Vol 7, No 1.7 (2018)

Special Issue 7

  • Conference Name: National Conference on Emerging Trends in Science, Engineering & Technology, Management and Applications (NCET SETMA)
  • Start date: 31st March 2017
  • End date: 31st March 2017
  • Country: India
  • Website: www.nehrucolleges.org/setma2017 

Table of Contents


Articles


A demand for wearable devices in health care

K. Vijayalakshmi, S. Uma, R. Bhuvanya, A. Suresh Pages: 1-4

DOI: 10.14419/ijet.v7i1.7.9377

An approach for verifying correctness of web service compositions

C. Saranya Jothi, Ravikumar S, Antony Kumar K, A. Suresh Pages: 5-10

DOI: 10.14419/ijet.v7i1.7.9378

An investigation on cryptographic algorithms usage in IoT contexts

R H Aswathy, N Malarvizhi Pages: 10-14

DOI: 10.14419/ijet.v7i1.7.9379

Internet of things (IoT): a survey on protocols and security risks

R H Aswathy, N Malarvizhi Pages: 15-20

DOI: 10.14419/ijet.v7i1.7.9380

RHEA: resource hypervisor and efficient allocator in cloud

G Soniya Priyatharsini, N Malarvizhi Pages: 21-26

DOI: 10.14419/ijet.v7i1.7.9381

Secure data in cloud with multimodal key generation

P Selvarani, N Malarvizhi Pages: 27-33

DOI: 10.14419/ijet.v7i1.7.9382

Survey of rice seed quality analysis for varietal purity estimation by using image processing techniques

S. Durai, C. Mahesh, T. Sujithra, A. Suresh Pages: 34-37

DOI: 10.14419/ijet.v7i1.7.9383

Comparative study on satellite-based data communication techniques

T. Sujithra, G. Nivedhitha, S. Durai, A. Suresh Pages: 38-42

DOI: 10.14419/ijet.v7i1.7.9384

Vitality and peripatetic sustain cluster key management schemes in MANET

S. Thylashri, D. Femi, S. Alex David, A. Suresh Pages: 43-46

DOI: 10.14419/ijet.v7i1.7.9385

Multibiometric authentication with MATLAB simulation

P Selvarani, N Malarvizhi Pages: 47-50

DOI: 10.14419/ijet.v7i1.7.9389

Data mining in personalized service of digital library

Nivedhitha G, Rupavathy N Pages: 51-53

DOI: 10.14419/ijet.v7i1.7.9570

Detection of novel attacks by anomaly intrusion detection system using classifiers

P. M. Abhinaya, V. Nivethitha Pages: 54-58

DOI: 10.14419/ijet.v7i1.7.9571

Frequent item set mining using normalized FP-growth algorithm

N K. Manikandan, D Manivannan Pages: 59-61

DOI: 10.14419/ijet.v7i1.7.9573

Online e-tollgate fee collection using QRcode

Kuna Venkateswararao, L Gurusarathy, Akepati Sankar Reddy Pages: 62-64

DOI: 10.14419/ijet.v7i1.7.9574

Supportive caching strategies for MANET: a review

NN. Phani Kumar, C. Amuthadevi Pages: 65-67

DOI: 10.14419/ijet.v7i1.7.9575

A flexible data hiding scheme using differential dual mapping

D Femi, S Thylashri, S Ravikumar Pages: 68-70

DOI: 10.14419/ijet.v7i1.7.9576

A mobile application using IoT enabled navigation system for bus riders

Nivedhitha G, Dr Carmel Mary Belinda M.J, Nivedhitha G Pages: 71-74

DOI: 10.14419/ijet.v7i1.7.9577

Aneffective cloud parcelling in a load balancing model

Hemalatha D, Almas Begum Pages: 75-78

DOI: 10.14419/ijet.v7i1.7.9578

Combinatorics based problem specific software architecture formulation using multi-objective genetic algorithm

V Nivethitha, P M Abhinaya Pages: 79-83

DOI: 10.14419/ijet.v7i1.7.9579

Enforcing security in cloud environment using elliptic curve cryptography and third party auditing

Latha K Pages: 84-86

DOI: 10.14419/ijet.v7i1.7.9580

Location based security architecture evaluated using ATAM

Almas Begum, V Cyril Raj Pages: 87-90

DOI: 10.14419/ijet.v7i1.7.9581

Predicting implicit search behaviors usinglog analysis

L LeemaPriyadharshini, S Florence, K Prema, C Shyamala Kumari Pages: 91-95

DOI: 10.14419/ijet.v7i1.7.9582

RFID enabled safer cards for new gerneration ATM machines

S Uma, R Bhuvanya, K Vijayalakshmi, A Suresh Pages: 96-99

DOI: 10.14419/ijet.v7i1.7.9583

Secret data sharing using steganography and image processing

R Bhuvanya, K Vijayalakshmi, S Uma, A A.Suresh Pages: 100-104

DOI: 10.14419/ijet.v7i1.7.9584

Secure and duplication detection in cloud using cryptographic hashing method

J. K. Periasamy, B. Latha Pages: 105-108

DOI: 10.14419/ijet.v7i1.7.9585

Smart health monitoring system based on internet of things with big data analytics and wireless networks

S Florence, C Shyamala Kumari, L LeemaPriyadharshini Pages: 109-111

DOI: 10.14419/ijet.v7i1.7.9586

Wireless body area network using data communicationprotocol

Antony Kumar K, C Saranya Jothi, S Ravikumar, V Usha Pages: 112-114

DOI: 10.14419/ijet.v7i1.7.9587

Lossless MRI compression utilizing prediction by partial approximate matching

Alex David S, Ravikumar S, Antony Kumar K Pages: 115-117

DOI: 10.14419/ijet.v7i1.7.9595

Mobile based secured student online exam system

V. Lalitha, J. K. Periasamy Pages: 118-120

DOI: 10.14419/ijet.v7i1.7.9588

Study of high yielding crops cultivation in India using data mining techniques

M J Carmel Mary Belinda, Umamaheswari R, Alex David S Pages: 121-124

DOI: 10.14419/ijet.v7i1.7.9589

Content clustering for MRI Image compression using PPAM

Alex David S, Almas Begum, Ravikumar S Pages: 126-127

DOI: 10.14419/ijet.v7i1.7.10631

Secured cryptographic data model for cloud

Antony Kumar K, Neeba E A, Durai S, Ravikumar . Pages: 128-131

DOI: 10.14419/ijet.v7i1.7.10632

A voice based text mail system for visually impaired

Carmel Mary Belinda M.J, Rupavathy N, Mahalakshmi N.R Pages: 132-136

DOI: 10.14419/ijet.v7i1.7.10633

Brain tumor prediction using naïve Bayes’ classifier and decision tree algorithms

Danda Shashank Reddy, Chinta Naga Harshitha, Carmel Mary Belinda Pages: 137-141

DOI: 10.14419/ijet.v7i1.7.10634

Privacy study on images uploaded in social networks

Hemalatha D, Almas Begum, Alex David S Pages: 142-145

DOI: 10.14419/ijet.v7i1.7.10636

Smart alert for smart transportation

K Kishore Kumar, Atmakuri Sravan Kumar, Sunkari Amarnadh Gupta, Sure Venkata Naga Parvesh Pages: 146-148

DOI: 10.14419/ijet.v7i1.7.10637

A mechanism for identifying the guilt agent in a network using vector quantization and skew Gaussian distribution

P Praveen Kumar, Y Srinivas, M Vamsi Krishna Pages: 149-151

DOI: 10.14419/ijet.v7i1.7.10638

An efficient cryptographic scheme for text message protection

Manikandan N K, Manivannan D, Antony kumar K Pages: 152-155

DOI: 10.14419/ijet.v7i1.7.10639

A swift unrest horde system for curtail SDO hit in cloud computing

S Ravikumar, E Kannan Pages: 156-160

DOI: 10.14419/ijet.v7i1.7.10641

Performance of segmentation in infrared breast thermograms using level set method

S Saran Raj, Hariharan R Pages: 161-164

DOI: 10.14419/ijet.v7i1.7.10642

Modelling and implementation of Mppt (Inc) algorithm for Pv water pump applications using Matlab

S Sivakumar, K Siddappa Naidu Pages: 165-168

DOI: 10.14419/ijet.v7i1.7.10643

A shoulder surfing resistance using graphical authentication system

Rupavathy N, Carmel Mary Belinda M. J, Nivedhitha G Pages: 169-174

DOI: 10.14419/ijet.v7i1.7.10644

Internet of things (IoT) based health monitoring system and challenges

M Sathya, S Madhan, K Jayanthi Pages: 175-178

DOI: 10.14419/ijet.v7i1.7.10645

Phishing websites blacklisting using machine learning algorithms

Nivedhitha G, Carmel Mary Belinda M.J, Rupavathy N Pages: 179-181

DOI: 10.14419/ijet.v7i1.7.10646

Survey to improve accessibility for person with disabilities

Manivannan D, Manikandan N.K, Kishore Kumar K Pages: 182-185

DOI: 10.14419/ijet.v7i1.7.10647

Cloud – IAAS security threats and its possible mitigations

R Priyadarshini, N Malarvizhi Pages: 186-188

DOI: 10.14419/ijet.v7i1.7.10648

Efficient utilization of energy consumption in cloud environment

G Soniya Priyatharsini, N Malarvizhi Pages: 189-193

DOI: 10.14419/ijet.v7i1.7.10649

An effective solution for DDOS attack

Rusheel Raj Panakadan, Chitluri Dhanush, Dr Carmel Mary Belinda Pages: 194-196

DOI: 10.14419/ijet.v7i1.7.10650

Secret communication over compound multiple access channel

S Bharathi, R Blessy Jenila Pages: 197-198

DOI: 10.14419/ijet.v7i1.7.10651

Recommendation on semantic web pages based on conceptual prediction model

Blessy Jenila R, Bharathi S Pages: 199-200

DOI: 10.14419/ijet.v7i1.7.10652

A Study on machine learning methods and applications in genetics and genomics

K Jayanthi, C Mahesh Pages: 201-204

DOI: 10.14419/ijet.v7i1.7.10653

An intelligent recursive feature reduction methods for efficient classification of medical blogs

Neeba E A, Koteeswaran S Pages: 205-209

DOI: 10.14419/ijet.v7i1.7.10654

Particle swarm optimization to produce optimal solution

C Saranya Jothi, V Usha, R Nithya Pages: 210-216

DOI: 10.14419/ijet.v7i1.7.10655

An analysis of brain neoplasm identification by employing data mining methods

D Sujeetha Lakshmi, Tamilmani G Pages: 217-218

DOI: 10.14419/ijet.v7i1.7.10656

An improved energy efficient and stable routing approach in manet

M Uvaneshwari, Neeba E A, Senthil kumar N.K Pages: 219-222

DOI: 10.14419/ijet.v7i1.7.10657

A study on the need and impact of emotional intelligence with special reference to managerial effectiveness in the organization

Mrs. Vani Murugesan, Dr H Sankaran Pages: 223-226

DOI: 10.14419/ijet.v7i1.7.10658

Secure, Peer-To-Peer, lossless configurations

Tamilmani G, Rajathi R, M Thanjaivadivel Pages: 227-229

DOI: 10.14419/ijet.v7i1.7.10674

Information leakage detection and protection of leaked information by using the MAC-IP binding technique

B. Raja Koti, G.V.S. Raj Kumar Pages: 230-235

DOI: 10.14419/ijet.v7i1.7.10700
science

Copyright © 2017 Science Publishing Corporation Inc. All rights reserved.