Advances and Applications in Mathematical Sciences
ContentsVOLUME 18, ISSUE 8, June 2019, PAGES 567-815
1. | A technique for identification and mollification of greedy nodes in wireless mesh networks (WMNs) Afshan Hassan and Rajeev Sharma Open Access Article |
567-585 |
2. | An improved hierarchical clustering approach for mobile sensor networks using type-2 fuzzy logic Asra Kousar, Nitin Mittal and Prabhjot Singh Open Access Article |
587-604 |
3. | Routing protocol for wireless mesh network – a survey Bhanu Sharma and Amar Singh Open Access Article |
605-616 |
4. | Overview of agile practices Deepika Kaushik and Punit Soni Open Access Article |
617-626 |
5. | Critical review of security issues of internet of things under cloud computing environment Mandeep Kaur, Sanchi Kakkar and V. P. Singh Open Access Article |
627-636 |
6. | GA based dimensionality reduction for effective software effort estimation using ANN Somya Goyal and Pradeep K. Bhatia Open Access Article |
637-649 |
7. | An efficient data locality system for big data processing over distributed data centre by using scheduling technique Navneet Kaur, S. C. Gupta and Deepak Kumar Open Access Article |
651-664 |
8. | Energy efficient grid based data dissemination to mobile sinks in wireless sensor network Navpreet Kaur, Mithilesh Kumar Dubey and Ravi Kant Sahu Open Access Article |
665-675 |
9. | Fuzzy logic: an overview of different application areas Ramandeep Kaur and Amar Singh Open Access Article |
677-689 |
10. | Combinational fuzzy expert system (CFES) for academic performance appraisal Ramit Manuja, Sandeep Singh Bindra and S. C. Gupta Open Access Article |
691-703 |
11. | Fuzzy based automated feedback collection and analysis system Reema Lalit, Karun Handa and Nitin Sharma Open Access Article |
705-714 |
12. | Generalized statistical convergence of order a in random n-normed space Reena, Meenakshi and Vijay Kumar Open Access Article |
715-729 |
13. | Impact of clone node attack on wireless sensor networks Sachin Lalar, Shashi Bhushan and Surender Open Access Article |
731-740 |
14. | Object detection and recognition Shakti Arora, Harish Saini and Ashish Kumar Open Access Article |
741-751 |
15. | Systematic review of recent computer aided diagnostic approaches in medical imaging Sukhendra Singh and Bipin Kumar Tripathi Open Access Article |
753-765 |
16. | Comparison of data security schemes framework for mobile cloud computing Sumant Raj Chauhan, Pankaj Kumar and Vikram Bali Open Access Article |
767-774 |
17. | Parallel computing of matrix multiplication in open MP supported codeblocks Hari Singh, Dinesh Chander and Ravindara Bhatt Open Access Article |
775-787 |
18. | An innovative technique linear cluster handling (LCH) for energy efficiency in linear WSNs Anju Rani and Amit Bindal Open Access Article |
789-804 |
19. | Categorization and taxonomy of resource management in cloud computing Udit Pratap Singh and Amit Jain Open Access Article |
805-815 |