NCSACT - Part 2



Title/Author Name

Security of Honey pots Computing
- S.Jancy Shylah, Dr.T.Geetha
Insider Collusion Distinguish Using Intrusion Detection Techniques
- MALATHI, Ms. M. MALATHI
A Survey On: De-Duplication With Security On Various Technologies
- K.Uma, Mr.E.Jayabalan
Collaborative-Frequent Itemset Mining of Big Data Using Mapreduce Framework
- A.PADMAPRIYA, R. VENKATACHALAM
Image Classification Using Convolutional Neural Network
- S. Adityajayaramarajan, S. Harinee Vibishikaa, Dr.K.C. Rajeswari
A Survey on Enhancement Cloud Portability with Basic Utility
- Mr.S. Ananth, Mrs.K.Radha, Miss.S. Sowndarya, Miss.M. Shyamala
Smart Shopping System By Using Li-Fi Technology In Supermarkets
- K. Santhoshkumar, R. Sudha, M. Umamaheswari
Virtual Machine Consolidation for Data Center with SLA and Energy Efficiency in Cloud Computing
- S.R JeyaPraveena, Dr.P.Keerthika, Dr.P.Suresh
A SURVEY ON IMPROVED ENERGY EFFICIENT VM ALLOCATION ALGORITHMS IN CLOUD COMPUTING
- T. THILAGAM, M. MALATHI
SURVEY ON GATEWAY SELECTION TECHNIQUES IN WIRELESS AD HOC NETWORK
- S. Usha, S.Sathish
Tracing Neli Kolam Patterns
- Haribalaji, Deepa, Ramya
CLOUD COMPUTING REPERCUSSION ON SCANNER DEVELOPMENT
- K.ABINAYA, AARTHI
OPTIMIZATION ROUTING ALGORITHMS FOR MOBILE AD HOC NETWORK
- S.Vasanthakumari, S.Sathish
IMAGE ACQUISITION OF WEED AND SPRAYING HERBICIDE BY USING ARDUINO
- C.Hari prabha, G.Hemalatha, T.Kanagamani, K.Kaviya
A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS
- M Jansirani, R Venkatachalam