Issue 16 of Volume 107

Secure Profile Matching for Portable Public Networks

Authors: M. Ramanjulu, M. Veeresh Babu

Survey on Constrained based Data Stream Mining

Authors: Lini Susan Kurien, Sreekumar K, Minu Kk

Strong (Weak) Domination Intuitionistic Fuzzy Graphs

Authors: J. John Stephan, A. Muthaiyan, N. Vinoth Kumar

Functional Encryption for Secured Big Data Analytics

Authors: Nilotpal Chakraborty, G K Patra

A Review: Study of Test Case Generation Techniques

Authors: Itti Hooda, Rajender Chhillar