Skip to content

IJCRCST -International Journal of Contemporary Research in Computer Science and Technology

Computer Science International Journal,Best Online Journals of Computer Science Stream, Best Computer science Journal, Low Publication Charge , Best International Journal, Top journal in computer science,Free Research Papers Publication

ijcrcst
  • Home
  • Aim and Scope
  • Editorial Board
  • Paper Submission
  • Conferences
  • Archives
  • Contact Us
  • Toggle search form

NCACCT ‘2017

National Conference on

Advanced Computing and Communication Technologies

(NCACCT’2017)

Organized by

Department Of Computer Science,
Siri PSG Arts and Science College for Women,
Sankari,Tamilnadu,India.
Date : 7th February 2017

Cover Page

1.EMERGING BLUETOOTH DEVICES
Authors : Dr MN Nachappa,J.Rohini Suzana
Paper Id :IJCRCST-NCACCT17-01
  Page No : 1-4

2.MOBILE AD-HOC NETWORKS: SECURITY ATTACKS
Authors : J.Selwyn Paul ,D.Ravi Kumar
Paper Id :IJCRCST-NCACCT17-02
  Page No : 5-7

3.PLOT CLUSTER STRUCTURE OVER TIME USING STREAMOPTICS ALGORITHM
Authors : I.Aruna,K.Manohari
Paper Id :IJCRCST-NCACCT17-03
  Page No : 8-11

4.ANALYSIS OF MULTIPATH RELIABLE ROUTING PROTOCOL SECURITY FOR WSN
Authors : S. Boopathi,Dr. A.SenthilKumar
Paper Id :IJCRCST-NCACCT17-04
  Page No : 12-14

5.DETECTION OF MIMICRY ATTACKS AGAINST WIRELESS LINK SIGNATURE USING TIME-SYNCHED LINK SIGNATURE
Authors : B.Dhivya ,Dr.R.Suguna
Paper Id :IJCRCST-NCACCT17-05
  Page No : 15-18

6.A STUDY ON MULTIPATH ROUTING ON WSN SECURITY ATTACKS
Authors : P.Brindha,Dr. A. Senthilkumar
Paper Id :IJCRCST-NCACCT17-06
  Page No : 19-23

7.A STUDY ON MUTIPATH ROUTING PROTOCOLS IN AD HOC NETWORKS
Authors : M.Shanmugapriya,S.Mythili
Paper Id :IJCRCST-NCACCT17-07
  Page No : 24-28

8.BURSTY TOPIC DETECTION FROM TWITTER USING SPATIO-TEMPORAL HASHTAG CLUSTERING
Authors : S.Gajapriya, K.Manohari
Paper Id :IJCRCST-NCACCT17-08
  Page No : 29-33

9.GLOBAL NAVIGATION SATELLITE SYSTEM
Authors : S.Geethamani,C.Swathi
Paper Id :IJCRCST-NCACCT17-09
  Page No : 34-36

10.A SURVEY ON SECURE AND EFFICIENT MULTI-PATH ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORK
Authors : N.V.Chinnasamy,Dr. A.Senthilkumar
Paper Id :IJCRCST-NCACCT17-10
  Page No : 37-39

11.A GENERAL STUDY ON METHODS, MODELS AND TOOLS FOR SOCIAL NETWORK ANALYSIS
Authors : K.K.Uma,Dr.K.Meenakshisundaram
Paper Id :IJCRCST-NCACCT17-11
  Page No :40-44

12.AN ENHANCED CENTER SYMMETRIC LOCAL BINARY PATTERN TECHNIQUE FOR IMAGE RETRIEVAL USING EUCLIDEAN DISTANCE
Authors : Dr.K.Meenakshisundaram,G.Vijaiprabhu
Paper Id :IJCRCST-NCACCT17-12
  Page No :45-52

13.THE EXTRACTION OF ONLINE NEWSPAPERS FOR CLASSIFICATION OF INDIVIDUAL NEWS ITEMS
Authors : K.Veena,R.Malathi,Dr.V.Sasirekha
Paper Id :IJCRCST-NCACCT17-13
  Page No :53-57

14.WEB USAGE MINING-AN OUTLINE
Authors : C.Veerakumar
Paper Id :IJCRCST-NCACCT17-14
  Page No :58-60

15.DIGITAL SIGNATURE – BASED SECURE NODE DISJOINT MULTIPATH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
Authors : Dr. A.SenthilKumar,R.Gopalakrishan
Paper Id :IJCRCST-NCACCT17-15
  Page No :61-63

16.MAXIMUM WEIGHT SCHEDULING IN WIRELESS AD HOC NETWORKS WITH HYPERGRAPH INTERFERENCE MODELS
Authors : B.Sindhupiriyaa,Dr.D.Maruthanayagam
Paper Id :IJCRCST-NCACCT17-16
  Page No :64-66

17.ANALYZING VARIOUS APPROACH FOR IMPLEMENTATION OF HONEYPOTS IN NETWORK SECURITY
Authors : A.Anthony Paul Raj,Dr. J. K. Kani Mozhi
Paper Id :IJCRCST-NCACCT17-17
  Page No :67-71

18.A COMPARATIVE STUDY OF QUALITY OF SERVICE ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
Authors : V.Vijayalakshmi,Dr.A.Senthilkumar
Paper Id :IJCRCST-NCACCT17-18
  Page No :72-76

19.HIGH UTILITY ITEMSETS MINING USING APRIORITY CH AND CLOSED HIGH UTILITY ITEMSET DISCOVERY
Authors : R.Kalaiselvi,Dr.R.Suguna
Paper Id :IJCRCST-NCACCT17-19
  Page No :77-81

20.A HYBRID MODEL OF DEFENSE TECHNIQUES AGAINST BASE STATION JAMMING ATTACK IN WIRELESS SENSOR NETWORKS
Authors : M.Malathi,Dr. A.SenthilKumar
Paper Id :IJCRCST-NCACCT17-20
  Page No :82-85

21.ROUTING TECHNIQUES IN AD-HOC WIRELESS NETWORK
Authors : A.Nazini Banu,K.Thaarani
Paper Id :IJCRCST-NCACCT17-21
  Page No :86-88

22.EFFICIENT KNN CLASSIFICATION ALGORITHM FOR BIG DATA
Authors : G.Priya,K.Manohari
Paper Id :IJCRCST-NCACCT17-22
  Page No :89-92

23.A DEFENSE MODEL FOR BLACK HOLE AND GRAY HOLE ATTACKS IN MANET USING CONTROL PACKETS
Authors : S.Radhika,N.Manohari
Paper Id :IJCRCST-NCACCT17-23
  Page No :93-99

24.EXPLANATORY DOS ATTACKS IN OLSR PROTOCOL USING DISTRIBUTED FORMATION CONTROL ALGORITHM
Authors : S.Sangeetha,Dr.R.Suguna
Paper Id :IJCRCST-NCACCT17-24
  Page No :100-103

25.ENHANCING THE LIFE TIME OF WIRELESS SENSOR NETWORK USING LITE-IDE
Authors : N.Dhivya,Dr.R.Suguna
Paper Id :IJCRCST-NCACCT17-25
  Page No :104-106

26.A STUDY ON ENERGY EFFICIENT MULTI-HOP CLUSTERING IN WIRELESS SENSOR NETWORK
Authors : V.Perumal,Dr.K.Meenakshi Sundram
Paper Id :IJCRCST-NCACCT17-26
  Page No :107-110

27.A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
Authors : S.Malathi,K.Sumathi
Paper Id :IJCRCST-NCACCT17-27
  Page No :111-114

28.A STUDY ON NETWORK SECURITY AND INTRUSION DETECTION SYSTEM
Authors : P.Kanagavalli, Dr.V.Karthikeyani
Paper Id :IJCRCST-NCACCT17-28
  Page No :115-119

Copyright © 2025 IJCRCST -International Journal of Contemporary Research in Computer Science and Technology.