- Conference name: International Conference on Recent Trends in Computing
- Start date: 14.12.17
- End date: 15.12.17
- Country: India
- Website: www.icrtc2017.com
Table of Contents
Articles
CMOS Front-End of LNA for GPS and GSM wireless applications |
![]() ![]() |
Mahesh Mudavath, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9069 |
Software metric evaluation on cloud based applications |
![]() ![]() |
A. Phani Sheetal, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9071 |
Diabetic retinopathy through retinal image analysis: A review |
![]() ![]() |
Y. Madhu Sudhana Reddy, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9072 |
Bit wise and delay of vedic multiplier |
![]() ![]() |
M Siva Kumar, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9117 |
Improvement of the efficiency of booth multiplier |
![]() ![]() |
M Siva Kumar, ![]() ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9118 |
Coalesce based binary table: an enhanced algorithm for mining frequent patterns |
![]() ![]() |
M. Sireesha, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9121 |
Performance evaluation of heuristic algorithms in floor planning for ASIC design |
![]() ![]() |
S. Nazeer Hussain, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9122 |
Reconfigurable pseudo biotic key encryption mechanism for cryptography applications |
![]() ![]() |
B. Murali Krishna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9124 |
Designing a waveform using LFM, NLFM for MIMO radar |
![]() ![]() |
G S Krishnam Naidu Yedla, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9127 |
LDT-MRF: Log decision tree and map reduce framework to clinical big data classification |
![]() ![]() |
T. Surekha, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9129 |
Encryption techniques & access control models for data security: A survey |
![]() ![]() |
Rashmi Dixit, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9130 |
Multi-hope relay based high capacity energy efficient model for ultra wideband communication system |
![]() ![]() |
B. Rajanna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9132 |
EMD based Hilbert energy spectrum analysis of adventitious lung wave signals |
![]() ![]() |
Shankar B. B., ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9133 |
Analysis of power reduction and implementation on FPGA for AES-128bits using BEDT schemes |
![]() ![]() |
C. Sapna Kumari, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9134 |
Glaucoma detection using cup to disc ratio and artificial neural networks |
![]() ![]() |
Gayathri R., ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9135 |
Inevitable dissection of left ventricle aimed at discovery of cardiac blood flow appraisal |
![]() ![]() |
Inbalatha M., ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9138 |
Implementation of FPGA based MRPMA for high performance applications |
![]() ![]() |
T. Siva Sankara Phani, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9139 |
VLSI design for efficient RSD-Based ECC processor using Karatsuba algorithm |
![]() ![]() |
Pasluri Bindu Swetha, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9140 |
Fuzzy based QoS prediction using bayesian network in cloud computing environment |
![]() ![]() |
Saravanan Chandrasekaran, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9141 |
Review on auditing cloud consistency service |
![]() ![]() |
Shaik BajiVali, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9143 |
A survey on privacy preserving and content protecting location based queries |
![]() ![]() |
K. Praveen Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9144 |
An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm |
![]() ![]() |
R. Vasantha, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9145 |
MATLAB/simulink study of multi-level inverter topologies using minimized quantity of switches |
![]() ![]() |
B.Vijaya Krishna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9148 |
Bigdata implementation of apriori algorithm for handling voluminous data-sets |
![]() ![]() |
M. Nagalakshmi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9149 |
Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish |
![]() ![]() |
Pankaj Singh, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9150 |
Design of low power 10GS/s 6-Bit DAC using CMOS technology |
![]() ![]() |
P. Ramakrishna, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9151 |
Efficient and high speed key-independent AES-based authenticated encryption architecture using FPGAs |
![]() ![]() |
A. Murali, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9152 |
Cantillever based MEMS pressure sensor |
![]() ![]() |
M. Siva Kumar, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9153 |
Future of internet of things (IoT) in 5G wireless networks |
![]() ![]() |
Abhiruchi Passi, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9155 |
A Study on graph with Desmos through Ict in diploma in elementary education of tamil Nadu state board |
![]() ![]() |
P. Charles Paul, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9156 |
Multilevel classification of security threats in cloud computing |
![]() ![]() |
N. Srinivasu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9157 |
FEM method structural analysis of pressure hull by using hyper mesh |
![]() ![]() |
V. Balaji, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9158 |
Extensive analysis of slip power recovery scheme |
![]() ![]() |
Ratansingh Atkar, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9159 |
Implementation of modified Q learning technique in EMCAP control architecture |
![]() ![]() |
D. Ganesha, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9160 |
Implementation of modified SARSA learning technique in EMCAP |
![]() ![]() |
D. Ganesha, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9161 |
Identifying images on moving objects to enhance the recognition |
![]() ![]() |
C. Raghavendra, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9162 |
L2 cache performance analysis for MPSoC by tag – comparision |
![]() ![]() |
Jenitha A, ![]() ![]() DOI: 10.14419/ijet.v7i1.5.9164 |
science