ICFTESH - Part 1



Title/Author Name

Review of Image Segmentation and Its Various Techniques
- C.Rajalakshmi, Dr.M.Germanus Alex, Dr.R.Balasubramanian
A Survey of Image Compression Techniques in an Agriculture Field
- V.P. Kulalvaimozhi, Dr. M. Germanus Alex, Dr. S. John Peter
Personal Assistant Using HMM Algorithm
- G.Karthik, S.Santhiya, C.Sindhu, C.Mano Sundari
E-Voting In cloud using Cryptography Algorithm
- P.Pooja, C.Elakkiya, S.Soundharya
Iot Based Automatic Accident Detection And Rescue Management In Vanet
- Manuja M, Kowshika S, Narmatha S, Gracy Theresa W
SMART DOOR LOCKER SECURITY SYSTEM USING IOT
- Asst Prof . Archana M , Gayathri G D, Jayabharathi R, Jayasudha I
IOT Asset Tracking System
- Indira R, Bhavya G, Dheva Dharshini S, Devaraj R
STOCK MARKET PREDICTION USING MACHINE LEARING TECHNIQUES
- Balamurugan, Keerthana GR, Narmatha A, Pushparani R
SECURITY IMPLEMENTATION IN CLOUD COMPUTING USING USER BEHAVIOR PROFILING ALGORITHM AND DECOY TECHNOLOGY
- G.Blessy ,S.Heena , N.Ishwary
TrafficShaper: Shaping Inter-Datacenter Traffic to Reduce the Transmission Cost
- S.Dharanipathi , T.S.Harshini Devi , P.Hemavathi
EDAA - An Efficient DDoS Association Analysis using Hypergraph Clustering in Fog Computing
- K.Arun Kumar, C.Santhosh, S.Shanmugapriya
Digital Image Steganogrpahy Using Universal Distortion In Encrypted Images
- M.Shanmugapriya, Mrs.M.Beemajan Saheen
Enterprise Project Management Organization
- S.Muthuraj , P.Senthil Kumar