Skip to content

IJCRCST -International Journal of Contemporary Research in Computer Science and Technology

Computer Science International Journal,Best Online Journals of Computer Science Stream, Best Computer science Journal, Low Publication Charge , Best International Journal, Top journal in computer science,Free Research Papers Publication

ijcrcst
  • Home
  • Aim and Scope
  • Editorial Board
  • Paper Submission
  • Conferences
  • Archives
  • Contact Us
  • Toggle search form

NCRTIC-18

National Conference on
Recent Trends in Information Technology and Communication
(NCRTIC’ 18)

Organized by

Department Of Information Technology,
Velammal Engineering College,
Chennai,Tamilnadu,India.
Date : 16th March 2018

In Association with

  • Cover Page

1. ANDROID BASED PROSOPIS JULIFLORA DETECTION AND ELIMINATION SYSTEM USING INTERNET OF THINGS(IOT)
Authors : V.Chandrasekaran,R.Narendhra Subramaniam,P.T.Hari Narayanan,R.Sri Gokulam
Paper Id :IJCRCST-NCRTIC18-01
–Page No : 1-3  


2.MACHINE VISION BASED APPROACH FOR VEGETABLE QUALITY EVALUATION
Authors : Venkat Kumari N,Kumar V,JennathPirthouse B,Dr. K. Selva Bhuvaneswari
Paper Id :IJCRCST-NCRTIC18-02
–Page No : 4-7

3.BRAIN TUMOR SEGMENTATION BASED ON SFCM USING PROBABILISTIC NEURAL NETWORK
Authors : K.Nithya,Ramya.U,Janani.S
Paper Id :IJCRCST-NCRTIC18-03
–Page No : 8-10

4.INTERNET VIDEO TRAFFIC CLASSIFICATION AND TRANSFER ACROSS DISTRIBUTED NETWORK IN VIDEO STREAMING
Authors : A. Sugashini,R.Swetha,G. Maheswari
Paper Id :IJCRCST-NCRTIC18-04
–Page No : 11-13

5.SECURE AND MEMORY EFFICIENT DE-DUPLICATION ON ENCRYPTED DATA IN CLOUD STORAGE
Authors : T.V.Ashwini,M.Jelinasree,R.Sridharshini,S.Ahamed Ali
Paper Id :IJCRCST-NCRTIC18-05
–Page No : 14-17

6.PRIVACY PRESERVATION SCHEME OF FACE IDENTIFICATION WITH MULTIPARTY ACCESS IN NET BANKING ENVIRONMENTS USING IOT
Authors : A . Rabik,A.Arun Pandi,S.Ajith Kumar,P. Arockia Mary
Paper Id :IJCRCST-NCRTIC18-06
–Page No : 18-21

7.DDOS BOTNET DETECTION AND IDENTIFICATION CHALLENGES AND STRATEGIES IN PEER TO PEER SYSTEMS
Authors : Prema A,Praveen S L,Vamsi Krishna AV,Dinesh Krishnan J
Paper Id :IJCRCST-NCRTIC18-07
–Page No : 22-24

8.CONTENT BASED DUPLICATION AVOIDANCE IN CLOUD USING CP-ABE
Authors : Devi K,Renuka Devi V,Ramyha V,Pandeeswari.R
Paper Id :IJCRCST-NCRTIC18-08
–Page No : 25-27

9.A SECURE ERASURE CODE-BASED CLOUD
Authors : S.Nivedhitha,Ruchi V Singh,K.Priyanka
Paper Id :IJCRCST-NCRTIC18-09
–Page No : 28-31

10.BRAIN DISEASE PREDICTION BY MACHINE LEARNING OVER BIGDATA FROM HEALTHCARE
Authors : Vijayan A,Athithiyan G,Anandaraj K
Paper Id :IJCRCST-NCRTIC18-10
–Page No : 32-35

11.IMPLEMENTATION OF SECURITY IN IOV USING QUERY BASED CAPTCHA
Authors : Dhanvarshinie R, Hamsini R,Varna K Kumar
Paper Id :IJCRCST-NCRTIC18-11
–Page No : 36-39

12.PROFICIENT PUBLIC SUBSTANTIATION OF DATA VERACITY FOR CLOUD STORAGE THROUGH DUAL PROTECTION
Authors : Prema A,R.Kavitha Priyadharshini,N S Durga,J Induja
Paper Id :IJCRCST-NCRTIC18-12
–Page No : 40-45

13.RESISTANCE ALIGNED WITH MAN IN THE MIDDLE ATTACK IN CLIENT SERVER SYSTEMS
Authors : Vijayan A,V.Kanagalakshmi,G. Pavittra,S.Monisha
Paper Id :IJCRCST-NCRTIC18-13
–Page No :46-51

14.EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
Authors : Vijayan A, Priyadarshini.S, Rubitha.S
Paper Id :IJCRCST-NCRTIC18-14
–Page No :52-55

15.A NOVEL MECHANISM TO PREVENT DDOS TCP SYN ATTACK USING PRE-SHARED KEY
Authors : Logeswari.M, Varsha.C, Shruthi Kalyani.SP, Gowri.V
Paper Id :IJCRCST-NCRTIC18-15
–Page No :56-58

16.TRAFFIC SIGN DETECTION AND RECOGNITION USING FUZZY SEGMENTATION APPROACH
Authors : Lavanya.S, Padma.K,Mythili.M,Visu.P
Paper Id :IJCRCST-NCRTIC18-16
–Page No :59-62

17.BATCH VERIFYING TECHNIQUE TO EXTRACT IMAGE FEATURES BASED ON CO-OCCURRENCE MATRIX IN CLOUD
Authors : Sharon Jennifer E, Jenishiya Hannah. N, Abimathi A,R. Ramya Devi
Paper Id :IJCRCST-NCRTIC18-17
–Page No : 63-66

18.DISCOVER OF MALICIOUS CONTENT AND TEXT IN SOCIAL MEDIA
Authors : V Subbulakshmi, Ujjwal Anand,Rajesh kannan T,Rajesh N
Paper Id :IJCRCST-NCRTIC18-18
–Page No : 67-70

19.PORTABLE SENSORS FOR MONITORING PERSONAL EXPOSURE TO AIR POLLUTION USING IOT
Authors : L.Hemalatha, L.Mirakanthan,J.Rajalakshmi
Paper Id :IJCRCST-NCRTIC18-19
–Page No : 71-74

20.BIOMETRIC BASED AUTOMATIC TICKET CHECKING
Authors : M.Ranjini M Arban, R.Vijayarani,V.Mythreyi
Paper Id :IJCRCST-NCRTIC18-20
–Page No : 75-76

21.SECURE FILE SHARING AND ACCESS IN CLOUD USING AES AND RSA
Authors : K.Sundar,S.Faizur Rahuman,R.Depak kumar,M.Vinoth
Paper Id :IJCRCST-NCRTIC18-21
–Page No : 77-80

22.AUTO DETECTION OF CIPHER TEXT AND MODIFIED AES ALGORITHM
Authors : S.Nirmal kumar,R. Dinesh
Paper Id :IJCRCST-NCRTIC18-22
–Page No : 81-84

Copyright © 2025 IJCRCST -International Journal of Contemporary Research in Computer Science and Technology.