![](/images/new.gif)
S.No |
Title/Author Name |
Paper ID |
61 |
Mitigation Of Pue Attack Using Pso In Wireless Cognitive Radio Networks
| ICASCT18-61 |
62 |
IoT Based Incessant Surveillance System
| ICASCT18-62 |
63 |
Human Aspect Profile Analysis For Privacy Preserving
| ICASCT18-63 |
64 |
Mining Probabilistically Frequent Sequential Patterns In Large Uncertain Database
| ICASCT18-64 |
65 |
Design Of Iot Node For Smart Cities
| ICASCT18-65 |
66 |
Automated Irrigation System Using Iot
| ICASCT18-66 |
67 |
Workload Consolidation For Cloud Data Centerswith Guaranteed Qos Using Request Reneging
| ICASCT18-67 |
68 |
Poisoning Network Visibility On Software Defined Network Using Topology Algorithm
| ICASCT18-68 |
69 |
Secure Enabled Region Based Data Sharing In Manet
| ICASCT18-69 |
70 |
A survey on Secure Data Access Control in E-HealthCare Monitoring System
| ICASCT18-70 |
71 |
Systematic Clustering Approach For Road Side Networks
| ICASCT18-71 |
72 |
Search and malware detection in Google play
| ICASCT18-72 |
73 |
A Smart Attendance Automation And Monitoring System Using Enhanced Facial Recognition Techniques
| ICASCT18-73 |
74 |
| ICASCT18-74 |
75 |
Automatic Fall Detection By Sensing Tiles
| ICASCT18-75 |
76 |
A New Displaying Technology For Information Hiding Using Temporally Brightness Modulated Pattern
| ICASCT18-76 |
77 |
Efficient BWT and SVM Based Multilevel Image Segmentation for Brain Tumor Detection in MRImages
| ICASCT18-77 |
78 |
Optimization On Stream Delivery Based On Region Of Interest
| ICASCT18-78 |
79 |
Image Seclusion Trespassing In Osn Using Watermarking Techniques
| ICASCT18-79 |
80 |
A Survey on Secure Medical Care Authentication in Cloud
| ICASCT18-80 |
81 |
Brain Computer Interface based Automatic Wheelchair System using IOT
| ICASCT18-81 |
82 |
Vehicle Monitoring System In Smart Cities
| ICASCT18-82 |
83 |
A Technique For Detection Of Data Leakage In Social Environment
| ICASCT18-83 |
84 |
Automatic Car Parking System Using Iot
| ICASCT18-84 |