Enhancing the security of E-Health services in Bangladesh using blockchain technology Chowdhury Akram HossainMohamad Afendee MohamedSiti Maryam Sharun Original Research 29 January 2022 Pages: 1179 - 1185
A secure technique for unstructured big data using clustering method Md Tabrez NafisRanjit Biswas Original Research 12 February 2019 Pages: 1187 - 1198
Gawk web search personalization using dynamic user profile S. AmudhaI. Elizabeth Shanthi Original Research 30 November 2019 Pages: 1199 - 1210
Web URLs retrieval with least execution time using MPV clustering approach SunitaVijay Rana Original Research 18 January 2020 Pages: 1211 - 1219
An enforced block diagonal low-rank representation method for the classification of medical image patterns Ishfaq Majeed SheikhManzoor Ahmad Chachoo Original Research 20 January 2022 Pages: 1221 - 1228
Signer independent real-time hand gestures recognition using multi-features extraction and various classifiers Shivashankara SSrinath S Original Research 07 May 2020 Pages: 1229 - 1240
Joint uplink and downlink power allocation for maximizing the energy efficiency in ultra-dense networks Usama Mir Original Research 27 August 2020 Pages: 1241 - 1249
Improved autistic spectrum disorder estimation using Cfs subset with greedy stepwise feature selection technique Manoj Sharma Original Research 05 August 2019 Pages: 1251 - 1261
An efficient framework for spatio-textual skyline querying and minimizing search space using R+ tree indexing technique Swathi Sowmya BavirthiK. P. Supreethi Original Research 21 February 2022 Pages: 1263 - 1271
Thyroid prediction using ensemble data mining techniques Dhyan Chandra YadavSaurabh Pal Original Research 28 November 2019 Pages: 1273 - 1283
Prolific detect and prevent invasion architecture with curvaceous K-pro acted neural nets for alpine the security in networking Akshay Rameshbhai GuptaJitendra Agrawal Original Research 08 January 2022 Pages: 1285 - 1294
A new tight approximation towards the computation of option price Gangadhar NayakAmit Kumar SinghDilip Senapati Original Research 20 May 2021 Pages: 1295 - 1303
Combining multiple regression and principal component analysis to evaluate the effects of ambient air pollution on children’s respiratory diseases Hayat LoukiliAbdelkader AnouzlaYassine Riadi Original Article 28 March 2022 Pages: 1305 - 1310
A vector-space-based lightweight RFID authentication protocol Mohd ShariqKaran Singh Original Research 24 May 2021 Pages: 1311 - 1320
Improved fuzzy commitment scheme Sonam ChauhanAjay Sharma Original Research 02 January 2019 Pages: 1321 - 1331
Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach Soumya RayKamta Nath MishraSandip Dutta Original Research 01 February 2022 Pages: 1333 - 1341
Watershed based algorithms for the segmentation of spine MRI M. Leena SilvosterR. MathusoothanaS. Kumar Original Article 04 August 2021 Pages: 1343 - 1353
Trust score estimation for device to device communication in internet of thing using fuzzy approach Rajkumar V. PatilParikshit N. MahalleGitanjali R. Shinde Original Research 23 October 2020 Pages: 1355 - 1365
An efficient environmental monitoring data encryption algorithm based on DNA coding and hyperchaotic system Jacob Mbarndouka TaamtéVitrice Ruben Folifack SigningSaïdou Original Research 24 February 2022 Pages: 1367 - 1380
Design and implementation of hybrid consensus mechanism for IoT based healthcare system security Punam PrabhaKakali Chatterjee Original Research 09 February 2022 Pages: 1381 - 1396
A computational scheme for fifth order boundary value problems Archana SenapatiSaumya Ranjan Jena Original Research 12 February 2022 Pages: 1397 - 1404
Design of compact and broad-bandwidth rectangular patch antenna using cylindrical rods artificial dielectric Preet Kaur Original Research 08 March 2021 Pages: 1405 - 1414
Efficient transformation capabilities of single database private block retrieval Radhakrishna BhatN. R. Sunitha Original Research Open access 19 January 2022 Pages: 1415 - 1423
Robbery pattern analysis (RPA) using the concept of multipolarity and examining the influencing factors Prerna KapoorPrem Kumar Singh Original Research 16 January 2021 Pages: 1425 - 1432
A novel approach to continuous CVE analysis on enterprise operating systems for system vulnerability assessment Yusuf KocamanSerkan GönenErcan Nurcan Yilmaz Original Research 09 February 2022 Pages: 1433 - 1443
BFL: a buffer based linear filtration method for data aggregation in wireless sensor networks Arun AgarwalKhushboo JainAmita Dev Original Research 04 February 2022 Pages: 1445 - 1454
Isotherm recognition on a V-notch specimen by color identification method P. L. RupeshM. ArulprakasajothiK. Raja Original Research 08 April 2021 Pages: 1455 - 1465
An intelligent assistive algorithm for bone tumor detection from human X-Ray images based on binary Blob analysis Anil K. BharodiyaAtul M. Gonsai Original Research 14 October 2020 Pages: 1467 - 1473
A novel intelligent round robin CPU scheduling algorithm Prem Sagar SharmaSanjeev KumarVinod Jain Original Research 09 March 2021 Pages: 1475 - 1482
An ultra-efficient design and optimized energy dissipation of reversible computing circuits in QCA technology using zone partitioning method Mukesh PatidarNamit Gupta Original Research 16 August 2021 Pages: 1483 - 1493
Developing knowledge-based system for the diagnosis and treatment of mango pests using data mining techniques Wasyihun Sema Admass Original Research 09 March 2022 Pages: 1495 - 1504
An efficient task scheduling for weather forecasting suites in high performance computing Rintu NathA. Nagaraju Original Research 12 September 2021 Pages: 1505 - 1514
An efficient and scalable dynamic session identification framework for web usage mining H. K. SowmyaR. J. Anandhi Original Research 09 February 2022 Pages: 1515 - 1523
An approach towards enhancement of classification accuracy rate using efficient pruning methods with associative classifiers Kavita Mittal Original Research 14 May 2021 Pages: 1525 - 1533
Improved related-cipher attack on Salsa and ChaCha: revisited K. C. Deepthi KakumaniKunwar SinghS. K. Karthika Original Research 02 March 2022 Pages: 1535 - 1542
MUCE: a multilingual use case model extractor using GPT-3 Deepali BajajAnita GoelHunar Batra Original Research 17 February 2022 Pages: 1543 - 1554
An expert system for selecting optimal cloud-service provider Md. Zahid HasanMohammad Shorif UddinMohammad Shahidul Islam Original Research 26 October 2021 Pages: 1555 - 1563
Bhoomi Prahari – e governance tool for monitoring encroachment on government land using mobile and GIS technology Anand PatelJ. B. Soni Original Research 19 July 2021 Pages: 1565 - 1573
A textual framework for contour retrieval using sub-multiple contour striking spread position learning V. KakulapatiV. Pentapati Original Research 22 January 2020 Pages: 1575 - 1583
A data structure perspective to the RDD-based Apriori algorithm on Spark Pankaj SinghSudhakar SinghRakhi Garg Original Research 07 August 2019 Pages: 1585 - 1594
Modified MRAS approach for sensorless speed control of induction motor for reliability improvement Shrinivas P. GanjewarYogesh Pahariya Original Research 05 February 2022 Pages: 1595 - 1602
An AWG based optical packet switch with add-drop of data Preeti SinghJ. K. RaiAjay K. Sharma Original Research 18 February 2022 Pages: 1603 - 1612
Towards the sustainability of power utilities in Nigeria: a Bayesian network approach Hadiza Ali UmarMathias FonkamRajesh Prasad Original Research 21 February 2022 Pages: 1613 - 1625
Multiple image encryption approach using non linear chaotic map and cosine transformation Mohit DuaArun KumarVaibhav garg Original Research 12 February 2022 Pages: 1627 - 1641
Low voltage high gain flipped voltage follower based operational transconductance amplifier Rajesh DurgamS. TamilNikhil Raj Original Research 15 February 2022 Pages: 1643 - 1648
Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis Rachna PatelKalpesh LadMukesh Patel Original Research 12 September 2021 Pages: 1649 - 1657
Music instrument recognition using deep convolutional neural networks Arun SolankiSachin Pandey Original Research 30 January 2019 Pages: 1659 - 1668
AKAME: A post-quantum authenticated key-agreement and message encryption scheme based on ring-LWE Simran ChoudharyAnil Gupta Original Research 24 February 2022 Pages: 1669 - 1676
Parallel implementation of solving linear equations using OpenMP Maitreyee PaliwalRishita Reddy ChillaS. P. Raja Original Research 10 March 2022 Pages: 1677 - 1687