List of Accepted Papers for Oral Presentation
<Paper_ID - Authors, Title>
2 - Gautam J, Anitha Sri S, Kasi Nivetha M and Madasamy P, Mitigation of Denial of Service attack using ICMP based IP Traceback
4 - Sumathi M and Dr.Sangeetha S, Survey on Handling Big Data – Challenges and Solutions
5 - Jayendra Bharati Venkataraman and Srikanth Ramasamy, Factors Influencing M-Learning – A Review of Literature
7 - Meenatchi V.T and Nivetha D, Document Oriented Datastores A Survey
8 - Padmavathi S and Sruthi Sivakumar, Private Cloud Services for Healthcare analytics Using Hybrid Classifiers
9 - Suganya P and Karthija T, Location Tracking Of Bus Using Mobile Application
11 - Singaravelan Shanmugasundaram, Gopalsamy Pathalaveeran, Dhanushkodi Murugan and Arun Shunmugam D, An Effective Segmentation of Real Time Traffic Alerts by Improving NLP Stickiness Scores
12 - Singaravelan Shanmugasundaram, Jerina Catherine Joy S and Murugan Dhanushkodi, An Inner Interruption Discovery and Defense System by using Data Mining
13 - Vignaraj Ananth, Srinivasan S, Shiva Kumar and Pavithra Ravi, Judgement Based Effort Estimation for Software Management: A Survey
16 - Riya Sharma and Raghav Sharma, Finger print based ATM
17 - Sagaya Priya Asokan and Britto Ramesh Kumar S, A Survey on Big Data Security
18 - Kalaivani Karuppiah and Uma Maheswari Natarajan, Prediction of Ischemic Heart Disease Using Big Data Analytics
19 - Kanagasabapathy N, Konjeti Gowtham, Eswaran N and Ambeth Kumar V.D, Smart Authentication System with Screen Brightness as a weapon in Smartphones
21 - Karthikeyan D, Thyagarajan C, Ambeth Kumar V.D and Harish G, A Survey of RDF Storage approaches in different Environment
22 - Sabarinathan Kulasekaran, Abinandhan M, Ambeth Kumar and Gunasekaran K, Machine Maintenance using Augmented Reality
23 - Ajith Tk, Naren Babu R, Abhishek Kr, Ambeth Kumar Vd and Thiyagarajan C, Prevention of Sureptitious Denial of Service in OpenStack
24 - Thangavel M, Mahalingam M and Sanjay S, Smart and Secure Home using Internet of Things
25 - Athiyaman P, Nirmalkumar Senthil Kumar and Sujith Kumar T, A Robust Graphical Authentication for wise Banking services
26 - Rahul Francis K, Manikandan A, Mothilal T, Ambethkumar V.D and Mahendran M, Three Step Authentication in ATM machine with Voting Application
27 - Veeraswamy Ammisetty, Empirical Approach for Classification of High Dimensional Data Using: Filtration Attribute Evaluation Feature Selection Method of Data mining
29 - Santhosh V, Swaminathan M, Javaji Ashok, Ambeth Kumar Vd and Rajendran M, Enshrouding of PIN from Snooping using Steganopin and BW Method
30 - Arunganessh K, Ultrasound Renal Image Segmentation Techniques: A Survey
31 - Gokul S M, Sathishkumar M, Ambeth Kumar V D and Thiyagarajan C, Dynamic Geological Meeting Recommendation on location based Services with User Interest
32 - Kavitha Gopinath, Tracking of an Epidemic using Cloud computing
33 - Kavitha Gopinath, Ignis Warrior
34 - Aishwarya R, Azma A, Mangala Ishwarya A and Suganya R, A Survey on Comparison of Traditional Data Mining Algorithms for the Application of Big Data
36 - Sudha M R and Sornam M, A Mobile Cloud Computing with an Energy Efficiency Improvement
38 - Chidralega J and Shanmugapriya E, Access Control Mechanisms in Cloud – A comparative study
39 - Priyanka M R, Samira Basima B and Akilandeswari V, Statistical Approach for Privacy Preservation in Wireless Medical Sensor Network
40 - P. Subha Rani, Efficient retrieval and composition of web services using multilevel indexing
41 – Parkavi R, Simulator for Teaching Computer Organization:EDUMIPS
42 - Ms. Yashaswini Joshi, Dr. Shashikumar Totad, Dr. Geeta R B and Dr. Pvgd Prasad Reddy, Mobile Agent based Frequent Pattern Mining for Databases Distributed
43 - M. Manikandakumar and P. Karthikeyan, Needs of Agricultural IoT in India: A Review
46 - Anitha J, Nithya P and Pethalakshmi A, A Review on Diagnosing Diabetes using Data Mining Techniques
47 - Supriya Belkar and Vidya Handur, Comparative Study of Static Load Balancing Algorithms in Distributed System Using CloudSim Framework
48 - Uma K V, Haseena Banu S, Krishnapriya E and Ramya K.S, A Survey on Various Entropies Used in Classification algorithms
50 - Jebas Sinthiya and Sanjeeve Kumar, Neural Networks Classification for Privacy Preserving Patient-Centric Clinical Decision Support System
51 - Jennifer Julius and K.M.M Rajashekharaiah, Mining and Polarity prediction of product reviews
52 - Alagappan V, Reduct via Relative Reduct Algorithm
53 - Sarathkumar Rangarajan, Ravindra Krishna Chandar Venkatachalapathy and Thangamani M, Survey on Big Data lake for personalized Healthcare Recommendations
54 - Kalaivani R and E Shanmuga Priya, Survey on Big Data for analysis the user Mobility in Huge Area Network
56 - Shanmuga Priya E and Kavitha R, Big Data security and Privacy – A look back
57 - Amit Mittal and Anmol Kaushik, Smart City Implementation using IOT technology
58 - Suprita Patil, Vijayalashmi M and Rakesh Tapaskar, Solar Energy Monitoring System using IoT
59 - Archana M, Anusowbarani R, Aravind Kumar M, Dineshkumar S and Mrs.Raja Lavanya, Prepaid energy meter using Arduino and GSM
60 - Balaji Kannan, Arpit Kumar, Gowtham Sankar and Ramya R, Suspending Idle PCs in a network
61 - Ambeth Kumar, Gokul G, Praveen Samuel J and Lokesh Kumar S, Modern Medical Innovation on the preferred information about the Medicine
62 - Nirmal Raj, Karthik Kumar and Dinesh Lal, Project Spartan OS
63 - Rubhini Shree, Dharanya Parthiban and Aishwarya Ganes, Real Time Commodity Price Prediction
64 - Rajalavanya Chakkaravarthy, Aishwarya Rajasekar, Malarvizhi Kandasamy and Muthu Subramanian, Survey on Security in Internet of Things
65 - Sheela Selvakumari and Radha V, A Voice Activity Detector using SVM and Naïve Bayes Classification Algorithm
66 – E Shanmuga Priya and T Shunmuga Priya, Intelligent Voice Call and SMS Self services using HMM
67 - Sriram M and Ragul R, Smart Energy Management and Analytics
68 - Dr. S.Abirami S.Selvam and Mrs. S.Umarani Santhosh, Mobile Cloud model for Clinical Laboratory
69 - Karpagam T, Kanageswari V and Rajathi S, Analysis of K-Means Clustering with seed selection algorithm
70 - Sabeetha K, Alamelu N and Abirami A.K.C, A Time-dependent approach for secured data sharing in the Cloud
71 - Abirami A.M and Gayathri V, Recommendation System using Feature Based Sentiment Analysis
72 - Arunfera M and Sanmugapriya M, A survey of scheduling using Genetic Algorithm in Cloud Environment
73 - Sheik Abdullah A, Gayathri N and Selvakumar S, Determination of the Risk of Heart Disease using Neural Network Classifier
74 - Arun Fera M and Narmadha N, A review on Trust Mechnaisms in Cloud environment
75 - Sumathi M and Vijayaraj N, Privacy Score based sensitive data protection and storage cost optimization in Cloud based online banking system
76 - Shivashankari R.A, Revathi R.R and Abirami A.M, Ontology based Feature extraction and Document Categorization for Textual Data
77 - P. Varalakshmi, M.Thangavel, R.Sindhuja, S.Kavi Priya, S.Radha, R.Hasika, K.N.Meenakshi , Smart and Secure e-Healthcare for Diabetes- A Personnel Healthcare Assistantship
78 - S.Muthuramalingam, M.Thangavel, C.Abinaya, A Survey on Image Steganography and Steganalysis