Other Journals Published by Timeline Publication Pvt. Ltd.

  • IJECCE
    IJECCE
  • IJEIR
    IJEIR
  • IJAIR
    IJAIR
  • IJAIM
    IJAIM
  • IJRAS
    IJRAS
  • IJISM
    IJISM
  • IJIRES
    IJIRES
  • IJASM
    IJASM
  • IJRIES
    IJRIES

Latest News

  • Submissions open

    "Submissions Open For Volume 8,Issue 6,Nov.-Dec.,2017"

  • Send your paper at E-mail:

    submit2ijecce@yahoo.in , submit@ijecce.org

  • Submissions open

    "Submissions Open For Volume 8,Issue 6,Nov.-Dec.,2017"

  • Successfully Published

    "Volume 8,Issue 5, Sept. -Oct. ,2017"

NCRTCST

"National Conference on Research Trends in Computer Science and Technology (NCRTCST)"

In Association with CSI, Hyderabad,A.P,India.

( Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X )

 

1. "A Layered Optimization Approach for Efficient MPEG Video Transmission Over Wireless Networks"
Author: Vijayalaksmi M.,Co-Author: Linganagouda Kulkarni,Vol.3,Issue(1) NCRTCST,Page No.:1-6,Download
2. "Concise study of Progressive Documentation and its adaptation to Agile Software Testing"
Author:Roshni Kanth, Co-Author: Madhu B K, Lokesha V,Vol. 3, Issue (1) NCRTCST, Page No.:7-9,Download
3. "Color and Texture Features for Image Indexing and Retrieval"
Author:NARENDRA GALI1 ,B.VENKATESHWAR RAO, Co-Author:ABDUL SUBHANI SHAIK,Volume 3, Issue (1) NCRTCST,Page No.:10-14,Download
4. "An efficient approach to calculate the power of discrete power spectrum"
Author: Mr. NIRMAL SINGH, Co-Author:Ms. MAMTA KATIYAR,Volume 3, Issue (1) NCRTCST,Page No.:15-17,Download
5. "A Review of the software testing process in SDLC"
Author: Swati Agarwal, Co-Author:Mr. Pankaj Sharma, Kumar Nikhil,Vol.3,Issue(1) NCRTCST,Page No.:18-21,Download
6. "Identification of Brain Tumors in 2 D MRI Using Automatic Seeded Region Growing Method"
Author: Swati Tiwari, Co-Author:Ashish Bansal,Rupali Sagar, Vol.3,Issue(1) NCRTCST,Page No.:22-25,Download
7. "A Sophisticated Study on Best Practices of Agile Software Testing"
Author: Harish R Co-Author:Madhu B K,  Lokesha V, Vol.3,Issue(1) NCRTCST,Page No.:26-30,Download
8. "A new approach to Image steganography  "
Author: S.T.V.S. Kumar, Co-Author:S.S. Panda, M.S.R.S. Prasad, Vol.3,Issue(1) NCRTCST,Page No.:31-36,Download
9. "Action of Images Created by Random Windows and Sequential Windows Image Cropping techniques"
Author: Kajal R. Gurnani Co-Author: Vol.3,Issue(1) NCRTCST,Page No.:37-40,Download
10. "Design Distributed Database Strategies for SQMD Architecture"
Author:Shailesh R. Thakare,Co-Author: Dr. C.A. Dhawale, Ajay B.Gadicha,Vol.3,Issue(1) NCRTCST,Page No.:41-45,Download
11. "ARMoteGame-A Wireless Device for Augmented Reality 3D Game Environment"
Author: M.Ashok kumar Co-Author:K.Sahitya Priyadharshini, Vol.3,Issue(1) NCRTCST,Page No.:46-49,Download
12. "Modeling and Control of Non – Linear Systems"
Author: K.S.S.Anjana and M.Sridhar, Co-Author: Vol.3,Issue(1) NCRTCST,Page No.:50-55,Download
13. "Improved Prediction of Salient Motion For Video Quality Assessment and Calculate the MOS"
Author: P.RAMESH NAIK ,Co-Author: B.SIVA REDDY, Vol.3,Issue(1) NCRTCST,Page No.:56-60,Download
14. "A Survey on the Cross and Multilingual Information Retrieval"
Author: N.Swapna ,Co-Author:Padmaja Rani, Kiran Kumar, Vol.3,Issue(1) NCRTCST,Page No.:61-64,Download
15. "Customer behaviour Analysis using CBA (Data Mining Approach)"
Author: K.V.Nagendra,Co-Author:C. Rajendra,G.Ravi Kumar, G.Srujana kumari, Vol.3,Issue(1) NCRTCST,Page No.:65-68,Download
16. "Exerting Modern Techniques for Data Leakage Problems Detect"
Author: N.Sandhya, Co-Author:G.Haricharan Sharma,K.Bhima,Vol.3,Issue(1) NCRTCST,Page No.:69-72,Download
17 "FPGA Design & Implementation of Hybrid Cellular Automation with Binary Synchronization"
Author:SHAIK. FAZEELATH JAHAN,Co-Author:S.NARASIMHA CHARY,Vol.3,Issue(1) NCRTCST,Page No.: 73-75,Download
18. "The New Vision of Go Programming Language "
Author: CH. Dayakar Reddy, Co-Author: Manish Kumar Shukla, Vol.3,Issue(1) NCRTCST,Page No.:76-78,Download
19. "Hardware Implementation of MAC Unit"
Author:Pratap Kumar Dakua,Co-Author:Anamika Sinha , Shivdhari & Gourab, Vol.3,Issue(1) NCRTCST,Page No.: 79-82,Download
20. "Implementation of ATM Security by Using Fingerprint recognition and GSM"
Author:PENNAM KRISHNAMURTHY,Co-Author:MR. M. MADDHUSUDHAN REDDDY, Vol.3,Issue(1) NCRTCST,Page No.:83-86,Download
21. "Image Inpainting Using Texture Synthesis"
Author:M Prasad,Co-Author:G.Mary Prakash Kumari,B V Raja Rao,Vol.3,Issue(1) NCRTCST,Page No.: 87-92,Download
22. "Improving Performance in Wireless Sensor Networks Using MEMS Technology"
Author:L.Mohan,Co-Author: B.Ranjitha, Syed Atiya Begum, Vol.3,Issue(1) NCRTCST,Page No.:93-95,Download
23. "ISP Security for DDoS Attacks "
Author: B.Mallikarjuna Reddy, Co-Author:K.R.N. Kiran Kumar, Vol.3,Issue(1) NCRTCST,Page No.:96-99,Download
24. "Information Completely Distributed in ireless Networks"
Author: Chandrashekhar B,Co-Author:, A.Vivekanand ,B.Rajani, Vol.3,Issue(1) NCRTCST,Page No.:100-104,Download
25. "Spread Spectrum System with DoS Attack Properties in Wireless Sensor Networks"
Author:Ch.V.V.Satyanarayana , Co-Author:G.Sanjiv Rao, B.Mallikarjuna Reddy, Vol.3,Issue(1) NCRTCST,Page No.:105-108,Download
26. "Discovering Usage Patterns from Web Data Using Web Usage Mining"
Author:L.Mohan,Co-Author:Dr.T.Venu Gopal,B.Ranjitha,Vol.3,Issue(1) NCRTCST,Page No.:109-112,Download
27. "Android Based Processor Performance Analyser "
Author:
Sumit Kumar ,Co-Author: Vol.3,Issue(1) NCRTCST,Page No.:113-114,Download
28. "Review Study on a Design of Finite Impulse Response Filter"
Author:Gopichauhann,Co-Author:P.Pavan Kumar,P.R.Vijaya Kumar,Vol.3,Issue(1) NCRTCST,Page No.:115-119,Download
29. "Query Optimization Using the Technique of Progressive Parametric"
Author:Rambabu P,Co-Author:Akkisetty Sesha Giri, Kumar Jetti,Priya jain,Vol.3,Issue(1) NCRTCST,Page No.:120-125,Download
30. "Analysis and Design of Controller for Two Area Deregulated AGC System"
Author:
K.S.S.Anjana ,Co-Author: Dr.M.Sridhar ,Vol.3,Issue(1) NCRTCST,Page No.:126-132,Download
31. "Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System"
Author: K.Valli Madhavi,Co-Author:R.Tamilkodi,R.BalaDinakar, Vol.3,Issue(1) NCRTCST,Page No.:133-137 ,Download
32. "Mobile IP Networks Approaches High Mobility Management for Performance Evaluation"
Author:R. Sujitha Rani,Co-Author: Vol.3,Issue(1) NCRTCST,Page No.:138-143,Download
33. "Architecture and Algorithm for an Cooperative Cache wireless p2p Networks"
Author:R. Vedasri, Co-Author:N.Sandeep Chaitanya,V.Venkataiah,Sk.Khaja Shareef,G.Rajeswari, Vol.3,Issue(1) NCRTCST,Page No.:144-151,Download
34. "Techniques for Resilience of Denial of Service Attacks in Mobile Ad Hoc Networks"
Author:Syed Atiya Begum, Co-Author:L.Mohan, B.Ranjitha, Vol.3,Issue(1) NCRTCST,Page No.:152-157,Download
35. "High-Speed Data Stream Mining using VFDT"
Author:Ch.S.K.V.R.Naidu, Co-Author:S. Devanam Priya,Sudam Sekhar Panda, Vol.3,Issue(1) NCRTCST,Page No.:158-163 , Download
36. "Tracing Sources of DDoS Attacks in IP Networks Using Machine Learning Automatic Defence System"
Author:K.SUBHASHINI, Co-Author:G.SUBBALAKSHMI, Vol.3,Issue(1) NCRTCST, Page No.:164-169, Download

Indexed By:

  • 1.gif
  • 1.png
  • 01.png
  • 2.jpg
  • 2.png
  • 3.jpg
  • 3.png
  • 4.jpg
  • 4.png
  • 5.png
  • 6.jpg
  • 6.png
  • 7.jpg
  • 7.png
  • 8.jpg
  • 8.png
  • 9.jpeg
  • 9.jpg
  • 10.jpg
  • 10.png
  • 11.jpg
  • 11.png
  • 12.jpg
  • 12.png
  • 13.jpg
  • 13.png
  • 14.jpg
  • 14.png
  • 15.jpg
  • 16.png
  • 17.jpg
  • 17.png
  • 19.png
  • copernicus.jpg