National Conference on Computing and Communication Technologies (NCCCT'18), Jamal Mohamed College (JMC) Tiruchirappalli, India
S.No. |
Title of Paper |
Page No. |
1. |
Security Issues in Cloud Computing Environment: A Review Author: R. Kanimozhi1 |
1-5 |
2. |
A Study on Job Scheduling Algorithms in Cloud Computing Author: P. Nandhini |
6-11 |
3. |
Authors: Durairaj. M, Nandhakumar Ramasamy |
12-16 |
4. |
A Survey on Fault Tolerant Energy Efficient Algorithms in Cloud Computing Authors:J. Diana Vency, Khairunnisa |
17-23 |
5. |
Performance Analysis of ID3 and C4.5 Algorithms using Paper Review Data Authors: J. Hajiram Beevi, B. Sumaiya Parveen |
24-29 |
6. |
A Survey on Insight of Big Data Authors: S. Josephine Theresa, Dr. D.J. Evangaline |
30-36 |
7. |
A Study on Symmetric key Ciphers in Cryptography and Network Security Authors: A. Amutha, H. Krishnaveni |
37-40 |
8. |
A Survey on Job Scheduling Technique in Cloud Computing Authors: S. Vaaheetha Kfatheen, R. Nisha, S. Sartaj Begum |
41-45 |
9. |
PUA: Power Utilization Algorithm Using IOT Authors: M. Kamal, G. Ramya |
46-48 |
10. |
A Study on Scheduling Algorithms in Cloud Environment Authors: S. Vaaheedha Kfatheen, S. Priyadharsini |
49-53 |
11. |
A Survey on Internet of Things Authors: S. Vaaheedha kfatheen, R. Jayalakshmi, K. Priya Dharshini |
54-59 |
12. |
Load Balancing Techniques in Cloud Computing: A Review Authors: S. Vaaheedah Kfatheen, J. Fathima Fouzia |
60-63 |
13. |
A Task Scheduling Algorithms in Cloud Computing Environment: A Review Authors : O.S. Abdul Qadir, Dr. G. Ravi, S. Shrinidhi |
64-69 |
14. |
A Study on Various Technique Used In Sentimental Analysis Authors : Dr. A. R. Mohamed Shanavas, R.Pavithra |
70-75 |
15. |
Sentiment Analysis on Facebook Posts using Emoticons Analysis Authors : M. Devishree, Dr. A. R. Mohamed Shanavas |
76-82 |
16. |
Sentimental Analysis:Voice Based Driven Review Analysis Authors : N. Ramya, S. Abdul Saleem |
83-87 |
17. |
Data Mining Techniques for Surveillance Video – A Survey Authors : Dr. M. Parveen, R. Dharani |
88-92 |
18. |
Techniques of Educational Data Mining: A Survey Authors : Dr. M. Parveen, S. Aiswarya Lakshmi |
93-99 |
19. |
Load Balancing in Grid Computing Environment: A Review Authors : S. Vaaheedha Kfatheen, K. Sultana |
100-103 |
20. |
Survey on Vague Set theory for Decision Making in Various Applications Authors : M. Durairaj, T. S. Poornappriya |
104-107 |
21. |
A Review on EEG Emotion Recognition Authors : M. Durairaj, Jansi Rani R |
108-112 |
22. |
Cost Effective Disaster Finding using Supervised Learning Methods on Hadoop (Suspended) Authors : V. Sobanadevi, Dr. G. Ravi |
113-119 |
23. |
Address Configuring Mechanisms in IPv4/v6 MANET - A Pragmatic Survey Authors : S. Manimozhi, M.Chandrakumar Peter, J. Gnana Jayanthi |
120-124 |
24. |
Authors : Dr. K. Mohan Kumar, B. Srinivasan |
125-128 |
25. |
A Weightless Attack Detection System for Internet of Things Authors : Z. Harith Ahamed, A. Abdul Samathu |
129-134 |
26. |
A Study on Clustering Techniques in Data Mining Authors : Dr. K.N. Abdul Kader Nihal |
135-138 |
27. |
An Experimental Study on Performance Evaluation of K Star Algorithm Using Diverse Datasets Authors : M. Ibramsha, K. Nafees Ahmed |
139-145 |
28. |
Forecasting of Student Performance using Data Mining Techniques Authors : Dr. M. Mohamed Surputheen, S. Peerbasha |
146-152 |
29. |
Text Classification Approach using Machine Learning and Rule-Based Automated Learning Authors : M. Durairaj, A. Alagu Karthikeyan |
153-158 |
30. |
A Review on Mobile Cloud Computing Authors: S. Vaaheedha kfatheen, S. Hani nasreen, A. Parveen sulthana |
159-164 |
31. |
A Comparative Study on Big Data Frameworks Authors: Dr. K. Mohan Kumar, D. Maghesh Kumar |
165-169 |
32. |
A Study on Task Scheduling Types in Cloud Computing Authors: O. S. Abdul Qadir, Dr. G. Ravi, S. Kalaiarasi |
170-176 |
33. |
Smart Home Automation System Based On IoT Through Fingerprint Recognition Authors : S. Vaaheedha Kfatheen, S. Shapna Begum |
177-180 |