Proceedings of
International E-Conference on Emerging Trends in Computational Technologies (ICETCT-2022)
Organised by Department of Computer Science and Engineering
28th June 2022
Chalapathi Institute of Engineering and Technology, Lam, Guntur, Andhra Pradesh |
S.No. |
Title of Paper |
PageNo. |
Download
PDF |
1. |
Eucledean Distance of Image Restoration using Mathematical Modeling and Simulation
Authors: K.Tejaswi, SK.RaziyaSulthana and B.Vishnupriya
DOI: https://doi.org/10.46501/IJMTST08S0801 |
1-9 |
|
2. |
Convolutional Neural Network based on Image Segmantation
Authors: Shaik. RaziyaSultana, K.Tejaswi and M.Pushpa Latha
DOI: https://doi.org/10.46501/IJMTST08S0802 |
10-18 |
|
3. |
Big Data Analytics and Machine Learning for Biomedical Information
Authors: V Naveen Kumar and A Ravi Kishore
DOI: https://doi.org/10.46501/IJMTST08S0803 |
19-23 |
|
4. |
Decision Tree Induction for Classification of Objects in Machine Learning
Authors: G.Sudha Rani and P.Surekha
DOI: https://doi.org/10.46501/IJMTST08S0804 |
24-27 |
|
5. |
IoT-Enabled Smart Agriculture
Authors: Lakshmeswari Chennagiri and Chennagiri Venkata Veera Brahmam
DOI: https://doi.org/10.46501/IJMTST08S0805 |
28-32 |
|
6. |
Review on Fall Detection Systems using Artificial Intelligence
Authors: Bandi Aruna
DOI: https://doi.org/10.46501/IJMTST08S0806 |
33-38 |
|
7. |
Fundamentals of IoT
Authors: Saniya Samreen, B. Anusha and N. Sahithi
DOI: https://doi.org/10.46501/IJMTST08S0807 |
39-42 |
|
8. |
Two Phase Text Data Compression Using New LZW Approach with Dynamic Bit Reduction
Authors: N Srinivasa Rao, M Praveen Kumar T and Mastanaih Naidu Y
DOI: https://doi.org/10.46501/IJMTST08S0808 |
43-46 |
|
9. |
Plant Leaves Disease Detection
Authors: Jajjara Bhargav, Panthagani Vijayababu and Guggilam Navya
DOI: https://doi.org/10.46501/IJMTST08S0809 |
47-51 |
|
10. |
Practical Speech Emotion Recognition
Authors: Jajjara Bhargav, Tata Venkateswarlu and P Susmitha Vadana
DOI: https://doi.org/10.46501/IJMTST08S0810 |
52-56 |
|
11. |
The Impact and Role of Internet of Things in Education Sector
Authors: Revathi B and Arulanandam K
DOI: https://doi.org/10.46501/IJMTST08S0811 |
57-62 |
|
12. |
Automatic License Number Plate Recognition System
Authors: G. Bharath Kumar, Ch. Jaya Rama Krishna, K. Jitha Priya and Ch. Naga Vamsi Chandh
DOI: https://doi.org/10.46501/IJMTST08S0812 |
63-67 |
|
13. |
Machine Learning – Smart Agriculture and Crop Management
Authors: S.S.Sarmila, P.Luna Jebasri, G.Pauline Persyl and C.Princy
DOI: https://doi.org/10.46501/IJMTST08S0813 |
68-71 |
|
14. |
A Comprehensive Review of DDoS Attack, Types and Mitigation Techniques in the Internet of Things Network
Authors: Amit, Akshaya Dhingra, Vikas Sindhu and Anil Sangwan
DOI: https://doi.org/10.46501/IJMTST08S0814 |
72-79 |
|
15. |
Suppressing uncertainties with Large-Scale Facial Expression Recognition
Authors: Indukuri Rahul Varma and Satya Shekar Varma P
DOI: https://doi.org/10.46501/IJMTST08S0815 |
80-84 |
|
16. |
A Survey on Plant Leaf Disease Detection Using Image Classification Techniques
Authors: Aswini .E and C. Vijayakumaran
DOI: https://doi.org/10.46501/IJMTST08S0816 |
85-91 |
|
17. |
Object Localization Based on a Fast Recurrent Regional Based Network (OL-FR-RBN)
Authors: Sakthi Priyanka.V and Dr.V.Radha
DOI: https://doi.org/10.46501/IJMTST08S0817 |
92-99 |
|
18. |
An Enhanced Design and Implementation of Smart Crop Yielding using IoT
Authors: Ch.Lakshmi Kumari
DOI: https://doi.org/10.46501/IJMTST08S0818 |
100-104 |
|
19. |
A Mouse Simulation System using Convex Hull Algorithm
Authors: Vedavathi K and Soujan V
DOI: https://doi.org/10.46501/IJMTST08S0819 |
105-109 |
|
20. |
Identifying Hidden Node Topical Hubs in Multiple Online Social Networks using MPHAT Model
Authors: Dr. D J Samatha Naidu and M.Shameem
DOI: https://doi.org/10.46501/IJMTST08S0820 |
110-113 |
|
21. |
Life Expectancy Prediction using Machine Learning
Authors: Yallamati Prakasarao and Arumalla Nagaraju
DOI: https://doi.org/10.46501/IJMTST08S0821 |
114-119 |
|
22. |
Cyber Supply Chain Protection using Forecasting Insights for Cyber Threats
Authors: J.SagarBabu and Ashok Kumar P S
DOI: https://doi.org/10.46501/IJMTST08S0822 |
120-129 |
|
23. |
Image Restoration and Topological Optimization Using Tychonoff Regularization
Authors: Vaddimukkala Naga Bushanam, V S Sudhakara Rao and Dr.Rokesh Kumar Yarava
DOI: https://doi.org/10.46501/IJMTST08S0823 |
130-137 |
|
24. |
Evolution of Data Science in Information Technology
Authors: G. Varun Teja, Khaja Raheel Ahmed Mohiuddin and D. Mahitha
DOI: https://doi.org/10.46501/IJMTST08S0824 |
138-140 |
|
25. |
Novel Factor Graph Based Model to Prevent Fraudulent Behaviour in MSN's
Authors: Dr. D J Samatha Naidu and G.Maheswari
DOI: https://doi.org/10.46501/IJMTST08S0825 |
141-144 |
|
26. |
Compiler Optimization using Machine Learning Techniques
Authors: Satya Mohan Chowdary G and Ganga Bhavani T
DOI: https://doi.org/10.46501/IJMTST08S0826 |
145-153 |
|
27. |
Machine Learning Techniques for selecting the Best Routing Traffic for Packets in LAN
Authors: Ganga Bhavani T and Satya Mohan Chowdary G
DOI: https://doi.org/10.46501/IJMTST08S0827 |
154-163 |
|
28. |
Preventing DDos Attacks for IoT Based Networks using Odit
Authors: Dr. D J Samatha Naidu and P.Vasundhara
DOI: https://doi.org/10.46501/IJMTST08S0828 |
164-167 |
|
29. |
Diffused Liver Disease Based on Fisher Discrimanate Generatic Algorithm using MRI Images
Authors: Dr. D J Samatha Naidu and K.Venkata Ramya
DOI: https://doi.org/10.46501/IJMTST08S0829 |
168-172 |
|
30. |
Time-Bound Anonymous Authentication for Roaming Networks
Authors: Gorantla Sai Pujitha and K. Madhu Kiran
DOI: https://doi.org/10.46501/IJMTST08S0830 |
173-178 |
|
31. |
CCP-CABE Framework model to protect privacy for information sharing in OSN’s
Authors: Dr. D J Samatha Naidu and M.Sowjanya
DOI: https://doi.org/10.46501/IJMTST08S0831 |
179-184 |
|
32. |
Detecting Hidden Attacks through the Mobile App-Web Interfaces
Authors: Kalpana Gottumukkala and G. Ramachandrarao
DOI: https://doi.org/10.46501/IJMTST08S0832 |
185-190 |
|