Proceedings of
AICTE Sponsored National E-Conference on Recent Advances in Computer Science and Engineering - 2020
Organised by Department of Computer Science and Engineering
August 28th - 29th 2020
Chalapathi Institute of Engineering and Technology, Lam, Guntur, Andhra Pradesh.
|
S.No. |
Title of Paper |
Page No. |
1. |
Flexible Learning Design and Implementation Based on Big Data
Authors: K.Naresh, P.Baby Maruthi and P.Leela
DOI: https://doi.org/10.46501/IJMTSTCIET01 |
01-05 |
2. |
Open Stack Cloud Tuning and Network Acceleration for HPC and Datacenter Intelligent Applications
Authors: Shashi Kant Gupta and Ashish Kumar Pandey
DOI: https://doi.org/10.46501/IJMTSTCIET02 |
06-12 |
3. |
A Different Approach for Using LZW Dictionary Codes to Increase the Text Compression Ratio
Authors: Srinivasa Rao Namburi, Praveen Kumar Muvva and K Sai Prasanth
DOI: https://doi.org/10.46501/IJMTSTCIET03 |
13-16 |
4. |
Fast Adaptive Upscaling of Low Designed Images through a Categorized Filling Strategy
Authors: Qurratul Aini, Sabah Syed Nasirullah and Sumaya Tazeen
DOI: https://doi.org/10.46501/IJMTSTCIET04 |
17-19 |
5. |
A Distribution Development for Wavelet – Transform - Based Image Denoising and, it’s Presentation to Document Image Binarization
Authors: Rana Quadri, Qurratul Aini and Sumaya Tazeen
DOI: https://doi.org/10.46501/IJMTSTCIET05 |
20-22 |
6. |
Different Tools for Implementing ML Algorithms in Data Mining Tasks
Authors: Sarada and Dr.P.V.Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET06 |
23-27 |
7. |
A General Structure for Scheming Image Processing Algorithms for Intelligible Polarimetric Images
Authors: Sabah Syed Nasirullah, Qurratul Aini and Lochan Rampal
DOI: https://doi.org/10.46501/IJMTSTCIET07 |
28-30 |
8. |
Fragmentation of Data beyond Traditional Databases and Opportunities using Big Data
Authors: N Phanindra and N Junnu Babu
DOI: https://doi.org/10.46501/IJMTSTCIET08 |
31-41 |
9. |
Methodology to predict Telecom Data using Big Data Tools
Authors: Naveen Kumar, V Srujana and I.Bhavana
DOI: https://doi.org/10.46501/IJMTSTCIET09 |
42-49 |
10. |
VuFind: A Next Generation Discovery Retrieval System
Authors: Ramesh Yernagula
DOI: https://doi.org/10.46501/IJMTSTCIET10 |
50-52 |
11. |
Generation of Green Electrical Energy by using IOT
Authors: V Naga Siva Rama Murthy, Suresh Jajula and Devdas Pitta
DOI: https://doi.org/10.46501/IJMTSTCIET11 |
53-57 |
12. |
Using Machine Learning Approach to Predict Covid-19 Progress
Authors: G Monica and Dr.M.Bharathi Devi
DOI: https://doi.org/10.46501/IJMTSTCIET12 |
58-62 |
13. |
Volumetric Data Rendering on mobile with Raycasting
Authors: A V Krishna Rao Padyala, P Ravi Kumar, Dr.KSrinivasa Rao and N Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTSTCIET13 |
63-69 |
14. |
SVM Based ECG Beat Classification Method for Unsupervised ECG Diagnosis Systems
Authors: A. Rajani and M. Hephzibah Grace
DOI: https://doi.org/10.46501/IJMTSTCIET14 |
70-75 |
15. |
Machine Learning for Query Processing System and Query Response Time using Hadoop
Authors: M.Srikanth and R.N.V.Jagan Mohan
DOI: https://doi.org/10.46501/IJMTSTCIET15 |
76-81 |
16. |
Role of Computer Applications in Science and Engineering
Authors: Dr. Daruri Venugopal
DOI: https://doi.org/10.46501/IJMTSTCIET16 |
82-88 |
17. |
Behavioral Analysis of User Data on Social Media Applications using Machine Learning Algorithms
Authors: Prof. Chethan Raj C, Abhishek V Dhapte and Namratha V
DOI: https://doi.org/10.46501/IJMTSTCIET17 |
89-94 |
18. |
Smart Home Automation and Water Plantation Farming Using IOT
Authors: Prof. Chethan Raj C, Meghana and Nischitha
DOI: https://doi.org/10.46501/IJMTSTCIET18 |
95-101 |
19. |
Voice Assistant Made Easy
Authors: Edara Nithin
DOI: https://doi.org/10.46501/IJMTSTCIET19 |
102-107 |
20. |
An efficient Data Packet Loss Regulator Using Tokens in IoT Networks
Authors: Ch. Lakshmi Kumari
DOI: https://doi.org/10.46501/IJMTSTCIET20 |
108-111 |
21. |
Performance Analysis of Robust 2D-PCA and 2D-LDA Feature Descriptors on SVM
Authors: Victor Mokaya Mageto and Mukesh Kumar Gupta
DOI: https://doi.org/10.46501/IJMTSTCIET21 |
112-116 |
22. |
An Excellence Calculation Technique of Cyber Threat Intelligence in User Perception
Authors: Lochan Rampal and Qurratul Aini
DOI: https://doi.org/10.46501/IJMTSTCIET22 |
117-121 |
23. |
Securing Data in IoT Devices using DNA Cryptography
Authors: Naga Saranya Cherukupalli and Sesha Shayee Maruvada
DOI: https://doi.org/10.46501/IJMTSTCIET23 |
122-124 |
24. |
Analysis of Online Food Delivery Process by Zomato using Data Science
Authors: Dr. Dharmpal Singh, Saurav Srivastav, Shweta Shree, Simran Shrivastava and Soma Sharma
DOI: https://doi.org/10.46501/IJMTSTCIET24 |
125-127 |
25. |
Automated Detection of ECG Noise Signal and Classification System by Using Modified CEEMD
Authors: A.Rajani and B.Prasanna Lakshmi
DOI: https://doi.org/10.46501/IJMTSTCIET25 |
128-133 |
26. |
Blur - Map Estimation and Deblurring of Degraded Image by Non - Convex Regularization Approach
Authors: Latha H N and Rajiv R Sahay
DOI: https://doi.org/10.46501/IJMTSTCIET26 |
134-139 |
27. |
A Local Modified U-net Architecture for Image Denoising
Authors: Latha H N and Rajiv R Sahay
DOI: https://doi.org/10.46501/IJMTSTCIET27 |
140-144 |
28. |
CAD intervention for Revival, Stylization & Adaptation of Madhubani Traditional Textiles
Authors: YaminiJhanji Dhir
DOI: https://doi.org/10.46501/IJMTSTCIET28 |
145-148 |
29. |
Robust Frequent Item set Mining on Massive Data
Authors: Dr. B. Indira and M. Surya Teja
DOI: https://doi.org/10.46501/IJMTSTCIET29 |
149-155 |
30. |
Use of Predictive Modeling in Healthcare
Authors: Dr.K.R.R.Mohana Rao, Dr.K.Kiran Kumar, G. Ramachandra Rao and Mr.P.Venkata Siva
DOI: https://doi.org/10.46501/IJMTSTCIET30 |
156-159 |
31. |
Data Classification with Deep Learning Using Tensor Flow
Authors: Dr.Keshetti Sreekala and A.S.Shalini
DOI: https://doi.org/10.46501/IJMTSTCIET31 |
160-165 |
32. |
ISODATA Classification using Fuzzy Logic
PAPER WITHDRAWN BY AUTHOR |
166-170 |
33. |
Design Thinking impact on Creative Thinking
Authors: Lakshmi Kalam
DOI: https://doi.org/10.46501/IJMTSTCIET33 |
171-174 |
34. |
RSA Public Key Distribution Using Blockchain
Authors: Rasika Mundhe and Ameya Joshi
DOI: https://doi.org/10.46501/IJMTSTCIET34 |
175-177 |
35. |
An Efficient Management and Querying of Encrypted Architecture Text Platform by Encrypted Communication using ELK
Authors: A Ravi Kishore, B Prashanth Babu and K Ashok Babu
DOI: https://doi.org/10.46501/IJMTSTCIET35 |
178-184 |
36. |
A Comprehensive Study on Design and Implementation of Bigdata-As-A-Service Stratum of Lifecycle Management of
Smart Internet of Things Applications
Authors: G.Ramesh babu, J.Sagar Babu and R.Venkat
DOI: https://doi.org/10.46501/IJMTSTCIET36 |
185-191 |
37. |
Existence of Robotics and ArtificialIntelligence for COVID-19
Authors: Jyoti and Dr Ankit Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET37 |
192-195 |
38. |
Retrieving body temperature and heart rate values using IoT
Authors: Kotoju Rajitha and Komatireddy Abhishek Reddy
DOI: https://doi.org/10.46501/IJMTSTCIET38 |
196-203 |
39. |
Design a New Routing Protocol to Improve QOS and to Reduce the Network Attacks over MANET
Authors: Venkataramana K and Dr Manoj Kumar
DOI: https://doi.org/10.46501/IJMTSTCIET39 |
204-210 |
40. |
Design and Simulation of Solid State Power Electronic Transformer
Authors: D.Srinivasa Rao and Dr. Anupama A. Deshpande
DOI: https://doi.org/10.46501/IJMTSTCIET40 |
211-217 |
41. |
Enhancing the Low Wind Speed Performance of H- Darius Wind Turbine by Novel Methods
Authors: Mohd Hasham Ali and Dr Syed Nawazish Mehdi and Dr. M. T. Naik
DOI: https://doi.org/10.46501/IJMTSTCIET41 |
218-222 |
42. |
A Review on Security Issue Solving Methods in Public and Private Cloud Computing
Authors: Swathi Priyadarshini and S Ramachandram
DOI: https://doi.org/10.46501/IJMTSTCIET42 |
223-228 |