| Efficient Hybrid Technique for Detecting Zero-Day Polymorphic Worms Ratinder Kaur and Maninder Singh |
| Realization of a Low Power Sensor Node Processor for Wireless Sensor Network and Its VLSI Implementation Joyashree Bag, Subhashis Roy and Subir Kumar Sarkar |
| MuteTrans: A Communication Medium for Deaf Naveenkumar C. Patil, Khyamling A. Parane, M. V. Guruprasad and Shivananda R. Poojara |
| Ranked Linear Discriminant Analysis Features for Metamorphic Malware Detection Jikku Kuriakose and P. Vinod |
| Grid Based Clustering Protocol with Dynamic Range Cluster Head Advertisement and Traffic Splitting in Wireless Sensor Networks Melaku Tamene and Kuda Nageswara Rao |
| Node Movement Stability and Congestion Aware Anycast Routing in Mobile Ad Hoc Networks P. I. Basarkod and S. S. Manvi |
| Order Management Sudoku—Simplified approach to transform OSS/BSS Anil Prasad Kurnool and Lata Dyaram |
| QoS Mapping from User to Network Requirements in WMSN: A Fuzzy Logic Based Approach Nagesha and S. S. Manvi |
| Dynamic Data Aggregation for Energy Optimization in Multi-Hop Wireless Sensor Networks L. N. Abhilash, Devaansh Goenka and Chetan Kumar |
| Land Slide Detection and Monitoring System Using Wireless Sensor Networks (WSN) G. N. L. Ravi Teja, V. K. R. Harish, D. Nayeem Muddin Khan, R. Bhargava Krishna, Rajesh Singh and S. Chaudhary |
| Free-Rider Detection and Punishment in BitTorrent Based P2P Networks Anuja Bhakuni, Parul Sharma and Rishabh Kaushal |
| Analysis of Routing Protocols Using UDP Traffic Under Dynamic Network Topology Trilok Kr. Saini, Satyendra Kumar and M. K. Dhaka |
| SOPC Based Network Enabled Voice Codec Unit Kapil Mahawar and M. K. Dhaka |
| Achieving Energy Efficiency and Increasing Network Life in Wireless Sensor Network Amrita Ruperee, Shikha Nema and Sanjay Pawar |
| Simulation and Investigation of Zigbee Sensor Network with Mobility Support Amritpal Kaur, Jaswinder Kaur and Gurjeevan Singh |
| Wireless Sensor Based Energy Conservation Via Bluetooth Siddhartha Jaitly, Sheila Mahapatra and A. N. Jha |
| A Model for Reducing the Effect of Ambient Light Source in VLC System Santosh Verma, Abhinav Shandilya and Ankit Singh |
| Adaptive Multi-Path Routing for Congestion Control N. Krishna Chaitanya, S. Varadarajan and P. Sreenivasulu |
| Detection of HELLO Flood Attack on LEACH Protocol Shikha Magotra and Krishan Kumar |
| Prevention of Information Leakages in a Web Browser by Monitoring System Calls Harshad Wadkar, Arun Mishra and Arati Dixit |
| Design and Implementation of Obstacle Detection Algorithm in Robotics Meha Sharma, Rewa Sharma, Gaurangi Kaushik and Swati Jha |
| Study of Filter Bank Multicarrier Cognitive Radio Under Wireless Fading Channel A. S. Kang and Renu Vig |
| Maximizing Lifetime of Wireless Sensor Networks Using Genetic Approach Sanjeev Wagh and Ramjee Prasad |
| Relay Node Placement Algorithm in Wireless Sensor Network Kumar Nitesh and Prasanta K. Jana |
| Complete k-Line Coverage and Connectivity in Wireless Sensor Networks S. K. L. V. Sai Prakash and Guru Bharath Seema |
| DiffServ-Aware Multi Protocol Label Switching Based Quality of Service in Next Generation Networks Umer Mushtaq Mir, Ajaz H. Mir, Adil Bashir and Mohammad Ahsan Chishti |
| Wireless Sensor Network Implementation using MiWi Wireless Protocol Stack Suman Chhajed, Mohammad Sabir and Kiran P. Singh |
| Availability and Handling of Data Recived Through GPS Device: In Tracking a Vehicle Rajeev Kumar and Harish Kumar |
| A Robust Multiple Watermarking Technique for Information Recovery Vidhi Khanduja, Shampa Chakraverty, Om Prakash Verma, Rakshita Tandon and Sahil Goel |
| Design an Anomaly Based Fuzzy Intrusion Detection System for Packet Dropping Attack in Mobile Ad Hoc Networks Alka Chaudhary, V. N. Tiwari and Anil Kumar |
| BER Analysis of Single/Multi-User LTE and LTE-A Systems Pallvi Chawla and Bhasker Gupta |
| Performance Analysis of IEEE 802.11E Under Binomial Backoff Algorithm G. Shanti, M. Sai Kumar, P. Sucharitha, J. Nipun Kumar and B. N. Bhandari |
| Using Identity and Trust with Key Management for Achieving Security in Ad Hoc Networks Pallavi Khatri |
| Assessment of Energy Detection Spectrum Sensing Under Different Wireless Channels S. Taruna, Bhumika Pahwa and Ikpreet Kaur |
| Performance Analysis of Wireless Sensor Network G. Sandhya Rani, T. S. Shri Krishnan, Vinita Daiya, Jemimah Ebenezer and S. A. V. Satya Murty |
| A Hybrid Anomaly Detection Model Using G-LDA Bhavesh Kasliwal, Shraey Bhatia, Shubham Saini, I. Sumaiya Thaseen and Ch. Aswani Kumar |
| A Discrete Time Polling Protocol for Wireless Body Area Network Anil K. Jacob and Lillykutty Jacob |
| Maximum Coverage Heuristics (MCH) for Target Coverage Problem in Wireless Sensor Network Dimple Bajaj and Manju |
| A New Tool for Lightweight Encryption on Android Sushma Verma, Saibal Kumar Pal and S. K. Muttoo |
| A Reactive Approach for Detection of Collusion Attacks in P2P Trust and Reputation Systems Nitin Kumar Saini, Vikas Kumar Sihag and Ramesh Chand Yadav |
| Lifetime Maximizing Cooperative Energy Efficient Broadcast Tree in Multi Hop Wireless Networks Keshaw Dewangan and Sanghita Bhattacharjee |
| Differentiated QoS Framework for Video Transmission Over Wireless LANs Using Push-Out Policy K. Madhana and M. Usha |
| Throughput Optimization with Cooperative Spectrum Sensing in Cognitive Radio Network Abhijit Bhowmick, Mrinal K. Das, Joydeep Biswas, Sanjay Dhar Roy and Sumit Kundu |
| Relay Based Cooperative Spectrum Sensing in Cognitive Radio Network Abhijit Bhowmick, Mrinal K. Das, Joydeep Biswas, Sanjay Dhar Roy and Sumit Kundu |
| Resource and Subcarriers Allocation for OFDMA Based Wireless Distributed Computing System Tangudu Ramji, Baratram Ramkumar and M. Sabarimalai Manikandan |
| Extending Open vSwitch to L4-L7 Service Aware OpenFlow Switch Prasad Gorja and Rakesh Kurapati |
| Session Rate Prediction for Multimedia Streaming Prathmesh N. Gunjgur and Amarsinh V. Vidhate |
| A Technique for Classification of VoIP Flows in UDP Media Streams Using VoIP Signalling Traffic Tejmani Sinam, Irengbam Tilokchan Singh, Pradeep Lamabam, Ngasham Nandarani Devi and Sukumar Nandi |
| Performance Analysis of Bee-Hive Routing in Multi-radio Networks K. Kiran, T. Shivapriya, Abhishek Alfred Singh, Nazima Begum, R. Ramya, P. Deepa Shenoy, K. R. Venugopal and Lalit M. Patnaik |
| Anti-Theft Application for Android Based Devices Azeem Ush Shan Khan, Mohammad Naved Qureshi and Mohammed Abdul Qadeer |
| Priority-Based Adaptive Rate Control for Wireless Sensor Networks Subha Kanta Swain and Pradipta Kumar Nanda |
| Multi-Level LEACH Protocol Model Using NS-3 Ravi Kishore Kodali and Naveen Kumar Aravapalli |
| Quality of Service Enhancement in MANETs with an Efficient Routing Algorithm Meena Rao, Meena Rao and Neeta Singh |
| Femtocell Based Economic Health Monitoring Scheme Using Mobile Cloud Computing Debashis De and Anwesha Mukherjee |
| A Vote Based System to Detect Misbehaving Nodes in MANETs Rahul Talreja and Vimla Jethani |
| Trade-Off Between AND and OR Detection Method for Cooperative Sensing in Cognitive Radio Jai Sukh Paul Singh, Mritunjay K. Rai, Jasvir Singh and A. S. Kang |
| Patient Health Management System Using e-Health Monitoring Architecture Srijani Mukherjee, Koustabh Dolui and Soumya Kanti Datta |
| Linear Equation Based Visual Secret Sharing Scheme Subhash Chand Bunker, Mayur Barasa and Aparajita Ojha |
| Improved Session Handover in Mobile Wireless Networks for Video Streaming Vidhate Amarsinh and Devane Satish |
| Digital Forensics Investigations in the Cloud Neha Thethi and Anthony Keane |