National Conference On Emerging Trends in Computing Technologies( NCETCT-18 )- 2018

S.NoTitle/Author NameSerial No
01A Study of Wi-fi Access Data Security in Internet of Things

– M.Balamurugan, Dr.R.Kalaiarasi

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df760e1d36a6bdd53f%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT101.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096897&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT101.pdf
NCETCT-101
02Detecting Malicious Packet Losses

– I. Dhanaseeli

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df4744d002b5cc6532%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT102.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-1&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096897&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT102.pdf
NCETCT-102
03Business Analytics Using Hadoop Together Withenterprise Data Warehouse

– Senthilkumar D, Sangeetha T

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfe0d3a5b19d795eb4%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT103.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-2&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT103.pdf
NCETCT-103
04Predictive analysis of Big data in the field of Clinical decision support system

– Sangeetha T, Udhayakumar U

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfac98b91d51ce6005%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT104.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-3&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT104.pdf
NCETCT-104
05Role and Analysis of Big Data Technology in Social Network

– Anitha R, Udhayakumar U

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df5875618992057255%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT105.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-4&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT105.pdf
NCETCT-105
06Deep learning Techniques in Image processing

– Ganesh B, Kumar C

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfc9e2e96f19077569%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT106.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-5&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT106.pdf
NCETCT-106
07Big data Analytics: Challenges and Applications for Social Media Data

– Krishnaveni C, Udhayakumar U

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df4c0479005ffe6657%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT107.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-6&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT107.pdf
NCETCT-107
08Exploration of Cloud Computing Perceptions

– Ranjith D, Balajee J

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfb4f70ac3cd5e346d%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT108.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-7&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT108.pdf
NCETCT-108
09Security and Privacy in Big data

– SanthoshKumar K, Udhayakumar U

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df032f7426a2cdb958%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT109.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-8&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096899&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT109.pdf
NCETCT-109
10Issues in Mobile Cloud Computing

– J.Mary Ramya Poovizhi

https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df12b66e0d92109a9a%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT110.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-9&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096899&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT110.pdf
NCETCT-110

IJET Management

Post Comment