Special Issue of ICACSSE 2014
Article-1
Title
Software Testing, Analysis and Objectives
01 - 04
Article-2
Title
A naive Fuzzy Clustering Method for Pixel Segmentation by using Differential Evolution
05 - 10
Article-3
Title
Multi-Recipient Action Based Tapping in Email Communication
11-16
Article-4
Title
Performance of Modified Jacobi Sequences with Good Merit Factor
17-24
Article-5
Title
Traffic Management Using Fuzzy Control System in Net
25-28
Article-6
Title
High Speed and Low Power Implementation of FIR Filter Design using DADDA & WALLACE Tree Multiplier
29-34
Article-7
Title
Removal of low and high density salt and pepper noise using combination of Fuzzy logic and Median Filter
35-39
Article-8
Title
DESIGN OF A SYNTHESIZABLE PIPELINED MIPS CORE FOR EMBEDDED APPLICATIONS
40-44
Article-9
Title
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain
45-48
Article-10
Title
DIGITAL IMAGE NOISE FILTERING USING EVOLVABLE HARDWARE
49-53
Article-11
Title
Power Saving and Reducing Transmission Delay in WSN using DMP Scheme
54-59
Article-12
Title
GNU Radio Based BIST for SDR Performance Measurement
60-63
Article-13
Title
Prioritized Coding of Multiple ROIs on Medical Image
64-67
Article-14
Title
Lifting Bi-orthogonal Wavelet Transform Based Edge Feature Extraction
68-71
Article-15
Title
Optimal Location of STATCOM for Voltage Security Enhancement Using PSO
72-76
Article-16
Title
Importance of Load Balancing in Cloud Computing Environment: A Review
77-82
Article-17
Title
128-bit Advanced Encryption Standard Algorithm implementation on FPGA
83-88
Article-18
Title
Security Based Intrusion-Detection System for Ad hoc mobile wireless networks
89-93
Article-19
Title
Supervision termination for multipath routing with intervention detection in wireless sensor networks
94-97
Article-20
Title
A Novel Framework Lime Lighting Dedup Over Caches in an Tacit Dope Center
98-104
Article-21
Title
An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks
105-110
Article-22
Title
Defending against Flood Attacks in Distraction Unbiased Networks
111-115
Article-23
Title
EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)
116-121
Article-24
Title
ELEVATED RECITAL COMMUNICATION IN MIMO ADHOC ASSOCIATIONS BY MANIPULATING SUPPORTIVE CONVEY
122-125
Article-25
Title
A Person and Proclamation identification by using Local Directional Number Pattern
126-131
Article-26
Title
AN EXTREMELY ASCENDIBLE KEY PRE-DISTRIBUTION THEME FOR WIRELESS DEVICE NETWORKS
132-137
Article-27
Title
Least Outlay Jamming Obstruction In Multi Path Wireless Routing Protocols
138-142
Article-28
Title
Presumable Study of Single Sign-on Technique for Distributed Network Systems
143-147
Article-29
Title
Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks
148-151
Article-30
Title
Energy-Efficient Cooperative Video Distribution with applied mathematics QoS Provisions over Wireless Networks
152-157
Article-31
Title
Communication Networks Based on Price Differentiation
158-163
Article-32
Title
Node Stateless In Mantes Network Management By Using Statistics And Security Identifies Protocol
164-168
Article-33
Title
Exemplar rooted digital inpainting image
169-172
Article-34
Title
PRECLUDING SPAMS BY USING REVOCABLE DATA SMACKING IN ENCRYPTED IMAGES
173-177
Article-35
Title
Query Generation for Multimedia Data Selection and Presentation
178-183
Article-36
Title
Defending Computer Networks from Covert Operations using Chaos Theory
184-188
Article-37
Title
ICMP: A Novel Profile Matching Scheme in Mobile Social Networks
189-194
Article-38
Title
WIRELESS AD HOC NETWORKS CREATION BASED ON SECURE PROTOCOL
195-202
Article-39
Title
Firewall Optimization for Privacy-Preserving With Cross Domain
203-206
Article-40
Title
A Pragmatic Intervention Model For Network Consistency Evaluation In Wireless Networks
207-211
Article-41
Title
Attribute-Aware information Aggregation exploitation Potential-Based Dynamic Routing in Wireless detector Networks
2212-217
Article-42
Title
A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks
218-222
Article-43
Title
Robust Satellite Image Resolution Enhancement using Double Density Dual Tree Complex Wavelet Transform
223-228
Article-44
Title
Companionate Data in Wireless Sensor Network with Prune Delay
229-233
Article-45
Title
Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction
234-238
Article-46
Title
DYNAMIC MANAGEMENT OF CRYPTOGRAPHY FOR PROGRESSIVE PACKET ARRIVALS IN DTNS
239-243
Article-47
Title
Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control
244-248
Article-48
Title
Noise Removing for Enhanced Images using Wavelet Transform
249-253
Article-49
Title
Secure sharing in distributed information Management Applications
254-259
Article-50
Title
Facilitating Indirect Mutual Trust for Cloud Storage Systems
260 -266
Article-51
Title
OPPORTUNISTIC MANETS: QUALITY WILL FRAME FOR LOW TRANSMISSION POWER
267-271
Article-52
Title
Face Ascertain Based Method For Accessible By Pardons Words
272-277
Article-53
Title
SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management
278-281
Article-54
Title
Cloud based Structure Approach of Content-As-A-Service for Supplier Impartial of Mobile Gadgets
282-287
Article-55
Title
Comparing Performance of Kalman Filtering and DWT based Speech Enhancement Techniques
288-293
Article-56
Title
Instinctive Digital Snapshot - Graph Matching for Character Identification
294-299
Article-57
Title
Nonlinear Approximations in Sigmoid Transfer Function for Improved Statistical Pattern Recognition Based on PNN Bayesian Approach
300-305
Article-58
Title
Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
306-309
Article-59
Title
An Efficient Key Exchange Authentication using Browser based Security
310-315
Article-60
Title
CREATION OF DYNAMIC QUERY FOR MINING HIGHLY OPTIMIZED TRANSACTIONAL DATABASES
316-320
Article-61
Title
High-Limit Reversible Information Stowing away In Double Pictures by Utilizing Example Substitution
321-326
Article-62
Title
Web Image Re-ranking using Query Log Data and visual photo Quality Assessment
327-331
Article-63
Title
Artificial Intelligence in Cyber Defense
332-336
Article-64
Title
Adaptable Face Picture Recovery utilizing Quality Upgraded Meager Code words
337-341
Article-65
Title
Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks
342-346
Article-66
Title
Secure Mining of Affiliation Runs in Evenly Disseminated Databases
347-351
Article-67
Title
A VISUAL CRYPTOGRAPHY SCHEME WITH LAYERED EXPANSION FOR SECRETHALFTONE IMAGES
352-356
Article-68
Title
An Exteriorized Itinerant Search Portal
357-360
Article-69
Title
C-Privacy: Collaborative Data Publishing to Preserve Integrity in Data Dissemination
361-366
Article-70
Title
Access Approach Union for Occasion Preparing Frameworks
367-371
Article-71
Title
GENETIC ALGORITHM TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE IN MODULE SYSTEM
372-375
Article-72
Title
On The Node Clone Detection Using DHT and RDE
376-379
Article-73
Title
An Efficient Reversible Data Hiding Technique using Reserving Room before Encryption for Data Hiding in Encrypted Images
380-384
Article-74
Title
Fault Node Identification Using Comparison Models
385-388
Article-75
Title
A Hybrid Intrusion Detection System for Identification of Anonymous Behavior
389-391
Article-76
Title
Answering General Time Sensitive Queries
392-394
Article-77
Title
Service Oriented application based search Engine for Mobile
395-398
Article-78
Title
Privacy Preserving and Optimal Keyword Search Over Out Sourced Data
399-402
Article-79
Title
An Empirical Model of Data Monitoring Service over cloud
403-407
Article-80
Title
An efficient Privacy Preserving Data Clustering over distributed Networks
408-410
Article-81
Title
A Novel Intrusion Detection System with Classification and Signature approach
411-413
Article-82
Title
A Double Layer Security Scheme for Conserving Private Data in Cloud Services
414-418
Article-83
Title
A Novel classification approach for Firewall Log data Analysis
419-422
Article-84
Title
A Genetic Based Pattern Mining approach for Search engine optimization
423-426
Article-85
Title
An Empirical Model of Secure Data Sharing between Multi Data Owners
427-430
Article-86
Title
Frequent Pattern Comparative Analysis of Apriori and FLAG Matrix
431-434
Article-87
Title
Privacy Preserving Data Storage of Intermediate Data Sets over Cloud
435-438
Article-88
Title
An Efficient Filtering Technique over Undesirable Data of OSN User Walls
439-442
Article-89
Title
A Secure Self-Destructive Active Storage Framework for Data Confidentiality
443-446
Article-90
Title
An Evolutionary approach for Candidate Set generation with String Transformation Technique
447-450
Article-91
Title
A Framework for Attaining Uncertainty and Traceability in WMN
451-455
Article-92
Title
Design of Optimized 64 Bit MAC Unit for DSP Applications
456-460
Article-93
Title
TRI-DCT BASED FAST BACK PROPAGATION ALGORITHM
461 - 465
Article-94
Title
Performance Analysis of High Speed DDR3 SDRAM
466-469
Article-95
Title
MIMO-OFDM DOWNLINK WIRELESS SYSTEM WITH REDUCED PAPER
470-475
Article-96
Title
MIMO RADAR PERFORMANCE USING SWERLING SCATTERING MODELS
504-480
Article-97
Title
CAPSULE IMAGE RETRIEVAL USING EDGE BASED ALGORITHMS
481-484
Article-98
Title
Artificial Neural Network Model for the Prediction of Thrombo-embolic Stroke
485-492
Article-99
Title
Review on Classification Techniques in Data Mining
493-497
Article-100
Title
Opinion Mining and Sentiment Analysis: A Survey
498-502
Article-101
Title
A New System to Generate Simplified Decision Trees for applicability in the domain of Health Care
503-507
Article-102
Title
A PROTOTYPE FOR DIAGNOSING CANCER DISEASE USING ADVANCED MINING TECHNIQUE
508-514
Article-103
Title
Secure Communication using Modified S-DES with Steganography
515-518
Article-104
Title
A Survey on gap between SQL and DMQL
519-525
Article-105
Title
Detecting Outliers in Large Dataset using Distributed Method
526-528
Article-106
Title
Mobile Sensor and Destination Tracking in Wireless Sensor Networks
529-532
Article-107
Title
Classification of Diabetic Retinopathy Using Image Processing and Soft Computing Techniques
533-537