DyTO: Dynamic Task Offloading Strategy for Mobile Cloud Computing Using Surrogate Object Model A. N. Gnana JeevanM. A. Maluk Mohamed OriginalPaper 13 March 2018 Pages: 399 - 415
Efficient MAI Cancellation Scheme in MC-DS-CDMA Using SIC A. K. GnanasekarV. Nagarajan OriginalPaper 02 May 2018 Pages: 416 - 430
An Area Efficient and Low Power Consumption of Run Time Digital System Based on Dynamic Partial Reconfiguration R. Saravana RamA. Gopi SaminathanS. Arun Prakash OriginalPaper 30 May 2018 Pages: 431 - 446
Quadrant Based Neighbor to Sink and Neighbor to Source Routing Protocol and Alternate Node Deployment Strategies for WSN Sathees Lingam PaulswamyHariharan Kaluvan OriginalPaper 16 June 2018 Pages: 447 - 469
Countering Statistical Attacks in Cloud-Based Searchable Encryption M. A. Manazir AhsanIhsan AliMuhammad Shoaib OriginalPaper 30 June 2018 Pages: 470 - 495
Charismatic Document Clustering Through Novel K-Means Non-negative Matrix Factorization (KNMF) Algorithm Using Key Phrase Extraction E. Laxmi LydiaP. Krishna KumarAndino Maseleno OriginalPaper 07 August 2018 Pages: 496 - 514
Triple DES: Privacy Preserving in Big Data Healthcare R. Ramya DeviV. Vijaya Chamundeeswari OriginalPaper 16 August 2018 Pages: 515 - 533
Comparison of Estimating Missing Values in IoT Time Series Data Using Different Interpolation Algorithms Zengyu DingGang MeiNengxiong Xu OriginalPaper 17 August 2018 Pages: 534 - 548
Resource Allocation in Cloud Computing Using SFLA and Cuckoo Search Hybridization P. DurgadeviS. Srinivasan OriginalPaper 25 August 2018 Pages: 549 - 565
GPU Accelerated Parallel Algorithm of Sliding-Window Belief Propagation for LDPC Codes Bowei ShanYong Fang OriginalPaper 04 April 2019 Pages: 566 - 579
Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption M. A. Manazir AhsanIhsan AliMuhammad Shoaib Correction 29 August 2018 Pages: 580 - 580