Society of Information Processing publishes IJIP quarterly Journal, Call for Papers for June 2015 Issue of IJIP
Home Editorial Board About Us Call for Papers Guidelines
Submission Published Papers ICIP Conference Contact Us Sign Up

        September 2016, Volume 10, Issue 3 

September 2016, Volume 10, Issue 3

Page No.

Learning Concept Hierarchies through Probabilistic Topic Modeling [Abstract pdf] ,

V S Anoop, S Asharaf, Deepak P

1

 

 

An Exhaustive Search for Personal Data Management [Abstract pdf ],

Mamta Kayest, S K Jain 

12

 

 

A Comparative Analysis of RF and PSO based Feature Selection Techniques and their Effect on the Plant Leaf Image Classification [Abstract pdf ] ,

A Kumar, V Patidar, P Saini, D Khazanchi

24

A Technique to Share Multiple Secret Images [Abstract pdf ],

Mohit Rajput, Maroti Deshmukh

35

 

 

A Survey on Modularity based Overlapping Community Detection Techniques in Social Networks [Abstract pdf ],

Chitra Devi J, Poovammal E

45

 

 

Authentication of Voter List Candidate using Iris Pattern Recognition for Proper Electoral Process [Abstract pdf ],

Parthasarathi De, Dibyendu Ghoshal, Tapajyoti Deb

55

 

 

Application of Fuzzy Logic in Early Stage Software Reliability Prediction [Abstract pdf ],

Syed Wajahat Abbas Rizvi, Raees Ahmad Khan, Vivek Kumar Singh

61

 

 

ECG Beat Classification using RR-Interval Features and the Evidential K-Nearest Neighbours Classifier [Abstract pdf ],

Shameer Faziludeen, Praveen Sankaran

78

 

 

Hopfield Neural Network based Dynamic Call Admission Control for Quality of Service Provisioning in Mobile Multimedia Networks [Abstract pdf ],

Sanjeev Kumar, Krishan Kumar, Anand Kumar Pandey

88

 

 

 

 

Energy-Balanced Edge-Based Clustering Algorithm for Wireless Sensor Networks_ [Abstract pdf ],

Muni Venkateswarlu K, A Kandasamy, K Chandrasekaran

98

 

 

        June 2016, Volume 10, Issue 2 

June 2016, Volume 10, Issue 2

Page No.

A Two Stage Approach to Detect Salient Objects in Noisy Images [Abstract pdf] ,

Nitin Kumar, Maheep Singh

1

 

 

Devising Robust Hybrid Algorithm for Cloud Security [Abstract pdf ],

Nandita Sengupta, Ramya Chinnasamy 

10

 

 

Denoising of Diffusion Weighted Images Using Statistical Based Method: An Extension of Joint LMMSE Approach [Abstract pdf ] ,

Anjanappa C , Sheshadri H S

23

Peer to Peer Communication Mechanism Across WebBrowsers [Abstract pdf ],

Jagadish Kotagi, Srikantaiah K C, Venugopal K R

32

 

 

Image Segmentation Using Improved Self Organizing FeatureMap [Abstract pdf ],

Pankaj Upadhyay, Jitender Kumar Chhabr

45

 

 

Secure Multi-Keyword Search and Multi-User Access Control over anEncrypted Cloud Data [Abstract pdf ],

Raghavendra S, Doddabasappa P A, Geeta C M, RajkumarBuyya, Venugopal K R, S S Iyengar, L M Patnaik

51

 

 

Security of Zone Routing Protocol Using HMAC-SHA512 Algorithm [Abstract pdf ],

Ravilla Dillil, Putta Chandra Shekar Reddy

62

 

 

Real Time Visibility Enhancement for Single Image Haze Removal [Abstract pdf ],

Apurva Kumari, S.K.Sahoo

71

 

 

RPRDC: Reliable Proliferation Routing with lowDuty-Cycle for Wireless Sensor Networks [Abstract pdf ],

Venkatesh, K R Venugopal, L M Patnaik

79

 

 

        March 2016, Volume 10, Issue 1 

March 2016, Volume 10, Issue 1

Page No.

Analyzing the Incremental Funding Method and its Software Project Scheduling Algorithms [Abstract pdf] ,

A J Alencar, J V Doria Jr, E A Schmitz, A L Correa

1

 

 

An Admission Control Algorithm of V2I Communication with Non-Classical Traffic [Abstract pdf ],

Mousumi Paul , Goutam Sanyal 

16

 

 

EERDC:Energy Efficient Routing using Dynamic Cluster approach [Abstract pdf ] ,

Praveen kumar K V, Shwetha K, B M Thippeswamy, Reshma, M K Banga, UdayaRani V, Venugopal K R

24

Secure and Minimum Expenditure Data Transmission in MANET Avoiding Selfish Nodes Using Game Theory [Abstract pdf ],

Debjit Das, Koushik Majumdea, Anurag Dasgupta

37

 

 

Spectrum Hole Prediction for Cognitive Radios: An Artificial Neural Network Approach [Abstract pdf ],

V Balaji, Chittaranjan Hota, P S Deshpande

52

 

 

3D Face Shape Estimation from Single Face Image using Modified Differential Evolution Algorithm [Abstract pdf ],

K Punnam Chandar, Tirumala Satyasavithri

67

 

 

PTIB: Profiling Top Influential Blogger in Online Social Networks [Abstract pdf ],

Vasanthakumar G U, P Deepa Shenoy, Venugopal K R

77

 

 

Analysis of Structural Coupling Strength in Improving Software Module Structure [Abstract pdf ],

Amarjeeta, Jitender Kumar Chhabra

92

 

 

A Watermarking Technique Using Discrete Curvelet Transform for Security of Multiple Biometric Features [Abstract pdf ],

Rohit M Thanki, Ved Vyas Dwivedi, Komal R Borisagar

103

 

 

SAAQ : Secure Aggregation for Approximate Queries in Wireless Sensor Networks [Abstract pdf ],

G Prathima E, Shiv Prakash T, Venugopal K R, S S Iyengar, L M Patnaik

115

        December 2015, Volume 9, Issue 4 

December 2015, Volume 9, Issue 4

Page No.

Improving Resource Utilization in Datacenters by Accurately Triggering Live VM Migration [Abstract pdf] ,

R R Bane, Annappa B

1

 

 

An Estimation Model for Countries Economic Rank Evaluation [Abstract pdf ],

A Bai, Swati Hira, P S Deshpande 

15

 

 

Performance Analysis of RFDMRP:River Formation Dynamics based Multi-Hop Routing Protocol in WSNs [Abstract pdf ] ,

Koppala Guravaiah, R Leela Velusamy

22

Energy Efficient Task Consolidation Algorithms for Cloud Computing Systems [Abstract pdf ],

Priyanka Panigrahi, Sanjaya Kumar Panda, Chitta Ranjan Tripathy

34

 

 

Distributed Query Processing Plans Generation using Teacher Learner based Optimization [Abstract pdf ],

Vikash Mishra, Vikram Singh

46

 

 

Reinforcement Learning Approach for Real Time Strategy Games Like Battle City and S3 [Abstract pdf ],

Harshit Sethy, Amit Patel

61

 

 

ACCDA: Adaptive Cost-value based Cluster Data Aggregation in Wireless Sensor Networks [Abstract pdf ],

Prabha R, Vikash Kumar, Manjula S H, Venugopal K R

80

 

 

K-means Min-Min Scheduling Algorithm for Heterogeneous Grids or Clouds [Abstract pdf ],

Roshni Pradhan, Sanjaya Kumar Panda, Sujaya Kumar Sathua

89

 

 

Threshold Multi Secret Sharing Using Elliptic Curve and Pairing [Abstract pdf ],

V P Binu, A Sreekumar

100

 

 

Software Implementation of the Quantum Key Distribution Protocol with Ququarts [Abstract pdf ],

Gabriela Mogos

113

        September 2015, Volume 9, Issue 3 

September 2015, Volume 9, Issue 3

Page No.

Classification of Microarray Data using Extreme Learning Machine Classifier [Abstract pdf] ,

Mukesh Kumar, Sandeep Singh, Santanu Kumar Rath

1

 

 

Algorithmic Approach for Test Scenario Generation from UML Composite Structure Diagram [Abstract pdf ],

Santosh Kumar Majhi, Santosh Kumar Behera  

17

 

 

An Automated Technique for Classification and Quantitative Analysis in Coloured Pencil Manufacturing Process using Artificial Neural Network [Abstract pdf ] ,

Santhosh KV, Bhagya R Navada

28

Object Oriented Analysis using Natural Language Processing concepts: A Review [Abstract pdf ],

Abinash Tripathy, Santanu Kumar Rath

38

 

 

SEEHPIP: Secure Energy Efficient Homomorphism based Privacy and Integrity Preserving Data Aggregation for Wireless Sensor Networks [Abstract pdf ],

H S Annapurna, M Siddappa

51

 

 

Comparative Study of Time Series model based Techniques for Personnel Verification using Ear Biometrics [Abstract pdf ],

Farida Khursheed, Ajaz Hussain Mir

63

 

 

A Hybrid Fuzzy Firefly based Evolutionary Radial Basis Functional Network for Classification [Abstract pdf ],

H S Behera, M Nandaa, K Nayaka, Janmenjoy Nayaka

76

 

 

A Multistage Hierarchical Method for Author Name Disambiguation [Abstract pdf ],

Tasleem Arif, Rashid Ali, M Asger

92

 

 

Recommender Systems to Improve Response Time of Computationally Intensive Tasks Distributed on Social Networking Platform [Abstract pdf ],

Varsha G Maragi, Prathibha M V, Lavanya B, Annappa B

106

 

 

Webpage Recommendation by Calculating Average Visiting Time on Webpages [Abstract pdf ],

Sejal D, Kamalakant T, Dinesh Anvekar, Venugopal K R, S S Iyengar, L M Patnaik

117

        June 2015, Volume 9, Issue 2 

June 2015, Volume 9, Issue 2

Page No.

CS Framework for Speech Coding using Sparse Hybrid Dictionary [Abstract pdf] ,

Vinitha Ramdas, Deepak Mishra, Sai Subrahmanyam Gorthi

1

 

 

An Uncertainty-Based Task Scheduling for Heterogeneous Multi-Cloud Systems [Abstract pdf ],

Sanjaya Kumar Panda, Benazir Neha, Sujaya Kumar Sathua  

13

 

 

Signal Tracking Approach for Phase and Phase Derivative Estimation in Digital Holographic Interferometry using Extended Kalman Filter [Abstract pdf ] ,

Rahul G Waghmare, Sai Siva Gorthi, Sai Subrahmanyam G R K, Deepak Mishra

25

Ensemble of Soft Decision Trees Using Multiple Approximate Fuzzy-Rough Set Based Reducts [Abstract pdf ],

G Kihor Kumar, P Viswanath and A Ananda Rao

36

 

 

Hybrid Clustering Model for Text documents with Semantic Based Document Representation [Abstract pdf ],

B Drakshayani, E V Prasad

47

 

 

Light-Weighted DNA based Hybrid Cryptographic Mechanism against Chosen Cipher text Attacks [Abstract pdf ],

E Suresh Babu, C Nagaraju, MHM Krishna Prasad

57

 

 

Performance Evaluation of HOG for Recognition of Hand Gestures Alphabet with Resemblances [Abstract pdf ],

Daleesha M Viswanathan, Sumam Mary Idicula

76

 

 

An Application for Decision Making Based on Interval Valued Intuitionistic Fuzzy Soft Multi Sets [Abstract pdf ],

Anjan Mukherjee, Ajoy Kanti Das

84

 

 

STEAR: Secure Trust-aware Energy-efficient Adaptive Routing in Wireless Sensor Networks [Abstract pdf ],

B M Thippeswamy, Reshma S, Sivasakthi P, Tejaswi V, Shaila K, Venugopal K R, L M Patnaik

93

 

 

New Fuzzy LBP Features for Face Recognition [Abstract pdf ],

Abdullah Gubbi, Mohammed Fazle Azeem, Zahid Ansari

106

         

        March 2015, Volume 9, Issue 1 

Title and Authors

Page No.

Concept Prioritization in Ontology Matching- Concept Type Classification based Approach [Abstract pdf] ,

Arthi J, Saruladha K

1

 

 

RFTMS: Robust and Flexible Trust Management Scheme for Cluster based Mobile Ad-Hoc Network [Abstract pdf ],

Joydeep Kundu, Koushik Majumder  

13

 

 

Usages of Composition Search Tree in Web Service Composition [Abstract pdf ] ,

Lakshmi H N, Hrushikesha Mohanty

28

A Replication Scheme Based on Clustering and Time Indexing For Ensuring Consistent Data Availability in Mobile Adhoc Networks[Abstract pdf ],

Chandrakala C B, Prema K V, Hareesha K S

38

 

 

Segmenting Medical Images using Computational Intelligence Technique [Abstract pdf ],

S V Aruna Kumar, B S Harish

48

 

 

Analysis of Retinal Fundus Images using Power Spectrum Fractal Dimension and Texture Feature: An Application for the Detection of Diabetic Retinopathy [Abstract pdf ],

Dharmanna Lamani, T C Manjunath, Mahesh M, Y S Nijagunaray

57

 

 

Automation of Traffic Personnel Gesture Recognition [Abstract pdf ],

R Sathya, M Kalaiselvi Geetha

67

 

 

Hybrid Region and Edge Based Unsupervised Color-Texture Segmentation for Natural Images [Abstract pdf ],

Tilottama Goswami, Arun Agarwal, C Raghavendra Rao

77

 

 

Nonlinear Control Design for Linear Inverted Pendulum System using Exact Feedback Linearization[Abstract pdf ],

Varunendra Kumar Singh, Vijay Kumar

93

 

 

Trust-Based Hierarchical Routing Protocol for Wireless Sensor Networks [Abstract pdf ],

Yamuna Devi, Manjula S H, Venugopal K R, S S Iyengar, L M Patnaik

101

         Year 2014, Volume 8, Issue 4 

Title and Authors

Page No.

Identification of Parameters and Trust Factors for Trust Based Secure Communication in Wireless Sensor Networks [Abstract pdf] ,

Geetha V, K Chandrasekaran

1

 

 

Stereo Vision System for Real Time Applications [Abstract pdf ],

Nishank Kumar, Deepak Mishra  

12

 

 

Protection of Iris Image using Secret Sharing Schemes [Abstract pdf ] ,

Maroti Deshmukh, Munaga V N K Prasad

23

Assessing the Fault Proneness Degree (DFP) of Change Request Artifacts by Estimating the Impact of Change Request Artifacts Correlation[Abstract pdf ],

Rudra Kumar M, A Ananda Rao

35

 

 

Enhanced Statistical Descriptors of the Intrinsic Mode Functions for Query by Humming Systems [Abstract pdf ],

Trisiladevi C Nagavi, Nagappa U Bhajantri

45

 

 

Secret Image Sharing Based Cheque Truncation System with Cheating Detection [Abstract pdf ],

Sreela S R, G Santhosh Kumar, Binu V P

56

 

 

RePC-SSMSM: Repetitive Preprocessing and Clustering Approach for Filtering Spam SMS Messages using Naïve Bayes Classifier [Abstract pdf ],

Asha S Manek, P Deepa Shenoy, M Chandra Mohan, K R Venugopal, L M Patnaik

68

 

 

Optimal Two-Tier Forecasting Power Generation Model in Smart Grids [Abstract pdf ],

Kianoosh G Boroojeni, Shekoufeh Mokhtari, Mohammadhadi Amini, S S Iyengar

79

 

 

Parallelization Approaches using OpenMP for Strassen’s Matrix Multiplication and Canny Edge Detector [Abstract pdf ],

Mustafa B, Waseem Ahmed

89

 

 

FRVIWF: Face Recognition using Virtual Images based on Weighted Fusion [Abstract pdf ],

Arunalatha J S, Suvarna C, Tejaswi V, Shaila K, Raja K B, Dinesh Anvekar, Venugopal K R, S S Iyengar, L M Patnaik

98

         Year 2014, Volume 8, Issue 3 

Title and Authors

Page No.

OHMF: A Query Based Optimal Healthcare Medication Framework [Abstract pdf] ,

Santosh Kumar Majhi, Padmalochan Bera

1

 

 

Two Stage Nonparametric Discriminant Analysis for Small Sample Size Problem in Face Recognition [Abstract pdf ],

Nitin Kumar, R K Agrawal 

13

 

 

Segmentation of Handwritten Text from Underlined Variable Regions in Documents [Abstract pdf ] ,

Suman V Patgar, Y H Sharath Kumar, Vasudev T

23

Fisher-Yates Chaotic Shuffling Based Image Encryption[Abstract pdf ],

Swaleha Saeed, M Sarosh Umar, M Athar Ali, Musheer Ahmad

31

 

 

Serial and Parallel Biometric Fusions under Spoofing Attacks [Abstract pdf ],

SZahid Akhtar

42

 

 

Identifying Cheating Anchor Nodes using Maximum Likelihood and Mahalanobis Distance [Abstract pdf ],

Jeril Kuriakose, Amruth V, Swathy Nandhini, Abhilash V

51

 

 

Non Binary Local Gradient Contours for Face Recognition [Abstract pdf ],

Abdullah Gubbi, Mohammad Fazle Azeem, M Sharmila Kumari

63

 

 

An Enhanced Model for Removal of Text-line Bending Deformations at Page Borders in Document Images for Better Readability by OCRs [Abstract pdf ],

Vijayashree C S, Shruthi C V, Vasudev T

75

 

 

Cardiovascular Disease Prediction based on Physical factors using Quantum Neural Network [Abstract pdf ],

Renu Narain, Sanjai Saxena, Achal Kumar Goyal

83

 

 

Textural and Singular Value Decomposition Feature Extraction Technique for Offline Signature Verification [Abstract pdf ],

Savitha G, Vibha L, Venugopal K R, L R Patnaik

95

 

 

         Year 2014, Volume 8, Issue 2 

Title and Authors

Page No.

Software Fault Prediction Using Radial Basis Function Network [Abstract pdf] ,

Yeresime Suresh, Santanu Ku. Rath

1

 

 

An Epitome of Multi Secret Sharing Schemes for General Access Structure [Abstract pdf ],

V P Binu, A Sreekumar  

13

 

 

Performance Evaluation of Wavelet-Based Compression Techniques in Medical Imaging [Abstract pdf ] ,

Mohd Rafi Lone, Abdul Gaffar Mir

37

Detecting Intrusion and Designing of CCRX Dynamic Encryption Algorithm of a Network System [Abstract pdf ] ,

Nandita Sengupta, Jeffrey Holmes, Jaya Sil

37

 

 

Gesture based Image Encryption using Modified Resistance Coding[Abstract pdf ],

Naveenkumar S K, Panduranga H T, Kiran

47

 

 

Efficient Segmentation and Feature Extraction Method for Iris Recognition[Abstract pdf ],

Sagar Sanap, U M Chaskar, Suhasini Todkari, Dhiraj Marale, Rahul Bendale

54

 

 

Online Validation of Soft Calibration Circuit for Capacitance Pressure Sensor[Abstract pdf ],

Santhosh K V, B K Roy

64

 

 

Cache Discovery Over a Multihop Wireless Ad Hoc Network [Abstract pdf ],

Preetha Theresa Joy, K Poulose Jacob

71

 

 

Blackhole Attack Defending Trusted On-Demand Routing in Wireless Ad-Hoc Network [Abstract pdf ],

Swarnali Hazra, S K Setua

81

 

 

Vein Detection: A System-on-Chip Approach[Abstract pdf ],

Ashwini J Kolar, D N Sonawane, Vikas Gaikwad, Prashant D Basargi

90

         Year 2014, Volume 8, Issue 1 

Title and Authors

Page No.

Mobile Vision System for Palm Principal Lines Features Extraction[Abstract pdf] ,

Aditya Mehta, Shitala Prasad, Sateesh K Peddoju

1

 

 

Challenges and Issues in Adapting Web Contents on Small Screen Devices [Abstract pdf ],

Krishna Murthy A, Suresha, Anil Kumar K M 

11

 

 

Comparison Analysis in Multicast Authentication Based on Batch Signature (MABS) in Network Security [Abstract pdf ] ,

Srikanth Bethu, K Kanthi Kumar, S Soujanya, MD Asrar Ahmed

11

 

 

Rainfall Forecasting with Seasonal Adjustment[Abstract pdf ],

Arpita Sharma, T V Mahua Bose

30

 

 

A Framework for Preprocessing Web Log in the Data Warehouse Environment for Web User Behavior Analytics [Abstract pdf ],

B N ShankarGowda, Vibha Lakshmikantha, K R Venugopal, L M Patnaik

40

 

 

Class of Service based OBS Multicast Traffic Routing Considering Node Capabilities[Abstract pdf ],

Terrance Frederick Fernandez, Megala T, Sreenath N

53

 

 

A Non-Parametric Discretization Based Imputation Algorithm for Continuous Attributes with Missing Data Values [Abstract pdf ],

G Madhu, T V Rajinikanth, A Govrdhan

64

 

 

A Framework to Mitigate Attacks and Establish Secure Communications in SCADA Systems [Abstract pdf ],

Pramod T C, N R Sunitha

73

 

 

EEHCR:Energy Efficient Hierarchical Cluster Routing in Wireless Sensor Networks [Abstract pdf ],

B M Thippeswamy, Reshma S, Shaila K, Tejaswini V,Venugopal K R, S S Iyengar, L M Patnaik

92

 

 

Agent-Based Cloud Broker Architecture for Distributed Access Control in the Inter-Cloud Environments [Abstract pdf ],

Manoj V Thomasa, K Chandra Sekaran

107

        Year 2013, Volume 7, Issue 4 

Title and Authors

Page No.

Automated Region Growing Approach for Brain Tumor Segmentation in 3D MR Images [Abstract pdf] ,

Shikha Gupta, Padam Kumar

1

 

 

Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing [Abstract pdf ],

Manoj Krishnaswamy, G. Hemantha Kumar  

11

 

 

S Fuzzy Assessment Methodology to Diagnosis the Yield of Rice using S weights[Abstract pdf ] ,

M Kalpana, A V Senthilkumar

21

 

 

A Study on Texture Analysis of Facial Expressions[Abstract pdf ],

P Saha, M K Bhowmik, D Bhattacharjee, B K De

28

 

 

Investigation on Error Handling Method Using Cryptanalysis Techniques of Simplified Data Encryption Standard for Block Data [Abstract pdf ],

Rajashekarappa, K M Sunjiv Soyjaudah, Sumithra Devi K A

35

 

 

Improved Bully Election Algorithm for Distributed Systems [Abstract pdf ],

P Beaulah Soundarabai, Ritesh Sahai, Thriveni J, K R Venugopal, L M Patnaik

43

 

 

Method in Determining Regular Pattern in Edge Labelled Dynamic Graph and the concept of Partial Regular [Abstract pdf ],

Anand Gupta, Hardeo Kumar Thakur

55

 

 

Design of Novel Architectures and FPGA Implementation of 2D Gaussian Surround Function[Abstract pdf ],

M C Hanumantharaju and M T Gopalakrishna

66

 

 

Qualitative and Quantitative Evaluation: Measuring Effectiveness of Security Activities [Abstract pdf ],

Sonia, Archana Singhal

76

 

 

Use Case Point Approach Based Software Effort Estimation using Various Support Vector Regression Kernel Methods [Abstract pdf ],

Shashank Mouli Satapathy, Santanu Kumar Rath

87

        Year 2013, Volume 7, Issue 3 

Title and Authors

Page No.

Distributed Painting by a Swarm of Robots with Unlimited Sensing Capabilities and Its Simulation [Abstract pdf] ,

Deepanwita Daa, Srabani Mukhopadhyaya

1

 

 

Region and Location Based Indexing and Retrieval of MR-T2 Brain Tumor Images [Abstract pdf ],

Krishna A N, Dr. B G Prasad  

16

 

 

Analysis of Iris Recognition using Normalized and Un-normalized Iris images[Abstract pdf ] ,

S B Kulkarni, U P Kulkarni, R S Hegadi

26

 

 

DCT-MLP based approach for Off-line Signature Verification[Abstract pdf ],

B H Shekar, R K Bharathi

34

 

 

An Ant-Miner System without Rule Pruning for Discovering Classification Rules [Abstract pdf ],

Saroj, Renu Bala, Jyoti

45

 

 

Elgamal Signature based Authentication in LTE-Advanced [Abstract pdf ],

M Prasad, R Manoharan

58

 

 

Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation [Abstract pdf ],

S kumarasawamy, Srikanth P L, Manjula S H, Venugopal K R, L M Patnaik

68

 

 

Text Classification and Distributional Features Techniques in Datamining and Warehousing[Abstract pdf ],

Srikanth Bethu, G Charless Babu, J Vinoda, E Priyadarshini, M Raghavendra Rao

83

 

 

Wavelet Transform Based Approach for Partial Image Encryption [Abstract pdf ],

Parameshachari B D, K M Sunjiv Soyjaudah, Sumithra Devi K A, Panduranga H T

95

 

 

Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks [Abstract pdf ],

T Shiva Prakash, K B Raja, Venugopal K R, S S Iyengar, L M Patnaik

100

         Year 2013, Volume 7, Issue 2 

Title and Authors

Page No.

SR-Match: Discovering Complex Semantic Matches based on Semantic Relationship of Attributes[Abstract pdf] ,

Sonia Khetarpaul, S K Gupta

1

 

 

On the Identification of the Most Efficient Implementation Sequence of MMFs and AEs [Abstract pdf ],

A J Alencar, I M Vital Jr., E A Schmitz, A L Correa  

11

 

 

Mathematical Model of Semantic Look - An Efficient Context Driven Search Engine [Abstract pdf ] ,

Leena Giri G, Srikanth P L, Manjula S H, Venugopal K R, L M Patnaik

20

 

 

Wireless Sensor Network Controlled Vehicle Navigation System and Its Applications[Abstract pdf ],

Arun Madhu, A Sreekumar

32

 

 

Feature Extraction Computation and Automatic Raga Identification for Carnatic Ragas[Abstract pdf ],

Surendra Shetty, K K Achary and Sarika Hegde

41

 

 

The Art of Moving Object Extraction, Detection and Recognition in a Video[Abstract pdf ],

Khundrakpam Johnson Singh, Usham Sanjota Chanu

52

 

 

Multiple Domain Secure Routing for Wireless Sensor Networks[Abstract pdf ],

Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

59

 

 

Impact of Two-Level Fuzzy Cluster Head Selection Protocol for Earthquake Wireless Sensor Network: An Energy Efficient Approach [Abstract pdf ],

P K Dutta, M K Naskar , O P Mishra

82

 

 

Speaker Independent Continuous Speech to Text Converter for Mobile Application[Abstract pdf ],

R Sandanalakshmi, P Abinaya viji, M Kiruthiga, M Manjari, A Sharina

82

 

 

Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity[Abstract pdf ],

Vishwanath R H, Leena S, Srikantaiah K C, K Shreekrishna Kumar, P Deepa Shenoy, Venugopal K R, S S Iyengar and L M Patnaik

90

         Year 2013, Volume 7, Issue 1 

Title and Authors

Page No.

Elemental Resistivity Profile Studies of Electrical Impedance Tomography (EIT) Images to Assess the Reconstructed Image Quality: An Image Contrast Analysis with Simulated data[Abstract pdf] ,

Tushar Kanti Bera and J Nagaraju

1

 

 

Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks[Abstract pdf ],

T Shiva Prakash, K B Raja, K R Venugopal, S S Iyengar, L M Patnaik 

15

 

 

A Statistical Method for Generating Test Sets with a Given Coverage Probability [Abstract pdf ] ,

C Selem, E A Schmitz, A J Alencar, J V Doria, F Protti

30

 

 

Marginality Preserving Embedding for Robust Face Recognition [Abstract pdf ],

Mohammad Moinul Islam, ; Vijayan K Asari, ; Mohammed Nazrul Islam, ; Mohammad A Karim, .

39

 

 

Human Facial Expression Tracking and Grading by Histogram Based Approach [Abstract pdf ],

Md. Alamgir Hossain, ; Prof Goutam Sanyal, .

40

 

 

Comparison of Supervised Learning and Reinforcement Learning in Intrusion Domain[Abstract pdf ],

Nandita Sengupta, ; Jaya Sil, .

51

 

 

Automated Water Regions Extraction from SAR Imagery using Log-Normal Parameter and Entropy[Abstract pdf ],

Debabrata Samanta, ; Goutam Sanyal, .

57

 

 

Outage Probability of Impairments due to Combining Errors and Branch Correlation in Rayleigh Fading Channels Incorporating Diversity [Abstract pdf ],

J Subhashini, ; Vidhyacharan Bhaskar, .

63

 

 

Analysis of Isolated Word Recognition for Kannada Language using Pattern Recognition Approach [Abstract pdf ],

Sarika Hegde, ; K K Achary, ; Surendra Shetty, .

73

        Year 2012, Volume 6, Issue 4 

Title and Authors

Page No.

A Local Histogram Based Descriptor for Object Tracking in Wide Area Motion Imagery [Abstract pdf] ,

Alex Mathew, ; Vijayan K. Asari, .

1

 

 

A Robust Video Steganography using DWTDM [Abstract pdf ],

Souvik Bhattacharyya, ; Gautam Sanyal, .  

13

 

 

Trust Based Model for Secure Key Distribution and Routing in Mobile Wireless Sensor Networks[Abstract pdf ] ,

Thejaswini S, ; N R Sunitha, ; B B Amberker, .

27

 

 

Analysis and Experimental Results of Modified Gram-Schmidt Process based Document Classifier[Abstract pdf ],

Sumanta Guha, ; Ananta Raj Lamichhane, .

42

 

 

A Study on Termite Based Routing Protocols for Mobile Ad Hoc Networks [Abstract pdf ],

Kiran M, ; G Ram Mohana Reddy, .

48

 

 

Recursive Partitioning for Process Improvement: Control Study of a Petrochemical Process[Abstract pdf ],

M V V N Sriram, ; Kanti Amin, ; G Padmavathi, .

55

 

 

Compact Reduct Formation for Classi cation Rule Set Generation using Rough Set Theory [Abstract pdf ],

Asit Kr. Das, ; Shampa Sengupta, .

64

 

 

Ecient Nearest Neighbor Classi cation on Categorical Data [Abstract pdf ],

Hari Seetha, ; V V R Srividya, .

75

 

 

Secure Reputation based Target Sensing in Wireless Sensor Networks [Abstract pdf ],

Tanuja R, ; Anoosha V, ; Manjula S H, ; Venugopal K R, ; L M Patnaik, .

82

 

 

         Year 2012, Volume 6, Issue 3 

Title and Authors

Page No.

Measuring the Learnability of a Parameter in Multi-Layer Perceptron Neural Network [Abstract pdf] ,

Siddhaling Urolagin, ; Prema K V, ; N V Subba Reddy, .

1

 

 

Text Steganography through Quantum Approach with SSCE Code [Abstract pdf ],

Indradip Banerjee, ; Souvik Bhattacharyya, ; Gautam Sanyal, .  

13

 

 

An Energy Aware Transport Protocol in Wireless Sensor Networks [Abstract pdf ] ,

Prabhudutta Mohanty, ; Manas Ranjan Kabat, ; Manoj Kumar Patel, .

23

 

 

An Objective Metric for Quality Assessment of Color Quantized Images [Abstract pdf ],

Mohammed Hassan, ; Chakravarthy Bhagvati, .

32

 

 

Regressive and Blind Source Separation Techniques for Ocular Artifact Removal [Abstract pdf ],

Theus H. Aspiras, ; Vijayan K. Asari, .

42

 

 

Rough Set and Statistical Method for Both Way Reduction of Microarray Cancer Dataset [Abstract pdf ],

Asit Kumar Das, ; Soumen Kumar Pati, .

55

 

 

A Novel Approach towards Computation and Memory Efficient Implementation of Convolution-based Binarization Techniques [Abstract pdf ],

Ayatullah Faruk Mollah, ; Subhadip Basu, ; Mita Nasipuri, .

67

 

 

Dimensionality Reduction by SVM-KNN Approach for Arecanut Classification[Abstract pdf ],

Ajit Danti, ; M Suresha, .

80

 

 

A Fully Automatic Bridge Extraction Technique for Satellite Images [Abstract pdf ],

Lizy Abraham, ; M Sasikumar, .

89

 

 

Similarity Pattern Search for Stream Time Series Image Data using Cluster Median Approach [Abstract pdf ],

Vishwanath R Hulipalled, ; K Shreekrishna Kumar, ; Venugopal K R, ; S S Iyengar, ; L M Patnaik, .

98

         Year 2012, Volume 6, Issue 2 

Title and Authors

Page No.

Cross-Layer Design RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks[Abstract pdf] ,

Kumaraswamy M, ; shaila K, ; Tejaswi V, ; Venugopal K R, ; S S Iyengar, ; L M Patnaik, .

1

 

 

Fault-Tolerant Multipath Routing Scheme for Energy Efficient Wireless Sensor Network [Abstract pdf ],

Prasenjit Chanak, ; Hafizur Rahaman, ; Tuhina Samanta, ; Indrajit Banerjee, .  

11

 

 

Design of Extensible Software Applications with Design Patterns [Abstract pdf ] ,

Annappa B, ; Rabna Rajendran, ; K Chandrasekaran, ; K C Shet, .

22

 

 

Identity, Expression and Age Information using Active Appearance Model Features [Abstract pdf ],

N S Lakshmiprabha, ; J Bhattacharya, ; S Majumder, .

31

 

 

An Image Mining Prototype to Achieve Medical Image Diagnosis with Effectiveness[Abstract pdf ],

Saritha S, ; G Santhosh Kumar, .

38

 

 

A New Global Thresholding Approach for Document Image Binarization [Abstract pdf ],

Samir Malakar, ; Dheeraj Mohanta, ; Ram Sarkar, ; Nibaran Das, ; D K Basu, .

48

 

 

Recognition of Emotional States using Nonlinear Range Compression of EEG Spectral Data[Abstract pdf ],

Theus H. Aspiras, ; Vijayan K. Asari, .

60

 

 

Bayesian Estimation Model for Trust dependent Greedy Antivoid Routing(TGAR) in Wireless Sensor Networks(WSNs) [Abstract pdf ],

Sivasankari H, ; Venugopal K R, ; S S Iyengar, ; L M Patnaik, .

73

 

 

Development of Edge Detection Technique for Images using Adaptive Thresholding[Abstract pdf ],

Debabrata Samant, ; Goutam Sanyal, .

83

 

 

Design and Implementation of Map Services for JAVA Phones[Abstract pdf ],

Ankur Chandra, ; Shashank Jain, ; Mohammed Abdul Qadeer, .

90

         Year 2012, Volume 6, Issue 1 

Title and Authors

Page No.

User-Centric Design for Privacy Preservation in Cloud Environment[Abstract pdf] ,

Lijo V P, ; Saidalavi Kalady

1

 

 

Effects of Transmission Range on EENDMRP for Wireless Sensor Networks[Abstract pdf ],

Shiva Murthy G, ; R J DSouza, ; Varaprasad, .  

12

 

 

Detection of Abrupt and Gradual Transitions in Digital Video Sequences [Abstract pdf ] ,

Lakshmi Priya G G, ; Domnic S, .

21

 

 

Object Based Segmentation of Satellite Images for LC Type Monitoring using CA [Abstract pdf ],

Bharathi S, ; Pooja P Sheth, ; P Deepa Shenoy, ; K R Venugopal, ; L M Patnaik, .

32

 

 

Propagation Model for Information Dissemination among Novel Social Networks [Abstract pdf ],

Sreedhar Bhukya, .

44

 

 

Recent Trends and Challenges in CAD of Liver Cancer on CT Images[Abstract pdf ],

Megha P Arakeri, ; G Ram Mohana Reddy, .

50

 

 

KDE Technique with ECA for Accurate Face Image Classification[Abstract pdf ],

M Sharmila Kumari, ; B H Shekar, .

60

 

 

O Convolutional Neural Network Generated Affinity Graph based Segmentation [Abstract pdf ],

Leena Silvoster M, ; V K Govindan, .

67

 

 

Comparison of Performance for Intrusion Detection System Using Different Rules of Classification [Abstract pdf ],

Nandita Sengupta, ; Jaya Sil, ; Moumita Saha, .

76

 

 

Moving Object Segmentation using Fuzzy C-Means Clustering Technique [Abstract pdf ],

Vivek Bhandari, ; B R Kapuriya, ; M M Kuber, .

84

         Year 2011, Volume 5, Issue 3 

Title and Authors

Page No.

Ranking SERP of a Specialty Search Engine based on Probability of Correctness of Facts [Abstract pdf] ,

Srikantaiah K C, ; Srikanth P L, ; Tejaswi V, ; shaila K, ; Dr. Venugopal K R, ; Dr. L M Patnaik,

1

 

 

An Improvised Dynamic and Semantic based Web Cache Replacement Policy [Abstract pdf ],

K Geetha, ; N Ammasai Gounden  

14

 

 

Indian Coin Cognition and Sum Counting System of Image Data Mining using ANN [Abstract pdf ] ,

C M Velu, ; K R Kashwan

26

 

 

Computational Methods in Biological Sequence Analysis for Complexity Reduction [Abstract pdf ],

Vidya A, ; Usha D, ; Rashma B M, ; K R Venugopal, ; L M Patnaik

37

 

 

Color-Texture Image Segmentation Algorithms based on Hypercomplex Gabor Analysis [Abstract pdf ],

B D Venkatramana Reddy, ; T Jayachandra Prasad, .

47

 

 

Reducing Power Consumption in Wireless Sensor Networks by using DACCPF [Abstract pdf ],

S Anandamurugan, ; C Venkatesh, .

59

 

 

Cryptographic Text Watermarking in Medical Image with Reversible Property [Abstract pdf ],

P Viswanathan, ; P VenkataKrishnab,

74

 

 

Improving Data Accessibility in Mobile Ad Hoc Networks[Abstract pdf ],

R Nandhakumar, ; N Mageshkumar, .

81

 

 

Optimal Path Finding using Homomorphic Encryption Schemes in Computer Networks [Abstract pdf ],

Levent Ertaul, ; Vaidehi, .

87

         Year 2011, Volume 5, Issue 2 

Title and Authors

Page No.

A Noisy Speech Enhancement Method by Spectral Subtraction and Harmonics Enhancement[Abstract pdf] ,

P Krishnamoorthy, ; S R Mahadeva Prasanna

1

 

 

Chaos and Wavelets Based Image Encryption [Abstract pdf ],

Musheer Ahmad, ; Omar Farooq, .  

13

 

 

APD: ARM Phishing Detector A System for Detecting Phishing in Instant Messengers [Abstract pdf ] ,

Mohd Mahmood Ali, ; Dr. Lakshmirajamani

22

 

 

Efficient Clustering Techniques with Presence of Noise [Abstract pdf ],

V Venkateswara Rao, ; Dasu Dasari

31

 

 

Segmented Average-Sufferage Heuristic for QoS based Independent Task Scheduling in Grid[Abstract pdf ],

Ashish Kumar, ; Sameer Singh Chauhan, ; Anil K Sarje

38

 

 

Adaptive Routing Protocol for Broadcasting in Mobile Ad Hoc Networks [Abstract pdf ],

SVMG Bavithiraja, ; R Radhakrishnan

46

 

 

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms[Abstract pdf ],

M Chithik Raja

59

 

 

Adaptive Spatio-Temporal Filtering for Video Denoising using Integer Wavelet Transform [Abstract pdf ],

R Vijaya Arjunan, ; V Vijaya Kumar

73

 

 

Counter Based Termination Detection Algorithm For Mobile Ad Hoc Systems [Abstract pdf ],

Archana Nair S, ; Philip Samuel

80

         Year 2011, Volume 5, Issue 1 

Title and Authors

Page No.

A Comparative Study on Different Wireless Sensor Network Routing Algorithms[Abstract pdf] ,

Subrata Dutta, Nandini Mukherjee, Sarmistha Neogy and Sarbani Roy

1

 

 

A Novel Chaos Based Permutation-Substitution scheme for Image Encryption[Abstract pdf ],

Vinod Patidar, G Purohit , K K Sud and N K Pareek  

10

 

 

Multicast MANETs Attacks and its Counter Solutions [Abstract pdf ] ,

Karthic Kumar S and Athirai A

21

 

 

Representation and Analysis of DNA Sequences using Fractal Method [Abstract pdf ],

Shiji S H and G Santhosh Kumar

33

 

 

A New Centroid based Summarization Approach for Automatic Web Document Categorization [Abstract pdf ],

Setu K Chaturvedi, D K Swami and Gulab Singh

41

 

 

Robust Invariant Neuro Modeling for Pattern Recognition[Abstract pdf ],

G Shyama Chandra Prasad, A Govardhan and T V Rao

48

 

 

AdaBoost Algorithm to Build Pattern Based Network Security [Abstract pdf ],

Vivek A Patole, V K Pachghare and Parag Kulkarni

57

 

 

Malicious Node Detection and Mitigation Mechanism for Mobile Ad hoc Networks[Abstract pdf ],

A Rajaram and S Palaniswami

57

 

 

Resource Performance based Grid Task Scheduling [Abstract pdf ],

Sameer Singh Chauhan and R C Joshi

72

 

 

Simultaneous Tolerance Synthesis for Manufacturing and Quality using GA and PSO[Abstract pdf ],

Y S Rao, C S P Rao, G Rangajanardhan and Pandu R Vundavilli

81

        Year 2010, Volume 4, Issue 4 

Title and Authors

Page No.

Information Retrieval Techniques in Intrusion Detection [Abstract pdf] ,

Nandita Sengupta and Jaya Sil

1

 

 

Job Modeling using History based Prediction in Large Distributed Environment [Abstract pdf ],

Madhulina Sarkar, Rupam Mukhopadhyay, Dibyajyoti Ghosh, Sarbani Roy and Nandini Mukherjee  

7

 

 

Webers Local Descriptor Based Model for Text Detection in Document Images[Abstract pdf ] ,

M Sharmila Kumari and B H Shekar

17

 

 

Performance Evaluation of Rough Set Theory Based Routing Protocols for Vehicles Moving at High Velocities[Abstract pdf ],

B S Shylaja, V Mary Anita Rajam, V Uma Maheswari and Arul Siromoney

26

 

 

Hybrid Neural Networks based Intrusion Detection Systems [Abstract pdf ],

Supriya Kamthania and Rashid Ali

35

 

 

An Algorithm for Group Formation in Wireless Sensor Network[Abstract pdf ],

Venkatramana Bhat P and Shridhar Aitha

44

 

 

Semantic Interoperability of Web applications in Clouds using XML [Abstract pdf ],

B Veeresh and S D Madhukumar

52

 

 

Automatic Shadow Removal Algorithm for VOP and Generation of Super Resolved VOP [Abstract pdf ],

Alwyn R Pais, Hari Krishna R, John DSouza and Ram Mohana Reddy

61

 

 

Classification of Stem and Leaf Images of Rice Plant [Abstract pdf ],

Santanu Phadikar and Jaya Sil .

70

 

 

Role of Exact Page Accessions for determining Text Relevance Measures [Abstract pdf ],

Arpana Rawal, H R Sharma, M K Kowar, Sanjay Sharma and Sarang Pitale .

77

 

 

         Year 2010, Volume 4, Issue 3 

Title and Authors

Page No.

A Two Stage Approach to Corner Matching using Fuzzy Similarity Measure. [Abstract pdf] ,

Ambar Dutta, Avijit Kar and B N Chatterji

1

 

 

Energy Aware Cluster-based Multihop Routing Protocol for Sensor Networks [Abstract pdf ],

G Santhosh Kumar, Sitara A and K Poulose Jacob  

9

 

 

Personalization of Web Search using Semantically Query Modification[Abstract pdf ] ,

Jaytrilok Choudhary and R C Joshi

17

 

 

Hierarchical Attributed Relational Graph Based Devnagari Character Recognition [Abstract pdf ],

P Mukherji and P P Rege

22

 

 

Energy Conservation using K-means Fusion Steiner Tree in Wireless Sensor Networks [Abstract pdf ],

H Sivasankari, Syed Ishaq Ali Hussaini, Vallabh Mahale, Shaila K, Venugopal K R and L M Patnaik

34

 

 

A Bandwidth-Efficient Framework for E-Learning Video Transmission [Abstract pdf ],

Salil Sahasrabudhe, Ankush Mittal and Manoj Mishra

49

 

 

Selection of Region of Interest for Assessment of Classification Accuracy in Remote Sensing Data [Abstract pdf ],

Abhishek Jain, Suneeta Agarwal and Dharmendra Singh

56

 

 

Minimum Frequency Requirement for a Wireless Communication System in Polynomial Time[Abstract pdf ],

Sumana Bandyopadhyay and Rajat K Pal

64

 

 

Performance Evaluation of TCP Congestion Control Protocols for High-Speed Networks [Abstract pdf ],

M V Ramakrishna, Y Suresh and K Pavan Kumar

74

 

 

Search Space Pruning in Protein Folding Simulation of 2D HP Model using Genetic Algorithms [Abstract pdf ],

Khalil Sawant, Ankush Mittal and Rajdeep Niyogi

84

         Year 2010, Volume 4, Issue 2 

Title and Authors

Page No.

Parallelization of Embedded Zero Tree (EZW) Wavelet on GP GPU Programming Paradigm[Abstract pdf] ,

Kshitiz Gupta and Ankush Mittal

1

 

 

Network Intrusion Detection Using RST, k Means and Fuzzy c Means Clustering [Abstract pdf ],

Nandita Sengupta and Jaya Sil  

8

 

 

Efficient Parallel k-means Algorithms on a Cyclic Network [Abstract pdf ] ,

M K Pakhira

15

 

 

Design of Low Complexity Quadrature Mirror Filter Lattice Filter Bank Using Simulated Annealing [Abstract pdf ],

Rengitha G Nair, Manoj V J and Elizabeth Elias

31

 

 

Pattern Oriented Dynamic Load Balancing in Distributed Systems.[Abstract pdf ],

Raghavan P, D Evangelin Geetha, T V Suresh Kumar and K Rajani Kanth

41

 

 

Discriminative SIFT Model: A Robust and an Accurate Face Representation and Recognition Model [Abstract pdf ],

B H Shekar and M Sharmila Kumari

51

 

 

What makes an Unbiased Evaluation towards Subjective Answer Assessments?[Abstract pdf ],

Ani Thomas, H R Sharma, M K Kowar and Sanjay Sharma

61

 

 

Secure Content Based Publish/Subscribe System Using Prefix Preserving Encryption [Abstract pdf ],

Shibily Joseph and S D Madhukumar

69

 

 

A Hybrid Classification Method for Direct Marketing[Abstract pdf ],

M Govindarajan and R M Chandrasekaran

80

 

 

ASR : Adaptive Secure Routing in Heterogeneous Wireless Sensor Networks[Abstract pdf ],

Shaila K, Vineet G H, Prashanth C R, Arjun A V, Shiva Prakash T, Tejaswi V, Manjula S H, Venugopal K R and L M Patnaik

88

         Year 2010, Volume 4, Issue 1 

Title and Authors

Page No.

Evaluation of Feature Selection Methods in Credit Scoring Models[Abstract pdf] ,

M V Sarvesha, Jay B Simha and S S Iyengar

1

 

 

Constructing Domain Ontologies for Unstructured Text Documents: A Bootstrapping Approach[Abstract pdf ],

H L Shashirekha, S Murali and P Nagabhushan  

9

 

 

Performance Analysis of Error Control Coding Techniques for Peak-to-Average Power Ratio Reduction of Multicarrier Signals [Abstract pdf ] ,

Sanjay Singh, M Sathish Kumar and H S Mruthyunjaya

22

 

 

A Semantic Preserving Distance Measure: Dset [Abstract pdf ],

Reena Srivastava and M M Gore

36

 

 

Performance of WalkSAT Approach in Solving The Nurse Scheduling Problem[Abstract pdf ],

S Kundu and S Acharyya

46

 

 

Bilingual Malayalam - English OCR System using Column-Stochastic Matrix Approach[Abstract pdf ],

Bindu Philip and R D Sudhaker Samuel

54

 

 

GMM Spectral Vectors Distribution for Language Identification [Abstract pdf ],

A Nagesh and V Kamakshi Prasad

63

 

 

An Efficient Secret Sharing Scheme for n out of n Scheme using POB-number System [Abstract pdf ],

A Sreekumar and S Babusundar

75

 

 

Data Analysis and Classification of Various Stages of Dementia Adopting Rough Sets Theory [Abstract pdf ],

Sandhya Joshi, Vibhudendra Simha G G , P Deepa Shenoy, K R Venugopal and L M Patnaik

86

 

 

Performance Study of AODV and DSR in Hybrid Networking Environment [Abstract pdf ],

Koushik Majumder and Subir Kumar Sarkar

100

         Year 2009, Volume 3, Issue 4 

Title and Authors

Page No.

Guaranteed QoS with MIMO Systems for Scalable Low Motion Video Streaming over Scarce Resource Wireless Channels[Abstract pdf] ,

Saket Gupta and Sparsh Mittal .

1

 

 

Writer Personality Prediction through letter Y using Generalised Hough Transform (GHT)[Abstract pdf ],

Champa H N and K R Ananda Kumar .  

17

 

 

Medical Image Retrieval Based on Active Learning and Ranking Techniques[Abstract pdf ] ,

R Suganya, S Rajaram and P Anandhakumar.

25

 

 

Service Oriented Architecture for Retrieving Data from Wireless Sensor Networks[Abstract pdf ],

G Santhosh Kumar, Sariga Raj, Vinu Paul M V and K Poulose Jacob .

33

 

 

Feature Extraction of Fragmented Iris by Differential Encoding [Abstract pdf ],

Prashanth C R, S P Ganavi, T D Mahalakshmi, K B Raja, K R Venugopal and L M Patnaik.

45

 

 

Parallelizing Video Surveillance Algorithm on the STI Cell Processor[Abstract pdf ],

P Vinay Kumar, Praveen Kumar and Ankush Mittal.

56

 

 

A Three Tier Architecture For Service Oriented Business Intelligence [Abstract pdf ],

M Nageswara Guptha, A Chitra and P T Rajan .

67

 

 

An Efficient Secret Sharing Scheme for (n - 1, n) Threshold using Visual Cryptography [Abstract pdf ],

A Sreekumara and S Babusundar .

77

 

 

Dynamic Resource Allocation for Providing Quality of Service [Abstract pdf ],

Mohammed A Qadeer,Shahid Habib and Yazdan Javaid.

84

 

 

A Flat Routing Protocol for Sensor Networks [Abstract pdf ],

Anitha Kanavalli, Dennis Sseyubiri, P Deepa Shenoy, Venugopal K R and L M Patnaik.

97

         Year 2009, Volume 3, Issue 3 

Title and Authors

Page No.

Optimal Scheduling for Maximizing the Network Lifetime of Wireless Sensor Networks [Abstract pdf] ,

S H Manjula, Nithin B K, Sarvajith M, Shaila K, Nalini L, K R Venugopal, LMPatnaik.

1

 

 

A Source-end Defense for Spoofed Flooding Attacks and its Performance Evaluation [Abstract pdf ],

S Malliga and Dr. A Tamilarasi.  

15

 

 

Image Retrieval: with Special Reference to its Content [Abstract pdf ] ,

Subashini Venkatraman , G Mahadevan and R K Rajarajan.

24

 

 

Online Handwritten Character Recognition system for Bangla [Abstract pdf ],

Asok Bandyopadhyay .

32

 

 

Certainty Factor Based Analysis for Measuring Users Satisfaction with Search Engine [Abstract pdf ],

Shruti Kohli and Ela Kumar.

39

 

 

Image Compression using Generic Vector Quantizer Designed with Kohonens Artificial Neural Networks [Abstract pdf ],

Yogesh H Dandawate and Madhuri A Joshi .

45

 

 

An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network [Abstract pdf ],

Jaydip Sen .

54

 

 

k - means Clustering with CART to Enhance Classifier Accuracy[Abstract pdf ],

Veena H Bhat, Prasanth G Rao, P Deepa Shenoy, K R Venugopal, L M Patnaik.

65

 

 

LSB Based Approach for Secret Sharing of Colour Images [Abstract pdf ],

Satya Kalyan and K N Rao .

71

 

 

Structural Approaches for the Characterization of Malayalam Characters through Lateral Cross- sectional Analysis of Rectangular Image Matrices [Abstract pdf ],

Bindu Philip and R D Sudhaker Samuel .

82

         Year 2009, Volume 3, Issue 2 

Title and Authors

Page No.

Identify Issues and Concerns in Software Reuse[Abstract pdf] ,

M Jha, L O’Brien and P Maheshwari .

1

 

 

Automatic Selection of Intrinsic Dimensionality of Data [Abstract pdf ],

Ch. Aswani Kumar and S Srinivas .  

8

 

 

Development of Efficient Text Clustering Model for Gene Ontology [Abstract pdf ] ,

Nandita Sengupta and Jaya Sil .

17

 

 

The Broker Based Dynamic Web Service Selection Mechanism to Handle a Large Volume of Requests [Abstract pdf ],

Demian Antony D Mello and Ananthanarayana V S.

24

 

 

Off-line Cursive Handwriting Segmentation: A Neuro-Heuristic Approach[Abstract pdf ],

A Rehman, F Kurniawan and D Mohamad .

37

 

 

Analyzing the Population Sizing Phenomenon in Genetic Algorithm for 0/1 Knapsack with Object Preferences [Abstract pdf ],

S Siva Sathya, S Kuppuswami, Vivek Ranjan and Rajeev Kumar Singh .

47

 

 

An Application of Renyi Entropy in Segmentating Microcalcifications using Otsus Method[Abstract pdf ],

J Mohanalin, Prem Kumar Kalra and Nirmal Kumar .

57

 

 

Adaptive Noise Cancellation for Satellite Signals using Higher Order Neural Network [Abstract pdf ],

K Burse, R N Yadav and S C Shrivastava.

66

 

 

Constraint Ordering in Dynamic Web Service Composition[Abstract pdf ],

Raghavendra Achar, P Santhi Thilagam and Demian Antony D Mello.

83

 

 

A Parallel Genetic Programming Approach for Automated Discovery of Censored Production Rules with Fuzzy Hierarchy[Abstract pdf ],

Saroj and K K Bharadwaj .

90

         Year 2009, Volume 3, Issue 1 

Title and Authors

Page No.

Semantic Web Information Retrieval and Software Engineering Modeling Techniques[Abstract pdf] ,

Minal Bhise

1

 

 

Incremental Training method for Face Recognition using PCA[Abstract pdf ],

Ch Satyanarayan, D Harith, P Sammulal, G Apparao Naidu and L Pratap Reddy .  

13

 

 

A Novel Approach for Image and Video Denoising by sparse 3-D Transform Domain using Atrous and Gabor Wavelets [Abstract pdf ] ,

T Shivaprakash, Venugopal K R and L M Patnaik .

27

 

 

Energy Management in Topology Controlled Wireless Ad Hoc Networks [Abstract pdf ],

Srinivasan A and Sharon Priya .

46

 

 

Enhanced Collusion-Resistant Fingerprinting for Multimedia [Abstract pdf ],

Ezhilarasan M, Thambidurai P, Karthi G .

57

 

 

Signature Authentication for Banking Applications[Abstract pdf ],

Chetana Hegde, P Deepa Shenoy, Venugopal K R and L M Patnaik .

65

 

 

A Comparative Study of Rough Set and Fuzzy Set based Rank Aggregation Techniques[Abstract pdf ],

Rashid Ali and M M Sufyan Beg .

78

 

 

Digital Watermarking by Modifying the High Frequency AC Coefficients in a JPEG Bitstream Using Random key [Abstract pdf ],

Mohammed Athar Ali, Muhammad Inamullah .

92

        Year 2008, Volume 2, Issue 4 

Title and Authors

Page No.

Efficient Data Aggregation using Query Processing in Sensor Networks [Abstract pdf] ,

Prakash G L, Thejaswini M, S H Manjula, K R Venugopal, L M Patnaik.

1

 

 

Efficient Zone Based Feature Extraction Algorithms for Handwritten Numeral Recognition of Indian Scripts [Abstract pdf ],

S V Rajashekararadhya, P Vanaja Ranjan .  

15

 

 

Image Encryption based on Multidimensional Chaotic Maps[Abstract pdf ] ,

G Nidhi S Kulkarni, Balasubramanian Raman and Indra Gupta .

29

 

 

Tree Augmanted Nave Bayes in Intrusion Detection Systems[Abstract pdf ],

Benferhat Salem, Boudjelida Abdelhamid, Drias Habib .

41

 

 

Comparing and Evaluating Intensity Based Spatial Domain Corner Detectors [Abstract pdf ],

Ambar Dutta, B N Chatterji and Avijit Kar .

48

 

 

Preventing Node Misbehavior by Secure QoS-Aware Data Fusion in Distributed Wireless Sensor Networks[Abstract pdf ],

Shaila K, Thriveni J, Vidya Yeri, Neelavathi H N, Arjun A V, Nalini L, K R Venugopal, L M Patnaik.

56

 

 

A Novel Fuzzy Logic based Automatic Segmentation of Echocardiographic Images [Abstract pdf ],

A Suphalakshmi and P Anandhakumar .

71

 

 

Uniform Secret Sharing Scheme for (2, n) Threshold Using Visual Cryptography [Abstract pdf ],

A Sreekumar and S Babusundar .

82

 

 

Reference Watermarking Scheme in Fractional Fourier Transform Domain using Singular Value Decomposition [Abstract pdf ],

Gaurav Bahtnagar and Balasubramanian R .

88

 

 

DSP Technique for Exon Prediction in Eukaryotes [Abstract pdf ],

M K Hota and V K Srivastava.

98

         Year 2008, Volume 2, Issue 3 

Title and Authors

Page No.

Camera Calibration using Hybridization of Genetic Algorithm and Neural Network [Abstract pdf] ,

N Sukavanam, R Balasubramanian, M Thakur and S Kumar .

1

 

 

A Hybrid Architecture for Unstructured Peer-to-Peer Systems [Abstract pdf ],

Guruprasad Khataniar, Brajesh Kumar Shrivastava, Sandeep Kumar Samudrala, Gandamalla Bharat Kumar, Diganta Goswa .  

12

 

 

An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks[Abstract pdf ] ,

Ashok Kumar .

21

 

 

A Shape from Shading Approach Using General Lambertian Reflectance Map [Abstract pdf ],

R Balasubramanian, Rama Bhargav and Manoj Kumar.

33

 

 

Modeling and Analysis of Coding Redundancy for Gray Scale Images using Statistical Coding Technique [Abstract pdf ],

Saravanan C, Ponalagusamy R .

41

 

 

Hierarchical Attributed Relational Graph Based Devnagari Character Recognition [Abstract pdf ],

P Mukherji and P P Rege.

49

 

 

Secure Transaction Processing in MLS/DDBMS [Abstract pdf ],

Navdeep Kaur, Rajwinder Singh, Manoj Misra and A K Sarje .

63

 

 

Static Slicing of Intra-Procedural Programs[Abstract pdf ],

Durga Prasd Mohapatra .

77

 

 

On Comparison of Two Composite DAG Scheduling Heuristics I Heterogeneous Distributed Computing [Abstract pdf ],

S K Sah, R S Singh and A K Tripathi .

83

 

 

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks [Abstract pdf ],

Jaydip Sen and Sripad Krishna .

88

         Year 2008, Volume 2, Issue 2 

Title and Authors

Page No.

Use of Mobile Sinks to Disseminate Data in Wireless Sensor Networks[Abstract pdf] ,

Natarajan Meghanathan, Sugam K Sharma, Gordon W Skelton .

1

 

 

Reliable Delivery with Varying Data Rate in Ad Hoc Wireless Networks[Abstract pdf ],

Thriveni J, Vikas M, Shaila K, L Nalini, K R Venugopal, L M Patnaik .  

12

 

 

C2WSN: A Two-Tier Chord Overlay Serving for Efficient Queries in Large-Scale Wireless Sensor Networks [Abstract pdf ] ,

J-G Yua, W-J Liu, J-J Song .

24

 

 

Improved Iris Localization for Degraded Eye Images [Abstract pdf ],

Somnath Dey, Debasis Samanta.

31

 

 

A Simulation Analysis of Gateway Discovery for Internet Access in Mobile Ad Hoc Networks[Abstract pdf ],

Rakesh Kumar, Manoj Misra, Anil K Sarje .

38

 

 

Evaluating the Lifetime of a Coverage and Connecting Guaranted Heterogeneous Wireless Sensor Network [Abstract pdf ],

S H Manjula, Arjun A V, Shilpa K R A, Shwetha N, Swetha N A, Shaila K, K R Venugopal, L M Patnaik .

48

 

 

Gabor Features for Universal Script Identification in Indian Multilingual Documents[Abstract pdf ],

R Sanjeev Kunte, R D Sudhaker Samuel.

81

 

 

A Branch Target Instruction Prefetching Technique for Improved Performance [Abstract pdf ],

Prashanth Reddy Gade, Roy Paily, Yajun Ha .

90

 

 

An Enhanced Method for Mining Acronym-Definition Pairs from Bioinformatics Literature[Abstract pdf ],

Abdul Nazeer K A, Rafeeque P C, M P Sebastian.

98

 

 

Robust Object Recognition using Binarized Gabor Features Under Noise Noise and Illumination changes[Abstract pdf ],

Siddhaling Urolagin, Prema K V, N V Subba Reddy .

106

         Year 2008, Volume 2, Issue 1 

Title and Authors

Page No.

Maximizing Network Lifetime in MANET using Average Energy Flooding[Abstract pdf] ,

Thriveni J, Prakash G L, K R Venugopal and L M Patnaik

1

 

 

An Incremental Knowledge Compilation in First Order Logic[Abstract pdf ],

Manoj K Raut.  

13

 

 

Stability Analysis of a Class of Artificial Neural Network Systems [Abstract pdf ] ,

S N Sivanandam, S N Deepa.

20

 

 

Algorithms to Compute a Generator of the Group and Safe Primes [Abstract pdf ],

Pinaki Mitra, M Durgaprasada Rao, M Kranthi Kumar .

29

 

 

Multiresolution Wavelet Decomposition Steganographic Model [Abstract pdf ],

K Suresh Babu, K B Raja, Arpitha P, Asima Nishat, K R Venugopal, L M Patnaik .

36

 

 

Design and Development of Group Key Management Strategies for Secure Group Communications[Abstract pdf ],

Nagesh H R, K Chandra Sekaran .

47

 

 

Image Denoising using Bacterial Foraging Optimization Technique[Abstract pdf ],

Swapna Devi, S S Pattnaik, M Dutta, G V R S Sastry, P K Patra, Ch Vidya Sagar .

57

 

 

Performance Analysis of Routing Protocols using Mobility Models in Wireless Sensor Networks [Abstract pdf ],

S H Manjula, C N Abhilash, Shaila K, K R Venugopal, L M Patnaik .

62

 

 

Synthesis of System Test Cases from UML Models [Abstract pdf ],

M Sarma, R Mall.

79

 

 

Meta-Tree based Mining of XML Documents for Frequent Induced Subtrees [Abstract pdf ],

Santhi Thilagam, Ananthanarayana V S .

89

         Year 2007, Volume 1, Issue 2 

Title and Authors

Page No.

Weighted Aggregation Scheme with Lifetime-Accuracy Tradeoff in Wireless Sensor Network[Abstract pdf] ,

Bhushan G Jagyasi, Bikash K Dey, S N Merchant and U B Desa .

1

 

 

Intelligent Sensors in Software: The Use of Parametric Models for Phase Noise Analysis [Abstract pdf ],

A Chorti, D Karatzas, N M White and C J Harris .  

10

 

 

Message Integrity in the World Wide Web : Use of Nested Hash Function and a Fast Stream Cipher[Abstract pdf ] ,

Shaana Mathew and K Paulose Jacob .

19

 

 

Life Time Maximization of Heterogeneous Wireless Ad Hoc Networks[Abstract pdf ],

T Shivaprakash, G S Badrinath, Venugopal K R and L M Patnaik .

26

 

 

Performance Analysis of Information Sevices in Computational Grids[Abstract pdf ],

Shakti Purohit and Sanjay Chaudhary .

40

 

 

Web Document Clustering Using Document Index Graph[Abstract pdf ],

B F Momin, P J Kulkarni and A A Chaudhari .

49

 

 

Routing Protocol for Lifetime Maximization of Wireless Sensor Networks[Abstract pdf ],

Suraiya Tarannum, B Aravind, Nalini L, Venugopal K R and L M Patnaik .

58

 

 

Distributed Asynchronous Clustering for Self-Organization of Wireless Sensor Networks [Abstract pdf ],

Peter Hebden and Adrian R Pearce .

68

 

 

Text Localization in Low Resolution Camera Captured Images[Abstract pdf ],

Bhavna J Antony, Peeta Basa Pati and A G Ramakrishnan .

78

 

 

Watershed Segmentation and Machine Learning for Mammography Classification[Abstract pdf ],

Vibha L, Harshavardhan G M, Pranaw K, P Deepa Shenoy, Venugopal K R and L M Patnaik .

87

         Year 2007, Volume 1, Issue 1 

Title and Authors

Page No.

Exploring Structurally Similar Protein Sequence Motifs using Relative-Distance Measures[Abstract pdf] ,

Srinivasa K G, Jagadish M, Venugopal K R and L M Patnaik

1

 

 

Selective Microarchitecture-Level Scaling for Energy Savings[Abstract pdf ],

M Black and M Fracklin .  

14

 

 

An efficient Heuristic Multicast QoS Routing Algorithm for Real-Time Applications [Abstract pdf ] ,

Manas Ranjan Kabat, Sandeep Kumar Mohanty, Rajib Mall and Chitta Ranjan Tripathy .

22

 

 

Steganalysis of LSB Embedded Images Using Variable Threshold Color Pair Analysis [Abstract pdf ],

Raja K B, Shankara N, Venugopal K R, L M Patnaik .

30

 

 

Ant Colony Optimization and its Application to Boolean Satisfiability for Digital VLSI Circuits [Abstract pdf ],

Rajamani Sethuram and Manish Parashar.

40

 

 

Survey of HDL Compiler Optimization Techniques[Abstract pdf ],

M Joseph, Narasimha B Bhat and K Chandra Sekaran .

51

 

 

Scheduling and Job Monitoring System for Heterogeneous Grid Environments[Abstract pdf ],

G Sumathi and N P Gopalan .

63

 

 

Semantics for a Distributed Programming Language using SACS and Weakest Pre-Conditions [Abstract pdf ],

A V S Rajan, A S Bavan and G Abeysinghe .

71

 

 

Determination of Optimal Buffer Allotment for Video-on-Demand Server [Abstract pdf ],

D N Sujatha, Girish K, Venugopal K R, L M Patnaik .

90

 

 

Network Intrusion Detection via Hybrid of Genetic Algorithms and Principal Component Analysis [Abstract pdf ],

Nalini N and Raghavendra Rao G .

104