ICRTESTM-2017 - Part 3



Title/Author Name

Palmprint Identification based on texture features using GLCM through Dynamic ROI
- K.J Archana, V.Sangeetha, Y. L. Malathi Latha
A Review On Different Access Control Mechanism In Cloud Environment
- B Sankaraiah, D. Bhadru, G Shravan Kumar
Crime Detection In Credit Card Fraud
- Ms. E.Anuradha, Mr N S S R S Srikar, Mr Aditya Sairam, Mr P. Srikar
Cooperative Secure Multi – Cloud Verification System
- Mr. B.Shankernayak, Msb.Deekshitha, Mr J. Karthik Reddy, Msb.Swathi
Fake Objects Based Intruder Detection System In Cloud Storage
- K V Rajani, V.Sangeetha, K.J Archana
Using Fuzzy Logic Clustering Discover Semantic Similarity in Web Document
- Miss. Sukshma M. Durge, Mr. Yogeshwar M.Kurwade, Dr. Vilas M. Thakare
Secure and Authorized Approach for Routing In MANET Using Group Signature
- Phani Raja.I
A Novel Approach For Progressive Of Duplicate Detection
- Vinaysagar Anchuri
A Proportional Study of Issues in Big Dataclustering Algorithm with Hybrid Cs/Pso Algorithm
- A.C.Priya Ranjani, Dr. M.Sridhar
Secure and Authorized Approach Node trust Evaluation in Mobile Ad Hoc Networks
- K.Sridevi, M.Sridhar