Published: 2018-03-03

Survey on Finding of Admissible Information and Influential Users

Sharik Ahmad, Dr. M. Mazhar Afzal, Dr. Umesh Chandra

Pages No. 23669-23673

Abstract 93  | PDF

Severity Analysis of Macular Edema using Random Tree Classifier

Deepthi K Prasad, Vibha L, Venugopal K R

Pages No. 23674-23679

Abstract 119  | PDF

Two-Wheeler Safety System for Accident Prevention, Detection and Reporting

Priyanka C, Priya Darshini C, Vinayak G Shavi, Sarvar Begum

Pages No. 23680-23682

Abstract 156  | PDF

Agriculture Robotics

G. Tejaswani, Afroz. B, Shruthi. Y, Sunitha .S

Pages No. 23683-23685

Abstract 122  | PDF

Pattern Identification and Predictions in Data Analysis

Mrs.M. Sasikala, Ms.D. Deepika, Mr.S.Shiva Shankar

Pages No. 23686-23691

Abstract 124  | PDF

Scope and Challenges of Internet of Things (IoT) in Kashmir

Pala, M. Maqbool

Pages No. 23692-23696

Abstract 129  | PDF

A Text Recognizing Device For Visually Impaired

G. Tejaswani, Afroz. B, Sunitha. S

Pages No. 23697-23700

Abstract 165  | PDF

Survey on Effect of Multimodal Interface on Senior Citizen

Aleena Susan Mathew, Vidya . N

Pages No. 23701-23704

Abstract 113  | PDF

Review on Logic Encryption Strategy Ensuring Key Interdependency

M. Padmaa, S. Divyadarshini, M. Keerthana, T.S. Mohana Parameswari, K. Mohana Priya

Pages No. 23705-23711

Abstract 87  | PDF

Survey on Cloud Based IP Traceback Authentication Framework

Aswathy T, Misha Ravi

Pages No. 23712-23715

Abstract 84  | PDF

Recommender Framework for Sentimental Analysis using l-injection

P. Deepa, D.Eva Roshini, V.Dhivya Bharathi, S. Bhuvaneswari

Pages No. 23716-23721

Abstract 107  | PDF

Military Based Security System Using Raspberry Pi

S. Kavitha, S.R.Kamali Varshini, Mrs.P. Vijayalakshmi

Abstract 139  | PDF

Simulation of Quasi Cascaded H-Bridge Five-Level Boost Inverter

M. Devika, M. Sundaraperumal, M.Valan Rajkumar

Pages No. 23727-23736

Abstract 189  | PDF

Survey of Routing Protocols under Realistic Mobility and Traffic

Suman Kumar Shriramoju, Dr.N. Satyanarayana

Pages No. 23737-23741

Abstract 92  | PDF

Survey of new attack models on Cloud Infrastructure

Har Preet Singh

Pages No. 23742-23752

Abstract 102  | PDF

Accident Detection for Automobiles Switch and Buzzer

Sharath Kumar K, Kavitha Juliet

Pages No. 23753-23754

Abstract 61  | PDF

A Big Data Based Edge Detection Method for Image Pattern Recognition - A Survey

S. Dhivya, Dr.R. Shanmugavadivu

Pages No. 23755-23760

Abstract 169  | PDF

Neural Network based Handwritten Character Recognition system

Savitha Attigeri

Pages No. 23761-23768

Abstract 447  | PDF

String Matching Algorithms

Mukku Bhagya Sri, Rachita Bhavsar, Preeti Narooka

Pages No. 23769-23772

Abstract 295  | PDF

Modeling and Simulation of 27- Level Hybrid H-Bridge Multilevel Inverter for PV System

S. Priyanga, M.Valan Rajkumar

Pages No. 23773-23780

Abstract 160  | PDF

Design of Quasi-Cyclic Low Density Parity Check Decoder Using Optimized Min-Sum Algorithm

Rajarshini Mishra

Pages No. 23781-23784

Abstract 72  | PDF

Homomorphic Encryption Using Enhanced BGV Encryption Scheme For Cloud Security

S.V.Suriya prasad, K. Kumanan

Pages No. 23785-23789

Abstract 164  | PDF

Design Of Wireless Sensor Networks For IOT Application : A Challenges and survey

Mr.K. Muruganandam, Dr.B. Balamurugan, Dr.Sibaram Khara

Pages No. 23790-23795

Abstract 154  | PDF

Philosophy of dividing the Computer Science into Several fields

Wafaa Ahmad Bazzi

Pages No. 23796-23805

Abstract 132  | PDF