NCORETECH-16

 

nCORETech-16

A Survey on Compressive Sensing by Exploiting the Sparsity of Data in the Transformed Domain for Aggregation

Parvathi A.K., Praveen Kumar K

Abstract | PDF with Text


An Efficient Annotation of SRRS Based on XML

Thushara K P, Varsha Philip

Abstract | PDF with Text


A Feasibility Study on Real-Time Gender Recognition

Jacob Joseph, Dr. K A Navas

Abstract | PDF with Text


A Survey of Computer Vision based methods for Violent action Representation and Recognition

Febin I P, Jayasree K

Abstract | PDF with Text


A Secure Payment Scheme in Multihop Wireless Network Using Shortest Reliable Routing

Ms. Jyothi Padmanabhan, Ms. Navya E K

Abstract | PDF with Text


Enhanced Broker-Less Publish/Subscribe System

Monisha P Mohanan, Shanjana C

Abstract | PDF with Text


A Comparison of SIFT and SURF Algorithm for the Recognition of an Efficient Iris Biometric System

Sheena S, Sheena Mathew

Abstract | PDF with Text


Cost-effective and Secure Data Sharing in MANET

Lincy M, Anju J

Abstract | PDF with Text


Encryption with Ordered Bucketization and Dynamic Query Forms

Shameema Thasneem, Pragisha K

Abstract | PDF with Text


Enhanced Face Recognition in RGB-D Images

Amrutha Damodaran, Pragisha.K

Abstract | PDF with Text


A New Way of Topic Modeling Using MALLET for Current Job Trends

Athira M, Bhavya K, Soorya K, Ajeesh Ramanujan, Anoop V.S

Abstract | PDF with Text


Integrating Cloud Computing For Internet of Things Based Intelligent Transport System

Amrutha M

Abstract | PDF with Text


Smart App based Shopping Trolley Assisted by RFID

Ameen Abdul Hameed P, Nineesha P

Abstract | PDF with Text


Recent Trends in Image Retrieval Techniques for the Big Data Platform: A Survey

O K Girija, M. Sudheep Elayidom

Abstract | PDF with Text


Wavelet Based Resolution Enhancement with Noise Reduction Method for Panoramic Dental X-ray Images

Shanida K, Shayini R, Sindhu C S

Abstract | PDF with Text


Sec-DiDrip: A Distributed Data Dissemination Protocol with Enhanced Security

Sruthi K, Binoy DM Panicker

Abstract | PDF with Text


Retinal blood vessel extraction

Surya G, Pratheesh M Vincent, Shanida K

Abstract | PDF with Text


English Text to Malayalam Speech Translation

Deepthy P S

Abstract | PDF with Text


Prevention of Dos and DDoS Attack Using Cryptographic Techniques

Soumya Suresh, Kiran V K

Abstract | PDF with Text


An Efficient and Secured way of Routing in Hybrid WSN

Aswani Raj N P, Kiran V K

Abstract | PDF with Text


Secured Self Destructing Data System Based on Active Storage Framework

Swathi J, Anagha Achuthan

Abstract | PDF with Text


A Survey on Quality Enhancing Local Descriptor for Biometric Spoofing Detection Using Various Techniques

Sneha B K, T V Mridula

Abstract | PDF with Text


Enhanced Image Security via Cryptography and Sound Steganography

Sukina K, Reshna T

Abstract | PDF with Text


Advancements in Machine Translation as a part of Natural Language Processing in Python

Fathimath Shouna Shayyam C A, Pragisha K

Abstract | PDF with Text


A Fast and Secure Scheme for Search over Encrypted Data

Malihabi V P, Kiran V K

Abstract | PDF with Text


ASMR: Anonymous Secure Multicast Routing

Sudhesh K M, Kiran V K

Abstract | PDF with Text


Cloud Security using EHASBE

Vinisha .C, Anju .J

Abstract | PDF with Text


A General Decentralized Clustering Using K-Harmonic Means

Shabana AS, Rajesh Kumar PM

Abstract | PDF with Text


Threshold Cryptography-based Group Authentication Scheme for the Smart Home Environments

Geetha A V, Rajesh Kumar PM

Abstract | PDF with Text


Provable Dynamic Multi Data Copy Possession in Cloud Storage

Sneha Josmi Sam, Vinodu George

Abstract | PDF with Text


Multi-Hop Communication for Home Automation with Enhanced Security Using ARM and RTOS

Jithesh Puthenkovilakam

Abstract | PDF with Text


Transliteration in Malayalam Using Deep Learning

Shilpa Krishnan, Usha K

Abstract | PDF with Text


SecDedup: A Secure Way for Maximizing Space Savings in Cloud Storage

Bushra K.R., Sindhu S

Abstract | PDF with Text


Trust Aware Watchdog Mechanism to Detect Selfish Node in MANET

Resmi C. S, Sindhu S

Abstract | PDF with Text


Key Aggregate Cryptosystem for Scalable Data Sharing with Policy Based File Assured Deletion for Secure Data Storage in Cloud

Dhanya K K, Sindhu S

Abstract | PDF with Text


Authentication to Cloud Using Modified Double Ceasar Cipher

Chanda Raju, Arif Mohammad Abdul, M Kiran Sastry

Abstract | PDF with Text


Sentiment Analysis in Malayalam

Thulasi P K

Abstract | PDF with Text


An EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION USING DITHERING

Amina Shereen O V, Lijina S S

Abstract PDF with Text


A Survey on Various Techniques for Detection of Diabetic Retinopathy in Retinal Fundus Images

Archana K, Praveen Kumar K

Abstract | PDF with Text

Open chat
Chat with IJARCCE