International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 11, No. 2, Feb. 2019
Cover page and Table of Contents: PDF (size: 171KB)
Contents
REGULAR PAPERS
-
A Chaotic Cryptosystem using Conjugate Transcendental Fractal Function
Shafali Agarwal
Abstract | References | Full Paper: PDF (Size:1156KB), PP.1-12, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.01
-
Performance Analysis of Convolution Code with Variable Constraint Length in Shallow Underwater Acoustic Communication
Krishnamoorthy Narasu Raghavan, Suriyakala C D, Ramadevi Rathinasabapathy, Marshiana Devaerakkam, Sujatha Kumaran
Abstract | References | Full Paper: PDF (Size:693KB), PP.13-20, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.02
-
An Efficient Steganography Technique for Images using Chaotic Bitstream
Hidayet Ogras
Abstract | References | Full Paper: PDF (Size:436KB), PP.21-27, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.03
-
An Efficient Image Block Encryption for Key Generation using Non-Uniform Cellular Automata
G. Kumaresan, N. P. Gopalan, T. Vetriselvi
Abstract | References | Full Paper: PDF (Size:627KB), PP.28-35, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.04
-
PSO and TLBO based Reliable Placement of Controllers in SDN
Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava
Abstract | References | Full Paper: PDF (Size:715KB), PP.36-42, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.05
-
Inculcating Global Optimization in ZRP through Newfangled Firefly Algorithm
Neha Sharma, Usha Batra, Sherin Zafar
Abstract | References | Full Paper: PDF (Size:981KB), PP.43-51, Pub. Date: 2019-02-08
DOI: 10.5815/ijcnis.2019.02.06