Journal: IJICT

Volume 6, Issue 3/4

241 -- 250Yong Yang, Yu-Song Yan, Zuo-An Hu, Pan Xie. Algorithm research for capacity-constrained stochastic traffic assignment model
251 -- 259A. Ruhan Bevi, S. Malarvizhi, Shubhra Saxena. RC5 implementation in ARM platform for cryptographic applications
260 -- 271Anbazhagan Rajesh, Rangaswamy Nakkeeran. Investigation on cooperative contention-based bandwidth request mechanism for heterogeneous networks
272 -- 291Tarachand Amgoth, Prasanta K. Jana. Energy efficient and load balanced clustering algorithms for wireless sensor networks
292 -- 308M. Esther Hannah, Saswati Mukherjee. A classification-based summarisation model for summarising text documents
309 -- 325Asutosh Kar, Mahesh Chandra. A novel variable tap-length learning algorithm for low complexity, fast converging stereophonic acoustic echo cancellation
326 -- 338Sivaranjan Goswami, Bijeet Bardoloi, Pinky Deka, Darathi Dutta, Dipjyoti Sarma. A novel approach for design of a speech enhancement system using auto-trained NLMS adaptive filter
339 -- 354Parismita A. Kashyap, Kandarpa Kumar Sarma. Adaptive gain and variable effective aperture aided multi antenna set-ups for faded Rayleigh channels
355 -- 368Mounira Zerari. Business process artefact adaptability approach based on artificial immune systems
369 -- 380V. Neelaya Dhatchayani, V. S. Shankar Sriram. Trust aware identity management for cloud computing
381 -- 402Pirita Ihamäki. User experiences in the Official WikiLeaks Forum
403 -- 421J. Sengathir, R. Manoharan. Reliability factor-based mathematical model for isolating selfish nodes in MANETs
422 -- 430Wen-Yu Chiang. A new procedure of market segmentation for dynamic CRM systems: a case study of airlines in Taiwan

Volume 6, Issue 2

109 -- 121G. Jaspher Willsie Kathrine, Kirubakaran Ezra, Elijah Blessing Rajsingh. Enhancing security of electronic health records through grid-based user authentication scheme
122 -- 141S. Santhi, G. Sudha Sadasivam. Enhanced AOMDV for energy conservation in hybrid ad hoc networks
142 -- 155Varsha Namdeo, Ramjeevan Singh Thakur. Classification of data at multilevel abstraction
156 -- 174Subasish Mohapatra, Banshidhar Majhi, Srikanta Patnaik. Scalable architecture for ubiquitous healthcare using sensor cloud platform
175 -- 188S. Senthil, L. Robert. Reinforced intelligent dictionary-based encoding scheme
189 -- 212Sugam Sharma, Udoyara Sunday Tim, Shashi K. Gadia, Johnny Wong. Does SNAP eligibility have racial or ethnic gradients: a geospatial social exploratory
213 -- 238Gagandeep Kaur, Vikas Saxena, J. P. Gupta. A multi scale approach to distinguish flash crowds from PDDoS attacks

Volume 6, Issue 1

1 -- 6Miaomiao Tian, Liusheng Huang, Wei Yang. On the security of an enhanced signature scheme
7 -- 22Shihu Liu, Fusheng Yu. Hesitation degree-based similarity measures for intuitionistic fuzzy sets
23 -- 38Jia Wu, Zhihua Cai. Learning attribute weighted AODE for ROC area ranking
39 -- 48Wenbo Shi, Debiao He, Shuhua Wu. Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card
49 -- 57Hazhir Ghasemnezhad, Siamak Talebi, M. J. Dehghani. A new low complexity technique for PAPR reduction by using peak-flipping
58 -- 70Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Ahmad Al-Khasawneh. Software comprehension based on database relational algebra
71 -- 85B. Yamuna, T. R. Padmanabhan. A minimal search soft decision list decoding algorithm for Reed-Solomon codes
86 -- 108Parismita Gogoi, Kandarpa Kumar Sarma. Kalman filter and semi-blind technique-based channel estimation for coded STBC multi-antenna set-ups in faded wireless channels