- Conference name: International Conference on Technological Innovations in Engineering and Management (ICTIEM-18)
- Start date: 26th Feb 2018
- End date: 27th Feb 2018
- Country: India
- Website: www.ictiem.com
Table of Contents
Articles
A Study of major secure SDLC processes in web based applications |
![]() ![]() |
Subhranshu Mohanty, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10029 |
Model-based compressed sensing algorithms for MIMO- OFDM channel estimation |
![]() ![]() |
P N. Jayanthi, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10030 |
Hybrid classification model to detect advanced intrusions using data mining techniques |
![]() ![]() |
V Mala, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10031 |
Human intention detection with facial expressions using video analytics |
![]() ![]() |
K Prema, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10032 |
Li-Fi – the future of wireless technology |
![]() ![]() |
C Shyamala Kumari, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10033 |
A vibrant data placement approach for map reduce in diverse environments |
![]() ![]() |
J Sujatha, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10034 |
Implementation and performance evaluation of AODV-PSO with AODV-ACO |
![]() ![]() |
Kavita ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10035 |
Hybrid Nature-inspired algorithm for efferent cloud resource utilization |
![]() ![]() |
Monika ., ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10036 |
Image segmentation using hybrid clustering with GA and finding the tumor area in image |
![]() ![]() |
Bandana Bali, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10037 |
Cluster head shuffling based global optimization using elephant herd optimization (EHO) approach |
![]() ![]() |
Er Sharad, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10039 |
A Novel approach of data deduplication for distributed storage |
![]() ![]() |
Shubhanshi Singhal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10040 |
A survey: issues and challenges in wireless sensor network |
![]() ![]() |
Tarun Bala, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10041 |
Development of smart farming - a detailed study |
![]() ![]() |
C M. Chidambaranathan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.10042 |
High Mobility Supports Routing Protocol (HMSRP) in Mobile Ad Hoc Networks |
![]() ![]() |
Dr T.Senthil Murugan, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11165 |
Covert Channels Detection with Supported Vector Machine and Hyperbolic Hopfield Neural Network |
![]() ![]() |
G Yuvaraj, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11166 |
Successive Duplicate Detection in Scalable Datasets in Cloud Database |
![]() ![]() |
N Rajkumar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11167 |
Acute Stage of Brain Stroke Diagnosis Using Hybrid Genetic Algorithm for Optimization of Feature Selection and Classifier |
![]() ![]() |
C Amuthadevi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11168 |
Cross-Monotonic in Cost Sharing Mechanisms Using Ns2 |
![]() ![]() |
R Ganesan, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11169 |
Implementation of Geospatial Labeling using Time of Arrival and Cramer-Rao bound approach |
![]() ![]() |
M Thanjaivadivel, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11170 |
Internet of Things based Accident Prevention and Detection System |
![]() ![]() |
K Meena, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11171 |
A Survey on Security and Privacy Issues in Cloud Computing |
![]() ![]() |
T Thilagam, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11172 |
Review on using Region of interest for HEVC |
![]() ![]() |
Parmeshwar Kokare, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11173 |
GSM based door open and closing system |
![]() ![]() |
V Usha, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11186 |
Load Forecasting Analysis by Time Series Method |
![]() ![]() |
Kuldeep S, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.11227 |
Using unsupervised machine learning to model tax practice learning theory |
![]() ![]() |
Alfred Howard Miller ![]() DOI: 10.14419/ijet.v7i2.4.13019 |
Aluminum metal matrix composites a review of reinforcement; mechanical and tribological behavior |
![]() ![]() |
Pranav Dev Srivyas, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13020 |
Detection of skin cancer- A genetic algorithm approach |
![]() ![]() |
T D. Srividya, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13023 |
Challenges in implementing industry revolution 4.0 in INDIAN manufacturing SMES: insights from five case studies |
![]() ![]() |
Suresh N, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13024 |
Estimating the difference of agriculture productivity in ASIAN regions |
![]() ![]() |
Swati Hira, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13025 |
IPV4 and IPV6 based hybrid approach for spam and virus detection |
![]() ![]() |
Swati Hira, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13026 |
Social policy and social legislation A jurisprudential interface |
![]() ![]() |
Prof. Dr. Shefali Raizada ![]() DOI: 10.14419/ijet.v7i2.4.13027 |
Analysis of AODV protocol under sinkhole attack in wireless sensor network |
![]() ![]() |
Harkesh Sehrawat, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13028 |
Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks |
![]() ![]() |
Harkesh Sehrawat, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13029 |
Hybrid algorithm designed for handling remote integrity check mechanism over dynamic cloud environment |
![]() ![]() |
Shakti Arora, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13030 |
Modified drosophila optimization algorithm for managing re-sources in cloud environment |
![]() ![]() |
Shilpa Kukreja, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13031 |
Comparative analysis of power aware routing protocols in mobile ad-hoc network |
![]() ![]() |
Meenu ., ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13032 |
A study on load balancing techniques in SDN |
![]() ![]() |
Anish Ghosh, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13033 |
Trend analysis of university placement by using machine learning algorithms |
![]() ![]() |
Chandrasekhar Kumbhar, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13034 |
Service identification using k-NN machine learning |
![]() ![]() |
Travis Joseph Poulose, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13035 |
A survey of intrusion detection techniques |
![]() ![]() |
Sharanya Chandran, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13036 |
Study of optimization parameters for service chaining in cloud environment |
![]() ![]() |
Prathamesh Purohit, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13037 |
Routing protocols for internet of things: a survey |
![]() ![]() |
Tamoghno Romario Bhattacharyya, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13038 |
Four-way handshake protocol for authenticating in multiple mix-zones |
![]() ![]() |
T Senthil Kumar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13039 |
Multicasting technique for path establishment in vehicular ad hoc networks |
![]() ![]() |
Sukhpreet Kaur, ![]() ![]() DOI: 10.14419/ijet.v7i2.4.13040 |
science