![](/images/new.gif)
S.No |
Title/Author Name |
Paper ID |
01 |
Monitoring Of Shrimp Status Using Machine Learning
| ICASCT18-01 |
02 |
Wireless Power Transfer Converter For Energy Hub Applications With Various Loads
| ICASCT18-02 |
03 |
Survey On Biometric Security System To Secure Data
| ICASCT18-03 |
04 |
| ICASCT18-04 |
05 |
Various Filtering Approaches Used In Mri Medical Images
| ICASCT18-05 |
06 |
Review On Mobility Based Secured E¬-voting System
| ICASCT18-06 |
07 |
Overview on Graph Cut Segmentation Technique
| ICASCT18-07 |
08 |
An Android Application for Library Access System
| ICASCT18-08 |
09 |
Credit Card Fraud Detection Algorithm: Survey
| ICASCT18-09 |
10 |
E-Library – A Web Application with PHP and MySQL
| ICASCT18-10 |
11 |
Survey On Three Components Of Cloud Computing: Safekeeping, Exploration And Imminent Scope
| ICASCT18-11 |
12 |
A Survey on Security Challenges in Cloud Computing
| ICASCT18-12 |
13 |
Divide-And-Conquer Approach In Machine-To-Machine Communication
| ICASCT18-13 |
14 |
The Survey Of Mimo-Ofdm System And Various Data Compression Techniques
| ICASCT18-14 |
15 |
Analysis Of Pid Controller Tuning For Level Process
| ICASCT18-15 |
16 |
IoT based smart water distribution system
| ICASCT18-16 |
17/p> |
A Smart Approach For Road Safety Of Passengers
| ICASCT18-17 |
18 |
Review on Indexing Methodologies for Microblogs
| ICASCT18-18 |
19 |
Fabric Defect Detection Using Sparse representation Algorithm
| ICASCT18-19 |
20 |
| ICASCT18-20 |
21 |
Automated Screening of Glaucoma in Fundus Imagery by Morphological Operations
| ICASCT18-21 |
22 |
Spo2 Based Oxygen Delivery System
| ICASCT18-22 |
23 |
A Health Care Service Model using Human Activity Patterns
| ICASCT18-23 |
24 |
Securing Digital Image Using Cryptographic Key Generation Algorithm
| ICASCT18-24 |
25 |
| ICASCT18-25 |
26 |
Analysis and Implementation of a Digital Converter for a WiMAX System
| ICASCT18-26 |
27 |
Despeckling of SAR Images using Shearlet Transform with Preconditioned Conjugate Gradient
| ICASCT18-27 |
28 |
Defending Against Sql Injection Attack In Cloud Computing
| ICASCT18-28 |
29 |
ChatBot Enabled Wifi Chat Configuration System
| ICASCT18-29 |
30 |
Design And Implementation Of Security Mail Services In Intranet
| ICASCT18-30 |