Integration of SRA, ANFIS and CAPM for stock portfolio management M. GunasekaranK. S. RamaswamiS. Karthik Original Research 28 September 2013 Pages: 291 - 300
SCADA security: a review and enhancement for DNP3 based systems Peeyush JainParitosh Tripathi Original Research 03 October 2013 Pages: 301 - 308
A fast and reliable approach to cell nuclei segmentation in PAP stained cervical smears N. B. ByjuVilayil K. SujathanR. Rajesh Kumar Original Research 08 October 2013 Pages: 309 - 315
A dynamic firewall architecture based on multi-source analysis Muraleedharan NavarikuthSubramanian NeelakantanAntashree Mallick Original Research 07 November 2013 Pages: 317 - 329
SAKA: a secure authentication and key agreement protocol for GSM networks Neetesh SaxenaNarendra S. Chaudhari Original Research 21 November 2013 Pages: 331 - 341
Identification and authentication using visual cryptography based fingerprint watermarking over natural image Jaishri Chourasia Brief Report 03 December 2013 Pages: 343 - 348
Development of Punjabi WordNet Ashish NarangR. K. SharmaParteek Kumar Original Research 11 December 2013 Pages: 349 - 354
Imprecise reversible visible watermarking Neelesh MehraMadhu Shandilya Original Research 17 December 2013 Pages: 355 - 365
Fuzzy-class point approach for software effort estimation using various adaptive regression methods Shashank Mouli SatapathyMukesh KumarSantanu Kumar Rath Original Research 31 December 2013 Pages: 367 - 380