Journal: IJAIP

Volume 12, Issue 3/4

207 -- 219Kourosh Kiani, Arash Mousavi, Shahaboddin Shamshirband. A new fractal watermarking method for images of text
220 -- 238Mehdi Dadkhah, Vyacheslav V. Lyashenko, Zhanna V. Deineko, Shahaboddin Shamshirband, Mohammad Davarpanah Jazi. Methodology of wavelet analysis in research of dynamics of phishing attacks
239 -- 253M. Bhagyavathi, Vankadara Saritha. Energy and velocity-based multipath routing protocol for VANET
254 -- 265Rijwan Khan, Mohd Amjad. Mutation-based genetic algorithm for efficiency optimisation of unit testing
266 -- 278T. K. Kandavel, T. Ashok Kumar, D. Vijay, S. Ashwanth Samraj. Application of artificial neural network on deformation and densification behaviour of sintered Fe-C steel under cold upsetting
279 -- 294Bindiya Jain, Gursewak Brar, Jyoteesh Malhotra. AMST-MAC: adaptive sleeping multi-frames selective data transmission control for wireless sensor networks
295 -- 304Shashi Mehrotra, Shruti Kohli, Aditi Sharan. An intelligent clustering approach for improving search result of a website
305 -- 316Aarti Singh, Dimple Juneja, Rashmi Singh, Saurabh Mukherjee. A clustered neighbourhood consensus algorithm for a generic agent interaction protocol
317 -- 330N. Haripriya, P. Kavitha, Seshadhri Srinivasan, Juri Belikov. Evolutionary optimisation-based fractional order controller for web transport systems in process industries
331 -- 354Yacine Slimani, Abdelouaheb Moussaoui, Yves Lechevallier, Ahlem Drif. Discovering communities for web usage mining systems
355 -- 369Arindam Dey, Anita Pal. Computing the shortest path with words
370 -- 391Soumi Ghosh, Ajay Rana, Vineet Kansal. A statistical comparison for evaluating the effectiveness of linear and nonlinear manifold detection techniques for software defect prediction
392 -- 399Vikash Yadav, Vandana Dixit Kaushik. A study on automatic early detection of skin cancer
400 -- 410Monika Verma, Vikash Yadav, Vandana Dixit Kaushik, Vinay Kumar Pathak. Multiple polynomial regression for solving atmospheric scattering model

Volume 12, Issue 1/2

3 -- 13F. Sangeetha Francelin Vinnarasi, A. Chandrasekar. VANET routing protocol with traffic aware approach
14 -- 23S. Rajeshwari, A. Chandrasekar. Real time MAF-based multi level access restriction approach for collaborative environment using ontology
24 -- 32S. Beulah Hemalatha, T. Vigneswaran. Reconfigurable communication wrapper for QoS demand for network on chip
33 -- 44R. K. Nadesh, M. Aramudhan. MMSI: a multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud
45 -- 56B. R. Tapas Bapu, L. C. Siddanna Gowd. Malicious node detection through run time self-healing algorithm in WSN
57 -- 67Velayutham Vimala, K. Ramar. Classification of neonatal epileptic seizures using support vector machine
68 -- 76Selvaraj Priya. A novel approach for secured transmission of DICOM images
77 -- 85K. Ramkumar, G. Gunasekaran. Preserving security using crisscross AES and FCFS scheduling in cloud computing
86 -- 97J. Ravisankar. Binary honey bee mating partial transmit sequence to improve OFDM
98 -- 119Priyan Malarvizhi Kumar, Usha Devi Gandhi. A survey on internet of vehicles: applications, technologies, challenges and opportunities
120 -- 133V. Nagaraju, L. C. Siddanna Gowd. Radio spectrum collision avoidness in cluster cognitive network through gazer nodes
134 -- 146K. P. Rama Prabha, N. Jeyanthi. Intelligent intrusion detection techniques for secure communications in wireless networks: a survey
147 -- 163D. Shiny Irene, T. Sethukarasi. Perlustration on existing techniques and applications in cloud computing for smart buildings using IoT
164 -- 177D. Naga Ravi Kiran, Chandrashekhar G. Dethe. Fuzzy rule selection using artificial bee colony optimisation algorithm
178 -- 191R. Jayanthi, K. John Singh. Image encryption techniques for data transmission in networks: a survey
192 -- 206S. Thaiyalnayaki, J. Sasikala, R. Ponraj. Detecting near-duplicate images using segmented minhash algorithm