QSHINE C

87 papers

YearTitle / Authors
20133-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs.
Samayveer Singh, Satish Chand, Bijendra Kumar
20136H-SiC Based Power VJFET and Its Temperature Dependence.
Amir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani
2013A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System.
Dheerendra Mishra, Sourav Mukhopadhyay
2013A Comparative Analysis of Various Deployment Based DDoS Defense Schemes.
Karanbir Singh, Navdeep Kaur, Deepa Nehra
2013A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks.
Manish Kumar, Itika Gupta, Sudarshan Tiwari, Rajeev Tripathi
2013A Framework of Service Selection and Composition for Flexible Network Architecture.
Akhilendra Pratap Singh, O. P. Vyas, Shirshu Varma
2013A Generalized Model for Internet-Based Access Control Systems with Delegation Support.
Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee
2013A Novel Framework for Users' Accountability on Online Social Networks.
Gambhir Mohit, M. N. Doja, Moinuddin
2013A Privacy Preserving Representation for Web Service Communicators' in the Cloud.
D. Chandramohan, T. Vengattaraman, D. Rajaguru, Ramachandran Baskaran, P. Dhavachelvan
2013A Proposal for SMS Security Using NTRU Cryptosystem.
Ashok Kumar Nanda, Lalit Kumar Awasthi
2013A Review on Remote User Authentication Schemes Using Smart Cards.
Keerti Srivastava, Amit K. Awasthi, R. C. Mittal
2013A Review on Wireless Network Security.
Sandeep Sharma, Rajesh Mishra, Karan Singh
2013A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks.
Anubhuti Roda Mohindra, Charu Kumar
2013An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration.
Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari
2013An Efficient and Secure Micro-payment Transaction Using Shell Cryptography.
Mayank Tiwari, Rajeshwar Kumar, Shaivya Jindal, Pankaj Sharma, Priyanshu
2013An Improved Method for Contrast Enhancement of Real World Hyperspectral Images.
Shyam Lal, Rahul Kumar, Mahesh Chandra
2013Analysis and Improvement of an Authentication Scheme Using Smart Cards.
Sonam Devgan Kaul, Amit K. Awasthi
2013Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System.
Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna, N. Saraf, Anant Gupta, Rajesh Mishra
2013Carrier Aggregation for Enhancement of Bandwidth in 4G Systems.
Jolly Parikh, Anuradha Basu
2013Change Detection from Satellite Images Using PNN.
Akansha Mehrotra, Krishna Kant Singh, Kirat Pal, M. J. Nigam
2013Ciphertext-Policy Attribute-Based Encryption with User Revocation Support.
A. Balu, Kuppusamy Krishnamoorthy
2013Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVM.
P. Mahesha, D. S. Vinod
2013Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks.
Puneet Azad, Vidushi Sharma
2013Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks.
Chandan Kumar Sonkar, Om Prakash Sangwan, Arun Mani Tripathi
2013DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network.
Nagaraj Ambika, G. T. Raju
2013DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers.
Rahul Johari, Neelima Gupta, Sandhya Aneja
2013Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units.
Arup Kr. Chattopadhyay, Chandan Kumar Bhattacharyya
2013Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application.
Sanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi, Sudarshan Tiwari
2013Design of High Performance MIPS Cryptography Processor.
Kirat Pal Singh, Shivani Parmar, Dilip Kumar
2013Design of Low Power FSM Using Verilog in VLSI.
Himani Mittal, Dinesh Chandra, Arvind Tiwari
2013Design of an Edge Detection Based Image Steganography with High Embedding Capacity.
Arup Kumar Pal, Tarok Pramanik
2013Detailed Dominant Approach Cloud Computing Integration with WSN.
Niranjan Lal, Shamimul Qamar, Mayank Singh
2013Detailed Dominant Approach Cloud Computing Integration with WSN.
Niranjan Lal, Shamimul Qamar, Mayank Singh
2013Enhanced Block Playfair Cipher.
Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Manika Sharma
2013Evaluation of Understandability of Object-Oriented Design.
Devpriya Soni
2013Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability.
Mohd Ashraf, Rajesh Mishra
2013FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks.
Seyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala
2013Fault Tolerant Range Grouping Routing in Dynamic Networks.
Akanksha Bhardwaj, Prachi Badera, K. Rajalakshmi
2013Feature and Future of Visual Cryptography Based Schemes.
Dhiraj Pandey, Anil Kumar, Yudhvir Singh
2013Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications.
Kalikinkar Mandal, Guang Gong
2013Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks.
Suddhasil De, Diganta Goswami, Sukumar Nandi
2013Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs.
Goutam Datta, Bushan L. Raina
2013GAS: A Novel Grid Based Authentication System.
Narayan Gowraj, Srinivas Avireddy, Sruthi Prabhu
2013HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks.
Tamoghna Ojha, Sudip Misra
2013High Speed Reconfigurable FPGA Based Digital Filter.
Navaid Z. Rizvi, Raaziyah Shamim, Rajesh Mishra, Sandeep Sharma
2013Hybrid Key Management Technique for WSN's.
Ravi Kishore Kodali, Sushant Chougule
2013Image Secret Sharing in Stego-Images with Authentication.
Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar
2013Improved Proxy Signature Scheme without Bilinear Pairings.
Sahadeo Padhye, Namita Tiwari
2013Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-Peer.
Remani Naga Venkata Jagan Mohan, Vegi Srinivas, Kurra Rajasekhara Rao
2013Integrated Approach for Multicast Source Authentication and Congestion Control.
Karan Singh, Rama Shankar Yadav
2013Key Pre-distribution in a Non-uniform Network Using Combinatorial Design.
Sarbari Mitra, Sourav Mukhopadhyay
2013Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell.
Indrasen Singh, Sanjeev Jain, Vijay Shanker Tripathi, Sudarshan Tiwari
2013Mobile Based Attendance System in Distributed LAN Server.
Ratnesh Prasad Srivastava, Hardwari Lal Mandoria, Rajesh Nautiyal
2013Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network.
Anil Kumar Sagar, D. K. Lobiyal
2013Multiplicative Watermarking of Audio in Spectral Domain.
Jyotsna Singh, Parul Garg, Alok Nath De
2013NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack.
Kumar Chanchal, D. K. Lobiyal
2013Network Security Using ECC with Biometric.
Dindayal Mahto, Dilip Kumar Yadav
2013Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter.
Rajeev Agrawal, Amit Sehgal
2013On Generalized Nega-Hadamard Transform.
Ankita Chaturvedi, Aditi Kar Gangopadhyay
2013On Second-Order Nonlinearities of Two Classes of Cubic Boolean Functions.
Deep Singh, Maheshanand Bhaintwal
2013Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load Models.
Rajendra P. Payasi, Asheesh Kumar Singh, Devender Singh
2013Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks.
Adarsh Kumar, Krishna Gopal, Alok Aggarwal
2013Performance Analysis of Cryptographic Acceleration in Multicore Environment.
Yashpal Dutta, Varun Sethi
2013Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2).
Gayatri Sakya, Vidushi Sharma
2013Power Efficient MAC Protocol for Mobile Ad Hoc Networks.
Sohan Kumar Yadav, D. K. Lobiyal
2013Protecting PLM Data Throughout Their Lifecycle.
Rohit Ranchal, Bharat K. Bhargava
2013Pruning Search Spaces of RATA Model for the Job-Shop Scheduling.
Farid Arfi, Jean-Michel Ilié, Djamel-Eddine Saïdouni
2013QoS Support Downlink for WiMAX Network.
Pooja Gupta, Brijesh Kumar, Bushan L. Raina
2013Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers
Karan Singh, Amit K. Awasthi
2013Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft Processor.
Manoj Pandey, Dorothi Borgohain, Gargi Baruah, Jagpal Singh Ubhi, Kota Solomon Raju
2013Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection.
Asutosh Kar, Mahesh Chandra
2013RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers.
Reema Aswani, N. Hema
2013Routing Protocols in Mobile Ad-Hoc Network: A Review.
Bahuguna Renu, Hardwari Lal Mandoria, Tayal Pranavi
2013SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNs.
Raju Pal, Ritu Sindhu, Ajay K. Sharma
2013Safety Analysis of Automatic Door Operation for Metro Train: A Case Study.
Ajeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith
2013Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA.
Rajesh Duvvuru, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju
2013Secret Image Sharing Scheme Based on Pixel Replacement.
Tapasi Bhattacharjee, Jyoti Prakash Singh
2013Secure Real Time Scheduling on Cluster with Energy Minimization.
Rudra Pratap Ojha, Rama Shankar Yadav, Sarsij Tripathi
2013Security Improvement in Group Key Management.
Manisha Manjul, Rakesh Kumar, Rajesh Mishra
2013Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter.
Ajay Kumar Maurya, Yogesh Kumar Chauhan
2013Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System.
Bhavnesh Kumar, Yogesh Kumar Chauhan, Vivek Shrivastava
2013The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading Channels.
Prabhat Kumar Sharma, Parul Garg
2013Threats and Challenges to Security of Electronic Health Records.
Shalini Bhartiya, Deepti Mehrotra
2013Trust Management Method for Vehicular Ad Hoc Networks.
Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani
2013WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices.
Xinxin Fan, Kalikinkar Mandal, Guang Gong
2013Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram.
Rohtash Dhiman, Priyanka, Jasbir Singh Saini
2013Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding Vegetation.
Babu Sean Paul, Suvendi Rimer