| Gaussian Restoration Pyramid : Application of Image Restoration to Laplacian Pyramid Compression A. Lakshmi and Subrata Rakshit |
| Hybrid Channel Allocation in Wireless Network Using Evolutionary Strategy S. R. Shinde, G. V. Chowdhary, M. L. Dhore and Archana S. Shinde |
| Mining Changes in Purchase Behavior in Retail Sale with Products as Conditional Part Pradip Kumar Bala |
| Novel Approach to Design a Testable Conservative Logic Gate for QCA Implementation Kunal Das and Debashis De |
| BER Performance of OFDM-BPSK and -QPSK Over Nakagami-m Fading Channels Neetu Sood, Ajay K. Sharma and Moin Uddin |
| Fault Tolerance and Energy Efficient Protocol for Cluster Communication in Sensor Networks A. Narendra Kumar, K. Thyagarajah and J. Irrai Anbu |
| Shape Constrained Mesh Editing For Delineating Anatomical Structures in Volumetric Datasets Yogish Mallya and Prashant Kumar |
| Statistical Evaluation of Image Segmentation Nitin Kumar Sharma, Shah Ronak, Malay K. Nema and Subrata Rakshit |
| Enhancing the Performance of WDM Systems by Using TFF in Hybrid Amplifiers (Advance Applications) Inderpreet Kaur and Neena Gupta |
| Script Identification in a Handwritten Document Image Using Texture Features P. S. Hiremath, S. Shivashankar, Jagdeesh D. Pujari and V. Mouneswara |
| Dynamic Threshold Based Sliding-Window Filtering Technique for RFID Data Sapna Tyagi, A. Q. Ansari and M. Ayoub Khan |
| Text Region Extraction from Low Resolution Natural Scene Images Using Texture Features S. A. Angadi and M. M. Kodabagi |
| A Closed form Delay Evaluation Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects R. Kar, V. Maheshwari, Md. Maqbool, A. K. Mal and A. K. Bhattacharjee |
| Hand Gesture Recognition Using Neural Networks G. R. S. Murthy and R. S. Jadon |
| Multiscale Ridgelet Transform for Content Based Image Retrieval Anil Balaji Gonde, R. P. Maheshwari and R. Balasubramanian |
| New Wavelet Features for Image Indexing and Retrieval A. Lakshmi and Subrata Rakshit |
| Feature Selection Using Bag-Of-Visual-Words Representation A. G. Faheema and Subrata Rakshit |
| CCAM: A Comprehensive Cost Analysis Model for Video-on-Demand System D. N. Sujatha, K. Girish, N. Sunil Kumar, K. R. Venugopal and L. M. Patnaik |
| Defect Detection and Identification in Textile Fabrics Using Multi Resolution Combined Statistical and Spatial Frequency Method R. S. Sabeenian and M. E. Paramasivam |
| Performance Measurement of a Fully Pipelined JPEG Codec on Emulation Platform Naveen Tiwari and Sagar Chaitanya Reddy |
| Evolutionary Approach for Approximation of Artificial Neural Network Sangita Pal, Swati Vipsita and Prashanta Kumar Patra |
| A New Approach on Co-Ordinate Based Routing Protocol for Mobile Networks P. K. Guha Thakurta, Rajarshi Poddar and Subhansu Bandyopadhyay |
| On QoS Aspects with Different Coding and Channel Conditions for a WiMAX based Network Vinit Grewal and Ajay K. Sharma |
| DCT Based Texture Watermarking Using GLCM Sushila Kamble, Suneeta Agarwal, V. K. Shrivastava and Vikas Maheshkar |
| Multi-Packet & Multi-Session Signature Detection Using State Based Model Pramod S. Pawar, Mayank Pal Singh and Sachin Narayanan |
| Untyped Aspect Calculus : Formal Theory of Aspect-Oriented Programming Languages Dinesh Gopalani and M. C. Govil |
| An Extended Secure Data Communication Using Blind Source Separation and HC-128 Anil Kumar, M. K. Ghose and K. V. Singh |
| A New Robust Watermarking Scheme for Color Images Sanjay Rawat and Balasubramanian Raman |
| Implementation of Stream Cipher System Based on Representation of Integers In Residue Number System Ganesh Aithal, K. N. Hari Bhat and U. Sripathi |
| Effect of Routing Misbehavior in Mobile Ad Hoc Network Rajender Nath, Pankaj Kumar Sehgal and Atul Kumar Sethi |
| Performance Evaluation of DWT Based Image Steganography Vijay Kumar and Dinesh Kumar |
| Signature Replacement Attack and Its Counter-Measures Subrata Sinha and Smriti Kumar Sinha |
| DIMM: Framework for Interoperability of Data Centric Mobile Middlewares Rajarshi Pal, Souvik Mazumder and Samiran Chattopadhyay |
| An Improvement of Liao et al.’s Authentication Scheme Using Smart Cards Sandeep K. Sood, Anil K. Sarje and Kuldip Singh |
| Enhanced AODV for Wireless Networks Sandeep Suman and Balkrishan |
| Fast Energy Aware Application Specific Network-on-Chip Topology Generator Naveen Choudhary, M. S. Gaur, V. Laxmi and V. Singh |
| Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN – A Multi-Agent Sourcing Methodology V. S. Shankar Sriram, G. Sahoo and Krishna Kant Agrawal |
| A Heuristic Algorithm for Delay Delay-Variation Bounded Least Cost Multicast Routing Manas Ranjan Kabat, Manoj Kumar Patel and Chita Ranjan Tripathy |
| Frame-Based Parallelization of MPEG-4 on Compute Unified Device Architecture (CUDA) Dishant Ailawadi, Milan Kumar Mohapatra and Ankush Mittal |
| Interference-Traffic Aware Channel Assignment for MRMC WMNs Kavitha Athota, Atul Negi and C. Raghavendra Rao |
| Impact of Coordinator Mobility on the Throughput in a Zigbee Mesh Networks Harsh Dhaka, Atishay Jain and Karun Verma |
| A Flow Based Anomaly Detection System Using Chi-Square Technique N. Muraleedharan, Arun Parmar and Manish Kumar |
| Fault Tolerant Application Execution Model in Computing Grid Major Singh and Lakhwinder Kaur |
| An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers Raman Kumar and Harsh Kumar Verma |
| Fuzzy Logic Based Effective Bidding Range Computation and Bidder’s Behavior Estimation in Keyword Auctions Madhu Kumari and Kamal K. Bharadwaj |
| Automated Analysis of Gestational Sac in Medical Image Processing Vrishali A. Chakkarwar, Madhuri S. Joshi and Praveen S. Revankar |
| Network Forensic System for Port Scanning Attack Atul Kant Kaushik, Emmanuel S. Pilli and R. C. Joshi |
| A Mathematical Model for Crawler Revisit Frequency Ashutosh Dixit and A. K. Sharma |
| A Novel 4UATT Architecture Based on Analysis of User Usage Trends of Mobile Devices Sapna Gambhir, M. N. Doja and Moinuddin |
| Evaluation of Correlation Properties of Orthogonal Spreading Codes for CDMA Wireless Mobile Communication Deepak Kedia, Manoj Duhan and S. L. Maskara |
| SAES- Expert System for Advising Academic Major — An Indian Perspective Sourabh Deorah, Srivatsan Sridharan and Shivani Goel |
| Elastic Registration of 2D Abdominal CT Images Using Hybrid Feature Point Selection for Liver Lesions Asmita A. Moghe, Jyoti Singhai and S. C. Shrivastava |
| An Encounter with Strong Association Rules G. S. Bhamra, A. K. Verma and R. B. Patel |
| Route Failure Tolerant Multicast in Mobile Ad Hoc Networks Using Disjoint Minimum Spanning Trees Based on Connectivity Index with Bandwidth Constraint B. R. Arun Kumar, Lokanath C. Reddy and Prakash S. Hiremath |
| Detection and Segmentation of Lines and Words in Gurmukhi Handwritten Text Rajiv Kumar and Amardeep Singh |
| Distributed Clustering Approach for Wireless Sensor Network Based Cellular Data Placement Model Sanjeev Gupta and Mayank Dave |
| An Autonomic Computing Approach to Enterprise Management Manoj Manuja and Rajender Kalra |