Assessing the impact of the density and sparsity of the network on community detection using a Gaussian mixture random partition graph generator Ashani WickramasingheSaman Muthukumarana Original Research 27 January 2022 Pages: 607 - 618
Traffic flow prediction using support vector regression Nidhi NidhiD. K. Lobiyal Original Research 13 January 2022 Pages: 619 - 626
A novel resource management technique for deadlock-free systems Madhavi Devi BotlaguntaSmriti AgrawalR. Rajeswara Rao Original Research 10 May 2021 Pages: 627 - 635
Bifold-crypto-chaotic steganography for visual data security Bharti AhujaRajesh Doriya Original Research 18 January 2022 Pages: 637 - 648
Modelling and predicting software vulnerabilities using a sigmoid function Javaid IqbalTabasum FirdousIqra Saraf Original Research 19 January 2022 Pages: 649 - 655
Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration Pradeep KumarNiraj SinghalDhiraj Pandey Original Research 24 January 2022 Pages: 657 - 665
On-demand charging planning for WRSNs based on weighted heuristic method Naween KumarGandharba SwainS. Routray Original Research 06 January 2022 Pages: 667 - 674
Online searching trend on Covid-19 using Google trend: infodemiological study in Malaysia Tengku Adil Tengku IzharTorab Torabi Original Research 29 January 2022 Pages: 675 - 680
A novel approximate PageRank computation: QEGauss-Seidel PageRank Atul Kumar SrivastavaMitali Srivastava Original Research 29 January 2022 Pages: 681 - 691
Comparative analysis of capacity oriented Integrated AMI modulation technique for the deployment of radio over fiber system Namita KathpalAmit Kumar Garg Original Research 01 January 2019 Pages: 693 - 702
Secure and efficient multi-tenant database management system for cloud computing environment G. B. PallaviP. Jayarekha Original Research 10 January 2020 Pages: 703 - 711
A literature review: various learning techniques and its applications for eye disease identification using retinal images Vipul RajyaguruChandresh VithalaniRohit Thanki Original Research 13 February 2020 Pages: 713 - 724
A multimodal biometric system using match score and decision level fusion Prachi PunyaniRashmi GuptaAshwani Kumar Original Research 20 January 2022 Pages: 725 - 730
Lower-part approximate multi-bit adders for low-power DSP Chinna V. GowdarM. C. Parameshwara Original Research 30 January 2022 Pages: 731 - 737
A novel web ranking algorithm based on pages multi-attribute Mohammed Rashad BakerM. Ali Akcayol Original Research 21 January 2022 Pages: 739 - 749
Comparative performance analysis of GFDM and UFMC under different window constraints for next generation cognitive radio communication Manisha GuptaA. S. KangVishal Sharma Original Research 16 May 2020 Pages: 751 - 760
IoT infrastructure for the accident avoidance: an approach of smart transportation Hitesh MohapatraAmiya Kumar RathNibedan Panda Original Research 29 January 2022 Pages: 761 - 768
Wireless sensor network in precision farming for forecasting and monitoring of apple disease: a survey Firasath NabiSanjay JamwalKumar Padmanbh Original Research 30 January 2020 Pages: 769 - 780
SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups Vinod KumarOm PalKamendra Kumar Original Research 27 January 2022 Pages: 781 - 788
Quality of service aware routing protocols in wireless multimedia sensor networks: survey Ronald ChiwariroThangadurai .N Original Research 29 July 2020 Pages: 789 - 800
An empirical analysis of cloud based robotics: challenges and applications Mimansha SainiKaushlendra SharmaRajesh Doriya Original Research 20 January 2022 Pages: 801 - 810
Spatial role labelling in Arabic using probabilistic classifiers Salha M. Alzahrani Original Research 09 January 2021 Pages: 811 - 825
Energy efficient intra-cluster data aggregation technique for wireless sensor network Anupkumar M. BongaleC. R. NirmalaArunkumar M. Bongale Original Research 27 January 2020 Pages: 827 - 835
HONEYDOS: a hybrid approach using data mining and honeypot to counter denial of service attack and malicious packets Pratima SharmaBharti Nagpal Original Research 20 April 2018 Pages: 837 - 846
Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison Darshan TankAkshai AggarwalNirbhay Chaubey Original Research 27 February 2019 Pages: 847 - 862
An efficient average execution time-round-robin (AET-RR) scheduling algorithm Sudhansu Bala DasSugyan Kumar MishraAnup Kumar Sahu Original Research 09 August 2019 Pages: 863 - 876
Investigating the performance of a vehicular communication system based on visible light communication (VLC) Sumita MishraRitvik MaheshwariV. Vaishnavi Original Research 13 January 2022 Pages: 877 - 885
Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs Jagatheswari SPraveen RamalingamChandra Priya J Original Research 07 February 2022 Pages: 887 - 897
Revisiting enterprise resource planning (ERP) risk factors over the past two decades: defining parameters and providing comprehensive classification Babak Zendehdel NobariAdel AzarPianpian Yang Original Research 05 August 2020 Pages: 899 - 914
T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks Deepika KukrejaDeepak Kumar Sharma Original Research 18 November 2019 Pages: 915 - 929
Classification of leaves of medicinal plants using laws’ texture features Diksha PuriAbhinav KumarKriti Original Research 19 August 2019 Pages: 931 - 942
Efficient resource allocation scheme for on-the-fly computing based mobile grids Amit Sadanand SavyanavarVijay Ram Ghorpade Original Research 15 December 2018 Pages: 943 - 954
Group security using ECC Purna Chandra SethiNeelima SahuPrafulla Kumar Behera Original Research 28 February 2021 Pages: 955 - 963
Discrimination of multi-class EEG signal in phase space of variability for epileptic seizure detection using error correcting output code (ECOC) Salim Rukhsar Original Research 25 July 2018 Pages: 965 - 977
Efficient load balancing techniques for multi-datacenter cloud milieu Sumanta Chandra Mishra SharmaAmiya Kumar RathBivasa Ranjan Parida Original Research 09 October 2020 Pages: 979 - 989
Design of fault tolerant bifunctional parity generator and scalable code converters based on QCA technology Nuriddin SafoevSuhaib AhmedSyed Farah Naz Original Research 19 July 2021 Pages: 991 - 998
Design of cognitive radio system and comparison of modified whale optimization algorithm with whale optimization algorithm Sumit BansalMunish Rattan Original Research 06 August 2019 Pages: 999 - 1010
A case study on AGV’s alternatives selection problem Divya AgarwalPushpendra S. Bharti Original Research 26 July 2018 Pages: 1011 - 1023
Automatic latent fingerprint identification system using scale and rotation invariant minutiae features Uttam U. DeshpandeV. S. MalemathSushma V. Chaugule Original Research 17 August 2020 Pages: 1025 - 1039
Open source software: analysis of available reliability models keeping security in the forefront Shiva TyagiDevendra KumarSachin Kumar Original Research 14 February 2019 Pages: 1041 - 1050
Understanding factors affecting technical debt Jaspreet BediKuljit Kaur Original Research 24 June 2020 Pages: 1051 - 1060
Empirical analysis of synthetic and real networks Pranav NerurkarMadhav ChandaneSunil Bhirud Original Research 06 August 2019 Pages: 1061 - 1073
A validation of security determinants model for cloud adoption in Saudi organisations’ context Madini O. AlassafiHany F. AtlamSeyed M. Buhari Original Research 30 August 2019 Pages: 1075 - 1085
IoT-Blockchain driven traceability techniques for improved safety measures in food supply chain S. BalamuruganA. AyyasamyK. Suresh Joseph Original Research 03 January 2021 Pages: 1087 - 1098
Efficiency measures for ranked pages by Markov Chain Principle Swati JainMukesh Rawat Original Research 29 October 2020 Pages: 1099 - 1106
Optimized data transmission scheme based on proper channel coordination used in vehicular ad hoc networks Aradhana Behura Original Research 20 April 2021 Pages: 1107 - 1116
Identification and integration of security activities for secure agile development Amit SharmaR. K. Bawa Original Research 05 March 2020 Pages: 1117 - 1130
Analysing and securing the sustainability of e-Government projects from technical aspect using employees perspective approach Jyoti YadavA. K. SainiAmit Kumar Yadav Original Research 07 August 2019 Pages: 1131 - 1143
Understanding structure and behavior of systems: a network perspective Pranav NerurkarMadhav ChandaneSunil Bhirud Original Research 14 August 2019 Pages: 1145 - 1159