HIDS: A host based intrusion detection system for cloud computing environment Prachi DeshpandeS. C. SharmaS. Junaid Original Article 24 June 2014 Pages: 567 - 576
DE-IE: differential evolution for color image enhancement Sushil KumarMillie PantAmiya Kumar Ray Original Article 19 June 2014 Pages: 577 - 588
Artificial bee colony algorithm with global and local neighborhoods Shimpi Singh JadonJagdish Chand BansalHarish Sharma Original Article 13 August 2014 Pages: 589 - 601
An optimal image watermarking approach through cuckoo search algorithm in wavelet domain Musrrat AliChang Wook Ahn Original Article 28 August 2014 Pages: 602 - 611
Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network Rajeev AryaS. C. Sharma Original Article 31 August 2014 Pages: 612 - 619
Sensitivity analysis on inverse characteristics of directional over current relays using differential evolution algorithm Srikanth AllamsettyRadha ThangarajMillie Pant Original Article 04 November 2014 Pages: 620 - 629
A formal study on generative power of a class of array token Petri net structure T. KamarajD. LalithaD. G. Thomas Original Article 24 October 2014 Pages: 630 - 638
Novel GA for metropolitan stations of Indian railways when modelled as a TSP Kusum DeepHadush MebrahtuAtulya K. Nagar Original Article 12 December 2014 Pages: 639 - 645
A study on impact of untrustworthy and older recommendations over T-Grid computational model P. Suresh KumarS. Ramachandram Original Article 17 December 2014 Pages: 646 - 656
Additive manufacturing applications in Defence Support Services: current practices and framework for implementation Alessandro BusachiJohn ErkoyuncuStephen Wilding Original Article 21 February 2017 Pages: 657 - 674
Research on building software usage model based on UML model Honghui LiAihua ZhaoJunwen Zhang Original Article 23 May 2017 Pages: 675 - 683
Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things Lele QinShuang FengHongyi Zhu Original Article 31 May 2017 Pages: 684 - 695
Multi objective optimization of railway emergency rescue resource allocation and decision Zhaoping TangJianping Sun Original Article 17 June 2017 Pages: 696 - 702
Enforcing compliance of hierarchical business process with visual security constraints Li DuanYang ZhangJunliang Chen Original Article 13 July 2017 Pages: 703 - 715
A matter-element method for risk identification of technology innovation Quan Xiao Original Article 19 September 2017 Pages: 716 - 728
Research on risk assessment and control of inland navigation safety Ling SunHanwen ZhangFei Chen Original Article 21 December 2017 Pages: 729 - 738