Email:editor.ijmtst@gmail.com

Volume 8, Special Issue 08, June 2022

Total Received Papers:      |  Total Accepted Papers:    |  Total Rejected Papers:     |  Acceptance Rate: 

 

Proceedings of
International E-Conference on Emerging Trends in Computational Technologies (ICETCT-2022)


Organised by Department of Computer Science and Engineering

28th June 2022

Chalapathi Institute of Engineering and Technology, Lam, Guntur, Andhra Pradesh
S.No. Title of Paper PageNo.   Download
PDF
1. Eucledean Distance of Image Restoration using Mathematical Modeling and Simulation
Authors: K.Tejaswi, SK.RaziyaSulthana and B.Vishnupriya
DOI: https://doi.org/10.46501/IJMTST08S0801
1-9
2. Convolutional Neural Network based on Image Segmantation
Authors: Shaik. RaziyaSultana, K.Tejaswi and M.Pushpa Latha
DOI: https://doi.org/10.46501/IJMTST08S0802
10-18
3. Big Data Analytics and Machine Learning for Biomedical Information
Authors: V Naveen Kumar and A Ravi Kishore
DOI: https://doi.org/10.46501/IJMTST08S0803
19-23
4. Decision Tree Induction for Classification of Objects in Machine Learning
Authors: G.Sudha Rani and P.Surekha
DOI: https://doi.org/10.46501/IJMTST08S0804
24-27
5. IoT-Enabled Smart Agriculture
Authors: Lakshmeswari Chennagiri and Chennagiri Venkata Veera Brahmam
DOI: https://doi.org/10.46501/IJMTST08S0805
28-32
6. Review on Fall Detection Systems using Artificial Intelligence
Authors: Bandi Aruna
DOI: https://doi.org/10.46501/IJMTST08S0806
33-38
7. Fundamentals of IoT
Authors: Saniya Samreen, B. Anusha and N. Sahithi
DOI: https://doi.org/10.46501/IJMTST08S0807
39-42
8. Two Phase Text Data Compression Using New LZW Approach with Dynamic Bit Reduction
Authors: N Srinivasa Rao, M Praveen Kumar T and Mastanaih Naidu Y
DOI: https://doi.org/10.46501/IJMTST08S0808
43-46
9. Plant Leaves Disease Detection
Authors: Jajjara Bhargav, Panthagani Vijayababu and Guggilam Navya
DOI: https://doi.org/10.46501/IJMTST08S0809
47-51
10. Practical Speech Emotion Recognition
Authors: Jajjara Bhargav, Tata Venkateswarlu and P Susmitha Vadana
DOI: https://doi.org/10.46501/IJMTST08S0810
52-56
11. The Impact and Role of Internet of Things in Education Sector
Authors: Revathi B and Arulanandam K
DOI: https://doi.org/10.46501/IJMTST08S0811
57-62
12. Automatic License Number Plate Recognition System
Authors: G. Bharath Kumar, Ch. Jaya Rama Krishna, K. Jitha Priya and Ch. Naga Vamsi Chandh
DOI: https://doi.org/10.46501/IJMTST08S0812
63-67
13. Machine Learning – Smart Agriculture and Crop Management
Authors: S.S.Sarmila, P.Luna Jebasri, G.Pauline Persyl and C.Princy
DOI: https://doi.org/10.46501/IJMTST08S0813
68-71
14. A Comprehensive Review of DDoS Attack, Types and Mitigation Techniques in the Internet of Things Network
Authors: Amit, Akshaya Dhingra, Vikas Sindhu and Anil Sangwan
DOI: https://doi.org/10.46501/IJMTST08S0814
72-79
15. Suppressing uncertainties with Large-Scale Facial Expression Recognition
Authors: Indukuri Rahul Varma and Satya Shekar Varma P
DOI: https://doi.org/10.46501/IJMTST08S0815
80-84
16. A Survey on Plant Leaf Disease Detection Using Image Classification Techniques
Authors: Aswini .E and C. Vijayakumaran
DOI: https://doi.org/10.46501/IJMTST08S0816
85-91
17. Object Localization Based on a Fast Recurrent Regional Based Network (OL-FR-RBN)
Authors: Sakthi Priyanka.V and Dr.V.Radha
DOI: https://doi.org/10.46501/IJMTST08S0817
92-99
18. An Enhanced Design and Implementation of Smart Crop Yielding using IoT
Authors: Ch.Lakshmi Kumari
DOI: https://doi.org/10.46501/IJMTST08S0818
100-104
19. A Mouse Simulation System using Convex Hull Algorithm
Authors: Vedavathi K and Soujan V
DOI: https://doi.org/10.46501/IJMTST08S0819
105-109
20. Identifying Hidden Node Topical Hubs in Multiple Online Social Networks using MPHAT Model
Authors: Dr. D J Samatha Naidu and M.Shameem
DOI: https://doi.org/10.46501/IJMTST08S0820
110-113
21. Life Expectancy Prediction using Machine Learning
Authors: Yallamati Prakasarao and Arumalla Nagaraju
DOI: https://doi.org/10.46501/IJMTST08S0821
114-119
22. Cyber Supply Chain Protection using Forecasting Insights for Cyber Threats
Authors: J.SagarBabu and Ashok Kumar P S
DOI: https://doi.org/10.46501/IJMTST08S0822
120-129
23. Image Restoration and Topological Optimization Using Tychonoff Regularization
Authors: Vaddimukkala Naga Bushanam, V S Sudhakara Rao and Dr.Rokesh Kumar Yarava
DOI: https://doi.org/10.46501/IJMTST08S0823
130-137
24. Evolution of Data Science in Information Technology
Authors: G. Varun Teja, Khaja Raheel Ahmed Mohiuddin and D. Mahitha
DOI: https://doi.org/10.46501/IJMTST08S0824
138-140
25. Novel Factor Graph Based Model to Prevent Fraudulent Behaviour in MSN's
Authors: Dr. D J Samatha Naidu and G.Maheswari
DOI: https://doi.org/10.46501/IJMTST08S0825
141-144
26. Compiler Optimization using Machine Learning Techniques
Authors: Satya Mohan Chowdary G and Ganga Bhavani T
DOI: https://doi.org/10.46501/IJMTST08S0826
145-153
27. Machine Learning Techniques for selecting the Best Routing Traffic for Packets in LAN
Authors: Ganga Bhavani T and Satya Mohan Chowdary G
DOI: https://doi.org/10.46501/IJMTST08S0827
154-163
28. Preventing DDos Attacks for IoT Based Networks using Odit
Authors: Dr. D J Samatha Naidu and P.Vasundhara
DOI: https://doi.org/10.46501/IJMTST08S0828
164-167
29. Diffused Liver Disease Based on Fisher Discrimanate Generatic Algorithm using MRI Images
Authors: Dr. D J Samatha Naidu and K.Venkata Ramya
DOI: https://doi.org/10.46501/IJMTST08S0829
168-172
30. Time-Bound Anonymous Authentication for Roaming Networks
Authors: Gorantla Sai Pujitha and K. Madhu Kiran
DOI: https://doi.org/10.46501/IJMTST08S0830
173-178
31. CCP-CABE Framework model to protect privacy for information sharing in OSN’s
Authors: Dr. D J Samatha Naidu and M.Sowjanya
DOI: https://doi.org/10.46501/IJMTST08S0831
179-184
32. Detecting Hidden Attacks through the Mobile App-Web Interfaces
Authors: Kalpana Gottumukkala and G. Ramachandrarao
DOI: https://doi.org/10.46501/IJMTST08S0832
185-190