Loading Now

International Conference on Emerging Trends in Applications of Computing ( ICETAC 2K17 ) , Francis Xavier Engineering College ,Vannarpet, Tirunelveli, Tamil Nadu 627003 ( ICETAC 2K17 ) March – 2017

S.NoTitle/Author NameSerial No
1Apple Leaf Disease Identification using Support Vector Machine
– S.Manimegalai ,G.SivagamaSundari
PDF ]
ICETAC2K17-P101
2Secure and Green Wireless Communication for Next Generation Li-Fi
– Muthammal V , Dharani V
PDF ]
ICETAC2K17-P102
3Fish Image Recognization Construction using Unsupervised Learning Performance
– N.Chithra , J. Jemi Florinabel ,
PDF ]
ICETAC2K17-P103
4Design and Implementation of Healthy Relationship between Doctor and Patient in Healthcare Management System
– Nagarajanudaiyar , J.Josiah Samuel Raj
PDF ] ×
ICETAC2K17-P104
5PHISHING
– Nishan.A.H , Mari Selvi.K
PDF ]
ICETAC2K17-P105
6A Frugal Storage For Cloud File System
– P.Rohini , K.Palraj
PDF ]
ICETAC2K17-P106
7Cyber security Survey
– P.Sharon Jerlin ,S.Hasina Fathima , A.Anitha ,
PDF ]
ICETAC2K17-P107
8VLSI Design of Low Power Cache Architecture
– P.Umadevi , K.Nishaji
PDF ]
ICETAC2K17-P108
9Battlefield Using MWSN Surveillance System
– P.Veeraselvi, C.Padmapriya, S.Gnanasundari
PDF ]
ICETAC2K17-P109
10Automated Buildings and Road Extraction from High Resolution Panchromatic Satellite Images
– R. Aruna, D.Sasireka
PDF ]
ICETAC2K17-P110
11Text Data Compression and Decompression Using Modified Deflate Algorithm
– R. Karthik, V. Ramesh, M. Siva
PDF ]
ICETAC2K17-P111
12Survey of (LI-FI) Light Fidelity
– R.Mallika Pandeeswari
PDF ]
ICETAC2K17-P112
13Fast Algorithm for OVERLAPPING Community Detection
– R.Sujatha , S.Indumathy
PDF ]
ICETAC2K17-P113
14REMOTE MONITORING THE GLUCOSE BOTTLE LEVEL IN HOSPITALS
– Ram kumar S ,Saravana kumar S , Sukumar M
PDF ]
ICETAC2K17-P114
15Speech and Gaze Conflicts in Human-Robot Interactions
– S.Infanta Adline Beatrice, S.Naga Lakshmi, J. Maria Sheela
PDF ]
ICETAC2K17-P115
16Real Time Path Planning Based On Hybrid VANET Using In Transportation System
– S.Mallika , P.Ramkumar ,
PDF ]
ICETAC2K17-P116
17Manipulating Traffic Management in Scalable Cloud Computing Data Centers
– S.Nandini , M.D.Indu , M.Kavitha ,
PDF ]
ICETAC2K17-P117
18Secure Key Generation for Cryptography
– S.Natarajan , S.Dheenathayalan ,
PDF ]
ICETAC2K17-P118
19Adaptation Of Tabu Search And Cognizant Turing Machine For Regression Test Case Prioritization
– S.Parkavi , M.Kavinaya , P.Sundaravadivel, M.Kasipandi ,
PDF ]
ICETAC2K17-P119
20Android and Web Based Electricity Monitoring and Controlling Using IOT & Embedded System
– S.Sabharinath ,B.Satish Kumar ,M.Manikandan ,
PDF ]
ICETAC2K17-P120
21Diagnosis of Grape Leaf Diseases Using K-Means Clustering and Neural Network
– S.Sankareswari , G.Sivakamasundari ,
PDF ]
ICETAC2K17-P121
22Cassandra – A Decentralized Structured Storage System
– S.Suganthi , M.Roshini, M.Madhuvathani ,
PDF ]
ICETAC2K17-P122
23Achieving the Performance of Manet Through DEL- CMAC Using Cross Layer Cooperative Diversity Approach
– Shieka Hinanas. S , Sanjeeve Kumar. S ,
PDF ]
ICETAC2K17-P123
24Statistical Score Calculation of Information Retrieval Systems using Data Fusion
– V.Gayathri, S.Ananthi, N.Ananthi ,
PDF ]
ICETAC2K17-P124
25Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search
– V.Manjunathan, D.Gnana Prakash, A.Raja, Mr.P.Sundaravadivel ,
PDF ]
ICETAC2K17-P125
26Adaptation Of Tabu Search And Cognizant Turing Machine For Regression Test Case Prioritization
– V.Ranjani, K.Jeya Aishwarya, A.Jeya Vani, S.Sangeetha ,
PDF ]
ICETAC2K17-P126
27PREDICTION OF PHISHING – An Online and Offline Technique of Spamming
– Nishan.A.H , Mari Selvi.K , Ms. S. Agnes Joshy ,
PDF ]
ICETAC2K17-P127

Post Comment

You May Have Missed