Journal: IJAIP

Volume 21, Issue 3/4

189 -- 210K. Sindhu, H. S. Guruprasad. Computational offloading framework using caching and cloud service selection in mobile cloud computing
211 -- 224Saswati Debnath, Pinki Roy. Audio-visual speech recognition based on machine learning approach
225 -- 234U. Harshavardhini, T. Saraswathi, J. Manju. Load balancing with SIP protocol using distributed web-server system
235 -- 246V. Gokula Krishnan, N. Sankar Ram. A novel approach to select cluster head and optimising the data transmission in VANET
247 -- 266Sihem Ghoudelbourk, Ahmad Taher Azar, Djalel Dib, Abelkrim Rechach. Fractional order control of switched reluctance motor
267 -- 286M. Devi, K. Ameenal Bibi, Hossein Rashmanlou, Yahya Talebi. New concepts in intuitionistic fuzzy labelling graphs
287 -- 304Ghadeer Al Qahmouss, Khaled Almakadmeh. Towards a standard-based model of system dependability requirements
305 -- 320G. Anuradha, Nageswara Rao Moparthi, Sridhar Namballa. Predicting elections over Twitter: a campaign strategies of political parties using machine learning algorithms
321 -- 329Jay Kant Pratap Singh Yadav, Arun Kumar Yadav 0001, Divakar Yadav, Vikash Yadav. Optimisation of Hopfield networks for storage and recall: a decade review
330 -- 347Jeffrey W. Tweedale. Using Lego EV3 to explore robotic concepts in a laboratory
348 -- 373Nacéra Laiche, Slimane Larabi. Geometric based histograms for shape representation and retrieval
374 -- 390Harpreet Kaur, Manoj Kumar, Ajay K. Sharma, Harjit Pal Singh. Design and analysis of SRRC filter in wavelet based multiuser environment of mobile WiMax

Volume 21, Issue 1/2

1 -- 17Kaushik Sekaran, P. Venkata Krishna 0001. Content-based load balancing of tasks using task clustering for cost optimisation in cloud computing environment
18 -- 40Raju Pal, Mukesh Saraswat. Improved biogeography-based optimisation
41 -- 52J. Gitanjali, Muhammad Rukunuddin Ghalib. Sequential pattern-based activity recognition model for ambient computing
53 -- 71Ruchi Makani, B. V. R. Reddy. Trust-based-tuning of Bayesian-watchdog intrusion detection for fast and improved detection of black hole attacks in mobile ad hoc networks
72 -- 86Tarun Kumar Ghosh, Sanjoy Das. Teaching learning-based optimisation for job scheduling in computational grids
87 -- 99Surafel Luleseged Tilahun. Swarm intelligence for a single source product distribution
100 -- 108C. Selvarathi, S. Subha, G. Madasamy Raja, K. Vidhya Lakshmi. A visualisation technique of extracting hidden patterns for maintaining road safety
109 -- 128Rohit Rastogi, D. K. Chaturvedi, Santosh Satya, Navneet Arora, Vikash Yadav, Vishwas Yadav, Pallavi Sharma, Sumit Chauhan. Statistical analysis of EMG and GSR biofeedback efficacy on different modes for chronic TTH on various indicators
129 -- 157Richa Sharma, Vasudha Vashisht, Umang Singh. eeFFA/DE - a fuzzy-based clustering algorithm using hybrid technique for wireless sensor networks
158 -- 173Vartika Kulshrestha, Seema Verma, C. Rama Krishna. Hybrid probabilistic triple encryption approach for data security in cloud computing
174 -- 188Ashu Bansal, Neeraj Gupta, Rakesh Garg. Fuzzy multi-attribute decision-making approach for the selection of software effort estimation models