S.No |
Title/Author Name |
Paper ID |
61 |
Mitigation Of Pue Attack Using Pso In Wireless Cognitive Radio Networks - A.Dhivya Lakshmi, D.Diana, S.Vimal, Dr.L.Kalaivani, Dr.M.Kaliappan | ICASCT18-61 |
62 |
IoT Based Incessant Surveillance System - Pon Aarthy M, Sreedevi B, Rajagopal S | ICASCT18-62 |
63 |
Human Aspect Profile Analysis For Privacy Preserving - Muvitha.A, Sowmiya.K, Theerthagiri.K, Leela.V | ICASCT18-63 |
64 |
Mining Probabilistically Frequent Sequential Patterns In Large Uncertain Database - Nithya.T, Ranganayaki.R, Naveena.M, Surendh Keerthan.P | ICASCT18-64 |
65 |
Design Of Iot Node For Smart Cities - R.Srijha, T.S.Arun Samuel | ICASCT18-65 |
66 |
Automated Irrigation System Using Iot - E.Jeyanthi, S.Tamil Selvi | ICASCT18-66 |
67 |
Workload Consolidation For Cloud Data Centerswith Guaranteed Qos Using Request Reneging - Dr.V.K.Manavalasundaram, D.Vinodhini, G.Sandhiya, B.Maneshraja | ICASCT18-67 |
68 |
Poisoning Network Visibility On Software Defined Network Using Topology Algorithm - A.Saravanan, C.Vinithsankar | ICASCT18-68 |
69 |
Secure Enabled Region Based Data Sharing In Manet - Guhan.E, Indhu.S, Vanitha.M, Kavitha.M | ICASCT18-69 |
70 |
A survey on Secure Data Access Control in E-HealthCare Monitoring System - K.PremKumar, K.PrakashKrishna, R.PremKumar, S.Sinega | ICASCT18-70 |
71 |
Systematic Clustering Approach For Road Side Networks - B.Suganya, P.R.Kaviamuthu, K.Gowtham, S.Viveka | ICASCT18-71 |
72 |
Search and malware detection in Google play - S.Priyankaa, M.Subhashree, S.Akshai, T.Premamala | ICASCT18-72 |
73 |
A Smart Attendance Automation And Monitoring System Using Enhanced Facial Recognition Techniques - S.Dhanasekaran, R.Sweda Preethy, V.Sundari | ICASCT18-73 |
74 |
- M.Jayanandhini, D.Naveen kumar, S.Nivetha, B.Punitha, M.Shanthamani, | ICASCT18-74 |
75 |
Automatic Fall Detection By Sensing Tiles - S.Jabeen Begum,Janani | ICASCT18-75 |
76 |
A New Displaying Technology For Information Hiding Using Temporally Brightness Modulated Pattern - Deepa K, Prakatheesh T, Rajalingam P, Ram kumar M | ICASCT18-76 |
77 |
Efficient BWT and SVM Based Multilevel Image Segmentation for Brain Tumor Detection in MRImages - DR.P.Santhi,V.Nivetha,R.Ponmozhi,L.Ruban | ICASCT18-77 |
78 |
Optimization On Stream Delivery Based On Region Of Interest - S.Praveena, C.Mounesh, C.P.Niveda, R.Menaka | ICASCT18-78 |
79 |
Image Seclusion Trespassing In Osn Using Watermarking Techniques - Murugeasan M, Britto Edison R, Joy Maria Ancy J, Jegan Kumar T | ICASCT18-79 |
80 |
A Survey on Secure Medical Care Authentication in Cloud - K.Prem Kumar, Kanishka B U, Mythili J, MythiliMeena D | ICASCT18-80 |
81 |
Brain Computer Interface based Automatic Wheelchair System using IOT - Kaliappan, Lenssen, Simon Ameero | ICASCT18-81 |
82 |
Vehicle Monitoring System In Smart Cities - Hariharasudhan N, Jeya Surya G, Raja Sundar B, Rajagopal S | ICASCT18-82 |
83 |
A Technique For Detection Of Data Leakage In Social Environment - S.Prabavathi, P.Pugalandhi, D.Praveena, S.Surya Kumar | ICASCT18-83 |
84 |
Automatic Car Parking System Using Iot - A.MohanaPriya, R.Gokul, N.Gowthaman | ICASCT18-84 |