Vol 7, No 2.4 (2018)

Special Issue 4

  • Conference name: International Conference on Technological Innovations in Engineering and Management (ICTIEM-18)
  • Start date: 26th Feb 2018
  • End date: 27th Feb 2018
  • Country: India
  • Website: www.ictiem.com

Table of Contents


A Study of major secure SDLC processes in web based applications

Subhranshu Mohanty, Amar Kumar Mohapatra, Srikanta Patnaik Pages: 1-4

DOI: 10.14419/ijet.v7i2.4.10029

Model-based compressed sensing algorithms for MIMO- OFDM channel estimation

P N. Jayanthi, S Ravishankar Pages: 5-9

DOI: 10.14419/ijet.v7i2.4.10030

Hybrid classification model to detect advanced intrusions using data mining techniques

V Mala, K Meena Pages: 10-13

DOI: 10.14419/ijet.v7i2.4.10031

Human intention detection with facial expressions using video analytics

K Prema, L Leema Priyadharshini, C Shyamala Kumari, S Florence Pages: 14-16

DOI: 10.14419/ijet.v7i2.4.10032

Li-Fi – the future of wireless technology

C Shyamala Kumari, S Florence, K Prema, L Leema Priyadharshini Pages: 17-19

DOI: 10.14419/ijet.v7i2.4.10033

A vibrant data placement approach for map reduce in diverse environments

J Sujatha, K Meena Pages: 20-22

DOI: 10.14419/ijet.v7i2.4.10034

Implementation and performance evaluation of AODV-PSO with AODV-ACO

Kavita ., Prashant Sahai, Sonu Mittal Pages: 23-25

DOI: 10.14419/ijet.v7i2.4.10035

Hybrid Nature-inspired algorithm for efferent cloud resource utilization

Monika ., Vivek Jaglan, Jugnesh Kumar, Akshat Agrawal Pages: 26-29

DOI: 10.14419/ijet.v7i2.4.10036

Image segmentation using hybrid clustering with GA and finding the tumor area in image

Bandana Bali, Brij Mohan Singh Pages: 30-33

DOI: 10.14419/ijet.v7i2.4.10037

Energy aware approach for security and power optimization in advance wireless networks of internet of things (IoT)

Er Sharad, Savita Shiwani, Manish Suroliya Pages: 34-38

DOI: 10.14419/ijet.v7i2.4.10038

Cluster head shuffling based global optimization using elephant herd optimization (EHO) approach

Er Sharad, Savita Shiwani, Manish Suroliya Pages: 39-45

DOI: 10.14419/ijet.v7i2.4.10039

A Novel approach of data deduplication for distributed storage

Shubhanshi Singhal, Akanksha Kaushik, Pooja Sharma Pages: 46-52

DOI: 10.14419/ijet.v7i2.4.10040

A survey: issues and challenges in wireless sensor network

Tarun Bala, Varsha Bhatia, Sunita Kumawat, Vivek Jaglan Pages: 53-55

DOI: 10.14419/ijet.v7i2.4.10041

Development of smart farming - a detailed study

C M. Chidambaranathan, S.S. Handa, M.V. Ramanamurthy Pages: 56-58

DOI: 10.14419/ijet.v7i2.4.10042

High Mobility Supports Routing Protocol (HMSRP) in Mobile Ad Hoc Networks

Dr T.Senthil Murugan, . . Pages: 59-61

DOI: 10.14419/ijet.v7i2.4.11165

Covert Channels Detection with Supported Vector Machine and Hyperbolic Hopfield Neural Network

G Yuvaraj, Siva Rama Lingham N, Rajkamal J Pages: 62-65

DOI: 10.14419/ijet.v7i2.4.11166

Successive Duplicate Detection in Scalable Datasets in Cloud Database

N Rajkumar, K Kishore Kumar, J Vivek Pages: 66-69

DOI: 10.14419/ijet.v7i2.4.11167

Acute Stage of Brain Stroke Diagnosis Using Hybrid Genetic Algorithm for Optimization of Feature Selection and Classifier

C Amuthadevi, K Meena, K Arthi Pages: 70-75

DOI: 10.14419/ijet.v7i2.4.11168

Cross-Monotonic in Cost Sharing Mechanisms Using Ns2

R Ganesan, Justin Joseph, Jisha Isaac Pages: 76-80

DOI: 10.14419/ijet.v7i2.4.11169

Implementation of Geospatial Labeling using Time of Arrival and Cramer-Rao bound approach

M Thanjaivadivel, Ignatious K. Pious Pages: 81-84

DOI: 10.14419/ijet.v7i2.4.11170

Internet of Things based Accident Prevention and Detection System

K Meena, C Amuthadevi, G Sai Kumar Pages: 85-87

DOI: 10.14419/ijet.v7i2.4.11171

A Survey on Security and Privacy Issues in Cloud Computing

T Thilagam, K Arthi, C Amuthadevi Pages: 88-92

DOI: 10.14419/ijet.v7i2.4.11172

Review on using Region of interest for HEVC

Parmeshwar Kokare, Dr MasoodhuBanu. N.M Pages: 93-96

DOI: 10.14419/ijet.v7i2.4.11173

GSM based door open and closing system

V Usha, N Rajkumar, Dr M. Shyamala Devi, C Saranya Jothi Pages: 97-100

DOI: 10.14419/ijet.v7i2.4.11186

Load Forecasting Analysis by Time Series Method

Kuldeep S, Anitha G S Pages: 101-104

DOI: 10.14419/ijet.v7i2.4.11227

Design of High-Speed Multiplier Architecture Based on Vedic Mathematics

Chaitanya CVS, Sundaresan C, P R Venkateswaran, Keerthana Prasad, V Siva Ramakrishna Pages: 105-108

DOI: 10.14419/ijet.v7i2.4.11228

Using unsupervised machine learning to model tax practice learning theory

Alfred Howard Miller Pages: 109-116

DOI: 10.14419/ijet.v7i2.4.13019

Aluminum metal matrix composites a review of reinforcement; mechanical and tribological behavior

Pranav Dev Srivyas, M S. Charoo Pages: 117-122

DOI: 10.14419/ijet.v7i2.4.13020

Resource provisioning methodology for cloud environment with producer and consumer favorable: an approach of virtual cloud compiler

V Vivek, R Srinivasan, R Elijah Blessing Pages: 123-130

DOI: 10.14419/ijet.v7i2.4.13022

Detection of skin cancer- A genetic algorithm approach

T D. Srividya, Dr V. Arulmozhi Pages: 131-135

DOI: 10.14419/ijet.v7i2.4.13023

Challenges in implementing industry revolution 4.0 in INDIAN manufacturing SMES: insights from five case studies

Suresh N, Hemamala K, Ashok N Pages: 136-139

DOI: 10.14419/ijet.v7i2.4.13024

Estimating the difference of agriculture productivity in ASIAN regions

Swati Hira, Anita Bai Pages: 140-146

DOI: 10.14419/ijet.v7i2.4.13025

IPV4 and IPV6 based hybrid approach for spam and virus detection

Swati Hira, Samir Ajani, Pratibha Kokardikar, Shubhangi Neware Pages: 147-150

DOI: 10.14419/ijet.v7i2.4.13026

Social policy and social legislation A jurisprudential interface

Prof. Dr. Shefali Raizada Pages: 151-152

DOI: 10.14419/ijet.v7i2.4.13027

Analysis of AODV protocol under sinkhole attack in wireless sensor network

Harkesh Sehrawat, Yudhvir Singh, Vikas Siwach Pages: 153-156

DOI: 10.14419/ijet.v7i2.4.13028

Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks

Harkesh Sehrawat, Yudhvir Singh, Vikas Siwach Pages: 157-160

DOI: 10.14419/ijet.v7i2.4.13029

Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud environment

Shakti Arora, Surjeet Dalal Pages: 161-164

DOI: 10.14419/ijet.v7i2.4.13030

Modified drosophila optimization algorithm for managing re-sources in cloud environment

Shilpa Kukreja, Surjeet Dalal, . . Pages: 165-169

DOI: 10.14419/ijet.v7i2.4.13031

Comparative analysis of power aware routing protocols in mobile ad-hoc network

Meenu ., Dr Vivek Jaglan, Akshat Agrawal Pages: 170-173

DOI: 10.14419/ijet.v7i2.4.13032

A study on load balancing techniques in SDN

Anish Ghosh, Mrs. T. Manoranjitham Pages: 174-177

DOI: 10.14419/ijet.v7i2.4.13033

Trend analysis of university placement by using machine learning algorithms

Chandrasekhar Kumbhar, Dr S. S. Sridhar Pages: 178-181

DOI: 10.14419/ijet.v7i2.4.13034

Service identification using k-NN machine learning

Travis Joseph Poulose, S Ganesh Kumar Pages: 182-186

DOI: 10.14419/ijet.v7i2.4.13035

A survey of intrusion detection techniques

Sharanya Chandran, K Senthil Kumar Pages: 187-189

DOI: 10.14419/ijet.v7i2.4.13036

Study of optimization parameters for service chaining in cloud environment

Prathamesh Purohit, Ruturaj Kadikar, M Susila, B Amutha Pages: 190-195

DOI: 10.14419/ijet.v7i2.4.13037

Routing protocols for internet of things: a survey

Tamoghno Romario Bhattacharyya, Dr M. Pushpalatha Pages: 196-199

DOI: 10.14419/ijet.v7i2.4.13038

Four-way handshake protocol for authenticating in multiple mix-zones

T Senthil Kumar, S Prabhakaran, V Prashanth Pages: 200-203

DOI: 10.14419/ijet.v7i2.4.13039

Multicasting technique for path establishment in vehicular ad hoc networks

Sukhpreet Kaur, Er Sharad Pages: 204-207

DOI: 10.14419/ijet.v7i2.4.13040

Copyright © 2022 Science Publishing Corporation Inc. All rights reserved.