Special issue on Advances in Engineering and Emerging Technology
Guest Editor:
M. Saranya, Research Head- BTS, Chennai.
Table of Contents
Articles
A survey on MANET protocols in wireless sensor networks |
![]() ![]() |
C Cynthia, Prudhvi Krishna Saguturu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13384 |
Design approach for wideband FM receiver using RTL-SDR and raspberry PI |
![]() ![]() |
P Satya Narayana, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13386 |
Organizing hematologic gene sequence data using neighbor joining phylogeny method |
![]() ![]() |
B J. Bipin Nair ![]() DOI: 10.14419/ijet.v7i2.31.13387 |
Vulnerability detection and prevention of SQL injection |
![]() ![]() |
B J. Santhosh Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13388 |
Optimizing the performance of hadoop clusters through efficient cluster management techniques |
![]() ![]() |
K S. Shraddha Bollamma, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13389 |
An enhanced variational level set method for MRI brain image segmentation using IFCM clustering and LBM |
![]() ![]() |
P Sudharshan Duth, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13390 |
Color detection in RGB-modeled images using MAT LAB |
![]() ![]() |
P Sudharshan Duth, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13391 |
Study and analysis of novel RF MEMS switched capacitor |
![]() ![]() |
K Vikas, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13392 |
Adaptive protection scheme for microgrids |
![]() ![]() |
C Vaithilingam, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13393 |
Firefly algorithm based multivariable PID controller design for MIMO process |
![]() ![]() |
J Ramyashree, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13394 |
Kannada morpheme segmentation using machine learning |
![]() ![]() |
Sachi Angle, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13395 |
Parikh factor matrices for finite words of rectangular Hilbert space filling curve |
![]() ![]() |
S Jeya Bharathi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13396 |
Design and development of C3 protocol for performance measurement of wireless sensor network |
![]() ![]() |
Kasturi S. Patil ![]() DOI: 10.14419/ijet.v7i2.31.13398 |
Compression of text files using genomic code compression algorithm |
![]() ![]() |
G Murugesan, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13399 |
Raspberry PI based advanced communication for disaster management |
![]() ![]() |
Dr Su. Suganthi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13400 |
Handover forecasting in 5G using machine learning |
![]() ![]() |
A Suresh Kumar, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13401 |
Sentimental analysis on social media data using R programming |
![]() ![]() |
Mandava Geetha Bhargava, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13402 |
Visual recognition and classification of videos using deep convolutional neural networks |
![]() ![]() |
N Shobha Rani, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13403 |
A survey on video classification using action recognition |
![]() ![]() |
Caleb Andrew, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13404 |
Methods to improve electro kinetic energy conversion efficiency in nanoscale channel |
![]() ![]() |
Manu P Nair, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13405 |
Securing cloud by mitigating insider data theft attacks with decoy technology using Hadoop |
![]() ![]() |
K Vamsi Krishna, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13407 |
Mobile interaction based on eye movement |
![]() ![]() |
K A. Maheshwari, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13409 |
Pharmacovigilance, signal detection using statistical data mining methods |
![]() ![]() |
G V. Sriramakrishnan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13423 |
A parametric study of residual stress in plate |
![]() ![]() |
Nikhil S. Agrawal, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13424 |
Employing control surface model in preliminary aircraft design software |
![]() ![]() |
Omran Al-Shamma, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13426 |
DeyPoS-homomorphism authenticated tree (HAT) for multi-user locality in cloud storage |
![]() ![]() |
M Muthu Selvam, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13427 |
Data secure in horizontally distributed database using apriori algorithm |
![]() ![]() |
K Mariappan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13428 |
An energy efficient based hybrid clustering (EEBHC) approaches in wireless sensor network |
![]() ![]() |
V Perumal, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13429 |
Enhancing power quality of ANN controller based PhotoVoltaic source injected DVR |
![]() ![]() |
T Ramesh, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13430 |
An energy minimizing score based optimal data gathering in wireless sensor networks |
![]() ![]() |
P Balamurugan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13431 |
Local energy match based non-sub sampled contourlet Transform for multi modal medical image fusion |
![]() ![]() |
M Shyamala Devi, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13432 |
Food grain storage management system |
![]() ![]() |
A Akila, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13433 |
An investigation of micro aerial vehicles (µAV) |
![]() ![]() |
S Swetha, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13434 |
Pin number theft recognition and cash transaction using sixth sense technology in ATM/CDM |
![]() ![]() |
S Pradeep Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13435 |
Erroneous message discovery with data acquisition and secret communication in cellular networks |
![]() ![]() |
R Balakrishna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13437 |
Parametric study of flyash based geopolymer concrete |
![]() ![]() |
Sourav Kumar Das ![]() DOI: 10.14419/ijet.v7i2.31.13439 |
Predicting malignant and benign brain tumor using image processing |
![]() ![]() |
Rishabh Saxena, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13440 |
Reducing convergence time along with improvement in path service quality of border gateway protocol |
![]() ![]() |
Arushi Agarwal, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13441 |
Implementation of various data encryption methods for medical information transmission |
![]() ![]() |
S Neelima, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13446 |
Smooth Optimization Technique for Denoising Image |
![]() ![]() |
R Suguna, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13447 |
High competence MIMO-OFDM with generalized led index modulation |
![]() ![]() |
N Showme, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13448 |
Gesture based wireless control for a robotic manipulator |
![]() ![]() |
Arockia Vijay Joseph, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13449 |
Quality of life of software employees with reference to Kannur, Kerala |
![]() ![]() |
Sreelal ., ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13450 |
Study on loneliness and depression of the institutionalized HIV/AIDS infected persons in Coimbatore |
![]() ![]() |
Arun Kurian, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.13451 |
Medimate : Ailment Diffusion Control System with Real Time Large Scale Data Processing |
![]() ![]() |
S Sujeetha, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18233 |
A Novel Framework to Control and Optimize the Traffic Congestion Issue in VANET |
![]() ![]() |
Tanuja Kayarga, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18234 |
Stability Analysis of Networked Control System Using LMI Approach |
![]() ![]() |
Richa Sharma, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18235 |
Improved Qos in Connection-Oriented Approach for TCP/IP Suite |
![]() ![]() |
Sakshi Garg, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18236 |
An Analysis for Repowering Prediction of Jamgodarani Wind Farm Using MATLAB |
![]() ![]() |
Manoj Verma, ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18237 |
Aadhar Card Based Double Identity Verification System for Railway |
![]() ![]() |
Saumya Gupta, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.31.18238 |
science