default search action
International Journal of Advanced Intelligence Paradigms, Volume 13
Volume 13, Numbers 1/2, 2019
- Bhagwati Prasad, Kunti Mishra:
A novel encryption compression scheme using Julia sets. 8-14 - Sumit Kumar Yadav, Devendra K. Tayal, Shiv Naresh Shivhare:
Perplexed Bayes classifier-based secure and intelligent approach for aspect level sentiment analysis. 15-31 - Med Karim Abdmouleh, Hedi Amri, Ali Khalfallah, Med Salim Bouhlel:
An efficient crypto-compression scheme for medical images by selective encryption using DCT. 32-42 - Sachin Dube, Kavita Sharma:
Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram. 43-66 - Bhaskar Mondal, Tarni Mandal, Tanupriya Choudhury, Danish Ali Khan:
Use of 'A light weight secure image encryption scheme based on chaos and DNA computing' for encrypted audio watermarking. 67-79 - Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Malware intelligence: beyond malware analysis. 80-100 - Himani Bansal, Shruti Kohli:
Trust evaluation of websites: a comprehensive study. 101-112 - Rudra Pratap Ojha, Kavita Sharma, Pramod Kumar Srivastava, Goutam Sanyal:
An epidemic model for security and performance of wireless sensor networks. 113-129 - Geetanjali Rathee, Hemraj Saini:
Secure handoff technique with reduced authentication delay in wireless mesh network. 130-154 - K. Srinivasa Reddy, S. Ramachandram:
A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases. 155-177 - Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal:
Security model against worms attack in wireless sensor network. 178-192 - Pinaki Ghosh, T. R. Mahesh:
Untraceable privacy-preserving authentication protocol for RFID tag using salted hash algorithm. 193-209 - Seema Verma, Manoj Kumar:
Comparison of different RSA variants. 210-229 - Deepika Kukreja, Deepak Kumar Sharma, Sanjay K. Dhurandher, B. V. Ramana Reddy:
GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks. 230-259
Volume 13, Numbers 3/4, 2019
- S. K. Lakshmanaprabu, U. Sabura Banu:
Adaptive multi-loop IMC-based PID controller tuning using bat optimisation algorithm for two interacting conical tank process. 263-287 - M. V. Ramana Rao, T. Adilakshmi:
Swarm dynamics for enhanced energy aware clustering. 288-303 - K. Vimal Kumar Stephen, V. Mathivanan:
Neural network-based virtual backbone tree construction and dynamic sink implementation to enhance the lifetime of the network and minimise the energy consumption. 304-323 - M. Jasmin, T. Vigneswaran:
An adaptive low power coding scheme for the NoC. 324-333 - Reddi Kiran Kumar, S. V. Achuta Rao:
Severity of defect: an optimised prediction. 334-345 - Lilia Kechiche, Lamjed Touil, Bouraoui Ouni:
High-level optimised systems design using hardware-software partitioning. 346-367 - B. Madhusudhanan, S. Chitra, S. Anbuchelian:
Feature extraction using CMIM for sentiment analysis. 368-381 - Aswinseshadri K., V. Thulasi Bai:
Bayesian approach for brain-computer interface using feature fusion techniques. 382-393 - Aziz Dahbi, Asmaa El Hannani, Abdelhak Aqqal, Abdelfatteh Haidine:
Power audit: an estimation model-based tool as a support for monitoring power consumption in a distributed network infrastructure. 394-419 - P. Sudheesh, M. Jayakumar:
Nonlinear channel tracking of a high mobility wireless communication system. 420-429 - Deepika Kukreja, Sanjay K. Dhurandher, B. V. Ramana Reddy:
Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system. 430-448 - Hachim Fall, Ouadoudi Zytoune, Mohamed Yahyai:
Contribution to radio resource distribution approach in wireless cellular software defined networking. 449-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.