| 4G-Warriors N. Yasar Arfath and M. Imranullah |
| A Comparison of Voltage & Current Signals for Impedance Cardiography Nikhil Rathi and Rohit Sharma |
| A New Approach for Identifying the Shortest Communications Paths among Components in CBD based Software Products K. S. Jasmine, R. Vasantha and Derick J. Mathew |
| A Novel Information Hiding Technique Using Codes in HTML Files Tripti Sharma and A. Ajaya Kumar |
| A Proposal for New Software Development Life Cycle Model: PARTH’s Model Parth Birendra and Arashdeep Kaur |
| A Simulation Model for Crop Yield under Varying Soil and Different Amount of Nutrients Conditions using Artificial Neural Networks in Back Propagation Algorithm N. Manoharan, R. Balasubramanian and J. Jeyabaskaran |
| A Survey on Noisy Medical Image Segmentation using Clustering Manisha Sutar and N. J. Janwe |
| A Virtual Instrument to Identify Presence of Obstructive and Restrictive Diseases S. K. Shrivastav, M. S. Pawar and Swati S.Tidke |
| An Artificial Device of Neuroscience R. Anand Raj |
| An Efficient Feature based Classification for JPEG Steganalysis Deepa D. Shankar |
| An Embedded Systems Approach for Implementing a Low Cost, Less Power Consumption and Stand-alone Music Synthesizer Akansha A. Pilley and N. G. Bawane |
| Analysis of Ranking Models for Information Retrieval in Hindi Suneet Kumar Gupta, Vikas Kumar, Gopal Gupta and Gaurav Kansal |
| Anatomical Asymmetry of Human Breast Image Analysis and Detection S. K. Bandyopadhyay |
| Authenticated Batch-signature for Multicasting P. Shrividhya and T. Aarthy |
| Comprehensive Experimental Analysis of Stochastic Computation Algorithms Syed Asadullah Hashmi |
| Detection of Bifurcation of Nerve in Exudates in Diabetic Retinopathy Images using Digital Image Processing Algorithms N. GopalaKrishnan and P. Arun Srinivas |
| Direct Digital (sinusoidal) Synthesizer using CORDIC Algorithm Anita Sharma and R. D. Daruwala |
| Effective Video-on-demand Transmission Methodology Rachit Mohan Garg and Mohd. Dilshad Ansari |
| Efficiency Analysis of Web Quality using Artificial Neural Networks N. Manoharan and R. Balasubramanian |
| Efficient Protocol for Fair Exchange of Data Over Internet Geeta M. Arwindekar and Prashant Y. Itankar |
| Efficient Tasks Scheduling for Heterogeneous Multiprocessor Parallel Computing using Enhanced Genetic Algorithm Jaspal Singh, Jasbir Singh Gill and Tarandeep Singh Walia |
| Elicitation of Non Functional Requirements in Grid Environment P. Muthuchelvi and C. Guhan |
| Environmental Texts based Document Classification using Ontology V. Uma |
| Error Flow Analysis of Abstract Models Pradip Peter Dey, Bhaskar Raj Sinha, Mohammad Amin, Hassan Badkoobehi and Arun Datta |
| Feature Extraction and Selection for Medical Images- A Hybrid Approach M. Vasantha and V. Subbiah Bharathy |
| Generic Framework for Vehicle Driver Assistance System to Prevent Against Vulnerable Road Traffic Pedestrians R. Geetha Ramani, C. S. Aishwarya and R. Aishwarya Lakshmi |
| Grid Computing : Opportunities or Hype A. J. Ajal |
| Hand Written Signature Image Analysis and Recognition Tai-Hoon Kim |
| HWTRS: Hand Written Text Recognition System Jigyasu Dubey and Anand Rajavat |
| Image Segmentation by Using Finite Bivariate Doubly Truncated GMM With EM + MML Criterion A. Tejaswi and A. Manaswi |
| Incorporating Generalized Modified Weibull TEF in to Software Reliability Growth Model and Analysis of Optimal Release Policy Shaik. Mohammad Rafi and Shaheda Akthar |
| Insertion of CRC Bits into MPEG-4 Bitstream for Error Detection at Frame Level Bhumin Pathak, Geoff Childs and Maaruf Ali |
| Issues and Challenges of Software Reengineering Process Anand Rajavat and Jigyasu Dubey |
| Kannada Speech Recognition using Discrete Wavelet Transform – PCA M. A. Anusuya and S. K. Katti |
| Malware Threat in Android Operating System Lukas Jeter, Meenakshi Mani, Tia Reinschmidt and Shivakant Mishra |
| Mammographic Image Enhancement using Double Sigmoid Transformation Function Vikrant Bhateja and Swapna Devi |
| Modeling and Analysis of the Crankshaft using ANSYS Software S. Arumugam and S. Arunkumar |
| Modelling of Classification Functions for Onboard Processor Arvind Vishnubhatla |
| Optimal Operation of Hydropower Station by using an Improved DE Algorithm Lei Yin and Xiaoxiang Liu |
| Preventing Heart Disease and Stroke in Cardiovascular Diabetics C. Sujatha and R. Anitha |
| Project Aura: Toward’s Amenable Pervasive Computing Vishal Bhimrao Dhule |
| Recognition and Classification of Traffic Signs from Video P. P. Halkarnikar and Nikita R. Shetty |
| Requirement Management Frame Work for Expert Systems N. Jayakanthan |
| Retrieving Quality Web Pages by Developing an Intelligent Web P. Bhavani |
| Segmenting the Colored X-ray Images N. Ravia Shabnam Parveen and M. Mohammed Sathik |
| “SIG-PASSWORD” - Design and Analysis of Authentication Scheme for Graphical Password Debnath Bhattacharyya |
| Software Engineering Strategies for Mobile Software Development In View of Current Development Scenario – A Road Map Selvakumar Samuel, Kesava Pillai Rajadorai and A. Vazeerudeen |
| Spintronics the Future of RAM Technology N. A. Sudarshan and T. K. Prakash |
| Video Denoising using with Both Spatial and Temporal Filters based on Video Codec Motion Estimation Nagaraju Panaganti and M. Sreenadh Reddy |
| Art of Writing Good Technical Abstracts (Non IEEE – Informative Paper) K. Kokula Krishna Hari |
| Art of Writing Effective Technical Paper and Presentation K. Kokula Krishna Hari and S. Prithiv Rajan |