Journal: IJICT

Volume 18, Issue 2

125 -- 141Ying Li. Security protocol of internet of things based on NTRU encryption model
142 -- 159Haiying Wang. Machine learning method based on improved drosophila optimisation algorithm
160 -- 174Zhang Xu. Research on blurred edge information segmentation of image based on computer vision
175 -- 188Yujiang Fei. Multi-tag cleaning software for cyclic redundant data stream based on RFID in cloud computing
189 -- 206Junjie Niu. Intelligent evaluation model of e-commerce transaction volume based on the combination of k-means and SOM algorithms
207 -- 223Lijun Zhao, Bin Liu, Jinling Ma. Virtual machine allocation method for cloud computing based on multi-objective evolutionary algorithm
224 -- 241Santar Pal Singh, S. C. Sharma. A PSO-based improved clustering algorithm for lifetime maximisation in wireless sensor networks