| Computing | |
| Modified Trivial Rejection Criteria in Cohen-Sutherland Line Clipping Algorithm | p. 1 |
| Greedy Views Selection Using Size and Query Frequency | p. 11 |
| Quantum-Inspired Differential Evolution on Bloch Coordinates of Qubits | p. 18 |
| Extending Speech-Act Based Communication to Enable Argumentation in Cognitive Agents | p. 25 |
| Medical Diagnosis Using Generic Intelligent Agents | p. 41 |
| Computational Modeling and Dynamical Analysis of Genetic Networks with Frbpn-Algorithm | p. 49 |
| A Petri Net-Fuzzy Predication Approach for Confidence Value of Called Genetic Bases | p. 56 |
| Textural Feature Based Image Classification Using Artificial Neural Network | p. 62 |
| Data-Warehousing Applications in Manufacturing Industry-Applicable Solutions and Challenges Faced | p. 70 |
| Application of Clustering in Virtual Stock Market | p. 79 |
| Distribution of Loads and Setting of Distribution Sub Station Using Clustering Technique | p. 88 |
| Landscape of Web Search Results Clustering Algorithms | p. 95 |
| An Improved K-Means Clustering Approach for Teaching Evaluation | p. 108 |
| Consensus Based Dynamic Load Balancing for a Network of Heterogeneous Workstations | p. 116 |
| An Effective Way to Hide the Secret Audio File Using High Frequency Manipulation | p. 125 |
| Web Usage Mining: An Implementation View | p. 131 |
| A Genetic Algorithm Way of Solving RWA Problem in All Optical WDM Networks | p. 137 |
| Working of Web Services Using BPEL Workflow in SOA | p. 143 |
| A Meta Search Approach to Find Similarity between Web Pages Using Different Similarity Measures | p. 150 |
| Cost Estimation for Distributed Systems Using Synthesized Use Case Point Model | p. 61 |
| Comparative Approach to Cloud Security Models | p. 170 |
| Development of Agile Security Framework Using a Hybrid Technique for Requirements Elicitation | p. 178 |
| Accuracy Comparison of Predictive Algorithms of Data Mining: Application in Education Sector | p. 189 |
| Orchestrator Model for System Security | p. 195 |
| Communication | |
| Performance Analysis of Interleave Division Multiple Access Scheme with Different Coding Techniques | p. 200 |
| Channel Assignment to Minimize Interference in Multiradio Wireless Mesh Networks | p. 208 |
| IEC 61850: Goose Messaging Implementation for MPR | p. 214 |
| Performance Analysis of Energy Efficient Routing Algorithms for Adhoc Network | p. 222 |
| ECG Signal Compression Using Different Techniques | p. 231 |
| Efficient Content Based Video Retrieval for Animal Videos | p. 242 |
| Data Randomization for Synchronization in OFDM System | p. 249 |
| Split Step Method in the Analysis and Modeling of Optical Fiber Communication System | p. 254 |
| Performance Analysis of MIMO-Space-Time Trellis Code System over Fading Channels | p. 262 |
| Modeling Performance Evaluation of Reinforcement Learning Based Routing Algorithm for Scalable Non-cooperative Ad-hoc Environment | p. 269 |
| SRPV: A Speedy Routing Protocol for VANET | p. 275 |
| Simultaneous Multiple Link/Node Failure Handling for Different Service-Paths in MPLS Networks | p. 285 |
| Energy-Efficient Multilevel Clustering in Heterogeneous Wireless Sensor Networks | p. 293 |
| Anomaly Detection in Ethernet Networks Using Self Organizing Maps | p. 300 |
| A Heuristic Multi Criteria Routing Protocol in Wireless Sensor Networks | p. 306 |
| Framework and Implimentation of an Agent Based Congestion Control Technique for Mobile Ad-hoc Network | p. 318 |
| A Hybrid Algorithm for Satellite Image Classification | p. 328 |
| An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA) | p. 335 |
| A Robust and Fast Text Extraction in Images and Video Frames | p. 342 |
| A Chip-Based Watermarking Framework for Color Image Authentication for Secured Communication | p. 349 |
| An Image Decomposition Parallel Approach to Train Flann for an Adaptive Filter | p. 355 |
| Palette based Technique for Image Steganography | p. 364 |
| Bilingual Malayalam - English OCR System Using Singular Values and Frequency Capture Approach | p. 372 |
| Minimization of Handoff Failure and Cellular Traffic by Introducing IEEE 802.11b WLAN Router in the Handoff Region | p. 378 |
| Design of GSM Based Auto-responder for Educational Institute | p. 386 |
| Minimization of Handoff Latency by Area Comparison Method Using GPS Based Map | p. 393 |
| Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks | p. 400 |
| Comparison of Routing Protocols for MANET and Performance Analysis of DSR Protocol | p. 406 |
| Transmitter Based Capacity Enhancement with Cross-Layer Design Approach for IEEE 802.11 Ad-hoc Networks | p. 413 |
| Wireless Sensor Network Using Bluetooth | p. 424 |
| A Performance of Security Aspect in WiMAX Physical Layer with Different Modulation Schemes | p. 433 |
| CE-OFDM: A PAPR Reduction Technique | p. 441 |
| Initializing Cluster Center for K-Means Using Biogeography Based Optimization | p. 448 |
| Implementation of Parallel Image Processing Using NVIDIA GPU Framework | p. 457 |
| Control | |
| Toggle Coverage for ALU Using VHDL | p. 465 |
| Design and Implementation of Voltage Control Oscillator (VCO) Using 180nm Technology | p. 472 |
| Design of Robust PID Controller for Flexible Transmission System Using Quantitative Feedback Theory (QFT) | p. 479 |
| Flatness Based Formation Control of Non Holonomic Vehicle | p. 486 |
| High Performance Tracking Controller for the Class of Uncertain Discrete-Time System with Input Delay | p. 494 |
| Implementation of Controller Area Network (CAN) Bus (Building Automation) | p. 507 |
| DXCCII-Based Mixed-Mode Electronically Tunable Quadrature Oscillator with Grounded Capacitors | p. 515 |
| Stereo Matching for 3D Building Reconstruction | p. 522 |
| Fingerprint Identification Using Sectionized Walsh Transform of Row and Column Mean | p. 530 |
| Author Index | p. 537 |
| Table of Contents provided by Ingram. All Rights Reserved. |