NCEITCS Number-1 April 2017
S.No
|
Title/Author Name
|
Ref. No
|
1 |
Security Enhancement In 3G And 4G Networks - M.M. Prasada Reddy
|
NCEITCS-P101 |
2 |
Data Mining and MultiAgent Integration - Dr.NAGARATNA P.HEGDE, B.VARIJA
|
NCEITCS-P102 |
3 |
Solutions for Security Challenges in Cloud Computing – A Review - Rajesh Kalepu and C. Lakshmi Devasena
|
NCEITCS-P103 |
4 |
Improved Set Partition Hierarchical Tree Algorithm for Video Zipping in Real time Applications - C. Lakshmi Devasena
|
NCEITCS-P104 |
5 |
Pollard Rho Algoritm For Elliptic Curve Cryptography - Deepthi P
|
NCEITCS-P105 |
6 |
Literature Survey on Smart Crawler - Nikitha Sharma, V. Sowmya Devi
|
NCEITCS-P106 |
7 |
Accuracy Analysis of Expression Recognition Rates Using Subspace Based Approaches - G.P.Hegde, M. Seetha, Nagaratna Hegde
|
NCEITCS-P107 |
8 |
Under sampled Face Recognition via Robust Auxiliary Dictionary Learning - Ch V S N Pavan Eswar Kumar, Dr S. Phani Kumar
|
NCEITCS-P108 |
9 |
Internet of Things (IoT) - Internet Evolution - Syed Abdul Moeed, Dr.A.Arun Kumar
|
NCEITCS-P109 |
10 |
UCCX BASED APPLICATION FOR HOLIDAY MANAGEMENT - Rajarankar Sruthi, Dr.K.Nikitha
|
NCEITCS-P110 |
11 |
IP Contact Center Call Flow Design Using UCCX - P.NISCHAL CHAND, Dr. SUDARSON JENA
|
NCEITCS-P111 |
12 |
Trust Based Substantiation Scheme Over Wireless Sensor Networks - B.Ranjith Kumar, Asiya
|
NCEITCS-P112 |
13 |
A Framework to Maintain Space Connection For Vertical Handover - S.M. Rawoof, P. Naga Prasad, Narsaiah Putta
|
NCEITCS-P113 |
14 |
A Survey of Spatial Data Mining Approaches: Algorithms and Architecture - D.Muralir, G.Hari Shankar, R.Sateesh Kumar
|
NCEITCS-P114 |
15 |
CDA Based Approach for Electronic Health Attention Records in Cloud Computing - Balne Sridevi, Thota Srilatha
|
NCEITCS-P115 |
16 |
A Dual Security and Protection Mechanism in Cloud Storage - AshishLadda, Sandhya Mekala, Mamatha Kencha
|
NCEITCS-P116 |
17 |
An Efficient Data Integrity Preservation Scheme by SSCE - G Loshma, Dr Nagaratna P Hegde
|
NCEITCS-P117 |
18 |
- C Sai Amogh, P vinaya Krishna, V.Sandhya
|
NCEITCS-P118 |
19 |
Extended Radial Network For Spectral Neuro Approach In Pattern Recognition - Dr G.Shyama Chandra Prasad, Prathibha, A.Pramod Kumar
|
NCEITCS-P119 |
20 |
Inheritance of Dynamic Metrics for increase In software Performance - Dr.M.V.L.N.Raja Rao, D.Hema Sindhu, Ch.Sugunalatha, P.Lakshmi Padmaja
|
NCEITCS-P120 |
21 |
Data Leakage Detection Through Fake objects - Mrs. Anita Dixit, Ms. Priyanka Dudgikar, Ms. Nireeksha Nayak, Ms. Ranjana Khyade
|
NCEITCS-P121 |
22 |
Cloud Testing – Types, Benefits and Challenges - K. Sunil Manohar Reddy
|
NCEITCS-P122 |
23 |
- Raju. Nadimpalli. V.G., Gopala Krishna. P., Yelleni Mounica, V Sahithi
|
NCEITCS-P123 |
24 |
- P.Samyuktha, D.Sriharsha
|
NCEITCS-P124 |
25 |
A Hybrid Cloud Appeal for Improving Storage Utilization for Secure Authorized Deduplication - B. Sowmya, N.Vaishnavi, B. Nayomi, Ms.P.S.Latha Kalyampudi
|
NCEITCS-P125 |
26 |
A Coherent Privacy-Conserving Ranked Keyword Search Approach in Cloud K.V.Sowmya, K. Sai - Snigdha, M.Susmitha Reddy, Ms.P.S.Latha Kalyampudi
|
NCEITCS-P126 |
27 |
Complementary trends in intrusion detection victimization knowledge-based and reference model - Raghavender.K.V, Dr.P.Premchand
|
NCEITCS-P127 |
28 |
Object Motion Detection and Tracking for Video Surveillance - M. Sahasri, C. Gireesh
|
NCEITCS-P128 |
29 |
- K.Spandana, Sai Supriya KPL
|
NCEITCS-P129 |
30 |
Fuzzy Clustering and ILB Methods Using Level Set Method for Image Segmentation - T.Saikumar
|
NCEITCS-P130 |