Table of Contents
Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic Aravinthan Parthibarajan Gopalakrishnan Narayanmurthy Arun Srinivas Parthibarajan Vigneswaran Narayanamurthy 1
An Intelligent Network for Offline Signature Verification Using Chain Code Minal Tomar Pratibha Singh 10
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP Antu Annam Thomas M. Wilscy 23
An Automatic Evolution of Rules to Identify Students' Multiple Intelligence Kunjal Mankad Priti Srinivas Sajja Rajendra Akerkar 35
A Survey on Hand Gesture Recognition in Context of Soft Computing Ankit Chaudhary J. L. Raheja Karen Das Sonia Raheja 46
Handwritten Numeral Recognition Using Modified BP ANN Structure Amit Choudhary Rahul Rishi Savita Ahlawat 56
Expert System for Sentence Recognition Bipul Pandey Anupam Shukla Ritu Tiwari 66
RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets Monowar H. Bhuyan D. K. Bhattacharyya J. K. Kalita 76
Distributed and Parallel Systems and Algorithms
A Review of Dynamic Web Service Composition Techniques Demian Antony D'Mello V. S. Ananthanarayana Supriya Salian 85
Output Regulation of Arneodo-Coullet Chaotic System Sundarapandian Vaidyanathan 98
A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS Indranil Hatai Indrajit Chakrabarti 108
A Mathematical Modeling of Exceptions in Healthcare Workflow Sumagna Patnaik 120
Functional Based Testing in Web Services Integrated Software Applications Selvakumar Ramachandran Lavanya Santapoor Haritha Rayudu 130
Design and Implementation of a Novel Distributed Memory File System Urvashi Karnani Rajesh Kalmady Phool Chand Anup Bhattacharjee B. S. Jagadeesh 139
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment Malarvizhi Nandagopal V. Rhymend Uthariaraj 149
Adoption of Cloud Computing in e-Governance Rama Krushna Das Sachidananda Patnaik Ajita Kumar Misro 161
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching Khushboo Hemnani Dushyant Chawda Bhupendra Verma 173
A Semantic Approach to Design an Intelligent Self Organized Search Engine for Extracting Information Relating to Educational Resources B. Saleena S. K. Srivatsa M. Chenthil Kumar 183
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System Katheeja Parveen Sheik Abdul Khader Munir Ahamed Rabbani 190
Integration Testing of Multiple Embedded Processing Components Hara Gopal Mani Pakala K. V. S. V. N. Raju Ibrahim Khan 200
Security and Information Assurance
A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks S.A. Arunmozhi Y. Venkataramani 210
A Model for Delegation Based on Authentication and Authorization Coimbatore Chandersekaran William R. Simpson 217
Identification of Encryption Algorithm Using Decision Tree R. Manjula R. Anitha 237
A Novel Mechanism for Detection of Distributed Denial of Service Attacks Jaydip Sen 247
Authenticating and Securing Mobile Applications Using Microlog Siddharth Gupta Sunil Kumar Singh 258
Assisting Programmers Resolving Vulnerabilities in Java Web Applications Pranjal Bathia Bharath Reddy Beerelli Marc-André Laverdiére 268
Estimating Strength of a DDoS Attack Using Multiple Regression Analysis B. B. Gupta P. K. Agrawal R. C. Joshi Manoj Misra 280
A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application G. A. Sathishkumar K. Bhoopathybagan N. Sriraam SP. Venkatachalam R. Vignesh 290
Chest X-Ray Analysis for Computer-Aided Diagnostic Kim Le 300
Overcoming Social Issues in Requirements Engineering Selvakumar Ramachandran Sandhyarani Dodda Lavanya Santapoor 310
Ad Hoc and Ubiquitous Computing
Range-Free Localization for Air-Dropped WSNs by Filtering Neighborhood Estimation Improvements Eva M. García Aurelio Bermúdez Rafael Casado 325
Evolution of Various Controlled Replication Routing Schemes for Opportunistic Networks Hemal Shah Yogeshwar P. Kosta 338
Collaborative Context Management and Selection in Context Aware Computing B. Vanathi V. Rhymend Uthariaraj 348
Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis Keshavamurthy B. N. Durga Toshniwal 358
Wireless Ad Hoc Networks and Sensor Networks
Application of Euclidean Distance Power Graphs in Localization of Sensor Networks G. N. Purohit Seema Verma Usha Sharma 367
A New Protocol to Secure AODV in Mobile AdHoc Networks Avinash Krishnan Aishwarya Manjunath Geetha J. Reddy 378
Spelling Corrector for Indian Languages K. V. N. Sunitha A. Sharada 390
Voltage Collapse Based Critical Bus Ranking Shobha Shankar T. Ananthapadmanabha 400
Multiplexer Based Circuit Synthesis with Area-Power Trade-Off Sambhu Nath Pradhan Santanu Chattopadhyay 410
Exergaming - New Age Gaming for Health, Rehabilitation and Education Ankit Kamal 421
Inclusion/Exclusion Protocol for RFID Tags Selwyn Piramuthu 431
Min Max Threshold Range (MMTR) Approach in Palmprint Recognition Jyoti Malik G. Sainarayanan Ratna Dahiya 438
Power and Buffer Overflow Optimization in Wireless Sensor Nodes Gauri Joshi Sudhanshu Dwivedi Anshul Goel Jaideep Mulherkar Prabhat Ranjan 450
Web Log Data Analysis and Mining L. K. Joshila Grace V. Maheswari Dhinaharan Nagamalai 459
Steganography Using Version Control System Vaishali S. Tidake Sopan A. Talekar 470
Author Index 481