International Conference on Emerging Trends in Applications of Computing ( ICETAC 2K17 ) , Francis Xavier Engineering College ,Vannarpet, Tirunelveli, Tamil Nadu 627003 ( ICETAC 2K17 ) March – 2017
S.No | Title/Author Name | Serial No |
1 | Apple Leaf Disease Identification using Support Vector Machine – S.Manimegalai ,G.SivagamaSundari [ PDF ] | ICETAC2K17-P101 |
2 | Secure and Green Wireless Communication for Next Generation Li-Fi – Muthammal V , Dharani V [ PDF ] | ICETAC2K17-P102 |
3 | Fish Image Recognization Construction using Unsupervised Learning Performance – N.Chithra , J. Jemi Florinabel , [ PDF ] | ICETAC2K17-P103 |
4 | Design and Implementation of Healthy Relationship between Doctor and Patient in Healthcare Management System – Nagarajanudaiyar , J.Josiah Samuel Raj [ PDF ] × | ICETAC2K17-P104 |
5 | PHISHING – Nishan.A.H , Mari Selvi.K [ PDF ] | ICETAC2K17-P105 |
6 | A Frugal Storage For Cloud File System – P.Rohini , K.Palraj [ PDF ] | ICETAC2K17-P106 |
7 | Cyber security Survey – P.Sharon Jerlin ,S.Hasina Fathima , A.Anitha , [ PDF ] | ICETAC2K17-P107 |
8 | VLSI Design of Low Power Cache Architecture – P.Umadevi , K.Nishaji [ PDF ] | ICETAC2K17-P108 |
9 | Battlefield Using MWSN Surveillance System – P.Veeraselvi, C.Padmapriya, S.Gnanasundari [ PDF ] | ICETAC2K17-P109 |
10 | Automated Buildings and Road Extraction from High Resolution Panchromatic Satellite Images – R. Aruna, D.Sasireka [ PDF ] | ICETAC2K17-P110 |
11 | Text Data Compression and Decompression Using Modified Deflate Algorithm – R. Karthik, V. Ramesh, M. Siva [ PDF ] | ICETAC2K17-P111 |
12 | Survey of (LI-FI) Light Fidelity – R.Mallika Pandeeswari [ PDF ] | ICETAC2K17-P112 |
13 | Fast Algorithm for OVERLAPPING Community Detection – R.Sujatha , S.Indumathy [ PDF ] | ICETAC2K17-P113 |
14 | REMOTE MONITORING THE GLUCOSE BOTTLE LEVEL IN HOSPITALS – Ram kumar S ,Saravana kumar S , Sukumar M [ PDF ] | ICETAC2K17-P114 |
15 | Speech and Gaze Conflicts in Human-Robot Interactions – S.Infanta Adline Beatrice, S.Naga Lakshmi, J. Maria Sheela [ PDF ] | ICETAC2K17-P115 |
16 | Real Time Path Planning Based On Hybrid VANET Using In Transportation System – S.Mallika , P.Ramkumar , [ PDF ] | ICETAC2K17-P116 |
17 | Manipulating Traffic Management in Scalable Cloud Computing Data Centers – S.Nandini , M.D.Indu , M.Kavitha , [ PDF ] | ICETAC2K17-P117 |
18 | Secure Key Generation for Cryptography – S.Natarajan , S.Dheenathayalan , [ PDF ] | ICETAC2K17-P118 |
19 | Adaptation Of Tabu Search And Cognizant Turing Machine For Regression Test Case Prioritization – S.Parkavi , M.Kavinaya , P.Sundaravadivel, M.Kasipandi , [ PDF ] | ICETAC2K17-P119 |
20 | Android and Web Based Electricity Monitoring and Controlling Using IOT & Embedded System – S.Sabharinath ,B.Satish Kumar ,M.Manikandan , [ PDF ] | ICETAC2K17-P120 |
21 | Diagnosis of Grape Leaf Diseases Using K-Means Clustering and Neural Network – S.Sankareswari , G.Sivakamasundari , [ PDF ] | ICETAC2K17-P121 |
22 | Cassandra – A Decentralized Structured Storage System – S.Suganthi , M.Roshini, M.Madhuvathani , [ PDF ] | ICETAC2K17-P122 |
23 | Achieving the Performance of Manet Through DEL- CMAC Using Cross Layer Cooperative Diversity Approach – Shieka Hinanas. S , Sanjeeve Kumar. S , [ PDF ] | ICETAC2K17-P123 |
24 | Statistical Score Calculation of Information Retrieval Systems using Data Fusion – V.Gayathri, S.Ananthi, N.Ananthi , [ PDF ] | ICETAC2K17-P124 |
25 | Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search – V.Manjunathan, D.Gnana Prakash, A.Raja, Mr.P.Sundaravadivel , [ PDF ] | ICETAC2K17-P125 |
26 | Adaptation Of Tabu Search And Cognizant Turing Machine For Regression Test Case Prioritization – V.Ranjani, K.Jeya Aishwarya, A.Jeya Vani, S.Sangeetha , [ PDF ] | ICETAC2K17-P126 |
27 | PREDICTION OF PHISHING – An Online and Offline Technique of Spamming – Nishan.A.H , Mari Selvi.K , Ms. S. Agnes Joshy , [ PDF ] | ICETAC2K17-P127 |
Post Comment