Special Issue on Advances in Information Technology, Communications and Computing (AITCC)
Chief Guest Editor
Dr. Piyush Kuchhal
University of Petroleum and Energy Studies, Dehradun (Uttarakhand)
Email: pkuchhal@ddn.upes.ac.in
Guest Editors
Dr. Ranjan Mishra
University of Petroleum and Energy Studies, Dehradun (Uttarakhand)
Email: rmishra@ddn.upes.ac.in
Mr. Raj Gaurav Mishra
University of Petroleum and Energy Studies, Dehradun (Uttarakhand)
Email: rgmishra@ddn.upes.ac.in
Table of Contents
Articles
Non parametric methods of disparity computation |
![]() ![]() |
Priya Charles, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10062 |
Hybrid method for automatic extraction of multiword expressions |
![]() ![]() |
Shaishav Agrawal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10063 |
Stability analysis of paper machine headbox using a new PI(D) tuning technique |
![]() ![]() |
Parvesh Saini, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10064 |
A Study on impact of smartphone addiction on academic performance |
![]() ![]() |
Pamela Chaudhury, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10066 |
Novel optimization using hierarchical Path finding A* (HPA*) algorithm for strategic gaming setup |
![]() ![]() |
Aqsa Zafar, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10067 |
A hybrid active queue management technique for QoS based unicasting protocols in MANETs |
![]() ![]() |
Susrita Mahapatro, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10068 |
A survey on exchange rate prediction using neural network based methods |
![]() ![]() |
Pragyan Paramita Barik, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10069 |
Applications of neural network based methods on stock market prediction: survey |
![]() ![]() |
Avilasa Mohapatra, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10070 |
Saving energy and improving performance in SDN using rate adaptation technique |
![]() ![]() |
Suchismita Rout, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10071 |
Comparative study of NoSQL databases for big data storage |
![]() ![]() |
Gourav Bathla, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10072 |
Hypercube optimization based global solution in numerical benchmark and sensor localization |
![]() ![]() |
S R.Sujatha, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10073 |
EDM – survey of performance factors and algorithms applied |
![]() ![]() |
Deepali R Vora, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10074 |
Mobile in learning: Enhancement of information and communication technologies |
![]() ![]() |
Jossy P George, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10075 |
Secondary steel mill furnace performance. |
![]() ![]() |
Yogesh Chandra Gupta, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10076 |
Design and development of air quality management devices with sensors and web of things |
![]() ![]() |
Neeraj Kumar Singh, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10077 |
Analysis and modeling of standalone wind driven doubly fed induction generator |
![]() ![]() |
Prerak Bhardwaj, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10097 |
Mobile based application for prediction of diabetes mellitus: FHIR Standard |
![]() ![]() |
Meenakshi Sharma, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10134 |
Augmented reality for history education |
![]() ![]() |
Manu Raghaw, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10136 |
A Comparison of recommendation algorithms based on use of linked data and cloud |
![]() ![]() |
Ankita Ranjan, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10137 |
Load restoration methodology considering renewable energies and combined heat and power systems |
![]() ![]() |
Hayder O. Alwan, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10138 |
Energy aware detection and prevention of black hole attack in MANET |
![]() ![]() |
Niranjan Panda, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10139 |
Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures |
![]() ![]() |
Jossy P. George, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10140 |
Poly-phase signal generation and optimizationof LPI Radar: A new approach |
![]() ![]() |
Jayshree Kamble, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10141 |
Implementation of OpenIdconnect and OAuth 2.0 to create SSO for educational institutes |
![]() ![]() |
Tarun Sujanani, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10142 |
A modified fuzzy approach to prioritize project activities |
![]() ![]() |
Sunny Joseph Kalayathankal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10143 |
Multiclass classification of motor imagery EEG signals using ensemble classifiers & cross-correlation |
![]() ![]() |
D Hari Krishna, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10144 |
Design of a High Gain Compact Circular Microstrip Patch Antenna for X-Band |
![]() ![]() |
Madhukant Patel, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10561 |
An Image Sharing Technique Using QR Code Through Cloud for Mobile Devices |
![]() ![]() |
N Aysha Farina, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10563 |
Comparison between Different Queue Management Techniques in Mobile Ad-Hoc Network: A Survey |
![]() ![]() |
Prabhat Kumar Sahu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10564 |
Kannada word sense disambiguation by finding the overlaps between the concepts |
![]() ![]() |
B Manjunatha Kumar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10565 |
Session Hijacking and Prevention Technique |
![]() ![]() |
Anuj Kumar Baitha, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10566 |
State Estimation of Power System Embedded with FACTS devices and PMUs |
![]() ![]() |
Balaji Venkateswaran V, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10567 |
A Survey on flow meters based on application |
![]() ![]() |
Sakthivel S R, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10568 |
Proposed Method for SQL Injection Detection and its Prevention |
![]() ![]() |
Ashish Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10569 |
Design and Development of a 3dB Quadrature Patch Hybrid Coupler |
![]() ![]() |
B Sekharbabu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10570 |
solution for the future: small file management by optimizing Hadoop |
![]() ![]() |
O Achandair, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10773 |
Effectiveness of the NIZKP Protocol for Authentication in IoT Environment |
![]() ![]() |
Teyi Yann Cedric Lawson, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10775 |
A lightweight hybrid encryption technique to secure IoT data transmission |
![]() ![]() |
Tenzin Kunchok, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10776 |
Integrated disaster management and smart insurance using cloud and internet of things |
![]() ![]() |
Suresh Koduru, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10777 |
Designand application of data aquistion interface circuit |
![]() ![]() |
Hayder O. Alwan, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10778 |
Crime analysis in India using data mining techniques |
![]() ![]() |
Deepika K K, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10779 |
Empirical analysis of software quality prediction using a TRAINBFG algorithm |
![]() ![]() |
Saumendra Pattnaik, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10780 |
Blockchain based examination system for effective evaluation and maintenance of examination records |
![]() ![]() |
Rahul Acharya, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10781 |
Concurrency testing using symbolic path finder |
![]() ![]() |
Bidush Kumar Sahoo, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.10782 |
A Survey of Data Mining Techniques on Information Networks |
![]() ![]() |
Sadhana Kodali, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11267 |
An Investigation on android background services for controlling the unauthorized accesses using android LOG system |
![]() ![]() |
Jay Kotecha, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11268 |
Liver tumour classification using average correction higher order local autocorrelation coefficient and legendre moments |
![]() ![]() |
Aravinda H.L, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11269 |
Incremental gradient algorithm for multiuser detection in multi-carrier DS-CDMA system under modulation schemes |
![]() ![]() |
Sumitra N. Motade, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11270 |
Analysis and Visualization of Data Assimilating Hive and COGNOS Insight 10.2.2 |
![]() ![]() |
Mandeep Virk, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11271 |
Semantic Ranking based on Keywords Extractions in the web |
![]() ![]() |
A Sangeetha, ![]() ![]() DOI: 10.14419/ijet.v7i2.6.11266 |
science