Journal: IJICT

Volume 7, Issue 6

537 -- 561Suman Das, Ranjan Ghosh. Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes
562 -- 584Omprakash Kaiwartya, Sushil Kumar. Cache agent-based geocasting in VANETs
585 -- 606Subhankar Joardar, Vandana Bhattacherjee, Debasis Giri. SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs
607 -- 631P. Latchoumy, P. Sheik Abdul Khader. Reliable job execution with process failure recovery in computational grid
632 -- 644Sunil Kumar Singh, Rajesh Duvvuru, Jyoti Prakash Singh. TCP and UDP-based performance evaluation of proactive and reactive routing protocols using mobility models in MANETS
645 -- 661Subasish Mohapatra, Banshidhar Majhi, Srikanta Patnaik. An efficient event matching algorithm for publish/subscribe system in sensor cloud platform
662 -- 675Vivek Arya, Charu Gandhi. Energy aware routing protocols for mobile ad hoc networks - a survey
676 -- 686H. Anandakumar, K. Nisha. Enhanced multicast cluster-based routing protocol for delay tolerant mobile networks

Volume 7, Issue 4/5

336 -- 347S. B. Rini Jones, P. Poongodi, A. Immanuel Selvakumar. Model reference fuzzy cascade controller: a novel method for attaining desired mass flow in a wind tunnel
348 -- 365Abdeldjalil Khelassi, Mohammed Amine Chikh. Cognitive amalgam with a distributed fuzzy case-based reasoning system for an accurate cardiac arrhythmias diagnosis
366 -- 384A. Albert Rajan, S. Vasantharathna. Experimental investigation on fuzzy-based dynamic PWM controller using FPGA for harmonics and torque ripple minimisation in BLDC motor drive
385 -- 405Amer Draa, Zeyneb Benayad, Fatima Zahra Djenna. An opposition-based firefly algorithm for medical image contrast enhancement
406 -- 424A. Amsaveni, P. T. Vanathi. A comprehensive study on image steganography and steganalysis techniques
425 -- 436Shanty Chacko, J. Jayakumar. Directional Gaussian filter with variable filtering strength and variable window size for deblocking digital images
437 -- 454S. Sridevi Sathya Priya, P. Karthigaikumar, N. M. Siva Mangai, R. Sandhya. Efficient hardware implementation of AES algorithm using bio metric key
455 -- 468Tanuja Srivastava, Nirmal Yadav. Error estimation of discrete convolution back projection for discrete Radon transform
469 -- 480Swati Tevatia, Rajesh Prasad. Multi-patterns parameterised matching with application to computational biology
481 -- 494James Daniel Correa De Freitas, Henrique Rego Monteiro Da Hora, Dalessandro Soares Vianna, Helder Gomes Costa. RIOT - a tool for estimating the reliability of surveys
495 -- 507Lihe Zhang, Chen Ma. Multi-level K-means clustering and group sparse coding with quasi-SIFT feature for image classification
508 -- 520Zhaogan Lu, Chunmei Xu. Multiple scale image segmentation-based multiple scale approximation with support vector machines
521 -- 536S. Uma Maheswari, D. Jude Hemanth. Different methodology for image steganography-based data hiding: review paper

Volume 7, Issue 2/3

126 -- 140Chunying Wu, Shundong Li, Yiying Zhang. Key management scheme based on secret sharing for wireless sensor networks
141 -- 158Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong. Attribute-based signature schemes with accountability
159 -- 184Hiren J. Patel, Christine Schubert-Kabban, Rusty O. Baldwin, David P. Montminy. Statistical analysis and comparison of linear regression attacks on the advanced encryption standard
185 -- 201Zhiqiang Lin. On two circuit configurations of non-linear feedback shift registers
202 -- 217Dongyan Zhang, Tao Zhang, Pingxin Du. A real-time data backup model and methods based on peer-to-peer network
218 -- 234Tapashi Kashyap Das, P. H. Talukdar, Kishore Dutta. Hidden Markov model-based Assamese vowel phoneme recognition using cepstral features
235 -- 246Haining Luo, Xu an Wang. New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption
247 -- 262Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang. Multi-party concurrent signatures scheme from lattice
263 -- 277Xia Deng, Jianxin Wang, Le Chang. Sociality-based comprehensive buffer management for multicast in DTNs
278 -- 286Huai Wu, Chunxiang Xu, Jiang Deng. Server-aided aggregate verification signature: security definition and construction
287 -- 301Lin Cheng, Qiaoyan Wen. Provably secure and efficient certificateless signature in the standard model
302 -- 315Peng Xiao, Dongbo Liu. Improving network routing energy-efficiency for real-time workloads by stochastic service model
316 -- 323Xia Shao, Weidang Zhang, Ping Li. Decreasing the BER of turbo codes with short frame by optimising the energy allocation
324 -- 332Xueyu Huang, Yongbo Xiang, Chuangming Tong, Na Wei. Design of a microwave down-converter module

Volume 7, Issue 1

1 -- 13E. Umamaheswari, T. V. Geetha. Learning event patterns from news text using bootstrapping
14 -- 24Guangtao Ma, Yang Zhou, Tao Liu, Jun Li. The quality of luminous environment of man-machine systems
25 -- 39Yasushi Yamaguchi. Extended visual cryptography for continuous-tone images: effect of the optimum tone mapping
40 -- 51Sunil Pratap Singh, Preetvanti Singh. Design and implementation of a location-based multimedia mobile tourist guide system
52 -- 72Mandana Farzaneh, Fatemeh Najafloo, Hatef Rasouli. A study of employees' views of strategic information systems in Iranian banks: the case of internet banking
73 -- 87Cheng-Wen Yao, Te-Yi Lin. Consumer behaviour with negative emotion in e-tailing service environment
88 -- 99Smita Prava Mishra, Debahuti Mishra, Srikanta Patnaik. A new improved cluster validity indexing technique: harnessed from Goodman-Kruskal validity index
100 -- 108Zhaojie Zhu, Zhenhong Jia, Xizhong Qin, Chuanling Cao, Chun Chang. Application of modified particle swarm optimisation on forecasting diffusion of mobile internet
109 -- 122Ming Jiang 0009, Jian Wang, Xingqi Wang, Jingfan Tang, Chunming Wu. A mixture language model for the classification of Chinese online reviews