Sl. No. | Paper Title | Authors | Download Paper |
1 | Survey on Deep Learning Analysis Of Spectrophotometric Data | Sreenidhi Raghavan, B. Srinidhi, R. Swetha, V. Sundari | Download Paper |
2 | DIALOGUE ACT RECOGNITION FOR CONVERSATIONAL BOTS USING POS-TRIPLET FEATURES | SaiTeja.D, Harish.M, Abhishek Nair.M, G.Indra | Download Paper |
3 | POWER QUALITY IMPROVEMENT OF RES/HESS INTEGRATIONTO MICROGRID USING FOUR LEG THREE LEVEL NPC INVERTER AND SECOND ORDER SLIDING MODE CONTROL | CHAITANYA DANAMARAJU, Dr. S. SUMATHI | Download Paper |
4 | NON LINEAR INVESTIGATION ON DWDM SYSTEM DESIGN | M.Priyadharshini, R.Siddharthan | Download Paper |
5 | PERFORMING TRAJECTORY SEARCH QUERY USING POINT OF INTEREST | C.LOKESH KUMAR, JEEVA.K | Download Paper |
6 | Wireless Sensor Network (WSN) based weather monitoring in flood disaster management by using IOT | Nithya Priya A.P, Vanamala C.K | Download Paper |
7 | ANDROID BASED SYSTEM FOR CAMERA BASED ATTACKS | Nagendra K M, SanjeevNaik L, Hemanth Kumar G, Dhruva Kumar H, B.S Jayasri | Download Paper |
8 | Automatic Student Attendance Management System Using Facial Recognition | Sathyanarayana N, Ramya M R, Ruchitha C, Shwetha H S | Download Paper |
9 | Effective Recognition of Different Accents of Kannada Using KNN | Mohan Kumar K, Dr.S.R.Swamy | Download Paper |
10 | BIDIRECTIONAL CONTROL OF HYBRID AC/DC MICROGRID INVOLVING ENERGY STORAGE, RENEWABLE ENERGY AND PULSED LOADS | BHAGYASHREE, SHARMILA N | Download Paper |
11 | DESIGN AND SIMULATION OF TRANSISTOR CLAMPED H-BRIDGE BASED CASCADED MULTILEVEL INVERTER USING MCPWM TECHNIQUE | SINDHOOJA H P, BALAJI CHAKRAVARTHY P | Download Paper |
12 | IMMUNITY TOWARDS DATA INJECTION ATTACK AND DETECTION IN WEB APPS | T. M. Padmapriya, P. Sivagama Sundari | Download Paper |
13 | A SOLUTION FOR FAKE WEBSITE DETECTION AND DOS PREVENTION | R. Iswarya, B. Prakash | Download Paper |
14 | MiRNA & TRANSCRIPTION FACTOR ON GENOMIC DATA USING CROSS ONTOLOGY | Dr.C.Dhaya, V.Pooja | Download Paper |
15 | OPTIMAL LINEAR CYBER – ATTACK ON WEB APPLICATION AND MITM ATTACK | P.Priya, P. Sivakamasundari | Download Paper |
16 | SECURITY AND MAINTENANCE IN INTERCLOUD ENVIRONMENT FOR MULTICLOUD DATA INTENSIVE APPLICATION | J.Lavanya, B.Rajmohan | Download Paper |
17 | Energy Efficient Analysis of Ad hoc Cognitive Radio Network | Nida Ambreen | Download Paper |
18 | POWER ALLOCATION POLICY FOR COGNITIVE RADIO NETWORKS WITH MULTIPLE RELAYS | ASMA BANU | Download Paper |
19 | SPECTRUM SENSING MOBILE DATA COLLECTION IN DIFFUSION ADAPTATION WITH COGNITIVE RADIO | SHEELA RAIN, U.NILABER NISHA, DR.A.MAHABUB BASHA | Download Paper |
20 | Prediction and Frequent Pattern in Data Mining with Brain Dominance | Dr.K.Venkatasalam | Download Paper |
21 | ADVANCED SMART HOME SECURITY ALERT SYSTEM | Shakthi Murugan.K.H., K.Sumathi, V.Mano, I.Mohamed Elias, S.Mohan Raj | Download Paper |
22 | Computer Vision based Defect Detection Algorithm for Tube-type Bottle | Jacintha .V, S.Gnanaprakash, Krushna Raj.E, B.Lakshmana Prabhu , Kribakaran.V | Download Paper |
23 | Design and Extraction of Traffic Sign from Dynamic Image | Navarajan.J, Pooja Satish, Irene Sylvia.I, Lakshmi Priya.V | Download Paper |
24 | BAGGAGE TRACING USING IOT IN AIRPORTS | R.Prathipa, R.Akash, K.Balaji, V.Dharanesh | Download Paper |
25 | Frequency Reconfigurable Antenna for Wi-Fi/Wi-Max Applications | Dr. D. Selvaraj, Harsha T, Tharun kv, Maheedhar j , Nikhli D | Download Paper |