| 131 | -- | 149 | Haider Mehraj, Ajaz Hussain Mir. Feature vector extraction and optimisation for multimodal biometrics employing face, ear and gait utilising artificial neural networks |
| 150 | -- | 162 | E. Laxmi Lydia, S. Kannan, S. SumanRajest, S. Satyanarayana. Correlative study and analysis for hidden patterns in text analytics unstructured data using supervised and unsupervised learning techniques |
| 163 | -- | 177 | R. Venkatesan, Sevugan Prabu. Spectral and spatial features-based HSI classification using multiple neuron-based learning approach |
| 178 | -- | 188 | Pradeep Kumar, Shailendra Narayan Singh, Sudhir Dawra. Green factors of referential value-based software component repository |
| 189 | -- | 206 | M. Priya, Ch. Aswani Kumar. A novel approach for merging ontologies using formal concept analysis |
| 207 | -- | 215 | Sathish Kumar Ravichandran, Archana Sasi. Effective storage of goods in a warehouse using farm optimisation algorithm |
| 216 | -- | 231 | M. K. Nallakaruppan, U. Senthil kumaran. Hybrid swarm intelligence for feature selection on IoT-based infrastructure |
| 232 | -- | 244 | Ruwaidah Fadhil Albadri. Development of a network packet sniffing tool for internet protocol generations |
| 245 | -- | 257 | S. Senthil Kumar, J. T. Thirukrishna. OREA for improving data packet transmission in wireless sensor networks with cloud security mechanism |
| 258 | -- | 284 | K. Krishna Jyothi, Shilpa Chaudhari. Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography |
| 285 | -- | 294 | B. Maheswara Rao, S. Baskar. Enhanced modulation scheme for cognitive radio over Rayleigh fading channels using power allocation and spectrum sensing models |
| 295 | -- | 310 | Gowtham Mamidisetti, Ramesh Makala. A novel data sharing model for cloud environment using dual key authentication |
| 311 | -- | 329 | I Karthiga, Sharmila Sankar. An IoT-based secure data transmission in WBSN |
| 330 | -- | 354 | A. Emmanuel Peo Mariadas, R. Madhanmohan. Hybrid PSO-DE algorithm-based trust and congestion aware cluster routing algorithm for MANET |
| 355 | -- | 374 | Manoj L. Bangare, Sarang A. Joshi. Kernel interpolation-based technique for privacy protection of pluggable data in cloud computing |