IJCTT - NCITDCE - Part 2 April 2017
S.No
|
Title/Author Name
|
Ref. No
|
31 |
- Dr. Shaik.Babu, Mr. A. Nagarjuna
|
NCITDCE-P131 |
32 |
Offline Echo Speech Recognition - Mr. Y. Rajesh, D.Ritwik Prakash, P.D.V.D.Praveen, S.Naveen
|
NCITDCE-P132 |
33 |
A Health Care DataBase For Finding Cluster Based Outlier Detection - Ch. Nagamani, D.Manasa, J. Sally Susmitha, G.Venkata Bhavyatha
|
NCITDCE-P133 |
34 |
I Shopping: Intelligent Shopping and Predicate Analysis System Using Data Mining - Mrs.K.Sireesha, K. Satya Sumitha, P.Harsha Priya, M.Tejitha
|
NCITDCE-P134 |
35 |
Detecting Fraud Rating For Mobile Apps - Mrs. K .Sireesha, P.Amani, Md.Afreen, M.Manasa
|
NCITDCE-P135 |
36 |
A Compact Notch Band Filter With Multi Serrated Mimo Antenna For Wimax Applications - Simhadri Parvathi, S.V.Rama Rao, M.S.S.S.Srinivas
|
NCITDCE-P136 |
37 |
Performance Evaluation Of Fingerprint Orientation Field Reconstruction Methods - Mr. A. Koteswara Rao, Mr. Tenali Ravi Kumar, G. Vijay Kumar, P. Ravi Teja
|
NCITDCE-P137 |
38 |
Quantifying Politicaldata Analysis Based On Tweets - MS.Reddy Sonykrishna, P.N.V.Saikrishna, K.Teja, M.Jeshwanthkumar
|
NCITDCE-P138 |
39 |
Query Result Extraction Using Dynamic Query Forms - Mrs. I. Anitha Rani, Y.Vijay, Abdul Moseen
|
NCITDCE-P139 |
40 |
A Review on Issues related to Big Data Analytics in Health Care - B.Swapna, Anuradha.T
|
NCITDCE-P140 |
41 |
Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks - Mrs.I.Anitha Rani, Y.PravallikaReddy, P.Anusha, A.Prasana Lakshmi
|
NCITDCE-P141 |
42 |
Single key Based Secure Data sharing in Cloud - Mr.B.V.Satish Babu, p.Tejaswani, m.Sirisha, b.Poornima
|
NCITDCE-P142 |
43 |
- Dr. Shaik.Babu, Mr. A. Nagarjuna
|
NCITDCE-P143 |
44 |
A Text Mining Application Of Emotion Classification Of Twitter`s Users - R. SonyKrishna, L. Priyanka, K. VijayaLakshmi, M. Sowmya
|
NCITDCE-P144 |
45 |
Detection of VT,VF Sounds Using SVM & Zero Crossing Rate - P.Priyanka, P.Shiny Angel, Dr.G.V.Hari Prasad
|
NCITDCE-P145 |
46 |
- Kore Lakshmi, K .Sireesha
|
NCITDCE-P146 |
47 |
PREVENTING FOREST FIRE ATTACKS BY USING TRUSTY BASED AUTHENTICATION PROTOCOL - Ms.D.N.Rajeswari, P. Laxmi Priya, SK.Ayesha, CH.Karuna
|
NCITDCE-P147 |
48 |
Secure Text Transmission Using Video Stegnography - A .Jyothirmai, Ch. Manju Sri
|
NCITDCE-P148 |
49 |
CONTROLLING OF ROBOT USING BRAIN SIGNALS WITH MATLAB INTERFACE - T.Prasanth, P.Dharma Teja, K.DasmanthaRao, M.N.Shyam Kumar, M.Rama Krishna
|
NCITDCE-P149 |
50 |
- D. NAGAMANI, K. VENKATESWARARAO
|
NCITDCE-P150 |
51 |
GSM Based Home Appliances Automation and Energy Auditing - Abdul Azeez, Nagidi Sivanagaraju, Motukuri Amilesh
|
NCITDCE-P151 |
52 |
1 ANONYMOUS AUTHENTICATION OF DATA WITH DECENTRALIZED ACCESS CONTROL STORED IN CLOUD - K.SIVA RAMA KRISHNA, TENALI RAVI KUMAR, K.SRAVANTHI
|
NCITDCE-P152 |
53 |
A Efficient Apriori Algorithm For Mining Infrequent Weighted Item Set Using Greedy - Ms.D.N.Rajeswari, T.Mary Raveena, N.Sravya
|
NCITDCE-P153 |
54 |
A Proficient File Order Attribute-Level Conversion Plan in Cloud Computing - R.MERCY VIRGINIA, P.YELLAMMA
|
NCITDCE-P154 |
55 |
AN EFFICIENT APPROACH FOR CONVERTING RELATIONAL QUERIES TO SPREAD SHEETS - Mrs.Razeena Begum, N.Navya Sri
|
NCITDCE-P155 |
56 |
Tracking of Objects in Video by Using Median Filters, Segmentation & Discrete Wavelet Transform - G. Naga Vasantha, K. Prathyusha
|
NCITDCE-P156 |
57 |
A novel recommendation model regularized with user trust and ratings - P.Harshavardhini, M.Mohana Deepthi
|
NCITDCE-P157 |
58 |
Implementing a Context Similarity Model for Mining Query Facets with Fine-Grained Similarity - CH.DEDEEPYA, L.V.RAMESH
|
NCITDCE-P158 |