- Conference Name: 1st International Conference on Innovative Research in Science and Technology - ICIRST17
- Start Date: 2017-11-14
- End Date: 2017-11-16
- Country: Salem, India
- Website: http://www.icirst.com/
Table of Contents
Articles
Optimization of integrated supply chain network problem using hybrid genetic algorithm approach |
![]() ![]() |
Anudari Chuluunsukh, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8905 |
Optimization of process parameters on friction stir welding of 2014 aluminum alloy plates |
![]() ![]() |
V. Jaiganesh, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8906 |
Optimal customer relationship management in telecalling industry by using data mining and business intelligence |
![]() ![]() |
T. Kamalakannan, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8907 |
Implementation of hybrid filter technique for noise removal from medical images |
![]() ![]() |
Shruti Bhargava Choubey, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8917 |
Content arrangement characteristic based encryption in cloud using public auditing for data management |
![]() ![]() |
V. Joseph Michael Jerard, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8918 |
Micro structural and static structural analysis of LM6/B4C and LM6/B4C/GR hybrid aluminium metal matrix composites |
![]() ![]() |
M.H. Faisal, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8919 |
A study on organizational factors for successful execution of human resource management (HRM) practices in private hospitals |
![]() ![]() |
S. Ganapathy, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8922 |
Mutual fund investors perception in India-a study |
![]() ![]() |
R. Udhayasankar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8924 |
An enhanced security tree to secure cloud data |
![]() ![]() |
S. Renu, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8925 |
Performance evaluation of high performance concrete beams under cyclic loading |
![]() ![]() |
S. Sharmila, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8926 |
Proactive model based testing and evaluation for component-based systems |
![]() ![]() |
A. Surendar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8927 |
Ultra low power design approach of asynchronous delta sigma modulator |
![]() ![]() |
Anil Kumar Sahu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.8929 |
Unit commitment and dispatch with coordination of wind and pumped storage hydro units by using cuckoo search algorithm |
![]() ![]() |
R. Jayashree, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9205 |
GVF snake algorithm-a parallel approach |
![]() ![]() |
Priya P Sajan, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9206 |
Optimal signal mapping scheme for MIMO-BICM-ID transmission over the different fading channel using whale algorithm |
![]() ![]() |
Vikas Nandal, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9207 |
Influence of demographic variables on job involvement of employees: a study in private banks in Tirupur |
![]() ![]() |
G. Kalpana, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9208 |
Design of a multi criteria decision model-fuzzy analytical hierarchy approach |
![]() ![]() |
P. Sona, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9209 |
Measuring distinct regions of grayscale image using pixel values |
![]() ![]() |
S. Jeyalaksshmi, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9210 |
Simultaneous evolutionary neural network based automated video based facial expression analysis |
![]() ![]() |
S. Jeyalaksshmi, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9211 |
Methodology for regression testing with open source tool |
![]() ![]() |
K. Hema Shankari, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9212 |
Optimization of process parameters on commercial mild steel using taguchi technique |
![]() ![]() |
V. Jaiganesh, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9213 |
Machine learning algorithms: a background artifact |
![]() ![]() |
J. Deepika, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9214 |
A study on analytical framework to breakdown conditions among data quality measurements |
![]() ![]() |
N. Deshai, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9276 |
Cloud computing system for small and medium corporations |
![]() ![]() |
R. Vijaya Arjunan, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9277 |
Performance comparisons of the soft computing algorithms in lung segmentation and nodule identification |
![]() ![]() |
Afshan Khanum, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9287 |
Cloud based secured privacy preserving protocol for vehicular DTNS |
![]() ![]() |
Sana Mohammed Abouljam, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9455 |
Enhancement of fingerprint image using wiener filter |
![]() ![]() |
R. Devi, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9456 |
Pre filtering techniques for face recognition based on edge detection algorithm |
![]() ![]() |
Sheela Rani, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9469 |
Techniques of providing data integrity in cloud computing |
![]() ![]() |
K David Raju, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9471 |
A survey on health prediction using human activity patterns through smart devices |
![]() ![]() |
G. Akhila, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9472 |
Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism |
![]() ![]() |
C. Vasan Sai Krishna, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9473 |
Graphical password scheme to diminish shoulder surfing |
![]() ![]() |
D. Sri Ram Varma, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9474 |
A distributed big data library extending Java 8 |
![]() ![]() |
MD. A R Quadri, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9476 |
Automated irrigation system using sensors and node micro controller unit |
![]() ![]() |
P. Shanmukha Sai Teja, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9477 |
A study on mutation testing of object oriented programs |
![]() ![]() |
T. N. S. Poojitha, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9478 |
Telemedical IoT based technology for emergency health-care |
![]() ![]() |
M. S. R. Prasad, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9480 |
Web security through improvised image based CAPTCHA |
![]() ![]() |
R. Murugan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9481 |
A survey for acquiring frequent and sequential items in E-commerce sites |
![]() ![]() |
Haritha P, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9484 |
Web service selection based on response time based on QOS |
![]() ![]() |
T. Vijaya Saradhi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9485 |
Analysis of supervised classification techniques |
![]() ![]() |
P. Lakhmi Prasanna, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9486 |
Personalized web search on e-commerce using ontology based association mining |
![]() ![]() |
B. Sekhar Babu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9487 |
Analysing software quality using cmmi-2 with agile-scrum framework |
![]() ![]() |
B Chaitanya Krishna, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9704 |
Record linkage and deduplication using traditional blocking |
![]() ![]() |
G Somasekhar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9705 |
A detailed study on risk assessment of mobile app permissions |
![]() ![]() |
D Naga Malleswari, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9706 |
Efficient named data networking using practical congestion control technique | |
Rishitha A ![]() DOI: 10.14419/ijet.v7i1.1.9707 |
Dos flooding attack control in information-centric networks |
![]() ![]() |
Srinivasa Rao T, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9708 |
Load balancing in cloud computing |
![]() ![]() |
Sudhir Kumar M, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9709 |
Hadoop high availability through multiple active name nodes |
![]() ![]() |
P Vijaya Lakshmi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9710 |
A study on risk assessment techniques in information systems |
![]() ![]() |
D Nagamalleswari, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9711 |
Different access control methods with revocationin multi-authority cloud |
![]() ![]() |
K. V. V. Satyanarayana, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9713 |
A comparative study of support vector machine and logistic regression for the diagnosis of thyroid dysfunction |
![]() ![]() |
Deepthi Gurram, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9714 |
Enhancement of security in cloud computing with secure multi-party computation |
![]() ![]() |
A Vijaya Kumar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9848 |
Wireless network based smart irrigation system using IOT |
![]() ![]() |
Ankit Kumar Verma, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9849 |
UPFC based transmission line power load flow control under different operating methods |
![]() ![]() |
K Lingaswamy, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9850 |
ACNM: advance coupling network model sleep/awake mechanism for wireless sensor networks |
![]() ![]() |
Habibulla Mohammad, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9851 |
Coplanar wave guide fed fork shaped frequency reconfigurable antenna for LTE, WI-FI and WLAN applications |
![]() ![]() |
B Siva Prasad, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9854 |
Secured dynamic path planning and multi-obstacle avoidance model for UAV networks |
![]() ![]() |
K Prathyusha, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9855 |
Finding the shortest path using the ant colony optimization |
![]() ![]() |
K Yella Swamy, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9859 |
Bug reduction with reliability factors using hybrid reliable model |
![]() ![]() |
T Vijaya Saradhi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9860 |
Redactable blockchain and it’s implementation in bitcoin |
![]() ![]() |
Krovi Rajasekhar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9861 |
Data mining techniques for herbs |
![]() ![]() |
J Satish Babu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9943 |
A systematic review of vulnerability analysis & penetration testing tools |
![]() ![]() |
K Raja Sekhar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9944 |
An efficient method for early stage detection of diabetic retinopathy |
![]() ![]() |
S D. Shirbahadurkar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9945 |
Modulation diversity for differential amplitude and phase shift keying technique |
![]() ![]() |
M Kanthimathi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9946 |
Incorporating autonomicity and trustworthiness aspects for assessing software quality |
![]() ![]() |
Pooja Dehraj, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9947 |
Quality based drip drag match data collection in wireless sensor network |
![]() ![]() |
V Jayaraj, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9948 |
Enterobacteria virulence factor prediction server |
![]() ![]() |
M Thirunavu karasu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9950 |
Neighbordiscovery-based security enhancement using threshold cryptography for IP address assigning in network |
![]() ![]() |
R Santhosh Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9951 |
The ambivalence of santiago a psychoanalytic study |
![]() ![]() |
T S. Sujatha ![]() DOI: 10.14419/ijet.v7i1.1.9952 |
Index split decision tree and compositional deep neural network for text categorization |
![]() ![]() |
N Ravikumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9953 |
An optimized feature selection using fuzzy mutual information based ant colony optimization for software defect prediction |
![]() ![]() |
G Manivasagam, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.9954 |
An novel cluster based feature selection and document classification model on high dimension trec data |
![]() ![]() |
Lalitha Kumari, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10146 |
Energy Efficient and robust routing with RPAR Protocol in Ad Hoc Networks |
![]() ![]() |
Joshua Reginald Pullagura, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10148 |
Implementation of MHLFF based low power pulse triggered flip flop |
![]() ![]() |
Shreya Verma, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10150 |
Prediction of best cloud service provider using the QoS ranking framework |
![]() ![]() |
A S. Syed Fiaz, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10151 |
Indian classical dance action identification using adaptive graph matching from unconstrained videos |
![]() ![]() |
K V.V. Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10156 |
Linear array Yagi-Uda 5G antenna for vehicular application |
![]() ![]() |
K Sreelakshmi, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10158 |
Enhanced replica detection scheme for efficient analysis of intrusion detection in MANET |
![]() ![]() |
P. Bakeyalakshmi, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10169 |
Design and fabrication of portable laser cutting and engraving machine |
![]() ![]() |
P. Jamaleswara Kumar, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10170 |
Optimizing best cloud service using the Bayesian personalized ranking framework |
![]() ![]() |
G Yuvaraj, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10226 |
A novel 3-D-IC test architecture-a review |
![]() ![]() |
R Karthick, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10227 |
A novel 3-D-IC test architecture-a review |
![]() ![]() |
R Karthick, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10228 |
Premature interlude detection and classification of breast cancer using ANN classifier |
![]() ![]() |
A N. Sruthi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10231 |
Artificial neural network classification-based skin cancer detection |
![]() ![]() |
M. Shyamala Devi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10364 |
Detecting malicious nodes using data aggregation protocols in wireless sensor networks |
![]() ![]() |
P. Balamurugan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10365 |
Text classification using artificial neural networks |
![]() ![]() |
P Lakshmi Prasanna, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10785 |
Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm |
![]() ![]() |
S Naveen Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10787 |
FPGA based asymmetric crypto system design |
![]() ![]() |
V Narasimha Nayak, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10788 |
a survey on sentiment study in twitter data using Hadoop streaming API |
![]() ![]() |
R Vyshnavi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10789 |
Capacity comparison of MIMO and cooperative MIMO |
![]() ![]() |
Ashish Kumar Sarangi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10794 |
Flower image classification with basket of features and multi layered artificial neural networks |
![]() ![]() |
Syed Inthiyaz, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10795 |
Speech controlled home mechanization framework using android gadgets |
![]() ![]() |
Mrs M. Kavitha, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10821 |
A load balancing model using bio inspired firefly algorithm in cloud computing |
![]() ![]() |
Vikas ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10825 |
Security enhanced using honey encryption for private data sharing in cloud |
![]() ![]() |
N Srinivasu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10826 |
Plan and analysis of synchronous buck converter for UPS application |
![]() ![]() |
Jadapalli Sreedhar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10827 |
Temperature based fan speed control and observing utilizing arduino |
![]() ![]() |
Dr M. Nagabhushana Rao, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10828 |
Multi-agent based load balancing in cloud computing |
![]() ![]() |
S Sandeep Kumar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10831 |
A survey on OAUTH protocol for security |
![]() ![]() |
V Srikanth, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10834 |
A novel method for minimizing distortions in endoscopy medical images |
![]() ![]() |
R. Sathiya, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.10846 |
Data mining techniques for herbs |
![]() ![]() |
J Satish Babu, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11222 |
A systematic review of vulnerability analysis & penetration testing tools |
![]() ![]() |
K Raja Sekhar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11223 |
An efficient method for early stage detection of diabetic retinopathy |
![]() ![]() |
S D. Shirbahadurkar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11237 |
Modulation diversity for differential amplitude and phase shift keying technique |
![]() ![]() |
M Kanthimathi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11238 |
Incorporating autonomicity and trustworthiness aspects for assessing software quality |
![]() ![]() |
Pooja Dehraj, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11239 |
Quality based drip drag match data collection in wireless sensor network |
![]() ![]() |
V Jayaraj, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11240 |
Enterobacteria virulence factor prediction server |
![]() ![]() |
S Gnanendra, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11242 |
Neighbor discovery-based security enhancement using threshold cryptography for IP address assigning in network |
![]() ![]() |
R Santhosh Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11243 |
The ambivalence of santiago a psychoanalytic study |
![]() ![]() |
T S. Sujatha ![]() DOI: 10.14419/ijet.v7i1.1.11244 |
Index split decision tree and compositional deep neural network for text categorization |
![]() ![]() |
N Ravikumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11245 |
An optimized feature selection using fuzzy mutual information based ant colony optimization for software defect prediction |
![]() ![]() |
G Manivasagam, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.11246 |
Is Agile Cure for Everything |
![]() ![]() |
Rahul Agarwal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.1.12317 |
EMG extractor and blink detection for human health monitoring |
![]() ![]() |
Aanchal Jha, ![]() ![]() DOI: 10.14419/ijet.v7i1.1.12648 |
science