Journal: IJAIP

Volume 20, Issue 3/4

221 -- 242Bushra Alhijawi. Dominion algorithm - a novel metaheuristic optimisation method
243 -- 263B. Suresh Kumar, Deepshikha Bhargava, Arpan Kumar Kar, Chinwe Peace Igiri. Rock Hyrax intelligent optimisation algorithm: an exploration for Web 3.0 domain selection
264 -- 276K. Santhi Sri, N. Veeranjaneyulu. Privacy preserving using Diffie-Hellman and an envelope protocol through key handling techniques in cloud storage
277 -- 295N. Vijayaraj, T. Senthil Murugan. Resource allocation with effective multi-attribute combinational double auction in cloud using O-DBS
296 -- 322Ajit Kumar Behera, Ch. Sanjeev Kumar Dash, Mrutyunjaya Panda, Satchidananda Dehuri, Rajib Mall. A state-of-the-art neuro-swarm approach for prediction of software reliability
323 -- 342Parveen Kumar Sharma, Rajiv Mahajan, Surender Kumar. Trust-based multi-level secure routing for authentication and authorisation in WMN
343 -- 355Suman Madan, Puneet Goswami. Hybrid privacy preservation model for big data publishing on cloud
356 -- 362T. Vishal Patro, M. Gayathri, C. Malathy 0001. Smart mirror with biometric authentication
363 -- 373G. Sasikala, B. Roopesh, S. V. Charan Sai, Y. Sathish Kumar. Energy saving management system in educational buildings
374 -- 387Varun M. Tayur, R. Suchithra. Modelling context awareness in internet of things with business process model and notation 2.0 extensions
388 -- 417Avjeet Singh, Anoj Kumar. Applications of nature-inspired meta-heuristic algorithms: a survey

Volume 20, Issue 1/2

1 -- 15Upasana Sharma, Sunil Kumar Khatri, L. M. Patnaik. A supervised learning approach for link prediction in complex social networks
16 -- 37Sharana Basappa, P. Ravi Babu. A low power architecture for 1D median filter using carry look ahead adder
38 -- 57Samir Abdelmalek, Ahmad Taher Azar, Djalel Dib. Fuzzy fault-tolerant control for doubly fed induction generator in wind energy conversion system
58 -- 88Hamid Hamiche, Karim Kemih, Sid-Ali Addouche, Ahmad Taher Azar, Rafik Saddaoui, Mourad Laghrouche. Hardware implementation of a new chaotic secured transmission system
89 -- 125Soumyabrata Das, Tanmoy Malakar. Optimal capacitor placement and sizing in a distribution system using a competitive swarm optimiser algorithm
126 -- 137Priyadarshini Adyasha Pattanaik, Tripti Swarnkar, Debabala Swain. Deep filter bridge for malaria identification and classification in microscopic blood smear images
138 -- 157E. Kiruba Nesa Malar, C. P. Chandran. Clustering analysis on molecular docking with swarm intelligence
158 -- 170Avjeet Singh, Anoj Kumar. Text document classification using a hybrid approach of ACOGA for feature selection
171 -- 189Sohail Saif, Rajni Gupta, Suparna Biswas. A complete secure cloud-based WBAN framework for health data transmission by implementing authenticity, confidentiality and integrity
190 -- 209Anuja Arora, Raghav Pangasa, Somya Goel, Tribhuwan Kumar Tewari. Audio acoustic features-based instrument recognition using classification algorithms
210 -- 220Uzair Khan, Vikash Yadav. A study based on structural needs and smart tools using IoT for developing a smart city