Email:editor.ijmtst@gmail.com

Volume 6, Special Issue 01, August 2020


Proceedings of
AICTE Sponsored National E-Conference on Recent Advances in Computer Science and Engineering - 2020

Organised by Department of Computer Science and Engineering
August 28th - 29th 2020
Chalapathi Institute of Engineering and Technology, Lam, Guntur, Andhra Pradesh.

S.No. Title of Paper Page No.
1. Flexible Learning Design and Implementation Based on Big Data
Authors: K.Naresh, P.Baby Maruthi and P.Leela
DOI: https://doi.org/10.46501/IJMTSTCIET01
01-05
2. Open Stack Cloud Tuning and Network Acceleration for HPC and Datacenter Intelligent Applications
Authors: Shashi Kant Gupta and Ashish Kumar Pandey
DOI: https://doi.org/10.46501/IJMTSTCIET02
06-12
3. A Different Approach for Using LZW Dictionary Codes to Increase the Text Compression Ratio
Authors: Srinivasa Rao Namburi, Praveen Kumar Muvva and K Sai Prasanth
DOI: https://doi.org/10.46501/IJMTSTCIET03
13-16
4. Fast Adaptive Upscaling of Low Designed Images through a Categorized Filling Strategy
Authors: Qurratul Aini, Sabah Syed Nasirullah and Sumaya Tazeen
DOI: https://doi.org/10.46501/IJMTSTCIET04
17-19
5. A Distribution Development for Wavelet – Transform - Based Image Denoising and, it’s Presentation to Document Image Binarization
Authors: Rana Quadri, Qurratul Aini and Sumaya Tazeen
DOI: https://doi.org/10.46501/IJMTSTCIET05
20-22
6. Different Tools for Implementing ML Algorithms in Data Mining Tasks
Authors: Sarada and Dr.P.V.Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET06
23-27
7. A General Structure for Scheming Image Processing Algorithms for Intelligible Polarimetric Images
Authors: Sabah Syed Nasirullah, Qurratul Aini and Lochan Rampal
DOI: https://doi.org/10.46501/IJMTSTCIET07
28-30
8. Fragmentation of Data beyond Traditional Databases and Opportunities using Big Data
Authors: N Phanindra and N Junnu Babu
DOI: https://doi.org/10.46501/IJMTSTCIET08
31-41
9. Methodology to predict Telecom Data using Big Data Tools
Authors: Naveen Kumar, V Srujana and I.Bhavana
DOI: https://doi.org/10.46501/IJMTSTCIET09
42-49
10. VuFind: A Next Generation Discovery Retrieval System
Authors: Ramesh Yernagula
DOI: https://doi.org/10.46501/IJMTSTCIET10
50-52
11. Generation of Green Electrical Energy by using IOT
Authors: V Naga Siva Rama Murthy, Suresh Jajula and Devdas Pitta
DOI: https://doi.org/10.46501/IJMTSTCIET11
53-57
12. Using Machine Learning Approach to Predict Covid-19 Progress
Authors: G Monica and Dr.M.Bharathi Devi
DOI: https://doi.org/10.46501/IJMTSTCIET12
58-62
13. Volumetric Data Rendering on mobile with Raycasting
Authors: A V Krishna Rao Padyala, P Ravi Kumar, Dr.KSrinivasa Rao and N Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTSTCIET13
63-69
14. SVM Based ECG Beat Classification Method for Unsupervised ECG Diagnosis Systems
Authors: A. Rajani and M. Hephzibah Grace
DOI: https://doi.org/10.46501/IJMTSTCIET14
70-75
15. Machine Learning for Query Processing System and Query Response Time using Hadoop
Authors: M.Srikanth and R.N.V.Jagan Mohan
DOI: https://doi.org/10.46501/IJMTSTCIET15
76-81
16. Role of Computer Applications in Science and Engineering
Authors: Dr. Daruri Venugopal
DOI: https://doi.org/10.46501/IJMTSTCIET16
82-88
17. Behavioral Analysis of User Data on Social Media Applications using Machine Learning Algorithms
Authors: Prof. Chethan Raj C, Abhishek V Dhapte and Namratha V
DOI: https://doi.org/10.46501/IJMTSTCIET17
89-94
18. Smart Home Automation and Water Plantation Farming Using IOT
Authors: Prof. Chethan Raj C, Meghana and Nischitha
DOI: 
https://doi.org/10.46501/IJMTSTCIET18
95-101
19. Voice Assistant Made Easy
Authors: Edara Nithin
DOI: https://doi.org/10.46501/IJMTSTCIET19
102-107
20. An efficient Data Packet Loss Regulator Using Tokens in IoT Networks
Authors: Ch. Lakshmi Kumari
DOI: https://doi.org/10.46501/IJMTSTCIET20
108-111
21. Performance Analysis of Robust 2D-PCA and 2D-LDA Feature Descriptors on SVM
Authors: Victor Mokaya Mageto and Mukesh Kumar Gupta
DOI: https://doi.org/10.46501/IJMTSTCIET21
112-116
22. An Excellence Calculation Technique of Cyber Threat Intelligence in User Perception
Authors: Lochan Rampal and Qurratul Aini
DOI: https://doi.org/10.46501/IJMTSTCIET22
117-121
23. Securing Data in IoT Devices using DNA Cryptography
Authors: Naga Saranya Cherukupalli and Sesha Shayee Maruvada
DOI: https://doi.org/10.46501/IJMTSTCIET23
122-124
24. Analysis of Online Food Delivery Process by Zomato using Data Science
Authors: Dr. Dharmpal Singh, Saurav Srivastav, Shweta Shree, Simran Shrivastava and Soma Sharma
DOI: https://doi.org/10.46501/IJMTSTCIET24
125-127
25. Automated Detection of ECG Noise Signal and Classification System by Using Modified CEEMD
Authors: A.Rajani and B.Prasanna Lakshmi
DOI: https://doi.org/10.46501/IJMTSTCIET25
128-133
26. Blur - Map Estimation and Deblurring of Degraded Image by Non - Convex Regularization Approach
Authors: Latha H N and Rajiv R Sahay
DOI: https://doi.org/10.46501/IJMTSTCIET26
134-139
27. A Local Modified U-net Architecture for Image Denoising
Authors: Latha H N and Rajiv R Sahay
DOI: https://doi.org/10.46501/IJMTSTCIET27
140-144
28. CAD intervention for Revival, Stylization & Adaptation of Madhubani Traditional Textiles
Authors: YaminiJhanji Dhir
DOI: https://doi.org/10.46501/IJMTSTCIET28
145-148
29. Robust Frequent Item set Mining on Massive Data
Authors: Dr. B. Indira and M. Surya Teja
DOI: https://doi.org/10.46501/IJMTSTCIET29
149-155
30. Use of Predictive Modeling in Healthcare
Authors: Dr.K.R.R.Mohana Rao, Dr.K.Kiran Kumar, G. Ramachandra Rao and Mr.P.Venkata Siva
DOI: https://doi.org/10.46501/IJMTSTCIET30
156-159
31. Data Classification with Deep Learning Using Tensor Flow
Authors: Dr.Keshetti Sreekala and A.S.Shalini
DOI: https://doi.org/10.46501/IJMTSTCIET31
160-165
32. ISODATA Classification using Fuzzy Logic
PAPER WITHDRAWN BY AUTHOR
166-170
33. Design Thinking impact on Creative Thinking
Authors: Lakshmi Kalam
DOI: https://doi.org/10.46501/IJMTSTCIET33
171-174
34. RSA Public Key Distribution Using Blockchain
Authors: Rasika Mundhe and Ameya Joshi
DOI: https://doi.org/10.46501/IJMTSTCIET34
175-177
35. An Efficient Management and Querying of Encrypted Architecture Text Platform by Encrypted Communication using ELK
Authors: A Ravi Kishore, B Prashanth Babu and K Ashok Babu
DOI: https://doi.org/10.46501/IJMTSTCIET35
178-184
36. A Comprehensive Study on Design and Implementation of Bigdata-As-A-Service Stratum of Lifecycle Management of
Smart Internet of Things Applications

Authors: G.Ramesh babu, J.Sagar Babu and R.Venkat
DOI: https://doi.org/10.46501/IJMTSTCIET36
185-191
37. Existence of Robotics and ArtificialIntelligence for COVID-19
Authors: Jyoti and Dr Ankit Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET37
192-195
38. Retrieving body temperature and heart rate values using IoT
Authors: Kotoju Rajitha and Komatireddy Abhishek Reddy
DOI: https://doi.org/10.46501/IJMTSTCIET38
196-203
39. Design a New Routing Protocol to Improve QOS and to Reduce the Network Attacks over MANET
Authors: Venkataramana K and Dr Manoj Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET39
204-210
40. Design and Simulation of Solid State Power Electronic Transformer
Authors: D.Srinivasa Rao and Dr. Anupama A. Deshpande
DOI: https://doi.org/10.46501/IJMTSTCIET40
211-217
41. Enhancing the Low Wind Speed Performance of H- Darius Wind Turbine by Novel Methods
Authors: Mohd Hasham Ali and Dr Syed Nawazish Mehdi and Dr. M. T. Naik
DOI: https://doi.org/10.46501/IJMTSTCIET41
218-222
42. A Review on Security Issue Solving Methods in Public and Private Cloud Computing
Authors: Swathi Priyadarshini and S Ramachandram
DOI: https://doi.org/10.46501/IJMTSTCIET42
223-228