- Conference name: International Conference on Cognitive Informatics & Soft Computing (CISC-2017)
- Start date: 20/12/2017
- End date: 21/12/2017
- Country: India
- Website: www.iccisc.com
Table of Contents
Articles
Simulation and performance analysis for coefficient estimation for sinusodial signal using LMS, RLS and proposed method |
![]() ![]() |
Kantipudi MVV Prasad, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8960 |
Dos invasion at network by intruder; protection mecha-nism by “anti-dos invasion firewall” |
![]() ![]() |
Govindaraj S., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8961 |
Survey on finger-vein segmentation and authentication |
![]() ![]() |
Shwetambari Kharabe, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8962 |
System engineering approach for assisting physical-ly challenged and geriatric persons |
![]() ![]() |
R. Gowri Shankar Rao, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8971 |
On node reproduction attack in wireless sensor networks |
![]() ![]() |
P. Harini ![]() DOI: 10.14419/ijet.v7i1.2.8973 |
A modified PV fed 9 level inverter for standalone applications with reduced number of switches |
![]() ![]() |
Jaikrishna V, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8986 |
Educational data mining for student placement prediction using machine learning algorithms |
![]() ![]() |
K. Sreenivasa Rao, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8988 |
Ingenious vehicular system to evade collisions |
![]() ![]() |
R. Sridhar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8990 |
A review: algorithm used for beam forming systems |
![]() ![]() |
Soma Pal, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8991 |
An approach to spectral analysis of psychologically influenced speech |
![]() ![]() |
Bhagyalaxmi Jena, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8993 |
Implementation of a low cost ac-dc converter for high and low power applications |
![]() ![]() |
R. C. Ilambirai, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8998 |
Efficient technique to estimate age using PCA & multi SVM classification |
![]() ![]() |
Laiphrakpam Jibanpriya Devi, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.8999 |
Energy efficient scheduling mechanism using wireless sensor networks |
![]() ![]() |
Vengadeshwari ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9000 |
A novel approach for phishing emails real time classifica-tion using k-means algorithm |
![]() ![]() |
Vidya Mhaske-Dhamdhere, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9018 |
DVR based reactive power control strategy of DFIG for wind energy generation during unbalanced grid voltages |
![]() ![]() |
S. Geethanjali, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9019 |
Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET |
![]() ![]() |
Uzma Shaikh, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9020 |
A fuzzy energy and security aware scheduling in cloud |
![]() ![]() |
Sirisati Ranga Swamy, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9021 |
Shared intelligent optimum route selection through traffic management system in VANET– SIRS |
![]() ![]() |
Mukund B Wagh, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9037 |
Design and development of text extraction and retrieval using style of documents in web searching |
![]() ![]() |
S. Balan, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9038 |
Power and resource allocation for MIMO based two-tier heterogeneous network using small cell clustering algorithm |
![]() ![]() |
K. Prabhu Chandran, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9039 |
Levenberg-marquardt algorithm to identify the fault analysis for industrial applications |
![]() ![]() |
P. Bhuvaneswari, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9040 |
Implementation and analysis of stability improvement in VANET using different scenarios |
![]() ![]() |
Sahil Verma, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9041 |
A combine approach of preprocessing in integrated signature verification (ISV) |
![]() ![]() |
Upasna Jindal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9042 |
Comparative study of cluster based routing protocols in WSN |
![]() ![]() |
Varsha Bhatia, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9045 |
Semantic educational data extraction using structur-al domain relationships |
![]() ![]() |
Manchikatla Srikanth ![]() DOI: 10.14419/ijet.v7i1.2.9060 |
Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks |
![]() ![]() |
Mohammad Sirajuddin ![]() DOI: 10.14419/ijet.v7i1.2.9061 |
A novel implementation of backpressure algorithm in wireless ad hoc network |
![]() ![]() |
Ugendhar Addagatla, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9062 |
Performance enhancement analysis of an isolated DC-DC converter using fuzzy logic controller |
![]() ![]() |
S. Muthu Balaji, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9063 |
Multiband microstrip patch antenna with rectangular slots on patch for bluetooth and c-band applications |
![]() ![]() |
Ajay Dadhich, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9064 |
Implementation and performance analysis of AODV-PSO with AODV-GA and AODV-ABC |
![]() ![]() |
Kavita ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9065 |
A novel simulated multilevel inverter topolo-gy with minimal switches |
![]() ![]() |
R. Anand, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9067 |
Review on high utility itemset mining algorithms for big data |
![]() ![]() |
Sandeep Dalal, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9230 |
Image retrieval techniques: a survey |
![]() ![]() |
Aman Dureja, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9231 |
Low power and high fault coverage SIC reseeding TPG using x-filling techniques for Scan BIST |
![]() ![]() |
Sabir Hussain ![]() DOI: 10.14419/ijet.v7i1.2.9232 |
A novel algorithm to moderate the cost of scrutinized paths |
![]() ![]() |
Grandhi Prasuna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9233 |
Software – defined networking based secure rout-ing in mobile ad hoc network |
![]() ![]() |
B. V. V. S. Prasad, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.9288 |
An adaptive sentimental analysis using ontology for retail market |
![]() ![]() |
J Mannar Mannan, ![]() ![]() DOI: 10.14419/ijet.v7i1.2.10666 |
science