Journal: IJCC

Volume 9, Issue 4

373 -- 396Ankita Taneja, Hari Singh, Suresh Chand Gupta. Stream of traffic balance in active cloud infrastructure service virtual machines using ant colony
397 -- 411Mirsaeid Hosseini Shirvani, Alireza Babazadeh Gorji. Optimisation of automatic web services composition using genetic algorithm
412 -- 431Majid Farhadi, Hamideh Bypour, Seyyed Erfan Asadi. A secure and efficient multi cloud-based data storage and retrieval using hash-based verifiable secret sharing scheme
432 -- 452Chetana Tukkoji, K. Seetharam. Memory constraint parallelised resource allocation and optimal scheduling using oppositional GWO for handling big data in cloud environment
453 -- 469Md. Oqail Ahmad, Rafiqul Zaman Khan. An efficient load balancing scheduling strategy for cloud computing based on hybrid approach

Volume 9, Issue 2/3

131 -- 149Haider Mehraj, Ajaz Hussain Mir. Feature vector extraction and optimisation for multimodal biometrics employing face, ear and gait utilising artificial neural networks
150 -- 162E. Laxmi Lydia, S. Kannan, S. SumanRajest, S. Satyanarayana. Correlative study and analysis for hidden patterns in text analytics unstructured data using supervised and unsupervised learning techniques
163 -- 177R. Venkatesan, Sevugan Prabu. Spectral and spatial features-based HSI classification using multiple neuron-based learning approach
178 -- 188Pradeep Kumar, Shailendra Narayan Singh, Sudhir Dawra. Green factors of referential value-based software component repository
189 -- 206M. Priya, Ch. Aswani Kumar. A novel approach for merging ontologies using formal concept analysis
207 -- 215Sathish Kumar Ravichandran, Archana Sasi. Effective storage of goods in a warehouse using farm optimisation algorithm
216 -- 231M. K. Nallakaruppan, U. Senthil kumaran. Hybrid swarm intelligence for feature selection on IoT-based infrastructure
232 -- 244Ruwaidah Fadhil Albadri. Development of a network packet sniffing tool for internet protocol generations
245 -- 257S. Senthil Kumar, J. T. Thirukrishna. OREA for improving data packet transmission in wireless sensor networks with cloud security mechanism
258 -- 284K. Krishna Jyothi, Shilpa Chaudhari. Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography
285 -- 294B. Maheswara Rao, S. Baskar. Enhanced modulation scheme for cognitive radio over Rayleigh fading channels using power allocation and spectrum sensing models
295 -- 310Gowtham Mamidisetti, Ramesh Makala. A novel data sharing model for cloud environment using dual key authentication
311 -- 329I Karthiga, Sharmila Sankar. An IoT-based secure data transmission in WBSN
330 -- 354A. Emmanuel Peo Mariadas, R. Madhanmohan. Hybrid PSO-DE algorithm-based trust and congestion aware cluster routing algorithm for MANET
355 -- 374Manoj L. Bangare, Sarang A. Joshi. Kernel interpolation-based technique for privacy protection of pluggable data in cloud computing

Volume 9, Issue 1

6 -- 27Arif Ahmed 0001, Guillaume Pierre. Docker-pi: Docker container deployment in fog computing infrastructures
28 -- 54Simone Bolettieri, Raffaele Bruno. Edge-centric resource allocation for heterogeneous IoT applications using a CoAP-based broker
55 -- 74Lucas R. B. Brasilino, Naveen Marri, Alexander Shroyer, Catherine L. Pilachowski, Ezra Kissel, Martin Swany. In-network processing for edge computing with InLocus
75 -- 94Ilse Bohé, Michiel Willocx, Vincent Naessens. SMIoT: a software architecture for maintainable internet-of-things applications
95 -- 128Roberto S. Silva Filho, Bo Yu, Ching-Ling Huang, Raju Venkataramana, Ashraf El-Messidi, Dustin Sharber, John Westerheide, Nasr Alkadi. The edge architecture for semi-autonomous industrial robotic inspection systems