| Node Centrality in Wireless Sensor Networks – Importance, Applications and Advances Aarti Jain and B. V. R. Reddy |
| Grouping of Clusters for Efficient Data Aggregation (GCEDA) in Wireless Sensor Network Dnyaneshwar Mantri, Neeli R. Prasad and Ramjee Prasad |
| New Cross Correlation Attack Methods on the Montgomery Ladder Implementation of RSA Ebru Akalp Kuzu, Betül Soysal, Muhammet Şahİnoğlu, Umut Güvenç and Ali Tangel |
| Development and Implementation of NMEA Interpreter for Real Time GPS Data Logging Mohd Shoab, Kamal Jain, M. Anulhaq and M. Shashi |
| Prevention of ARP Spoofing – A Probe Packet Based Technique Poonam Pandey |
| BER Analysis of Alamouti Space Time Block Coded 2x2 MIMO Systems Using Rayleigh Dent Mobile Radio Channel Priyanka Mishra, Gurpreet Singh, Rahul Vij and Gaurav Chandil |
| Honeypot Based Signature Generation for Defense Against Polymorphic Worm Attacks in Networks Sounak Paul and Bimal Kumar Mishra |
| Modeling User Preferences for Vertical Handover in 3G-WLAN Interworking Environment on Top of IEEE 802.11u Vishal Gupta and Mukesh Kumar Rohil |
| Analysis of Circular Ring Frequency Selective Surface at Ka/Ku Band Garima Bharti, G. Singh, K. R. Jha and Rajeev Jyoti |
| Tumbling Multilevel Channel Conflicts in Mobile Ad Hoc Networks Mohamed Abd Elhamid Abbas and Husain Shahnawaz |
| RSS Based Detection and Expulsion of Malicious Users From Cooperative Sensing in Cognitive Radios Sumit Yadav and Manisha J. Nene |
| Automated Digital Forensic Technique with Intrusion Detection Systems Komal Barhate and C. D. Jaidhar |
| Rapid Upgradation and Remote Service Station Facitity for Embedded Based Systems V. V. Deotare, D. V. Padole and Vikrant K. Mohanty |
| Quadrature Band and Penta-Band MIMO Antenna by Mutually Coupling Non-Radiating Edges V. V. Mapare, S. V. Mapare and G. G. Sarate |
| Triple Band Slotted Patch Antenna for Microwave Communication Bipa Datta, Arnab Das, Abhijit Kundu, Moumita Mukherjee and Santosh Kumar Chowdhury |
| Novel Approach for Loss Reduction in LPF for Satellite Communication System Kiran P. Singh, Anurag Paliwal and Madhur Deo Upadhyay |
| Priority Aided Scheduling of Pigeons in Homing-Pigeon-Based Delay Tolerant Networks Priyanka Das, Kavita Dubey and Tanmay De |
| Routing in Delay Tolerant Networks Using Credit Based Spraying Priyanka Das, Kavita Dubey and Tanmay De |
| An Efficient Cluster Based Routing Protocol for MANET Dhirendra Kumar Sharma, Chiranjeev Kumar and Surajit Mandal |
| Enhancement of Performance by Embedding Trust Model into Reactive Routing Protocols – Applied to AODV, DSR and TORA A. Sudhir Babu and K. V. Sambasiva Rao |
| Designing a Clustered Database for Identification of Leaves Komal Asrani and Renu Jain |
| Comparative Analysis of Ad Hoc Routing Protocols Based on User's Point of View Naveen Bilandi, Harsh K. Verma and Naresh Kumar |
| Improving GA Based Automated Test Data Generation Technique for Object Oriented Software Nirmal Kumar Gupta and Mukesh Kumar Rohil |
| Performance Analysis of Congestion in Wireless Sensor Networks Gajendra S. Vyas and Vivek S. Deshpande |
| A Novel Particle Swarm Optimization Approach for VLSI Routing Abhinandan Khan, Sulagna Laha and Subir Kumar Sarkar |
| Reverse G-Shape Antenna for UWB with Notch Kunal Srivastava, Ashwani Kumar, Raj Kumar and A. K. Verma |
| A Split Half Reliability Coefficient Based Mathematical Model for Mitigating Selfish Nodes in Manets J. Sengathir and R. Manoharan |
| Real-Time Packet Scheduling for Real-Time Wireless Sensor Networks Pradeep Chennakesavula, Jemimah Ebenezer, S. A. V. Satya Murty and T. Jayakumar |
| Fuzzy-Controlled Cache Management (FCM) in Experience-Based Energy-Efficient Routing Protocol in Ad Hoc Networks Anuradha Banerjee, Paramartha Dutta and Subhankar Ghosh |
| C 2 Mesh – New Interconnection Network Topology Based on 2D Mesh Lalit Kishore Arora and Rajkumar |
| A Conceptual Framework for Personalized Location-Based Services (LBS) Tourism Mobile Application Leveraging Semantic Web to Enhance Tourism Experience Fadhlun Mohamed Mahmood and Zailan Arabee Bin Abdul Salam |
| An Improved Maximum Signal to Interference Ratio Scheduler at Base Station for Real Time Services in WiMAX Tarun Kulshrestha and Sanjay Tanwani |
| Determination of Rearrangement Cost for Optical Networks Kallol Krishna Karmakar and Mamun-ur-Rashid Khandker |
| Performance Evaluation of TCP Variants Under Different Node Speeds Using OPNET Simulator Chitranjan Sharma and Bhudev Tyagi |
| Graph Colouring Based Multi Pin Net Detailed Routing for FPGA Using SAT Shyamapada Mukherjee and Suchismita Roy |
| Preamble-Based Timing Synchronization for OFDM Systems U. C. Samal and K. Vasudevan |
| Performance Analysis of Multiple Detector Algorithms with Optimal Ordering for V-BLAST Architecture in MIMO System E. Bindu and B. V. R. Reddy |
| Improved Data Availability and Fault Tolerance in Manet by Replication C. B. Chandrakala, K. V. Prema and K. S. Hareesha |
| Cluster Head Selection Scheme for Data Centric Wireless Sensor Networks Vipin Pal, Girdhari Singh and R. P. Yadav |
| PPN – Prime Product Number Based Malicious Node Detection Scheme for MANETs Sapna Gambhir and Saurabh Sharma |
| Online Social Network Architecture – A Push Towards Users’ Accountability Mohit Gambhir, M. N. Doja and Moinuddin |
| Mathematical Analysis & Model of Packet Delay Variation Experienced by IEEE 1588 Packets Jayesh Chhapekar |
| Amplifying-Forward MIMO Based Mutual Information Analysis for Correlated Fading Channel V. Shivrain and A. Kansal |
| Proposed Profile Translation Based Proactive Adaptation Using Context Management (PTPACM) in Smartphones Poonam N Railkar and Parikshit N Mahalle |
| New Identity Based Signature Scheme Using Bilinear Pairings Over Elliptic Curves P. V. S. S. N. Gopal, P. Vasudeva Reddy and T. Gowri |
| Application Performance Analysis During Live Migration of Virtual Machines M. R. Anala, Manjunath Kashyap and G. Shobha |
| GA-SVD Based Signal Detection in Cognitive Radio Networks Varsha Saxena and S. J. Basha |
| PushNotify – Push Server Application Mohammad Danish and Pritee Parwekar |
| A Key Based Cache Replacement Policy for Cooperative Caching in Mobile Ad hoc Networks Preetha Theresa Joy and K. Poulose Jacob |
| Detection of Malicious Attack in MANET a Behavioral Approach Meenakshi Patel and Sanjay Sharma |
| Optimistic Congestion Control to Improve the Performance of Mobile Ad Hoc Network Chandra Prakash Sahu, Prem Shankar Yadav, Sachin Ahuja and Rajesh Prasad |
| An Efficient Signcryption Scheme Based on ECC with Forward Secrecy and Encrypted Message Authentication Maitreyee Dutta, Anuj Kumar Singh and Ajay Kumar |
| Linear Order Sensor Network Deployment for Coverage Analysis Based on TBM Theory Sushil Kumar and D. K. Lobiyal |
| Energy Balancing Multiple Sink Optimal Deployment in Multi-Hop Wireless Sensor Networks Deepak R. Dandekar and P. R. Deshmukh |
| Survey and Analysis of Mobility Management Protocols for Handover in Wireless Network Khatib Noaman Ashraf, Vidhate Amarsinh and Devane Satish |
| Design and Analysis of Modified H Shaped Antenna for Wireless Communication Rahul S. Batra, Dipika S. Sagne and P. L. Zade |
| Energy Efficient Communication Overhead Algorithm in Wireless Sensor Networks Bhupendra and Vidushi Sharma |
| Few More Quasi-Orthogonal Space-Time Block Codes with 3-Time Slots for Wireless Communication Ritu Chauhan, Rohit Singhal, Narendra Singh Thakur and Satendra Singh Thakur |
| Design of Modified Geometry Sierpinski Carpet Fractal Antenna Array for Wireless Communication Dipika S. Sagne, Rahul S. Batra and P. L. Zade |
| The Analysis of AODV, Based on Mobility Model Arvind Kumar Shukla, C. K. Jha, Nitin Saxena and Sanjay Kumar Biswash |
| Co-Channel Interference Modeling for Land Mobile Radio System Sonia Gupta, S. P. Singh and V. K. Pandey |
| Efficient Data Forwarding Techniques in Wireless Sensor Networks Zeenat Rehena, Sarbani Roy and Nandini Mukherjee |
| Handling Area Fault in Multiple-Sink Wireless Sensor Networks Zeenat Rehena, Debasree Das, Sarbani Roy and Nandini Mukherjee |
| Impact of Trust, Security and Privacy Concerns in Social Networking – An Exploratory Study to Understand the Pattern of Information Revelation in Facebook Anil Dhami, Neha Agarwal, Tamal Kanti Chakraborty, Brijendra Pratap Singh and Jasmine Minj |
| Reduced Complexity Channel Estimation Method for Multi Input Multi Output-Orthogonal Frequency Division Multiplexing Systems by Subspace Tracking Ganesh Miriyala, Amit Kaul and Ravinder Nath |
| Clustering Analysis in Social Network Using Covering Based Rough Set Anirban Mitra, Sangita Rani Satapathy and Subrata Paul |
| Polarization Tunable Microstrip Patch Antenna Using RF-MEMS Nazia Hasan and S. C. Gupta |
| Analysis of SMAC Protocol for Missioon Critical Applications in Wireless Sensor Networks Gayatri Sakya, Vidushi Sharma and P. C. Jain |
| Distributed Dual Beamforming for Randomly Distributed Sensors Using LS Estimation G. Vaikundam and G. F. Sudha |
| A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack Using Advanced DRI Table in Ad hoc Network Ankur Mishra, Ranjeet Jaiswal, Raghvendra Shukla and Ritesh Jain |
| Cooperative Clustering Protocol for Mobile Devices with Bluetooth and Wi-Fi Interface in mLearning S. V. Vambase and S. R. Mangalwede |
| Multiobjective Multicast Routing in Wireless Ad Hoc Networks – An Ant Colony Approach Sunita Prasad, Zaheeruddin and D. K. Lobiyal |
| Novel Techniques to Reduce PAPR in OFDM Systems Using Threshold SLM Bahubali K. Shiragapur, Uday Wali and Sandeep Bidwai |
| E-Business Strategies to Cut Back Cost of Business Enterprise Ahmad Tasnim Siddiqui and Amjath Fareeth Basha |
| Energy Efficient Air Indexing Schemes for Single and Multi-Level Wireless Channels Vikas Goel, Garima Panwar and Anil Kumar Ahlawat |
| Energy Efficient Analysis of Heterogeneous Wireless Network Arjun Singh and Rajarshi Mahapatra |
| Cost Performance Analysis of Intrusion Detection System in Mobile Wireless Ad-Hoc Network Anil Kumar Pinnaka, D. Tharashasank and V. S. K. Reddy |
| Comparison of Present-Day Networking and Routing Protocols on Underwater Wireless Communication Harish Ramani |
| Π-Shape Microstrip Antenna Design for WiMAX, Wi-Fi and Biomedical Application at 2.45 GHz Md. Masudur Rahman, Md. Mozaffor Hossain and Kallol Krishna Karmakar |
| An Efficient Defense Method Against UDP Spoofed Flooding Traffic of Denial of Service (DoS) Attacks in VANET Karan Verma, Halabi Hasbullah and Ashok Kumar |
| Enhancement of RC6 Block Cipher Algorithm and Comparison with RC5 & RC6 Harsh Kumar Verma and Ravindra Kumar Singh |
| Ultra Wide Band Dual Stacked Microstrip Antenna with Narrow Slits Pradeep Rana, Subodh Kumar Tripathi, Manoj Kumar Pal and B. K. Kanaujia |
| Numerical Performance Evaluation of Heterogeneous Multi-Server Models with Breakdowns and FCFS, LCFS-PR, LCFS-NPR Repair Strategies Abhilash, Ram Chakka and Rama Krishna Challa |
| CBSRP – Cluster Based Secure Routing Protocol Monzur Morshed and Rafiqul Islam |
| Localization in Wireless Sensor Networks Using Directionally Information Sunil Kumar, Radhakrishnan Ramaswami and Kapil Tomar |