221 | -- | 242 | Bushra Alhijawi. Dominion algorithm - a novel metaheuristic optimisation method |
243 | -- | 263 | B. Suresh Kumar, Deepshikha Bhargava, Arpan Kumar Kar, Chinwe Peace Igiri. Rock Hyrax intelligent optimisation algorithm: an exploration for Web 3.0 domain selection |
264 | -- | 276 | K. Santhi Sri, N. Veeranjaneyulu. Privacy preserving using Diffie-Hellman and an envelope protocol through key handling techniques in cloud storage |
277 | -- | 295 | N. Vijayaraj, T. Senthil Murugan. Resource allocation with effective multi-attribute combinational double auction in cloud using O-DBS |
296 | -- | 322 | Ajit Kumar Behera, Ch. Sanjeev Kumar Dash, Mrutyunjaya Panda, Satchidananda Dehuri, Rajib Mall. A state-of-the-art neuro-swarm approach for prediction of software reliability |
323 | -- | 342 | Parveen Kumar Sharma, Rajiv Mahajan, Surender Kumar. Trust-based multi-level secure routing for authentication and authorisation in WMN |
343 | -- | 355 | Suman Madan, Puneet Goswami. Hybrid privacy preservation model for big data publishing on cloud |
356 | -- | 362 | T. Vishal Patro, M. Gayathri, C. Malathy 0001. Smart mirror with biometric authentication |
363 | -- | 373 | G. Sasikala, B. Roopesh, S. V. Charan Sai, Y. Sathish Kumar. Energy saving management system in educational buildings |
374 | -- | 387 | Varun M. Tayur, R. Suchithra. Modelling context awareness in internet of things with business process model and notation 2.0 extensions |
388 | -- | 417 | Avjeet Singh, Anoj Kumar. Applications of nature-inspired meta-heuristic algorithms: a survey |