515 | -- | 522 | Vibhor Sharma, Shashi Bhushan, Bhim Singh Boahar, Pramod Kumar, Anuj Kumar. An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites |
523 | -- | 531 | Sarvani Anandarao, Sweetlin Hemalatha Chellasamy. Detection of Hot Topic in Tweets Using Modified Density Peak Clustering |
533 | -- | 539 | Krittachai Boonsivanon, Worawat Sa-ngiamvibool. A SIFT Description Approach for Non-Uniform Illumination and Other Invariants |
541 | -- | 547 | Wiharto, Esti Suryani, Sigit Setyawan. Framework Two-Tier Feature Selection on the Intelligence System Model for Detecting Coronary Heart Disease |
549 | -- | 557 | Venkatasubramanian Srinivasan. Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET |
559 | -- | 567 | Battula Phijik, Chakunta Venkata Guru Rao. Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks |
569 | -- | 576 | Badawi Badawi, Arif Nurudin, Muafi Muafi. Consumer Conformity, Social Ties and EWOM in Digital Marketing |
577 | -- | 584 | Jitendra Rajpurohit. A Modified Jellyfish Search Optimizer with Opposition Based Learning and Biased Passive Swarm Motion |
585 | -- | 590 | RatnaKumari Challa, VijayaKumari Gunta. Towards the Construction of Reed-Muller Code Based Symmetric Key FHE |
591 | -- | 597 | Annabathula Phani Sheetal, Kongara Ravindranath. High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing |