National Conference On Emerging Trends in Computing Technologies( NCETCT-18 )- 2018
S.No | Title/Author Name | Serial No |
01 | A Study of Wi-fi Access Data Security in Internet of Things![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df760e1d36a6bdd53f%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT101.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-0&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096897&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT101.pdf | NCETCT-101 |
02 | Detecting Malicious Packet Losses![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df4744d002b5cc6532%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT102.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-1&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096897&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT102.pdf | NCETCT-102 |
03 | Business Analytics Using Hadoop Together Withenterprise Data Warehouse![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfe0d3a5b19d795eb4%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT103.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-2&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT103.pdf | NCETCT-103 |
04 | Predictive analysis of Big data in the field of Clinical decision support system![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfac98b91d51ce6005%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT104.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-3&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT104.pdf | NCETCT-104 |
05 | Role and Analysis of Big Data Technology in Social Network![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df5875618992057255%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT105.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-4&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT105.pdf | NCETCT-105 |
06 | Deep learning Techniques in Image processing![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfc9e2e96f19077569%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT106.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-5&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT106.pdf | NCETCT-106 |
07 | Big data Analytics: Challenges and Applications for Social Media Data![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df4c0479005ffe6657%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT107.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-6&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT107.pdf | NCETCT-107 |
08 | Exploration of Cloud Computing Perceptions![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfb4f70ac3cd5e346d%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT108.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-7&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096898&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT108.pdf | NCETCT-108 |
09 | Security and Privacy in Big data![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df032f7426a2cdb958%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT109.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-8&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096899&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT109.pdf | NCETCT-109 |
10 | Issues in Mobile Cloud Computing![]() https://www.facebook.com/v2.0/plugins/share_button.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Df12b66e0d92109a9a%26domain%3Dwww.ijetjournal.org%26is_canvas%3Dfalse%26origin%3Dhttp%253A%252F%252Fwww.ijetjournal.org%252Ff52a9029b6e7f183b%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT110.pdf&layout=button_count&locale=en_GB&sdk=joeySharehttps://platform.twitter.com/widgets/tweet_button.2f70fb173b9000da126c79afe2098f02.en.html#dnt=false&id=twitter-widget-9&lang=en&original_referer=http%3A%2F%2Fwww.ijetjournal.org%2FNCETCT18P2.html&size=m&text=National%20Conference%20On%20Emerging%20Trends%20in%20Computing%20Technologies%20(%20NCETCT-18%20)&time=1745149096899&type=share&url=http%3A%2F%2Fwww.ijetjournal.org%2FSpecial-Issues%2FNCETCT%2FNCETCT110.pdf | NCETCT-110 |
Post Comment