ICTER-2019 - Part 2
Research Article |
Detect Fake Identities Using Machine Learning
Ms.K.Nagalakshmi , Ms.P.Nanthini , Ms.A.Saranya , Mrs.B.Revathi
Research Article |
Comparative Text Based Emotion Recognition Using Artificial Neural Network
M.Vinodhini , M.Sangavi , Mr.J.Stalin
Research Article |
Evidence Based Treatment To Reduce Medical Prescribing Errors
Sinkaravel.S , Palraj.S , Muthu Mani.M
Research Article |
Contrivance Multiple Images By Visible Obscure Techniques
I.Muthu Meenatchi , P.Bavithra, S.Sangeetha , D.Soundarya
Research Article |
A Novel SHM Approach for Bridge Monitoring and Alert Generation System Using IOT
R.Nandhini., A.Amirtha, M.Pavithra, N.lakshmi priya,A.N.Sivadharshini
Research Article |
Dos attack identifying in intrusion detection system using WinPcap
Mr.Naveen Kumar.T , Surya.G , Muthu Irulan.P , Karthick.P , Rama Priya.M
Research Article |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
Sivasakthi.C , Nantha kumar.K ,Ajith.S , Karpagam.M
Research Article |
Cued Click-Points of a Knowledge Based Authentication Mechanism
Ms.M.Karthigaiselvi , Ms.M.Manochithra , Ms.S.Sivasankari , Mr.A.AnnaArasu
Research Article |
New Approach from K-Nearest Neighbor Data Classification
Ms.P.Anushya , Ms.P.Jothilakshimi , Ms.S.Pavithra , Mrs.B.Revathi
Research Article |
An Effective Power and Performance Control in Translucent Network with GMPLS Control Plane
A.Abitha, A.Jothi, T.Nagajothi, M.Sudha, R.Padmanaban
Research Article |
Blockchain-Based Decentralised Storage Architecture for Secure the Data-Sharing Protocol using Meta-Key
Mr.Alagupandi.D , Mr.Surya.K.K , Mr.Santhana Krishnan.S , Mr.Senthil Srinivasan.S , Miss.Muthu Meenatchi.I
Research Article |
Web Cam Based Moving Object Detection
Mrs.M.Karpagam , Ms.P.Babychitra , Ms.R.Loheswari , Mrs.K.Swathi
Research Article |
Monitoring Health Care System using Internet of Things
P. Nandhini , C. Malar , K. Kalaivanan , Mr. T. Vignesh