Accepted Paper List *

S/N Paper ID Paper Title
1 2Braille And Voice Based Text Messaging System for The Blind
2 6Road Congestion based Traffic Management System with Dynamic Time Quantum
3 7An Energy-Efficient Algorithm Using Layer Heads For Software-Defined Wireless Sensor Networks
4 8Swarm Intelligence Approach for User Clustering Based Recommender System
5 9Enhanced Security of Sensitive Images by Cryptography and Hiding Methods
6 10Trust model for cloud providers using Linear equations
7 11Real Time Detection of Internal Attacks System (RTDIAS)
8 12Securing Wireless Adhoc Networks against packet dropping attacks using cluster based trust Entropy method
9 13Head Pose Estimation using Transfer Learning
10 17The Industrial Internet of Things: The Evolution of Automation in the Oil and Gas Complex
11 19Big Data for E-Governance
12 21Power Quality Enhancement by Integrating Distributed Generation in Distribution System
13 23Reducing Attribute Couplet Attack in Social Networks using Factor Analysis
14 25Clustering and Data Aggregation in Wireless Sensor Networks Using Machine Learning Algorithms
15 26On Factorization of Semiprimes and Related Applications through Pythagorean Tuples
16 27Enhanced Energy Efficient Stable Clustering Algorithm for Mobile Ad Hoc Networks
17 31Acceleration of Hadoop
18 41Improvement Of Crop Prediction Using Data Mining Techniques
19 52TensorFlow Based Website Click through Rate (CTR) Prediction using Heat maps
20 57Securing Internet of Things using Blockchain Convergence
21 61Argumentative Analysis on Persuasive Essays
22 62Security in Cloud Computing
23 68JPEG Metadata:A complete study
24 69Prediction of Theoretical Limit for Test Data Compression
25 72DYNAMO: Dynamic Multimodal Route And Travel Recommendation System
26 73Evolution of Malware Detection Modeling Systems
27 74A Survey on Co-Operative Communication in 4G-LTE Wireless Networks
28 76Reliable Flooding in Location-Aided Routing Protocol for Wireless Sensor Networks
29 78SpinPad: A Secured PIN Number Based User authentication Scheme
30 80Design of a new controller for switching of energy sources applied to Hybrid Electric / Electric vehicle
31 81Collaborating Filtering Based Recommendation System Through Geo Tagged Photographs
32 83An Intelligent Fuzzy Rule based Feature Selection for Effective Intrusion Detection
33 84Determining Response Credibility by Blink Count
34 87A Source Coder Implementation in FPGA for a Novel High Speed Communication System
35 88Survey of Middlewares for Internet of Things
36 89Empty Seat Revelation System Using Face Detection And Correlation Matching
37 90Cloud inside Attack Detection using Machine Learning
38 91Eye State Detection for Use in Advanced Driver Assistance Systems
39 92Performance Enhancement of The Electronic Refrigerator Controller using Cloud
40 93Enhancing Localization Accuracy in Wireless Sensor Networks using Range-free methods and RSS Measurements
41 94An Optimized Resource allocation by Improved Task Scheduling Algorithm in Cloud Environments
42 95Real-Time Localization of a Person Using Smart Phone
43 96Enhancing Data Security in IoT Healthcare Services Using Fog Computing
44 98Liveliness Detection in Real Time Videos using Color based Chromatic Moment
45 102LSSD with hybrid optimal filtering for object detection and tracking in videos
46 107Investigation of Breast Melanoma using Hybrid – Image Processing Tool
* Camera Ready Copy should incorporate the following in your manuscript for publication in conference proceedings

Instructions to be followed:

  1. Every Conference article or paper should have the following elements:
    • Metadata – title, keywords, abstract, professional affiliation(s), and cited references in the bibliography must be included, and written in the English Language.
    • Abstract – a brief and objective summary that previews the rest of the paper it describes. It should be succinct yet provide enough information about the paper to facilitate a decision on whether the entire paper could be read with profit.
    • Introduction – an introductory statement of the purpose of the paper, usually describing the hypothesis that will be tested and a summary of related previous work by others.
    • Methods – the methods that are used to test the hypothesis should be given in sufficient detail that another researcher in the field could duplicate the testing.
    • Results – the hypothesis should be tested and data representing the results of the testing presented.
    • Conclusion – the data should be discussed and the results interpreted, and conclusions given.
  2. Use pdf express: IEEE PDF eXpress is a free service to IEEE conferences, allowing their authors to make IEEE Xplore-compatible PDFs. Refer the following url:
  3. Further communication will be sent to the corresponding author mail id