- Conference Name: National Conference on Emerging Trends in Science, Engineering & Technology, Management and Applications (NCET SETMA)
- Start date: 31st March 2017
- End date: 31st March 2017
- Country: India
- Website: www.nehrucolleges.org/setma2017
Table of Contents
Articles
A demand for wearable devices in health care |
![]() ![]() |
K. Vijayalakshmi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9377 |
An approach for verifying correctness of web service compositions |
![]() ![]() |
C. Saranya Jothi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9378 |
An investigation on cryptographic algorithms usage in IoT contexts |
![]() ![]() |
R H Aswathy, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9379 |
Internet of things (IoT): a survey on protocols and security risks |
![]() ![]() |
R H Aswathy, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9380 |
RHEA: resource hypervisor and efficient allocator in cloud |
![]() ![]() |
G Soniya Priyatharsini, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9381 |
Secure data in cloud with multimodal key generation |
![]() ![]() |
P Selvarani, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9382 |
Survey of rice seed quality analysis for varietal purity estimation by using image processing techniques |
![]() ![]() |
S. Durai, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9383 |
Comparative study on satellite-based data communication techniques |
![]() ![]() |
T. Sujithra, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9384 |
Vitality and peripatetic sustain cluster key management schemes in MANET |
![]() ![]() |
S. Thylashri, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9385 |
Multibiometric authentication with MATLAB simulation |
![]() ![]() |
P Selvarani, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9389 |
Data mining in personalized service of digital library |
![]() ![]() |
Nivedhitha G, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9570 |
Detection of novel attacks by anomaly intrusion detection system using classifiers |
![]() ![]() |
P. M. Abhinaya, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9571 |
Frequent item set mining using normalized FP-growth algorithm |
![]() ![]() |
N K. Manikandan, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9573 |
Online e-tollgate fee collection using QRcode |
![]() ![]() |
Kuna Venkateswararao, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9574 |
Supportive caching strategies for MANET: a review |
![]() ![]() |
NN. Phani Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9575 |
A flexible data hiding scheme using differential dual mapping |
![]() ![]() |
D Femi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9576 |
A mobile application using IoT enabled navigation system for bus riders |
![]() ![]() |
Nivedhitha G, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9577 |
Aneffective cloud parcelling in a load balancing model |
![]() ![]() |
Hemalatha D, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9578 |
Combinatorics based problem specific software architecture formulation using multi-objective genetic algorithm |
![]() ![]() |
V Nivethitha, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9579 |
Enforcing security in cloud environment using elliptic curve cryptography and third party auditing | |
Latha K ![]() DOI: 10.14419/ijet.v7i1.7.9580 |
Location based security architecture evaluated using ATAM |
![]() ![]() |
Almas Begum, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9581 |
Predicting implicit search behaviors usinglog analysis |
![]() ![]() |
L LeemaPriyadharshini, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9582 |
RFID enabled safer cards for new gerneration ATM machines |
![]() ![]() |
S Uma, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9583 |
Secret data sharing using steganography and image processing |
![]() ![]() |
R Bhuvanya, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9584 |
Secure and duplication detection in cloud using cryptographic hashing method |
![]() ![]() |
J. K. Periasamy, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9585 |
Wireless body area network using data communicationprotocol |
![]() ![]() |
Antony Kumar K, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9587 |
Lossless MRI compression utilizing prediction by partial approximate matching |
![]() ![]() |
Alex David S, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9595 |
Mobile based secured student online exam system |
![]() ![]() |
V. Lalitha, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9588 |
Study of high yielding crops cultivation in India using data mining techniques |
![]() ![]() |
M J Carmel Mary Belinda, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.9589 |
Content clustering for MRI Image compression using PPAM |
![]() ![]() |
Alex David S, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10631 |
Secured cryptographic data model for cloud |
![]() ![]() |
Antony Kumar K, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10632 |
A voice based text mail system for visually impaired |
![]() ![]() |
Carmel Mary Belinda M.J, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10633 |
Brain tumor prediction using naïve Bayes’ classifier and decision tree algorithms |
![]() ![]() |
Danda Shashank Reddy, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10634 |
Privacy study on images uploaded in social networks |
![]() ![]() |
Hemalatha D, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10636 |
Smart alert for smart transportation |
![]() ![]() |
K Kishore Kumar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10637 |
An efficient cryptographic scheme for text message protection |
![]() ![]() |
Manikandan N K, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10639 |
A swift unrest horde system for curtail SDO hit in cloud computing |
![]() ![]() |
S Ravikumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10641 |
Performance of segmentation in infrared breast thermograms using level set method |
![]() ![]() |
S Saran Raj, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10642 |
Modelling and implementation of Mppt (Inc) algorithm for Pv water pump applications using Matlab |
![]() ![]() |
S Sivakumar, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10643 |
A shoulder surfing resistance using graphical authentication system |
![]() ![]() |
Rupavathy N, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10644 |
Internet of things (IoT) based health monitoring system and challenges |
![]() ![]() |
M Sathya, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10645 |
Phishing websites blacklisting using machine learning algorithms |
![]() ![]() |
Nivedhitha G, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10646 |
Survey to improve accessibility for person with disabilities |
![]() ![]() |
Manivannan D, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10647 |
Cloud – IAAS security threats and its possible mitigations |
![]() ![]() |
R Priyadarshini, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10648 |
Efficient utilization of energy consumption in cloud environment |
![]() ![]() |
G Soniya Priyatharsini, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10649 |
An effective solution for DDOS attack |
![]() ![]() |
Rusheel Raj Panakadan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10650 |
Secret communication over compound multiple access channel |
![]() ![]() |
S Bharathi, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10651 |
Recommendation on semantic web pages based on conceptual prediction model |
![]() ![]() |
Blessy Jenila R, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10652 |
A Study on machine learning methods and applications in genetics and genomics |
![]() ![]() |
K Jayanthi, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10653 |
An intelligent recursive feature reduction methods for efficient classification of medical blogs |
![]() ![]() |
Neeba E A, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10654 |
Particle swarm optimization to produce optimal solution |
![]() ![]() |
C Saranya Jothi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10655 |
An analysis of brain neoplasm identification by employing data mining methods |
![]() ![]() |
D Sujeetha Lakshmi, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10656 |
An improved energy efficient and stable routing approach in manet |
![]() ![]() |
M Uvaneshwari, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10657 |
Secure, Peer-To-Peer, lossless configurations |
![]() ![]() |
Tamilmani G, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10674 |
Information leakage detection and protection of leaked information by using the MAC-IP binding technique |
![]() ![]() |
B. Raja Koti, ![]() ![]() DOI: 10.14419/ijet.v7i1.7.10700 |
science