- Conference name: 7th International Conference on Engineering and Humanities
- Start date:21 July 2018
- End date:22 July 2018
- Country: Austria
- Website:http://ehconf.com/?l=en
Table of Contents
Articles
Human Pose Estimation in Images and Videos |
![]() ![]() |
P Reddy Gurunatha Swamy, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17640 |
Equilibrium Molecular Dynamics Investigation of Fluid Slip in Nanoscale Channels |
![]() ![]() |
Mathews Daniel, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17641 |
Biomedical Arrhythmia Heart Diseases Classification Based on Artificial Neural Network and Machine Learning Approach |
![]() ![]() |
Stalin Subbiah, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17642 |
Free and Moving Boundary Problems of Heat and Mass Transfer |
![]() ![]() |
P Kanakadurga Devi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17644 |
Intelligent Vehicular System with Speed Limit |
![]() ![]() |
D Laxma Reddy, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17645 |
A Navel Analysis of GNSS for Monitoring the Position of Trains |
![]() ![]() |
P Yakaiah, ![]() ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17647 |
Access Policy’s Over Encrypted Cloud Storage for Secure Deduplication |
![]() ![]() |
G Kiran Kumar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17648 |
A Geographical Factor of Interest Recommended Strategies in Location Based Social Networks |
![]() ![]() |
Bulusu Rama, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17649 |
Mathematical Modeling of Battery and Ultra Capacitor for Photo Voltaic System |
![]() ![]() |
Rupanshu Suhane, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17651 |
A Novel ASNO Segmentation Technique for Segmenting the JUXTA Vascular Region |
![]() ![]() |
Arun B. Mathews, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17652 |
Enhancement of Plant Monitoring Using IoT |
![]() ![]() |
A Pravin, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17653 |
Gene Selection Approaches for Classifying Disease Relevant Data Sample |
![]() ![]() |
J Briso Becky Bell, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17655 |
Interactive Natural Image Segmentation and Foreground Extraction |
![]() ![]() |
Y David Solomon Raju, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17657 |
Smart Street Solutions Using Iot |
![]() ![]() |
E Ganesh Kumar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17658 |
Indoor Navigation System for Blind People Using VLC |
![]() ![]() |
S Subhash Reddy, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17659 |
Simulation of Fuel Cell Technology Using Matlab |
![]() ![]() |
G Sheebha Jyothi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17660 |
Selection of Suitable Supervised Classification Techniques for the Geographic Analysis of Land Using GIS Techniques |
![]() ![]() |
S L. Senthil Lekha, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17661 |
Crime Case Reasoning Based Knowledge Discovery Using Sentence Case Relative Clustering for Crime Analyses |
![]() ![]() |
M Ramzan Begam, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17662 |
Artifacts Removal in Melanoma Using Various Preprocessing Filters |
![]() ![]() |
R Ramya Ravi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17664 |
Arduino Object Follower with Augmented Reality |
![]() ![]() |
T Prem Jacob, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17665 |
A Speed Control of DC Motor with PWM Using Microcontroller in Hardware in Loop |
![]() ![]() |
S Reeba Rex, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17669 |
Linear Cryptanalysis of S-Box BRADG |
![]() ![]() |
Emaan Oudha Oraby, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17670 |
Part of Speech Tagging for Arabic Long Sentence |
![]() ![]() |
Ahmed H. Aliwy, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17671 |
Proposed Method to Generated Strong Keys by Fuzzy Extractor And Biometric |
![]() ![]() |
Huda Saleem, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17672 |
Cloud Based Medical Image Data Analytics in Healthcare Management |
![]() ![]() |
R A. Karthika, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17744 |
Designing in Architecture: Behavioral Approach Methodology |
![]() ![]() |
Sri Astuti Indriyati, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17746 |
New Software Testing Method Based on Evolutionary Algorithm |
![]() ![]() |
Samiyeh Khosravi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17747 |
Wormhole Attack: a Major Security Concern in Internet of Things (Iot) |
![]() ![]() |
Swetha Palacharla, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17748 |
Robust Stabilization of a Non-Linear Chaotic Financial System with Uncertain Parameters |
![]() ![]() |
Santosh Kumar Choudhary, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17749 |
An Improved Power Factor Correction for Interleaved Flyback Switched Mode Power Supply |
![]() ![]() |
K Sasikala, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17752 |
Survey on Image Dimensionality Reduction Using Deep Learning Techniques |
![]() ![]() |
K M. Monica, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17755 |
Automatic Rice Leaf Disease Segmentation Using Image Processing Techniques |
![]() ![]() |
K S. Archana, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17756 |
Analysis to Determine the Scope and Challenging Responsibilities of Ethical Hacking Employed in Cyber Security |
![]() ![]() |
R Vignesh, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17759 |
Opinion Mining Embedding with Applications to Opinions |
![]() ![]() |
Pavani ., ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17760 |
Security Issues in Cloud Computing and Existing Solutions- a Survey |
![]() ![]() |
M Revathi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17761 |
CBIR with Partial Input of Unshaped Images Using Compressed-Pixel Matching Algorithm |
![]() ![]() |
Ahilandeswari Thangarajan, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17762 |
Anfis to Detect Brain Tumor Using MRI |
![]() ![]() |
Susmita Mishra, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17763 |
A Novel Approach for Efficient Forgery Image Detection Using Hybrid Feature Extraction and Classification |
![]() ![]() |
G Clara Shanthi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17879 |
Mobile Cloud-Privacy and Data Security in Healthcare Environment Using Cloudsim Simulator |
![]() ![]() |
R Parameswari, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17880 |
Analysis of Risks and Security Requirements in Public Cloud |
![]() ![]() |
A Banushri, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17881 |
Indexing Based Feature Selection by Applying Ant Colony Optimization Method for Improving Web Page Classification |
![]() ![]() |
A M. James Raj, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17882 |
Modulation and Demodulation of Image Processing by Using GMSK |
![]() ![]() |
Sandip R. Udawant, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17883 |
Optimization Before Biomedical Image Compression Using CLAHE and DCS |
![]() ![]() |
Satyawati S. Magar, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17884 |
Research Analysis of Big Data and Cloud Computing with Emerging Impact of Testing |
![]() ![]() |
R K. Bathla, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17885 |
Sriden - Self Assurance Report Based Interloper Detection and Elimination in Adhoc Network |
![]() ![]() |
S Vijitha, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17886 |
SOBM - Server Occupancy Based Migration by Optimizing Link and Storage Capacity in Check Points |
![]() ![]() |
Sreeleja N. Unnithan, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17887 |
Massive Volume of Unstructured Data and Storage Space Optimization- a Review |
![]() ![]() |
Ranjeet V. Powar, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17888 |
Mean Square Error Optimization to Authenticate Multi-Modality Medical Images in Wavelet Domain |
![]() ![]() |
S K. Jayanthi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17890 |
An Efficient Fabric Defect Prediction Based on Modular Neural Network Classifier with Alternative Hard C-Means Clustering |
![]() ![]() |
S Rathinavel, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17892 |
Safe Diffusion of Provenance in Wireless Sensor Networks Using in-Packet Bloom Filter Provenance Encoding Technique |
![]() ![]() |
Sujesh P Lal, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17893 |
On JD-Fuzzy Ideal of BH-Algebra |
![]() ![]() |
Showq Mhammed. E, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17896 |
A Low Cost Thermal Imaging System for Medical Diagnostic Applications |
![]() ![]() |
U Jayalatsumi, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17897 |
Protected Data Using Hybrid Algorithm in Cloud |
![]() ![]() |
K Kalaiselvi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17898 |
A Study on Image Retrieval Based on Tetrolet Transform |
![]() ![]() |
Devika Sarath, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17964 |
Correlation Feature Selection (CFS) and Probabilistic Neural Network (PNN) for Diabetes Disease Prediction |
![]() ![]() |
K Kalaiselvi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17965 |
Strength Characteristics of Bamboo Reinforced Slabs |
![]() ![]() |
S Suppiah, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17967 |
Implementation of a Novel Control Technique in Landsman Converter Using Bumble Bee Optimization |
![]() ![]() |
Riyaz A. Rahiman, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17968 |
Structuring, Design and Analysis of a Pentab and SIW Cavity Backed Antenna for Iot Applications |
![]() ![]() |
S P. Cowsigan, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17969 |
Transition in Adolescents: a Study on Changes in Social Cohesion |
![]() ![]() |
M C. Jaison, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17970 |
Biotelemetry Using Human Area Networking |
![]() ![]() |
T Godhavari, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17971 |
Convolutional Neural Network Based Image Denoising for Better Quality of Images |
![]() ![]() |
Anandbabu Gopatoti, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17972 |
Fuzzy Based Adaptive Controller for on - Chip Communication |
![]() ![]() |
M Jasmin, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17973 |
Smart Infotainment System for Vehicular Network |
![]() ![]() |
K Siddharthraju, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17974 |
An Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in WSN |
![]() ![]() |
Y Chitti Babu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17975 |
Earning Management and Risk Profile in the Banking Industry: Case Study from Indonesia |
![]() ![]() |
Hery Winoto Tj, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17976 |
Relationship in Indonesia Tax Receivable Components Period 1990-2016 |
![]() ![]() |
Endang Mahpudin, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17977 |
Stress Management Program in Selected Transport Companies in the Kingdom of Bahrain: it’s Influence on Job Performance |
![]() ![]() |
Manju Rajan Babu ![]() DOI: 10.14419/ijet.v7i3.27.17978 |
Model and Financial Performance: Panel Data in Causality and Cointegration Test |
![]() ![]() |
Amir Indrabudiman ![]() DOI: 10.14419/ijet.v7i3.27.17979 |
Detection and Classification of R-Peak Using Naïve Bayes Classifier |
![]() ![]() |
S Celin, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17982 |
Burst Assembly Framework for High Speed Optical Network |
![]() ![]() |
H Saini, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17983 |
Novel Adaptive Background Segmentation Algorithm for Multiple Object Tracking |
![]() ![]() |
V Ramalakshmi Kanthimathi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17984 |
Study of Hardware Implementation on Size of the Microcalcification Detection Using Embedded Systems |
![]() ![]() |
G R. Jothilakshmi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17988 |
Implementation Methodology of ECC to Overcome Side Channel Attacks |
![]() ![]() |
M Maheswari, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17989 |
Energy Sector Reforms and its Role of Economic Development with Special Reference to Tamilnadu |
![]() ![]() |
S Thangamayan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17990 |
Energy Audit with Innovative Technology Management for Resourcing the Clean Energy and Sustainability in India |
![]() ![]() |
C Sivapriya, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17991 |
Investigation of Various Techniques of Spectrum Sensing for Power Detection in Cognitive Radio |
![]() ![]() |
M Monisha, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17993 |
Employee Engagement Practices in Organized Retail Sector: an Empirical Study with Respect to Ernakulam Town |
![]() ![]() |
Sabu K. Nair, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17996 |
Aerodynamic Analysis on Wind Turbine Aerofoil |
![]() ![]() |
Albi ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17997 |
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation |
![]() ![]() |
S Krishna Kishore, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17998 |
Design of an Ultra-Wideband Antenna for Breast Cancer Detection |
![]() ![]() |
C Jayapriya, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.17999 |
A New Hybrid Test Pattern Generator for Stuck-at –Fault and Path Delay Fault in Scan Based Bist |
![]() ![]() |
C Karthikeyini, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18000 |
Portfolio Selection and Post Optimality Test Using Goal Programming |
![]() ![]() |
Darsha Panwar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18001 |
Information Trouncing Via Slightest Momentous Spot System Procedure |
![]() ![]() |
D Saravanan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18002 |
Dynamic Stability Improvement of Power System with VSC-HVDC Transmission |
![]() ![]() |
R Vasudevan, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18003 |
Comparative Analysis of Distributive Optimized Clustering Techniques in Cognitive Radio Networks |
![]() ![]() |
R Ganesh Babu, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18470 |
Reinforce Coverage Area of Sensor Mote in Wireless Ad-Hoc Networks Using Genetic Algorithm |
![]() ![]() |
B Hemalatha, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18471 |
Relationship the Fuzzy P-Ideal with Some Fuzzy Subset of BH-Algebra |
![]() ![]() |
Suad Abdulaali Neamah, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18472 |
Study on Feebly Local Function |
![]() ![]() |
Afeefa Yousif Jaafar Al-Fahham, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18473 |
Driver’s Drowsiness Behaviour Detection by Using PSO/DPSO Algorithm for Urban Road System |
![]() ![]() |
J Sudhakar, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18474 |
Contemporary Review on Technologies and Methods for Converting Unstructured Data to Structured Data |
![]() ![]() |
Sreenivasulu Bolla, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18476 |
Type-2 Fuzzy Logic Controlled Adjustable Step-Size LMS Algorithm for DSTATCOM |
![]() ![]() |
Ganji Vivekanand, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18487 |
Problems of State Regulation of the Russian Labor Market |
![]() ![]() |
Leysan R. Fatkhutdinova, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18489 |
Dynamics of Bodybuild Indices in the Process of Complex Aerobic And Power Training Program |
![]() ![]() |
Rustam A. Aydarov, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18494 |
Development of Information System for Automation of the Fitness Center |
![]() ![]() |
Diana R. Grigoreva, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18496 |
Management in the Field of Cleaning Services Using the Information System |
![]() ![]() |
Diana R. Grigoreva, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18497 |
Improvemento Financial Activity Management by the Information System |
![]() ![]() |
Gulnara A. Gareeva, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18499 |
Sourcing’s Maneuver as Tool for Effective Restructuring of Industrial Enterprise |
![]() ![]() |
Il'nur I. Farkhoutdinov, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18500 |
Evaluation of Expediency of Using Industrial Outsourcing in Industrial Enterprise |
![]() ![]() |
Il'nur I. Farkhoutdinov, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18501 |
Classification of Textures based on Circular and Elliptical Weighted Symmetric Texture Matrix |
![]() ![]() |
J Srinivas, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18503 |
Texture Classification based on First Order Circular and Elliptical Ternary Direction Pattern Matrix |
![]() ![]() |
K Subba Reddy, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18504 |
Multiple Band Mobile Antenna for LTE, GSM, PCS, UMTS & IoT Applications |
![]() ![]() |
B T P Madhav, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18505 |
Propagation Studies in Free Space Using RZ and NRZ Optical Links Under Atmospheric Turbulence |
![]() ![]() |
K Sony, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18509 |
An Enhancement of Progressive Duplicate Detection with Performance Evaluation |
![]() ![]() |
Ravikanth. M, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.18510 |
Propagation Studies in Free Space Using RZ and NRZ Optical Links Under Atmospheric Turbulence |
![]() ![]() |
K Sony, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19260 |
The using CASE tools in the software development life cycle |
![]() ![]() |
Rustam A. Burnashev, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19261 |
Feature Level Fusion for Brain Stroke Detection in MRI-CT Images |
![]() ![]() |
C Hemasundara Rao, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19262 |
Implementation of Highway Driving Automation with Path Planning Considering Obstacles |
![]() ![]() |
P Parthasaradhy, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19263 |
Dual Band Double Cross Monopole Antenna with Defected Ground Structure |
![]() ![]() |
B Madhavi, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19264 |
An Enhanced Apriori Algorithm for Modernized Intrusion Detection in Data |
![]() ![]() |
Bhukya Krishna, ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19266 |
An Optimal Data Replication Techniques in Cloud for Performance and Security |
![]() ![]() |
Md Rafeeq, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.19267 |
Some Difference Double Sequences Spaces with Respect to Double Orlicz Function |
![]() ![]() |
Ali Hussain Battor, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.20183 |
Simplification Using the Levers of Agility and Devops at Large Financial Organizations |
![]() ![]() |
Anshu Premchand, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i3.27.20184 |
science