3rd National Conference on Recent Advances in Computer Science and Engineering January 27th - 28th 2018 Chalapathi Institute of Engineering and Technology, Lam, Guntur, Andhra Pradesh. |
||
S.No. | Title of Paper | Page No. |
1. | A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia Authors: P V V S Eswar Rao and K. Narendra Kumar |
01-03 |
2. | An Analysis to Improve Branch Authors: Dr Subba Rao |
04-07 |
3. | An Experimental Construction for Distributed Image Processing Using Hadoop Authors: N Jagajeevan, P. Subba Rao, G Sreenivasulu and Y.Prakash Rao |
08-14 |
4. | Cryptography Technique for Secure Data Contribution in Context of Cloud Computing Authors: N Junnu Babu, V. Naveen Kumar and P.Srinivasa Rao |
15-18 |
5. | Information Retrieval Area Using Scalable Graph-based Ranking Model for Content-based System Authors: B.Veerendra |
19-23 |
6. | Job through Social Network Authors: P Ashok |
24-27 |
7. | Android Crime Reporter and Missing Person Finder Authors: R Mani Deepika, B Tarun Tej, V Alekhya and Ch Avinash |
28-31 |
8. | Enhanced Platform for Consistent Work Assistance Authors: Dr.K.Kiran Kumar, V.Rajakumari, M.Siva Karthik, G.Lakshmi Durga and T.Varshith |
32-34 |
9. | A Data Mining Approach Using Incognito Techniques with Keyword Search on Authors: E.Ramesh, Dr.B.Tarakeswara Rao and M.Srikanth |
35-39 |
10. | Identify Location Based Collective Interactions in Dynamic Social Networks Authors: M Sravan Kumar Babu and S V N Vamsidhar |
40-45 |
11. | An Inquisition Approach to Diabetes Diagnosis Authors: D V V Brahamchari and M.Rithvik |
46-50 |
12. | Distributed Knowledge Management Analysis Authors: S.Phani Kumar and K.Narendra Kumar |
51-56 |
13. | Efficient Security and Data Distribute in Cloud Using RSA Algorithm Authors: K.Ravi Chand and Sivanarayana Nerella |
57-62 |
14. | Un-Penetrable Data Relegation Node Using Cryptology Authors: Kiran Kumar K, Ramesh Babu K and B.Gopi Krishna |
63-66 |
15. | A Software Re-process in Small Scale Production Authors: M Markandeyulu, B.Nageswari and M.Koteswara Rao |
67-69 |
16. | Big Data Processing Techniques for Elimination of Hazards in Medical Cyber-Physical Systems Authors: B.Umamaheswara Rao and P.Seetharamaiah |
70-84 |
17. | Segmentation of Tumor on Mammogram Image Authors: G.Ramachandra Rao, Ch.Viajyanand Ratnam and Ch.Veera Babu |
85-88 |
18. | Visual Cryptography Schemes for Sharing of Single and Multiple Secret Images Authors: Jeevan Ratnakar K, Jetty Sudeepthi and M Ratna Raju |
89-95 |
19. | AngularJS : The Framework for Dynamic and Interactive Front-end web Application Authors: Rakesh Kumar M and Dr.Nikhil G |
96-101 |
20. | R Language : The Art Of Authors: Sachin Manohar Pangare and Dr.M.Vinaya Babu |
102-104 |
21 | Some Studies on Big Data Analytics with Machine Learning Authors: S.Krishna Reddy, P.Lakshmikanth and B.Ramakrishna |
105-110 |
22 | Some Studies on Clustering large datasets with K-means customized inter and Authors: Y.Naga Sai Kumari and Dr.B.Tarakeswara Rao |
111-115 |
23 | Big Data task Scheduling using Swarm Intelligence in Cloud Computing Authors: Sindhe Phani Kumar, Sreenivasulu B and B. Srikanth |
116-125 |
24 | Load Balanced Partitioning of Data Space in Cloud Computing Authors: Surendra Kalagara |
126-129 |
25 | Trusted Hardware DB with Privacy and Data Confidentiality Authors: N. Srinivasa Rao, K.Poojitha, M. Lakshmi Poojitha, A. Satya Mounika and K. V |
130-134 |
26 | A Survey on Spark Architecture in Big Data Processing Authors: Ayyappa Chakravarthi M, Movva Sriya Chowdary |
135-142 |
27 | Design and Implementation of Smart Home System using Raspberry Pi Authors: B V Suresh Kumar, M Shanthi Chandana, Navya Uppala and B Niharika |
143-146 |
28 | Explanatory & Complex Analysis of Structured Data to Enrich Data in Analytical Appliance Authors: R S M Lakshmi Patibandla and N. Veeranjaneyulu |
147-151 |