Other Journals Published by Timeline Publication Pvt. Ltd.

  • IJECCE
    IJECCE
  • IJEIR
    IJEIR
  • IJAIR
    IJAIR
  • IJAIM
    IJAIM
  • IJRAS
    IJRAS
  • IJISM
    IJISM
  • IJIRES
    IJIRES
  • IJASM
    IJASM
  • IJRIES
    IJRIES

Latest News

  • Submissions open

    "Submissions Open For Volume 8,Issue 5,Sept.-Oct.,2017"

  • Send your paper at E-mail:

    submit2ijecce@yahoo.in , submit@ijecce.org

  • Submissions open

    "Submissions Open For Volume 8,Issue 5,Sept.-Oct.,2017"

  • Successfully Published

    "Volume 8,Issue 4, July -Aug. ,2017"

NCRTCST-2

2nd National Conference on Research Trends in Computer Science and Technology (NCRTCST)

15th & 16th Nov, 2013, Jointly Organized by Dept. of CSE and Dept of IT
CMR College of Engineering & Technology
Kandlakoya(V), Medchal Road, Hyderabad
This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it., http://www.cmr-ncrtcst.org

( Volume 4, Issue (6) NCRTCST, ISSN 2249 –071X )

 

S.No. Paper Title Author Co-Author Download Page No.
           
1.  Data Security through Steganography and Cryptography in VOIP
 
Shilpa Sunil Wankhade  Prof. Ramesh V. Shahabade  Download  1-5
2.  Challenges and opportunities of BIG DATA ANALYTICS in Business Applications
  
Mr. M. Joseph Rajakumar  Mrs. E. Sushma  Download  6-9
3.  A Survey on Different Fusion Techniques of Visual and Thermal Images for Human Face Recognition
  
Tumpa Dey    Download  10-14
4.  Stateless Multicast & Multipath DSR in Adhoc Networks
 
N.Sandeep Chaitanya K. Vijaya Kumar, P. Sruthi,
T.V. Suresh Kumar, SP Santhosh
 Download  15-20
5.  Guarantee Delivery of Packets Using Greedy Anti-Void Routing for Wireless Sensor Networks
  
Ch. Raja Kishore Babu  L. Anil Kumar, S. Siva Skandha  Download  21-24
6.  Effective Algo for the Frequent ItemSet in Data Mining
   
Madhuri Agrawal Gupta  D. Praneeth  Download  25-28
7.  An Analysis on Stenography Based ABE System Using LPC Based Source Filter Model
  
G. Gandhimathi  Dr. S. Jayakumar  Download  29-33
8.  Survey on Security Issues and Strategies of Cloud Computing
   
K.V. Nagendra  D. Madhu Babu  Download  34-38
9.  Generation of 3D City Model from Multi-Sensor Geo-Spatial Image Data and Its Visualization
  
V. Naveen Chandra  E. Rajesh  Download  39-42
10.  Cloud Outcome and Troubles with Safety Solutions
   
K. Madan Mohan  Dr. P. Premchand, Dr. K. Chandrasekharaiah  Download  43-46
11.  A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing
   
Sugandh Shah  B. M. Mehtre  Download  47-52
12.  A Hybrid Model for Fast Converge Cast in Tree-Based WSN
   
M. Kamal Kishore  Dr. K. Madhavi  Download  53-56
13.  Video Compression Based on RMB
  
P. Ushashree  Preeti Prasada  Download  57-60
14.  The Theoretical Approach to Cloud Computing
  
Hemanth Kumar TS    Download  61-64
15.  The Theoretical Approach to Music Information System
  
Dattasmita HV    Download  65-67
16.  Archival, Retrieval and Display of Net CDF Products
  
B. Dhana Lakshmi  Dr. N. Sudhakar  Download  68-72
17.  Content Based Image Retrieval using RIP Model
   
Kranthi Kumar.K Pilla Dinesh, Madhuri Venkata Saroja  Pasikanti Muvvala,Susruthi Divya Sruthi  Download  73-78
18.  Advanced Information System Approach to Design of Emergency Response on Natural Disaster
   
Bixapathi. A V. Koteswari  Download  79-81
19.  Multiple Techniques for Raga Identification in Indian Classical Music
   
Trupti Katte    Download  82-87
20.  Dynamic Component Safety Analysis: A Regression Based Code Coverage Approach
   
T. Ramesh K. Prabhakar, G. Ramesh  Download  88-92
21.  Object Segmentation in Color Images Using Enhanced Level Set Segmentation by Soft Fuzzy C Means Clustering
   
Manjusha Singh Abhishek Misal  Download  93-97
22.  Suitability Analysis of Various Software Development Life Cycle Models
 
Apoorva Mishra Deepty Dubey  Download  98-101
23.  Improving the Usability of Statistical Parsers by Incorporating Linguistic Constraints
  
B.Venkata Seshu Kumari R. Rajeswara Rao  Download  102-105
24.  Advanced Trust Based Approach For Increasing Security in Cloud Computing
   
T. Vani D. Sunil Kumar  Download  106-112
25.  Analyzing the Detection of Active Attacks in MANETs
  
Ch. Rajya Lakshmi U. Suresh Kumar  Download  113-116
26.  Prior Authentication Approach to Enhance Security in Cloud Computing
  
P. M. Jyosthna J. Suman  Download  117-120
27.  Key Structure Based Approach towards Scalable Access Control in Cloud Computing
  
Challa. Madhavi Latha K.L.S. Soujanya  Download  121-124
28.  Fault Tolerant Concurrent Service Composition in Service Oriented Architecture
   
M. Siva Mahesh    Download  125-128
29.  Image Processing and DEM of Spatial Information Technology in Landslide Vulnerable Mapping
   
Dr. M. Sunandana Reddy Mr. K. Lakshmikanta Reddy  Download  129-132
30.  Integrity Verification & Distributed Accountability in High Performance distributed Clouds
   
B. Rajani K. Nagasindhu, K. Saikrishna  Download  133-140
31.  Improving Modern Web Application Defenses Using HTML5
   
Achin Kulshrestha    Download  141-143
32.  An Analytical Study of Meta Search Engines Performance Based on Precision and Relative Recall
  
Nagaraju Mamillapally Trivikram Mulukutla  Download  144-149
33.  Comparative Analysis of Routing Protocols in Mobile Adhoc Networks
  
Kiranmai Nandagiri    Download  150-157
34.  Optimized Kernel Fuzzy C-Means Clustering for Bio-Images Using  Level Set Method  
  
Mr.Tara.Saikumar Dr. M.Sundarana Reddy  Download  158-162
35.  Removed
   
     Download  163-166
36.  An Efficient Routing Method in AODV by Providing Energy Information in Beacon Message
   
V. Veda Sahithi B. Ratnakanth  Download  167-170
37.  A Frame Work for Extraction, Integration and Analysis of Unified Medical Language System
   
I. Venkanna B. Sukumar, B. Sivaiah  Download  171-175
38.  Decision List Algorithm for Word Sense Disambiguation for TELUGU Natural Language Processing  
   
Durga Prasad Palanati Ramakrishna Kolikipogu  Download  176-180
39.  Classification of Web Services Using JForty Eight
  
Venkataiah Vaadaala Dr. R. Rajeswara Rao, Venkateswara Rao K.  Download  181-184
40.  Wire Less Detection of Soil Condition and Sends the Generated Reports to Nearest Agriculture Office Using ICT. Technology    Basawaraj Bilamge    Download  185-187
41.  Performance Analysis of Adaptive M-PSK Communications Using Equal Gain Combining     Ranjani S. Kavitha Narayanan, K. Harisudha  Download  188-192
42.  A Study on Cooperative OFDM     Kavitha Narayanan, Ranjani S., K. Harisudha  Download  193-195
43.  Security Threats on Vehicular Ad Hoc Networks (VANET): A Review Paper
   
Senthil Ganesh N. Ranjani S.  Download  196-200
44.  Novel Approach to User Appreciated Media Management Over FM Radio
  
S. Vijayananth S. Sathiya Bhama  Download  201-204
45.  Determining Conditional Intermeeting Time in DTMN Networks  Sindhu Vegesna  I.Haripriya,G.RaviKumar,K.Venkateswara Rao  Download  205-208
           

 

Indexed By:

  • 1.gif
  • 1.png
  • 01.png
  • 2.jpg
  • 2.png
  • 3.jpg
  • 3.png
  • 4.jpg
  • 4.png
  • 5.png
  • 6.jpg
  • 6.png
  • 7.jpg
  • 7.png
  • 8.jpg
  • 8.png
  • 9.jpeg
  • 9.jpg
  • 10.jpg
  • 10.png
  • 11.jpg
  • 11.png
  • 12.jpg
  • 12.png
  • 13.jpg
  • 13.png
  • 14.jpg
  • 14.png
  • 15.jpg
  • 16.png
  • 17.jpg
  • 17.png
  • 19.png
  • copernicus.jpg