya |
193 |
Automated Histogram Based Seed Selection for the Segmentation of Natural Scene
Aarthi R. and Shanmuga Priya S. |
194 |
A High-Capacity Medical Image Watermarking Approach for Imperceptible Patient Data Embedding
Sherin Tresa Paul and Kumudha Raimond |
195 |
Application of Image Fusion Approaches for Image Differencing in Satellite Images
R. Jenice Aroma and Kumudha Raimond |
196 |
Novel Competitive Swarm Optimizer for Sampling Based Image Matting Problem
Prabhujit Mohapatra, Kedar Nath Das, and Santanu Roy |
197 |
A Novel Method for Detecting Bone Contours in Hand Radiographic Images
D. Diana, J. Revathi, K. Uma, A. Ramya, and J. Anitha |
198 |
A Systematic Review on Program Debugging Techniques
Debolina Ghosh and Jagannath Singh |
199 |
Removal of Eye-blink Artifact from EEG Using LDA and Pre-trained RBF Neural Network
Rajdeep Ghosh, Nidul Sinha, and Saroj Kumar Biswas |