- Conference Name: The ICMLSC 2018: International Conference on Advanced Machine Learning and Soft Computing
- Start date: 22nd June 2018
- End date: 23rd June 2018
- Country: India
- Website: http://www.icmlsc.com/
Editors:
1) Dr Ketan Kotecha , Director and Dean, SIT Pune.
2) Dr M.A. Jabbar, Professor, Dept.of CSE Vardhaman College Of Engineering, Hyderabad.
3) Prof Rajanikanth Aluvalu, Professor, Dept.of CSE Vardhaman College Of Engineering, Hyderabad.
Table of Contents
Articles
Fine Grained Access Control Policy with Advanced Encryption Standard in the Cloud Computing |
![]() ![]() |
Krishna Keerthi Chennam, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20221 |
A Future Perspective Survey on Bio-inspired algorithms based self-organization techniques for GA |
![]() ![]() |
Santhoshini Banda, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20222 |
Human Emotion Surveillance Using Computer Vision |
![]() ![]() |
Dr. R.Radha, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20223 |
A Review: Map Reduce Framework for Cloud Computing |
![]() ![]() |
Mekala Sandhya, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20224 |
Local Directional Threshold based Binary Patterns for Facial Expression Recognition and Analysis |
![]() ![]() |
V Uma Maheswari, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20225 |
The Future of Health care: Machine Learning |
![]() ![]() |
M. A.Jabbar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20226 |
Attribute based Access Control Scheme in Cloud Storage System |
![]() ![]() |
Banoth SeethaRamulu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20228 |
Cyber Physical Systems for Smart Cities Development |
![]() ![]() |
M. A.Jabbar, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20229 |
Decentralized Secure Online Digital Data Registrations |
![]() ![]() |
Raman Dugyala, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20231 |
Energy efficient Key Distribution for Wireless Sensor Networks |
![]() ![]() |
Ramu Ramu Kuchipudi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20234 |
A Group Tasks Scheduling Algorithm for Cloud Computing Networks based on QoS |
![]() ![]() |
Dr. K. Jairam Naik, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20236 |
Comparative Study on Modern Approaches of Recommender System |
![]() ![]() |
A. Bhanu Prasad, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20237 |
R-Language Based Analytics System For Monitoring Railway Disasters |
![]() ![]() |
G S Prasada Reddy, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20238 |
Travel Data Sequence from Multi-Source Recommendation System |
![]() ![]() |
Ms. Shobarani, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20242 |
Visual Feature Based Image Forgery Detection |
![]() ![]() |
D. Vaishnavi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20436 |
A Survey on Diagnosing Health by Using Iot-Wearables Patient Centric Care |
![]() ![]() |
Ms. S. Laxmi Sunaina, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20437 |
A Method For Detecting Duplicate And Near-Duplicate Images Penetration |
![]() ![]() |
Dr. Ramesh Shahabadkar, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20438 |
Homomorphic encryption security - a review |
![]() ![]() |
J. Phani Prasad, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20439 |
Towards Cloud of Things from Internet of Things |
![]() ![]() |
D. Vaishnavi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20443 |
Face Recognition Approaches: A Survey |
![]() ![]() |
A. A. Mallikarjuna Reddy, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20446 |
Speech Recognition Using Convolutional Neural Networks |
![]() ![]() |
D. Nagajyothi, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20449 |
Evaluating the QoS Cognizance in Composition of Cloud Services: A Systematic Literature Review |
![]() ![]() |
A V L N Sujith, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20451 |
Sensors in IoE: A Review |
![]() ![]() |
K. Srinivas, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20453 |
Predicting User Behaviour on E-Commerce Site Using Ann |
![]() ![]() |
Aditya Sai Srinivas, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20454 |
Maximum Power Point Tracking for Shaded Photovoltaic Generation Using P&O Fuzzy Logic Approach |
![]() ![]() |
Rajagopal Reddy B, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20455 |
Sensing Technologies used for Monitoring and Detecting Insect Infestation in Stored Grain |
![]() ![]() |
Rekha Kaushik, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20456 |
Multi-Objective Optimization for scientific workflow task scheduling in IaaS Cloud |
![]() ![]() |
Arunkumar Panneerselvam, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20457 |
A Novel Intrusion Detection System Using Artificial Neural Networks and Feature Subset Selection |
![]() ![]() |
L. Haripriya, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20458 |
Harmonic cancellation in a Multi-level Inverter Configuration Suitable for PV Applications |
![]() ![]() |
Kiran Kumar Nallamekala, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20459 |
A Analysis of Machine Learning in Wireless Sensor Network |
![]() ![]() |
Bhanu chander, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20460 |
Wastage Pay Smart Bin |
![]() ![]() |
N. Karuppiah, ![]() ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20461 |
Target Channel Selection Algorithm for Cognitive Radio Network |
![]() ![]() |
Yuvaraj K.S, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20462 |
Data Analytics: Why Data Normalization |
![]() ![]() |
Dr. K. Dhana Sree, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20464 |
Conceptual ClusteringAnalysis in Data Mining: A Study |
![]() ![]() |
K. Nikhila, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20465 |
LBP and GLCM Based Image Forgery Recognition |
![]() ![]() |
D. Vaishnavi, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20478 |
Improvement of Image Fusion by Integrating Wavelet Transform with Principal Component Analysis |
![]() ![]() |
C. Lokanath Reddy, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20479 |
Prediction of Breast Cancer Using Big Data Analytics |
![]() ![]() |
K. Shailaja, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20480 |
Novel Microstrip Band Pass Filter for C- Band Wireless Applications |
![]() ![]() |
Dr. S. Sreenath Kashyap, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20481 |
Finding Frequent Patterns in Biological Networks |
![]() ![]() |
Rahul Rane, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20482 |
Adaptive ARX Rate Controller for multi hop MANET |
![]() ![]() |
Dr. R.Radha, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20483 |
Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing |
![]() ![]() |
Dayaker P, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20484 |
Side Information Mitigation with new Phase Sequence for Hybrid PTS Scheme |
![]() ![]() |
K. Satyavathi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20485 |
Generalized solution for inverse kinematics problem of a robot using hybrid genetic algorithms |
![]() ![]() |
Pavan Kumar K, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20486 |
A Novel Robotic Arm Design for Small Scale Industries Using myRIO |
![]() ![]() |
M. Srilatha, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20487 |
Fuzzy Logic Aware QoS Multicasting in MANETs with Load Balance |
![]() ![]() |
Nageswara Rao Sirisala, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20488 |
Implementation of Transceiver module for SDR system using ADALM PLUTO platform |
![]() ![]() |
Sowjanya. P., ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20490 |
A Novel User Interface for Text Dependent Human Voice Recognition System |
![]() ![]() |
Ramadevi P, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20714 |
Analysis and presenting the educational techniques in Machine and Deep Learning Short communication |
![]() ![]() |
S Rahul, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.20716 |
A Novel User Interface for Text Dependent Human Voice Recognition System |
![]() ![]() |
Ramadevi P, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.21193 |
Analysis and presenting the educational techniques in Machine and Deep Learning Short communication |
![]() ![]() |
S Rahul ![]() DOI: 10.14419/ijet.v7i4.6.21194 |
Invariant Hand Gesture Recognition System |
![]() ![]() |
G. N. Balaji, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.21196 |
Network Efficiency Amendment Utilizing Cloud Radio Access Network In Mobile Communications |
![]() ![]() |
Karthikala. P, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28439 |
Differentiation of Natural and Maliciously Induced Packet Loss in Wireless Network Using Forensic Analysis |
![]() ![]() |
Karthikeyan N, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28440 |
Iot Based Smart Jar For Connected Devices Using Machinelearning |
![]() ![]() |
Neelaveni. R, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28441 |
Checksec Email Phishi Trasher Tool |
![]() ![]() |
Manoj B, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28442 |
An Overview of Digital Video Tampering Detection Using Passive Methods and D-Hash Algorithm |
![]() ![]() |
Anto Crescentia.A, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28444 |
Torque and Flux Ripple Minimization of Induction Motor Using Hybrid Neuro Fuzzy Controller |
![]() ![]() |
V. Sakthi, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28445 |
Cross Layer Design based Hybrid Error Control for Packet Aggregation over WSN |
![]() ![]() |
Lakshmi. S, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28446 |
Defending Iot from Ddos Using Lightweight Authentication |
![]() ![]() |
G. A. Vani, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28447 |
Asset Management Security System Using RFID Technology |
![]() ![]() |
Soumyasanta Rakshit, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28448 |
Blockchain and Smart Contract for Digital Document Verification |
![]() ![]() |
S. Sunitha kumari, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28449 |
Blockchain Based Aadhaar Security |
![]() ![]() |
Sankaranarayanan P.J, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28450 |
Automated Elephant Entry Prevention for Human and Crop Protection |
![]() ![]() |
Mahalakshmi K, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28451 |
A Neural Network Based Hybrid Approach for Analysing and Detecting Malware Threat in Android Applications |
![]() ![]() |
Hetal Suresh, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28452 |
Low Solar Power Harvesting With Iot Smart Nodes |
![]() ![]() |
Hemalatha. R., ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28453 |
Secure and Lightweight Cryptographic Scheme for Iot Based Applications |
![]() ![]() |
R. Aakash, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28503 |
Enhancement Of Power Efficiency In 5g- Massive Mimo System Using Innovative Algorithm Technique |
![]() ![]() |
N. C.A.Boovarahan, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28557 |
Enhanced Design of Fractional Order Induction Heating System |
![]() ![]() |
G. Padmanabha Sivakumar, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28558 |
A Survey On The Prediction Of Exhaustion Attacks Over Wireless Networks Using Fuzzy Cluster Means (FCM) |
![]() ![]() |
K. Abdul Basith, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28559 |
A Flash Flood Early Warning System: Algorithm and Architecture |
![]() ![]() |
Asokan Jayaram, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28560 |
Power Efficient Resource Allocation of OFDMA Wireless Network |
![]() ![]() |
S. S. Saravana Kumar, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28562 |
Power Management for Hospitalization Using Microcontroller BasedWireless Multimedia Sensor Networks |
![]() ![]() |
G. Gomathy, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28563 |
Subscription Based Architecture For Secured Group Key Management By Using Linear Equation |
![]() ![]() |
Sorabh kumar Mangal, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28564 |
Mitigation of Harmonics using Dstatcom with Renewable Energy Sources for Enhanced Power Quality with Intelligent Controller |
![]() ![]() |
G. Sravani, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28565 |
Denoising of Satellite Images Using Hybrid Filtering and Convolutional Neural Network |
![]() ![]() |
E Mohan, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28566 |
Distributed Attack Detection For Wireless Sensor Networks |
![]() ![]() |
A. Annamalai Giri, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28567 |
Data Compression with High Peak Signal to Noise Ratio Using Bisectional Cylindrical Wavelet Transform For a Satellite Image |
![]() ![]() |
K. Pranitha, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28648 |
Malicious Website Collection System Using Machine Learning |
![]() ![]() |
Jayakumar Shriya, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28649 |
SURVEY ON AIS BASED COMPUTER SECURITY SYSTEM |
![]() ![]() |
Ms S Monica Catherine, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28667 |
High Quality Intelligent Database Driven Microcontroller Based Heartbeat Monitoring System |
![]() ![]() |
ganesh Babu Loganathan, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28668 |
An Efficient Securing Data using Enhanced Key Policy Attribute based Encryption in Cloud |
![]() ![]() |
M. Saraswathi, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28669 |
Copyright Management System to Protect the Legitimate Rights of Copy Right Owners. |
![]() ![]() |
K. Abitha, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28670 |
An Overview of Data Mining Techniques for Maize Yield Prediction |
![]() ![]() |
M. Tamilselvi, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28672 |
Location Information Assisted Joint Spectrum Sensing And Power Allocation For Cognitive Radio Networks |
![]() ![]() |
M. Thenmozhi, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28673 |
Aerial Scene Classification by Surf Feature Extarction Using Unsupervised Learning |
![]() ![]() |
S. G.Hymlin Rose, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28674 |
Mitigating Multiple attacks in Cognitive Radio Networks |
![]() ![]() |
Sivasankari Jothiraj, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28675 |
Level Boosting DC-DC Converter for Solar Energy Conversion System |
![]() ![]() |
Ramesh Komarasamy, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28676 |
A Compact Wideband SIW Bandpass Filter For UWB Applications |
![]() ![]() |
A. Pavithra, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28677 |
Detection of Genetic Replica Robots Using Wireless Sensor Networks. |
![]() ![]() |
V. Sathya, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28678 |
A Survey on Epilepsy Detection and Classifications Using Automated Approaches |
![]() ![]() |
Srinath R, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28679 |
Application of Empirical Wavelet Transform (EWT) on Images to Explore Brain Tumour |
![]() ![]() |
R. Saritha, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28917 |
LIFI based Voice transmission for Coal Mine Safety Monitoring and Control Automation |
![]() ![]() |
Janaki S, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28923 |
A Lobal Optimization Algorithm for VLSI Floor planning Problems |
![]() ![]() |
Mrs. S.Venkatraman, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28924 |
An Autonomous Health Monitoring and Fall Detection Using Wban |
![]() ![]() |
Mr. M.Sheriff, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28926 |
Operating IR Emitters using Internet Based Teleoperation |
![]() ![]() |
Dr. M.Anto Bennet, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28927 |
Waste Segregation Management Using Object Sorting Robot |
![]() ![]() |
S. Lokesh, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28928 |
Raspberry Pi Based Smart Surveillance Enhanced with Wi-Fi Tecnology |
![]() ![]() |
C. Murugan, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28929 |
Incorporation of Eye Movement in Vehicle Dynamics and Auto Notification System |
![]() ![]() |
S. Venkatraman, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28930 |
Design of Dual Stage 180nm CMOS High Gain Low Noise Amplifier for 5G Applications |
![]() ![]() |
Anjana Jyothi Banu, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.28932 |
Performance Evaluation of MAC Layers with Routing Protocols in Wireless Sensor Networks |
![]() ![]() |
P. N.Renjith, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.29033 |
Performance Evaluation of MAC Layers with Routing Protocols in Wireless Sensor Networks |
![]() ![]() |
P. N.Renjith, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.29034 |
Power Consumption Prediction based on Infrastructure for Technical Educational Institutions |
![]() ![]() |
Dr. Poonkavithai Kalamegam, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.29037 |
Overlapping Community Detection Algorithms: A Comparative Study |
![]() ![]() |
Subham Datta, ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30915 |
Comparison of Eye Detection Methods using Image Processing |
![]() ![]() |
Vijayalaxmi Biradar ![]() DOI: 10.14419/ijet.v7i4.6.30916 |
Design of Low-Power 2.5 GHz Integer-N Frequency Synthesizer |
![]() ![]() |
M. A. Raheem, ![]() ![]() ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30917 |
A study of virtual private networks security issues and restrictions |
![]() ![]() |
A. Saritha, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30919 |
Cryptanalysis of Critical Security Mechanism designed for Hierarchical Multi-medical Server in TMIS Environment |
![]() ![]() |
Dr. B Rama Subba Reddy, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30920 |
Opal-RT based Analysis and Implementation of DFIG with Standalone Wind Energy Conversion System |
![]() ![]() |
Saurabh Gupta, ![]() ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30921 |
Asset Management Security System Using RFID Technology |
![]() ![]() |
Soumyasanta Rakshit, ![]() ![]() DOI: 10.14419/ijet.v7i4.6.30922 |
science