📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to Archives

International Conference on Innovative Trends in Computer Science and Applications

ICITCSA 2017
📅 Date: 6th January 2017
🏫 Organized by: Pioneer College of Arts and Science, Coimbatore
📚 Department: Department of CSE

A Survey on Automated Classification Techniques in Data Mining for Brain Tumor Analysis

T. Vishnusaranya, A. Sathish

|PDF

Bayesian Network Based Classification of Optical Coherence Tomography Images for Diagnosis of Glaucoma using Discrete Wavelet Transform Compression

Dr.V. Kathiresan, S. Nithya

|PDF

Implementation of Rail Fence & Position Analyze Technique for More Secure Data

N. Sivakumar, V. Navamani, V. Yuvaraj

|PDF

An Overview: Basic Concept of Network Simulation Tools

Mrs. C. Gayathri, Dr. R. Vadivel

|PDF

Online Optical Character Recognition (OCR) Tools – Performance Analysis

Dr. S. Vijayarani, Ms. A. Sakila

|PDF

Object Oriented Approach for Analysis of Software Fault Prediction using K-Jensen Shannon Entropy Model based Clustering Algorithm

M. Praneesh, K. Mahalakshmi

|PDF

A Study on Ransomware Cryptowall

V. Archana, S. Vinothini

|PDF

A Review on Classification of Eye Movement using Electrooculography

Dr. S. Ramkumar, Mr. Barathkesavan, Mr. Hariharasubramanian

|PDF

Android Application for Student – Faculty Interaction

Dr. K. Sumathi, V. Pitchai Kani, M. Rajapriya

|PDF

Mobile Application for Student Information System

Dr. K. Sumathi, M. Umarani, P. Abinaya

|PDF

Intelligent Tutoring System for Teaching Java

R. Sivarasan, Dr. G.P. Ramesh Kumar

|PDF

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

N. Sowmiya, S.Sampath

|PDF

Mathematical Approach for Fourier-Finite Mellin Transform using Adjoint Operators for Secure Medical Image Steganography based on QR-Codes

Dr. D. Napoleon, M. Praneesh

|PDF

Recent Routing Protocols in Mobile AdHoc Network (MANET)

Mr. C. Rangarajan, Mrs. S. Sridevikarumari, Ms. V. Sujitha

|PDF

A Detail Study on Big Data Analytics

Mrs. R. Anusuya, Ms. R Vinothini

|PDF

Li-Fi Technology in Wireless Communication

Mr. C. Rangarajan, Ms. D. Devi

|PDF

Study of Image Fusion on Satellite Images

Sudha.V, Priya .R

|PDF

A New QPSO Based Network Intrusion Detection System using Feature Selection

V. Attchara, K. Sujitha, S. Sayina

|PDF

Honeypot in Code Injection Attacks

V. Attchara, M. Nithya, R. Epsi

|PDF

A Comparative Study on Data Mining Algorithm for Gene Cancer Analysis

M. Sofia, S. Diviya

|PDF

Cloud Computing Security in IAAS

Dr. N. Balakumar, K. Zuvairiya, R. Kausalya

|PDF

Mobile Phone Cloning

Dr. S. Kirshnaveni, M. Kanagapriya, K. Zuvairiya

|PDF

Cloud OS and Security Protocols

Mr. S. Gopalakrishnan, Ms. V. Sujitha

|PDF

Security and Privacy in Big Data

T. Shanmuga Vadivu, D. Saranya, S. Karthika

|PDF

A Comparative Study of Genetic Algorithm with the KNN Evolutionary Optimization Algorithm in Data Mining

Dr. M. Subha

|PDF

Secure Image using Steganography

G. Saranya, N. Pravaeena

|PDF

The Private Key Capacity of a Cooperative Pairwise-Independent Network (PIN)

S.Gopalakrishnan, D.Suganya, S.Vennila

|PDF

Quality Assurance for Business Needs using Software Testing Concepts

R. Jaya Kumar, A. Senthil Kumar

|PDF

Heterogeneous Cloud Radio Access Networks Based on New Perspective for Enhancing Spectral and Energy Efficiencies

S. Roja, M. Indira

|PDF

An Overview of Data Warehousing and OLAP Technology

B. Prabadevi, P. Aswini

|PDF

Getting IoT Ready: From Connected Things to Living in the Data

Jacob Thomas

|PDF

Information Technology Drives Innovation: A Path to Success in Business and in Higher Education

Dr. Indhu Gopal

|PDF

An Effective Fuzzy Set Theory with Neural Networks for using Feature Selection and Classification

Dr. N. Balakumar, A. Vaishnavi

|PDF

A Survey of Characteristics and Emerging Technologies in Big Data

Dr. S. Krishnaveni, R. Divya, V. Attchara

|PDF

A Survey of Characteristics and Emerging Technologies in Big Data

R. Anusuya, B. Prabadevi, R. Divya

|PDF

Big Data: Why? What? How?

K. Soniya

|PDF

A Comparative Study on Healthcare System using Data Mining Prediction Techniques

R. Kalaivani, S. Subhasini

|PDF

Survey on Thyroid Diagnosis using Data Mining Techniques

S. Sathya Priya, Dr. D. Anitha

|PDF

Logistic Regression: A Novel Approach to Implement in Business Intelligence

D. Kalaivani, Dr. T. Arunkumar

|PDF

Blue Eye Technology

N.Santhiya, E.Maheswari

|PDF

Simulators and Emulators used for Wireless Sensor Network

Dr. V. Vasanthi

|PDF

Mobile Banking and its Security

Dr. S. Krishnaveni, N. Sathyadevi

|PDF

A Knowledge Based Post Mining Techniques in Large Databases through Interactive Post Processing of Association Rules using Ontologies

A. Vaishnavi, M. Hemalatha

|PDF

Performance Tuning with Different Kernel Function Hyperplane Analysis for Optimal Recognition Rate

P. Rukmanidevi, V. Kalaivani

|PDF

Effective Global Sensor Deployment for Coverage Problem in WSN using Ant Colony Optimization

T.B. Saranya Preetha, V. Sowmiya, K. Yamuna devi

|PDF

Estimation of Claim Severity in Non-Life Insurance: A Non-Parametric Approach

K.M. Sakthivel, C.S. Rajitha

|PDF

Horizontal Aggregation Function Using Multi Class Clustering (MCC) and Weighted (PCA)

Dr. K. Sathesh Kumar, P. Sabiya, S.Deepika

|PDF

Secured Transcode Enabled Layer 7 Proxy Handoff in Mobile Networks

Anantha Prabha.P, Immaculate Jennifer J, Haripreethi G, Harshini P, Gokulraj S, Gowtham R

|PDF

Survey of Pros and Cons of Mobile Apps

S. Srividhya, A. Cynthia, J. Brindha

|PDF

Well-Ordered Workflow Preparation for Beneficial Multi Cloud Surroundings

N. Chithra, R. Saranya

|PDF

5G Mobile and Wireless Networks

R. Suganya, G. Sowmiya, B. Maheswari

|PDF

Cloud Computing Security Issues

K. Vasanthi, U. Vanitha

|PDF

Automatic 2D-to-3D Image Conversion-A Study

M. Sofia, R. Sabarinathan, Shivashankar

|PDF

Mean Weighted Artificial Bee Colony (MWABC) based Feature Selection for Gene Co-Expression using Microarray Data

M. Sofia, Dr. N. Tajunisha

|PDF

An Efficient Accumulative Constraint Based Leader Ant Clustering

S. Sridevikarumari

|PDF

A State of Art Review on Current Researches in Moblie Adhoc Networks

G. Deepalakshmi, R. Saradha, G. Santhiya

|PDF

A Review on Security Issues in Wireless Sensor Networks using Bio-inspired Computing

R. Kanagaraj, P.S. Shinu, K. Pavithra

|PDF

A Review on Wireless Sensor Network Routing Algorithm using Bio-inspired Computing

D. Antony Arul Raj, V. Keerthana, R. Roshini

|PDF

Study on Machine Learning Techniques using SVM

M. Selvanayaki, T.S. Anushya Devi

|PDF