Vol 7, No 1.2 (2018)

Special Issue 2

  • Conference name: International Conference on Cognitive Informatics & Soft Computing (CISC-2017)
  • Start date: 20/12/2017
  • End date: 21/12/2017
  • Country: India
  • Website: www.iccisc.com

Table of Contents


Articles


Simulation and performance analysis for coefficient estimation for sinusodial signal using LMS, RLS and proposed method

Kantipudi MVV Prasad, H.N. Suresh Pages: 1-5

DOI: 10.14419/ijet.v7i1.2.8960

Dos invasion at network by intruder; protection mecha-nism by “anti-dos invasion firewall”

Govindaraj S., V. Khanaa S., C. Rukkumani Pages: 6-8

DOI: 10.14419/ijet.v7i1.2.8961

Survey on finger-vein segmentation and authentication

Shwetambari Kharabe, C. Nalini Pages: 9-14

DOI: 10.14419/ijet.v7i1.2.8962

Investigations on stability and performance of a varia-ble frequency based fuzzy logic controller for induction cooking system

Pradeep Vishnuram, Booma Nagarajan, A. Sureshkumar Pages: 15-22

DOI: 10.14419/ijet.v7i1.2.8970

System engineering approach for assisting physical-ly challenged and geriatric persons

R. Gowri Shankar Rao, N.K. Rayaguru, Sunil Kumar Thakur Pages: 23-26

DOI: 10.14419/ijet.v7i1.2.8971

On node reproduction attack in wireless sensor networks

P. Harini Pages: 27-32

DOI: 10.14419/ijet.v7i1.2.8973

A modified PV fed 9 level inverter for standalone applications with reduced number of switches

Jaikrishna V, Subhranhsu Sekhar Dash, Linss T Alex Pages: 33-36

DOI: 10.14419/ijet.v7i1.2.8986

Comparative performance analysis of one rank cuckoo search technique based optimization for automatic generation control of interconnected power systems

N. Manoharan, Subhransu Sekhar Dash, Raghuraman Sivalingam, Dheeraj P. R. Pages: 37-42

DOI: 10.14419/ijet.v7i1.2.8987

Educational data mining for student placement prediction using machine learning algorithms

K. Sreenivasa Rao, N. Swapna, P. Praveen Kumar Pages: 43-46

DOI: 10.14419/ijet.v7i1.2.8988

Mathematical modeling and control of wind energy electric conversion system feeding standalone load

N K Rayaguru, N. Poornachandra Rao, K. Navin Sam, Sunil Kumar Thakur Pages: 47-52

DOI: 10.14419/ijet.v7i1.2.8989

Ingenious vehicular system to evade collisions

R. Sridhar, Aditya Nema, Anshul Nalin, Ankur Rai Pages: 53-57

DOI: 10.14419/ijet.v7i1.2.8990

A review: algorithm used for beam forming systems

Soma Pal, Azazul Haque Pages: 58-60

DOI: 10.14419/ijet.v7i1.2.8991

Optimizing performance of fuzzy decision support system with multiple parameter dependency for cloud provider evaluation

Uma Rani, Surjeet Dalal, Jugnesh Kumar Pages: 61-65

DOI: 10.14419/ijet.v7i1.2.8992

An approach to spectral analysis of psychologically influenced speech

Bhagyalaxmi Jena, Sudhansu Sekhar Singh Pages: 66-70

DOI: 10.14419/ijet.v7i1.2.8993

Intrusion detection and avoidance of black and grey hole attacks using AODV Protocol based MANET

Uzma Shaikh, Arokia Paul Rajan Pages: 71-76

DOI: 10.14419/ijet.v7i1.2.8994

Implementation of a low cost ac-dc converter for high and low power applications

R. C. Ilambirai, Subhransu Sekhar Dash, N K Rayaguru Pages: 77-80

DOI: 10.14419/ijet.v7i1.2.8998

Efficient technique to estimate age using PCA & multi SVM classification

Laiphrakpam Jibanpriya Devi, J L Mazher Iqbal Pages: 81-84

DOI: 10.14419/ijet.v7i1.2.8999

Energy efficient scheduling mechanism using wireless sensor networks

Vengadeshwari ., D. Ruthra Prabha, T. Sree Sravya Pages: 85-88

DOI: 10.14419/ijet.v7i1.2.9000

Design and performance evaluation through synchro-phasor signals for transient fault analysis in transmission lines and distributions

M. Nithyavelam, Joseph Henry Pages: 89-95

DOI: 10.14419/ijet.v7i1.2.9001

A novel approach for phishing emails real time classifica-tion using k-means algorithm

Vidya Mhaske-Dhamdhere, Sandeep Vanjale Pages: 96-100

DOI: 10.14419/ijet.v7i1.2.9018

DVR based reactive power control strategy of DFIG for wind energy generation during unbalanced grid voltages

S. Geethanjali, S. Shanmugapriya Pages: 101-109

DOI: 10.14419/ijet.v7i1.2.9019

Intrusion detection and avoidance of black and grey hole attacks using AODV protocol based MANET

Uzma Shaikh, Arokia Paul Rajan Pages: 110-116

DOI: 10.14419/ijet.v7i1.2.9020

A fuzzy energy and security aware scheduling in cloud

Sirisati Ranga Swamy, Sridhar Mandapati Pages: 117-124

DOI: 10.14419/ijet.v7i1.2.9021

Shared intelligent optimum route selection through traffic management system in VANET– SIRS

Mukund B Wagh, N. Gomathi Pages: 125-129

DOI: 10.14419/ijet.v7i1.2.9037

Design and development of text extraction and retrieval using style of documents in web searching

S. Balan, P. Ponmuthuramalingam Pages: 130-134

DOI: 10.14419/ijet.v7i1.2.9038

Power and resource allocation for MIMO based two-tier heterogeneous network using small cell clustering algorithm

K. Prabhu Chandran, Ramesh G. P Pages: 135-140

DOI: 10.14419/ijet.v7i1.2.9039

Levenberg-marquardt algorithm to identify the fault analysis for industrial applications

P. Bhuvaneswari, Ramesh G.P Pages: 141-150

DOI: 10.14419/ijet.v7i1.2.9040

Implementation and analysis of stability improvement in VANET using different scenarios

Sahil Verma, Sonu Mittal Pages: 151-154

DOI: 10.14419/ijet.v7i1.2.9041

A combine approach of preprocessing in integrated signature verification (ISV)

Upasna Jindal, Surjeet Dalal, Neeraj Dahiya Pages: 155-159

DOI: 10.14419/ijet.v7i1.2.9042

Contagious disease detection in cereals crops and classification as 'solid' or 'undesirable': an application of pattern recognition, image processing and machine learning algorithms

Priyanka Thakur, Preeti Aggarwal, Mamta Juneja Pages: 160-165

DOI: 10.14419/ijet.v7i1.2.9043

Optimizing performance of fuzzy decision support system with multiple parameter dependency for cloud provider evaluation

Uma Rani, Surjeet Dalal, Jugnesh Kumar Pages: 166-170

DOI: 10.14419/ijet.v7i1.2.9044

Comparative study of cluster based routing protocols in WSN

Varsha Bhatia, Sunita Kumawat, Vivek Jaglan Pages: 171-174

DOI: 10.14419/ijet.v7i1.2.9045

Semantic educational data extraction using structur-al domain relationships

Manchikatla Srikanth Pages: 175-177

DOI: 10.14419/ijet.v7i1.2.9060

Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks

Mohammad Sirajuddin Pages: 178-180

DOI: 10.14419/ijet.v7i1.2.9061

A novel implementation of backpressure algorithm in wireless ad hoc network

Ugendhar Addagatla, V. Janaki Pages: 181-185

DOI: 10.14419/ijet.v7i1.2.9062

Performance enhancement analysis of an isolated DC-DC converter using fuzzy logic controller

S. Muthu Balaji, R. Anand, P. Senthil Pandian Pages: 186-190

DOI: 10.14419/ijet.v7i1.2.9063

Multiband microstrip patch antenna with rectangular slots on patch for bluetooth and c-band applications

Ajay Dadhich, J. K. Deegwal Pages: 191-193

DOI: 10.14419/ijet.v7i1.2.9064

Implementation and performance analysis of AODV-PSO with AODV-GA and AODV-ABC

Kavita ., Prashant Sahai, Sonu Mittal Pages: 194-198

DOI: 10.14419/ijet.v7i1.2.9065

Development of new optimal cloud computing mechanism for data exchange based on link selectivity, link reliability and data exchange efficiency

K. Shirisha Reddy, M. Balaraju, Ramananaik . Pages: 199-204

DOI: 10.14419/ijet.v7i1.2.9066

A novel simulated multilevel inverter topolo-gy with minimal switches

R. Anand, S. Muthu Balaji Pages: 205-210

DOI: 10.14419/ijet.v7i1.2.9067

Review on high utility itemset mining algorithms for big data

Sandeep Dalal, Vandna Dahiya Pages: 211-214

DOI: 10.14419/ijet.v7i1.2.9230

Image retrieval techniques: a survey

Aman Dureja, Payal Pahwa Pages: 215-219

DOI: 10.14419/ijet.v7i1.2.9231

Low power and high fault coverage SIC reseeding TPG using x-filling techniques for Scan BIST

Sabir Hussain Pages: 220-224

DOI: 10.14419/ijet.v7i1.2.9232

A novel algorithm to moderate the cost of scrutinized paths

Grandhi Prasuna, O. Naga Raju, C. Hari Kishan Pages: 225-228

DOI: 10.14419/ijet.v7i1.2.9233

Software – defined networking based secure rout-ing in mobile ad hoc network

B. V. V. S. Prasad, Sd. Salman Ali Pages: 229-234

DOI: 10.14419/ijet.v7i1.2.9288

Diagnosis of lesion with statistical method of Anova1 & two ways for multi-MRI images with format. dicom

Kaouther El Kourd, Atianaoual ., Abdenour Bouaicha, Souleyman Benkraouda Pages: 235-238

DOI: 10.14419/ijet.v7i1.2.9289

Identification of suitable websites for digital marketing – an approach using bio-inspired computing

B. Suresh Kumar, Deepshikha Bharghava, Arpan Kumar Kar, Chinwe Peace Igiri Pages: 239-245

DOI: 10.14419/ijet.v7i1.2.9313

The strategy of simulation effects of wind speed, variation of turbine blades and it’s interaction to power generated by vertical axis wind turbine using NACA 2412

Bambang Sugiyono Agus Purwono, Masroni ., Awan Setiawan, Tundung Subali Patma, Ida Bagus Suardika Pages: 246-250

DOI: 10.14419/ijet.v7i1.2.9314

An adaptive sentimental analysis using ontology for retail market

J Mannar Mannan, Jayavel J Pages: 176-180

DOI: 10.14419/ijet.v7i1.2.10666
science

Copyright © 2017 Science Publishing Corporation Inc. All rights reserved.