S.No |
Title/Author Name |
Paper ID |
01 |
Monitoring Of Shrimp Status Using Machine Learning - Authors : P.Chaitanya Varma, R.P Surya Shankar, Dr.B.Kannapiran | ICASCT18-01 |
02 |
Wireless Power Transfer Converter For Energy Hub Applications With Various Loads - Authors : M.Sharmi, K.Mariappan, S.Devi | ICASCT18-02 |
03 |
Survey On Biometric Security System To Secure Data - Authors : Bhagyashri Budhe, Mrs. Rashmi Jain | ICASCT18-03 |
04 |
- Authors : Ms. Juhi Arora, Dr. ManaliKshirsagar | ICASCT18-04 |
05 |
Various Filtering Approaches Used In Mri Medical Images - Authors : C. Mohan, T. Balaji, M Sumathi | ICASCT18-05 |
06 |
Review On Mobility Based Secured E¬-voting System - Authors : Jayshree Gajabe, Mrs. Rashmi Jain | ICASCT18-06 |
07 |
Overview on Graph Cut Segmentation Technique - Authors : Samruddhi S. Bawane, HemantTurkar | ICASCT18-07 |
08 |
An Android Application for Library Access System - Authors : K.Prabhavathy, S.Gogula Nandhini, M.Dhanalakshmi, R.Gayathri, Dr.K.Sumathi | ICASCT18-08 |
09 |
Credit Card Fraud Detection Algorithm: Survey - Authors : Ms. DurgaWanjari, Prof. Rajesh Nasare | ICASCT18-09 |
10 |
E-Library – A Web Application with PHP and MySQL - Authors : G.Gunasekaran, S.Shankarganesh, E.Charlynishanth, Dr.K.Sumathi | ICASCT18-10 |
11 |
Survey On Three Components Of Cloud Computing: Safekeeping, Exploration And Imminent Scope - Authors : D.Saritha, K.Sumathi | ICASCT18-11 |
12 |
A Survey on Security Challenges in Cloud Computing - Authors : A.Vikram, G.Gopinath | ICASCT18-12 |
13 |
Divide-And-Conquer Approach In Machine-To-Machine Communication - Authors : P.Nivetha, V.UmaMaheswari | ICASCT18-13 |
14 |
The Survey Of Mimo-Ofdm System And Various Data Compression Techniques - Authors : Pallavi H. Meher, Prof. Kalyani Pendke, Prof. Rajesh Nasare | ICASCT18-14 |
15 |
Analysis Of Pid Controller Tuning For Level Process - Authors : S.Atchutha Raman, R.Avinash Shunmuga Priyan, A.M.Ganesha Moorthy | ICASCT18-15 |
16 |
IoT based smart water distribution system - Authors : Pushpa Jaculine J, Ramesh K | ICASCT18-16 |
17/p> |
A Smart Approach For Road Safety Of Passengers - Authors : J.Subireya, Ms.Vinolia Anandan, Ms.K.UshaKingsly Devi | ICASCT18-17 |
18 |
Review on Indexing Methodologies for Microblogs - Authors : A.Vegi Fernando, Dr.K.Ramesh | ICASCT18-18 |
19 |
Fabric Defect Detection Using Sparse representation Algorithm - Authors : M.Fathu Nisha, Dr.P.Vasuki, Dr.S.Mohamed Mansoor Roomi | ICASCT18-19 |
20 |
- Authors : C.Maharajothi, P.Murugalakshmi, Mrs.V.Anusuya, Mrs.Kalaivani | ICASCT18-20 |
21 |
Automated Screening of Glaucoma in Fundus Imagery by Morphological Operations - Authors : J.Kanimozhi, Dr.P.Vasuki, Dr.S.Mohamed Mansoor Roomi | ICASCT18-21 |
22 |
Spo2 Based Oxygen Delivery System - Authors : Anand subramaniam, Anandhakumar M, Naveenprasad R, Ayyappan G | ICASCT18-22 |
23 |
A Health Care Service Model using Human Activity Patterns - Authors : R.Nandhini, B.Viswanadhan, K.Yazhini, Ms.R.Mynavathi | ICASCT18-23 |
24 |
Securing Digital Image Using Cryptographic Key Generation Algorithm - Authors : V.Anusuya, M.Pappa, Mrs.B.Shunmuga Priya | ICASCT18-24 |
25 |
- Authors : S.Thavasi , K.Abinaya, R.Deepa Nandhini, B.Meenakshi | ICASCT18-25 |
26 |
Analysis and Implementation of a Digital Converter for a WiMAX System - Authors : Sherin A Thomas, K.Anusudha | ICASCT18-26 |
27 |
Despeckling of SAR Images using Shearlet Transform with Preconditioned Conjugate Gradient - Authors : A.Shakin Banu, Dr.P.Vasuki, Dr.S.Mohamed Mansoor Roomi | ICASCT18-27 |
28 |
Defending Against Sql Injection Attack In Cloud Computing - Authors : P.Ponmuthukalaiselvi, S.K.Santha, Mrs.B.Shunmugapriya | ICASCT18-28 |
29 |
ChatBot Enabled Wifi Chat Configuration System - Authors : Rukmani Surya N, Silviya Thiresa A, Arunpriya S | ICASCT18-29 |
30 |
Design And Implementation Of Security Mail Services In Intranet - Authors : Helen Mano Irine, R.Gokila, Mr.K.Maharajan | ICASCT18-30 |