2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)

19-20 May 2017

Filter Results

Displaying Results 1 - 25 of 474
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1087 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Message

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (419 KB)
    Freely Available from IEEE
  • Message from chairman/chief patron

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Message from chief executive director/patron

    Publication Year: 2017, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Message from guest of honor/keynote speaker

    Publication Year: 2017, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Message from technical program committee chair

    Publication Year: 2017, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Message from TPC co-chair

    Publication Year: 2017, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Message from general chair/principal

    Publication Year: 2017, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Message from registrar

    Publication Year: 2017, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Message from convener/HOD

    Publication Year: 2017, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):xvii - xxx
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Mobile solar aerator

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Oxygen is main essential need of survival not only on land but also in water body. Life of aquatic organisms depends on it. Due to increase in human population and industrial waste, the indulgence of waste materials into the water body leads adverse effect on percentage of dissolved oxygen. With this the scarcity of life also increases. There are many methods introduced to increase the dissolved o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KNN file classification for securing cloud infrastructure

    Publication Year: 2017, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Security aspects of information in cloud storage is one of the barriers of Degree of Trust and cloud penetration. The ask from cloud user community is to ensure security and performance via quality of services (QoS). Several models were proposed [2] [3] [7] to address security concerns. Some of the concerns that still remains is to eliminate manual intervention and bring in automation for the info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of ANN and SVM for identification of tsunamigenic earthquakes from 3-component seismic data

    Publication Year: 2017, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Two pattern classification methodologies - Artificial Neural Network (ANN) and Support Vector Machine (SVM) have been used in this study to identify shallow focus (depth<;70 km) tsunamigenic earthquakes at a regional distance. Besides location and magnitude, the root mean square (rms) amplitudes of seismic phases recorded by a single 3-component station have been considered as inputs to bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative investigation on user's perspective reliability evaluation and prediction of web services

    Publication Year: 2017, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Sharing and exchanging the abundant information and resources over the internet in a secure and dependable manner through web service is the tricky task. In this paper we have designed and implemented a research prototype web service based e-ATM and medicine searching services in .Net and Java technology respectively. We have performed a relative evaluation on availability and reliability under ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kappa and accuracy evaluations of machine learning classifiers

    Publication Year: 2017, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Machine learning is a method in which computers are given the competence to acquire without being unambiguously programmed. Machine learning discovers the learning and structuring of algorithms that can learn from the past data and make predictions on the same. Methods for relating two or more algorithms on a single dataset have been inspected in the current scenario, comparison of algorithms on m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ways for protection against various attacks in the Internet

    Publication Year: 2017, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    With the growing of network attacks, it has been difficult to protect the internet based services just by differentiating attack traffic from that of legitimate traffic. Denial of Service attacks and link flooding attacks are one of the major problems of security in networks. Because of the attack, heavy traffic will be generated in a network resource so that it becomes very slow to process inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Small signal stability assessment of a DFIG based wind power systems

    Publication Year: 2017, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    The global increases in electricity demand, it leads to integrate the non-conventional energy resources to the grid for the sustainable development. The presences of wind energy to the grid, it has resulted in problems related to the stability of the system, security of the system and power quality. Therefore, it has required studying the stability of the system before connecting to the grid. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues in cloud computing and its counter measure

    Publication Year: 2017, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The Cloud computing is one of the most important on Internet of Services and computer infrastructure. More and more industries have begun to explore cloud computing. Cloud computing is a developing technique in a distributed computing system that increases the scalability and flexibility in processing due to the ability to decrease the time for calculation. However, the high flexibility and portab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rice quality analysis based on physical attributes using image processing technique

    Publication Year: 2017, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    This review paper is for quality control of rice which is most important crop for human as well as in food market using image processing techniques and computer vision. Basic problem in Indian food industry that performs quality check manually by human inspectors which is non-reliable, costly and time consuming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors inhibiting the adoption of DevOps in large organisations: South African context

    Publication Year: 2017, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    DevOps has been identified as a phenomenon whereby stakeholders of a software development team work together to deliver software continuously, allowing the business to seize emerging and existing market opportunities while reducing the time required for inclusion of client feedback. However, little has been done to develop adoption strategies/frameworks for this phenomenon. The absence of such str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Received signal strength based dispersion of swarm of autonomous ground vehicles

    Publication Year: 2017, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    Definition of swarm refers to a group or a collection of similar objects and the interactions between them. Application of this swarm concept in the field of robotics has led to the origin of an emerging robotics field called as Swarm Robotics. In this work, we develop and analyze a RSSI based dispersion algorithm for dispersing a swarm of robots based on received signal strength using wireless co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.