Journal: Ingénierie des Systèmes d Information

Volume 26, Issue 6

515 -- 522Vibhor Sharma, Shashi Bhushan, Bhim Singh Boahar, Pramod Kumar, Anuj Kumar. An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites
523 -- 531Sarvani Anandarao, Sweetlin Hemalatha Chellasamy. Detection of Hot Topic in Tweets Using Modified Density Peak Clustering
533 -- 539Krittachai Boonsivanon, Worawat Sa-ngiamvibool. A SIFT Description Approach for Non-Uniform Illumination and Other Invariants
541 -- 547Wiharto, Esti Suryani, Sigit Setyawan. Framework Two-Tier Feature Selection on the Intelligence System Model for Detecting Coronary Heart Disease
549 -- 557Venkatasubramanian Srinivasan. Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET
559 -- 567Battula Phijik, Chakunta Venkata Guru Rao. Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks
569 -- 576Badawi Badawi, Arif Nurudin, Muafi Muafi. Consumer Conformity, Social Ties and EWOM in Digital Marketing
577 -- 584Jitendra Rajpurohit. A Modified Jellyfish Search Optimizer with Opposition Based Learning and Biased Passive Swarm Motion
585 -- 590RatnaKumari Challa, VijayaKumari Gunta. Towards the Construction of Reed-Muller Code Based Symmetric Key FHE
591 -- 597Annabathula Phani Sheetal, Kongara Ravindranath. High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing