Abstract is missing.
- Dynamic Parameter Adaptation Based on Using Interval Type-2 Fuzzy Logic in Bio-inspired Optimization MethodsOscar Castillo. 1-12 [doi]
- Effect of Derivative Action on Back-Propagation AlgorithmsAhmet Gürhanli, Taner Çevik, Nazife Çevik. 13-19 [doi]
- Quantum Cryptography: A SurveyLav Upadhyay. 20-35 [doi]
- Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption ContrivanceSakshi, Prateek Thakral, Karan Goyal, Tarun Kumar, Deepak Garg. 36-45 [doi]
- A Review on Human Action Recognition and Machine Learning Techniques for Suicide Detection SystemV. Rahul Chiranjeevi, D. Elangovan. 46-55 [doi]
- EEG Signal Analysis Using Wavelet Transform for Driver Status DetectionPrabhavathi C. Nissimagoudar, Anilkumar V. Nandi, H. M. Gireesha. 56-65 [doi]
- BMI Application: Accident Reduction Using Drowsiness DetectionChirag Ghube, Anuja Kulkarni, Chinmayi Bankar, Mangesh Bedekar. 66-72 [doi]
- Genre Based Classification of Hindi MusicDeepti Chaudhary, Niraj Pratap Singh, Sachin Singh. 73-82 [doi]
- A Novel Meta-heuristic Differential Evolution Algorithm for Optimal Target Coverage in Wireless Sensor NetworksChandra Naik, D. Pushparaj Shetty. 83-92 [doi]
- Implementation of Threshold Comparator Using Cartesian Genetic Programming on Embryonic FabricGayatri Malhotra, V. Lekshmi, S. Sudhakar, Subramanya Udupa. 93-102 [doi]
- Design and Implementation of an IoT-Based Háptical Interface Implemented by Memetic Algorithms to Improve Competitiveness in an Industry 4.0 Model for the Manufacturing SectorRoberto Contreras, Alberto Ochoa 0002, Edgar Cossio, Vicente García, Diego Oliva, Raul Torres. 103-117 [doi]
- An Effective Approach for Party Recommendation in Voting Advice ApplicationSharanya Nagarjan, Anuj Mohamed. 118-128 [doi]
- Fuzzy Logic Based Dynamic Plotting of Mood Swings from TweetsSrishti Vashishtha, Seba Susan. 129-139 [doi]
- Application of Parallel Genetic Algorithm for Model-Based Gaussian Cluster AnalysisPeter Laurinec, Tomás Jarábek, Mária Lucká. 140-150 [doi]
- EEG Based Feature Extraction and Classification for Driver Status DetectionPrabhavathi C. Nissimagoudar, Anilkumar V. Nandi, H. M. Gireesha. 151-161 [doi]
- Security Challenges in Semantic Web of ThingsSanju Mishra, Sarika Jain 0001, Chhiteesh Rai, Niketa Gandhi. 162-169 [doi]
- A Theoretical Approach Towards Optimizing the Movement of Catom Clusters in Micro Robotics Based on the Foraging Behaviour of Honey BeesK. C. Jithin, Syam Sankar. 170-181 [doi]
- Sensor Data Cleaning Using Particle Swarm OptimizationParag Narkhede, Shripad Deshpande, Rahee Walambe. 182-191 [doi]
- Comparative Analysis of Chaotic Variant of Firefly Algorithm, Flower Pollination Algorithm and Dragonfly Algorithm for High Dimension Non-linear Test FunctionsAmrit Pal Singh, Arvinder Kaur. 192-201 [doi]
- Analysis of Optimised LQR Controller Using Genetic Algorithm for Isolated Power SystemAnju G. Pillai, Elizabeth Rita Samuel, A. Unnikrishnan. 202-211 [doi]
- Learning Based Image Super Resolution Using Sparse Online Greedy Support Vector RegressionJesna Anver, P. Abdulla 0001. 212-218 [doi]
- A Deep Learning Approach for Molecular Crystallinity PredictionAkash Sharma, Bharti Khungar. 219-225 [doi]
- Malayalam to English Translation: A Statistical ApproachBlessy B. John, N. V. Sobhana, L. Sobha, T. Rajkumar. 226-234 [doi]
- GABoost: A Clustering Based Undersampling Algorithm for Highly Imbalanced Datasets Using Genetic AlgorithmO. A. Ajilisa, V. P. Jagathyraj, M. K. Sabu. 235-246 [doi]
- A Modified IEEE 802.11 Protocol for Increasing Confidentiality in WLANsAbhijath Ande, Nakul Singh, B. K. S. P. Kumar Raju. 247-256 [doi]
- Temporal Event Detection Using Supervised Machine Learning Based AlgorithmRakshita Bansal, Monika Rani, Harish Kumar, Sakshi Kaushal. 257-268 [doi]
- PPARM: Privacy Preserving Association Rule Mining Technique for Vertical Partitioning DatabaseVirendra Dani, Shubham Kothari, Himanshu Panadiwal. 269-278 [doi]
- Generation of Hindi Word Embeddings and Their Utilization in Ranking Documents Using Negative Sampling Architecture, t-SNE Visualization and TF-IDF Based Weighted Average of VectorsArya Prabhudesai. 279-288 [doi]
- Design and Performance of Millimeter Wave Antenna for the 5th Generation of Wireless Communication Systems ApplicationGiriraj Kumar Prajapati, Santhosh Kumar Allemki. 289-299 [doi]
- Path Construction for Data Mule in Target Based Mobile Wireless Sensor NetworksUdit Kamboj, Vishal Prasad Sharma, Pratyay Kuila. 300-309 [doi]
- Learning to Solve Single Variable Linear Equations by Universal Search with Probabilistic Program GraphsSwarna Kamal Paul, Prince Gupta, Parama Bhaumik. 310-320 [doi]
- PKI Model Optimisation in VANET with Clustering and PollingS. Arul Thileeban, C. Sathiya Narayan, J. Bhuvana, V. Balasubramanian. 321-329 [doi]
- Optimizing Probability of Intercept Using XCS AlgorithmRavindra V. Joshi, N. Chandrashekhar. 330-338 [doi]
- Reducing the Negative Effect of Malicious Nodes in Opportunistic Networks Using Reputation Based Trust ManagementSmritikona Barai, Nupur Boral, Parama Bhaumik. 339-349 [doi]
- Features Extraction: A Significant Stage in Melanoma ClassificationSavy Gulati, Rosepreet Kaur Bhogal. 350-360 [doi]
- Development of an Innovative Mobile Phone-Based Newborn Care Training ApplicationSherri L. Bucher, Elizabeth Meyers, Bhavani Singh Agnikula Kshatriya, Prem Chand Avanigadda, Saptarshi Purkayastha. 361-374 [doi]
- An Image Encryption Method Using Henon Map and Josephus TraversalShahna K. U., Anuj Mohamed. 375-385 [doi]
- Revealing Abnormality Based on Hybrid Clustering and Classification Approach - (RA-HC-CA)C. P. Prathibhamol, Asha Ashok. 386-394 [doi]
- Medical Recovery System Based on Inertial SensorsSilviu Butnariu, Csaba Antonya, Petronela Ursu. 395-405 [doi]
- A Comparative Study of Performance and Security Issues of Public Key Cryptography and Symmetric Key Cryptography in Reversible Data HidingS. Anagha, Neenu Sebastian, K. Rosebell Paul. 406-412 [doi]
- Haptic Device with Decoupled Motion for Rehabilitation and Training of the Upper LimbCsaba Antonya, Silviu Butnariu, Claudiu Pozna. 413-422 [doi]
- LSTM Approach to Cancel Noise from Mouse Input for Patients with Motor DisabilitiesSoham Harnale, Ashwin Vaidya, Aditya Bhide, Aniket Sanap, Mangesh V. Bedekar. 423-430 [doi]
- Advancements in Medical Practice Using Mixed Reality TechnologyAdam Nowak, Mikolaj Wozniak, Michal Pieprzowski, Andrzej Romanowski. 431-439 [doi]
- Contouring the Behavioral Patterns of the Users of Social Network(ing) Sites and the Need for Data Privacy Law in India: An Application of SEM-PLS TechniqueSandeep Mittal, Priyanka Sharma. 440-451 [doi]
- Classification of Melanoma Using Different Segmentation TechniquesSavy Gulati, Rosepreet Kaur Bhogal. 452-462 [doi]
- A Fuzzy Based Hybrid Firefly Optimization Technique for Load Balancing in Cloud DatacentersM. Lawanya Shri, E. Ganga Devi, Balamurugan Balusamy, Seifedine Nimer Kadry, Sanjay Misra, Modupe Odusami. 463-473 [doi]
- A Fuzzy Expert System for Diagnosing and Analyzing Human DiseasesNureni Ayofe Azeez, Timothy Towolawi, Charles Van der Vyver, Sanjay Misra, Adewole Adewumi, Robertas Damasevicius, Ravin Ahuja. 474-484 [doi]
- Diagnosing Oral Ulcers with Bayes ModelNureni Ayofe Azeez, Samuel O. Oyeniran, Charles Van der Vyver, Sanjay Misra, Ravin Ahuja, Robertas Damasevicius, Rytis Maskeliunas. 485-494 [doi]
- Design and Implementation of a Fault Management SystemAbiola Salau, Chika Yinka-Banjo, Sanjay Misra, Adewole Adewumi, Ravin Ahuja, Rytis Maskeliunas. 495-505 [doi]
- Optimized Path Selection in Oceanographic EnvironmentN. V. Sobhana, M. Rahul Raj, Gayatri Menon B., Elizabeth Sherly. 506-517 [doi]