e-ISSN : 0975-4024 p-ISSN : 2319-8613   
CODEN : IJETIY    

International Journal of Engineering and Technology

Home
IJET Topics
Call for Papers 2021
Author Guidelines
Special Issue
Current Issue
Articles in Press
Archives
Editorial Board
Reviewer List
Publication Ethics and Malpractice statement
Authors Publication Ethics
Policy of screening for plagiarism
Open Access Statement
Terms and Conditions
Contact Us

VOLUME 8 Issue 1

ISSN: 0975-4024
Vol. 8, No.1

Search the Article

Article # Article Title & Authors (Volume 8 Issue 1 Feb-Mar 2016) Page
1. d-STC for Dual Polarized MIMO Transmission in the Hybrid Mobile Satellite System
Shaileena V. John, Dr. M.K. Gupta, Dr. Soni Changlani
Abstract | PDFIconPDF
1-8
2. A Practical, Almost Zero-knowledge Watermark Verification Algorithm
Priscilla Lee, Mohammed Awad, Ernst L. Leiss
Abstract | PDFIconPDF
9-16
3. Feature Extraction for the Analysis of Multi-Channel EEG Signals Using Hilbert- Huang Technique
Mahipal Singh, Rekha Goyat
Abstract | PDFIconPDF
17-27
4. A Modified K-Nearest Neighbor Algorithm Using Feature Optimization
Rashmi Agrawal
Abstract | PDFIconPDF
28-37
5. Thermodynamic Analysis of a Mixed-Mode Solar Dryer
I.A. Ikem, I.H. Aondover, O.E. Nyong, A.J. Adie
Abstract | PDFIconPDF
38-47
6. Switching Arithmetic for DC to DC Converters Using Delta Sigma Modulator Based Control Circuit
K.Diwakar, V.Vinoth Kumar, N.Vignesh Prasanna, D.Reethika
Abstract | PDFIconPDF
48-54
7. Performance Measurement of Water Desalination Supply Chain Using Balanced Scorecard Model
Hasan Balfaqih, Zulkifli Mohd Nopiah, Malak T. Al-Nory, Nizaroyani Saibani
Abstract | PDFIconPDF
55-63
8. Blind Source Separation with Conjugate Gradient Algorithm and Kurtosis Maximization Criterion
Sanjev N Jain, Chandra Shekhar Rai
Abstract | PDFIconPDF
64-74
9. Novel automatic tumor extraction method based on decision Tree Classifier
Sara SANDABAD, Yassine SAYD TAHRI, Achraf Benba, Ahmed HAMMOUCH
Abstract | PDFIconPDF
75-82
10. Data Encryption and Decryption using Reed-Muller Techniques
Upputuri Neelima, Fazal Noorbasha
Abstract | PDFIconPDF
83-91
11. Analyses of Nature Inspired Intelligence in the domain of Path Planning and searching in Cross Country with consideration of various constrained parameters
Monica Sood, Dr Ashish Kr Luhach, Dr Vinod Kr Panchal
Abstract | PDFIconPDF
92-97
12. Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Data
Veerraju Gampala, Sreelatha Malempati
Abstract | PDFIconPDF
98-107
13. Effect of Polyvinyl Alcohol (PVA) Blending and Gamma Irradiation on Compressive Strength of FHAp/FGel Composite as Candidate of Scaffold
Alva Edy Tontowi, Dian Pribadi Perkasa, Widowati Siswomihardjo, Darmawan Darwis
Abstract | PDFIconPDF
108-116
14. Cepstral Coefficients Based Feature for Real Time Movement Imagery Classification
Sumanta Bhattacharyya, Dr. Manoj Kumar Mukul
Abstract | PDFIconPDF
117-123
15. A Novel Approach of Load Balancing in Cloud Computing using Computational Intelligence
Shabnam Sharma, Dr. Ashish Kr. Luhach, Dr. Kiran Jyoti
Abstract | PDFIconPDF
124-128
16. A New Approach for Estimation of Penalty Parameter with Tolerance Stack-Up
C. A. Akhadkar, A. B. Deoghare, A. M. Vaidya, P. V. Walke
Abstract | PDFIconPDF
129-137
17. Elevating the Accuracy of Missing Data Imputation Using Bolzano Classifier
S. Kanchana, DR. Antony Selvadoss Thanamani
Abstract | PDFIconPDF
138-145
18. Prevention of Interapp Permission Leakage for Android Applications
Gayathri S, Nirmalrani V
Abstract | PDFIconPDF
146-154
19. Stresses and Deformations in Concrete Encasing Spiral Case of a Hydro-turbine by Finite Element Method
Nibedita Pradhan, Joygopal Jena
Abstract | PDFIconPDF
155-161
20. Study and development of various modules for an interactive G- CAPP using a novel approach for a 2.5D prismatic part
Viswa Mohan Pedagopu, Manish Kumar, Saroj patel
Abstract | PDFIconPDF
162-182
21. Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks
Nagarajan Ravi, Jeyanthi. P
Abstract | PDFIconPDF
183-190
22. A novel approach to recognize and extract features from a 2.5D prismatic part for an interactive G-CAPP system
Viswa Mohan Pedagopu, Manish Kumar, Saroj patel
Abstract | PDFIconPDF
191-218
23. Reducing Errors of Judgment of Intoxication in Overloaded Speech Signal
Seong-Geon Bae, Myung-Jin Bae
Abstract | PDFIconPDF
219-224
24. Data Fusion in Underwater Environment
K.Lakshmi Prasanna, S.Koteswara Rao, B.Omkar Lakshmi Jagan, A.Jawahar, Sk.B.Karishma
Abstract | PDFIconPDF
225-234
25. A Study on Low Frequency Noise of Dehumidifier using Acoustic Characteristics
Seong-Geon Bae, Won-Hee Lee, Myung-Jin Bae
Abstract | PDFIconPDF
235-237
26. Novel Estimation Algorithm For Bearings-Only Target Tracking
B.Omkar Lakshmi Jagan, S.Koteswara Rao, K.Lakshmi Prasanna, A.Jawahar, Sk.B.Karishma
Abstract | PDFIconPDF
238-246
27. Power Optimization Techniques for Next Generation Wireless Networks
Ratheesh R, Vetrivelan P
Abstract | PDFIconPDF
247-256
28. Survey on Opportunistic Networks in Delay Tolerant Mobile Sensor Networks
Koushik.C.P, Vetrivelan.P
Abstract | PDFIconPDF
257-264
29. MPPT CONTROLLER BASED SOLAR POWER GENERATION USING A MULTILEVEL INVERTER
Kelam Bhargav, Santhi Mary Antony .A
Abstract | PDFIconPDF
265-273
30. Implementation of Video-Processing and Control on a Zynq Soc Platform
J.SriVarshini, V.NarasimhaNayak
Abstract | PDFIconPDF
274-279
31. Multiple Trust Model in Online Transaction by Trusted Third Party
R. Suganya, C. Merlin Pauliester
Abstract | PDFIconPDF
280-286
32. Self-regulating Exploration for Orthologous in Homologous Hematologic Gene Sequence Data Using UPGMA Method
Bipin Nair B J, Sujith M, Alphonsa M V
Abstract | PDFIconPDF
287-292
33. AN EFFICIENT VOICE SCRAMBLING TECHNIQUE FOR NEXT GENERATION COMMUNICATION SYSTEMS
Dhanya G, Dr. J. Jayakumari
Abstract | PDFIconPDF
293-299
34. A Smart Booster Approach In Wireless Ad Hoc Network
Anzar Ahmad, R.C Joshi, R.Gowri
Abstract | PDFIconPDF
300-304
35. Clustering of User Behaviour based on Web Log data using Improved K-Means Clustering Algorithm
S.Padmaja, Dr.Ananthi Sheshasaayee
Abstract | PDFIconPDF
305-310
36. HUMAN SPEECH EMOTION RECOGNITION
Maheshwari Selvaraj, Dr.R.Bhuvana, S.Padmaja
Abstract | PDFIconPDF
311-323
37. A Review of Cryptographic Algorithms in Network Security
B.Nithya, Dr.P.Sripriya
Abstract | PDFIconPDF
324-331
38. Wireless Secured Data Transmission using Cryptographic Techniques through FPGA
I.Rama Satya Nageswara Rao, B.Murali Krishna, Syed Shameem, Habibullah Khan, G.L.Madhumati
Abstract | PDFIconPDF
332-338
39. Estimation of Remaining Useful Life of Bearings Based on Nested Dichotomy Classifier – A Machine Learning Approach
R. Satishkumar, V.Sugumaran
Abstract | PDFIconPDF
339-349
40. Improvement in surface properties with TiN thin film coating on plasma nitrided austenitic 316 stainless steel
Pankaj Kumar Singh, Arbind Kumar, Sanjay Kumar Sinha, Aman Aggarwal, Gajendra Prasad Singh
Abstract | PDFIconPDF
350-356
41. Video Retrieval System-An Approach based on Image Comparison
Tarun Sharma, Chinta Rahul, Shaik Shahul, M. Venkatesan
Abstract | PDFIconPDF
357-363
42. Traffic Collision Avoidance in VANET Using Computational Intelligence
Mayank Bhatt, Shabnam Sharma, Aditya Prakash, Dr. U.S.Pandey, Dr. Kiran Jyoti
Abstract | PDFIconPDF
364-370
43. An Automated Detection and Classification of Suspicious Lesions in Mammograms
Dr. S. Chidambaranathan
Abstract | PDFIconPDF
371-378
44. Experimental Investigation and Optimization of Air-Water SprayImpingement Cooling to Enhance Heat Transfer
Santosh Kumar Nayak, Purna Chandra Mishra, S. K. S. Parashar
Abstract | PDFIconPDF
379-390
45. Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps
Mr.Thendral Puyalnithi, Dr.V Madhu Viswanatham
Abstract | PDFIconPDF
391-395
46. Experimental Analysis of Cellular Outdoor Propagation at 1800 MHz over Dense Urban Regions of Ghaziabad
Ranjeeta Verma, Garima Saini, Chhaya Dalela
Abstract | PDFIconPDF
396-404
47. Neural Network Controller Based Dstatcom for Voltage Sag Mitigation and Power Quality Issue
Husham Idan Hussein
Abstract | PDFIconPDF
405-420
48. Multi Cloud Deploymentwith Containers
Baskaran Jambunathan, Dr.Y.Kalpana
Abstract | PDFIconPDF
421-428
49. A REVIEW ON CONTEXT MODELLING TECHNIQUES IN CONTEXT AWARECOMPUTING
K.S.Sagaya Priya, Dr.Y.Kalpana
Abstract | PDFIconPDF
429-433
50. Sensitivity Analysis of MEMS Flexure FET with Multiple Gates
K.Spandana, N.Nagendra Reddy, N.Siddaiah
Abstract | PDFIconPDF
434-439
51. Changes in Densities of Basic Constituents during CRMB Production
Naeem Aziz Memon, Pervez Shaikh, Fareed Ahmed Memon, Nafees Ahmed Memon, Noor Ahmed Memon
Abstract | PDFIconPDF
440-451
52. Morphological Analysis of Arabic Words Using Parsing
Majed AbuSafiya, Mohammed Awad
Abstract | PDFIconPDF
452-453
53. Double Ridge Magic-Tee Coupler Using AG and FEM Methods
Fayza BOUSALAH, Nour-Eddine BOUKLI-HACENE
Abstract | PDFIconPDF
454-464
54. A NEW INVENTION OF ALARM REMINDER LOCKING (ARL) SECURITY SYSTEM
M.S.M. Effendi, Z. Shayfull, M.S. Saad, S.M. Nasir, A.H. Badrul Azmi
Abstract | PDFIconPDF
465-472
55. Designing Of Effective Shopper Purchase Analysis Model Based On Chrip Likes
Palla Jyothsna, S.Igni Sabasti Prabu
Abstract | PDFIconPDF
473-485
56. Robust Audio Watermarking Scheme with Synchronization Code and QIM
N.V.Lalitha, Ch.Srinivasa Rao, P.V.Y.Jaya Sree
Abstract | PDFIconPDF
486-500
57. AT-SITE FLOOD ANALYSIS USING EXPONENTIAL AND GENERALIZED LOGISTIC MODELS IN PARTIAL DURATION SERIES (PDS)
M.K.Bhuyan, Joygopal Jena, P.K. Bhunya
Abstract | PDFIconPDF
501-514
58. To design a belt drive scissor lifting table
Corrado Andrea, Polini Wilma, Canale Luca, Cavaliere Costanzo
Abstract | PDFIconPDF
515-525
59. More geometric tolerances on the same surface for a variational model
Polini Wilma
Abstract | PDFIconPDF
526-535