National Conference on Computing and Communication Technologies (NCCCT'18), Jamal Mohamed College (JMC) Tiruchirappalli, India
| 
           S.No.  | 
            
           Title of Paper  | 
            
           Page No.   | 
        
1.   | 
          Security Issues in Cloud Computing Environment: A Review Author: R. Kanimozhi1  | 
          1-5  | 
        
2.   | 
          A Study on Job Scheduling Algorithms in Cloud Computing Author: P. Nandhini  | 
          6-11  | 
        
3.   | 
          
               Authors: Durairaj. M, Nandhakumar Ramasamy  | 
          12-16  | 
        
4.   | 
          A Survey on Fault Tolerant Energy Efficient Algorithms in Cloud Computing Authors:J. Diana Vency, Khairunnisa  | 
          17-23  | 
        
5.   | 
          Performance Analysis of ID3 and C4.5 Algorithms using Paper Review Data Authors: J. Hajiram Beevi, B. Sumaiya Parveen  | 
          24-29  | 
        
6.   | 
          A Survey on Insight of Big Data Authors: S. Josephine Theresa, Dr. D.J. Evangaline  | 
          30-36  | 
        
7.   | 
          A Study on Symmetric key Ciphers in Cryptography and Network Security Authors: A. Amutha, H. Krishnaveni  | 
          37-40  | 
        
8.   | 
          A Survey on Job Scheduling Technique in Cloud Computing Authors: S. Vaaheetha Kfatheen, R. Nisha, S. Sartaj Begum  | 
          41-45  | 
        
9.   | 
          PUA: Power Utilization Algorithm Using IOT Authors: M. Kamal, G. Ramya  | 
          46-48  | 
        
10.   | 
          A Study on Scheduling Algorithms in Cloud Environment Authors: S. Vaaheedha Kfatheen, S. Priyadharsini  | 
          49-53  | 
        
11.   | 
          A Survey on Internet of Things Authors: S. Vaaheedha kfatheen, R. Jayalakshmi, K. Priya Dharshini  | 
          54-59  | 
        
12.   | 
          Load Balancing Techniques in Cloud Computing: A Review Authors: S. Vaaheedah Kfatheen, J. Fathima Fouzia  | 
          60-63  | 
        
13.   | 
          A Task Scheduling Algorithms in Cloud Computing Environment: A Review Authors : O.S. Abdul Qadir, Dr. G. Ravi, S. Shrinidhi  | 
          64-69  | 
        
14.   | 
          A Study on Various Technique Used In Sentimental Analysis Authors : Dr. A. R. Mohamed Shanavas, R.Pavithra  | 
          70-75  | 
        
15.   | 
          Sentiment Analysis on Facebook Posts using Emoticons Analysis Authors : M. Devishree, Dr. A. R. Mohamed Shanavas  | 
          76-82  | 
        
16.   | 
          Sentimental Analysis:Voice Based Driven Review Analysis Authors : N. Ramya, S. Abdul Saleem  | 
          83-87  | 
        
17.  | 
          Data Mining Techniques for Surveillance Video – A Survey Authors : Dr. M. Parveen, R. Dharani  | 
          88-92  | 
        
18.   | 
          Techniques of Educational Data Mining: A Survey Authors : Dr. M. Parveen, S. Aiswarya Lakshmi  | 
          93-99  | 
        
19.   | 
          Load Balancing in Grid Computing Environment: A Review Authors : S. Vaaheedha Kfatheen, K. Sultana  | 
          100-103  | 
        
20.   | 
          Survey on Vague Set theory for Decision Making in Various Applications Authors : M. Durairaj, T. S. Poornappriya  | 
          104-107  | 
        
21.   | 
          A Review on EEG Emotion Recognition Authors : M. Durairaj, Jansi Rani R  | 
          108-112  | 
        
22.   | 
          Cost Effective Disaster Finding using Supervised Learning Methods on Hadoop (Suspended) Authors : V. Sobanadevi, Dr. G. Ravi  | 
          113-119  | 
        
23.   | 
          Address Configuring Mechanisms in IPv4/v6 MANET - A Pragmatic Survey Authors : S. Manimozhi, M.Chandrakumar Peter, J. Gnana Jayanthi  | 
          120-124  | 
        
24.   | 
          
               Authors : Dr. K. Mohan Kumar, B. Srinivasan  | 
          125-128  | 
        
25.   | 
          A Weightless Attack Detection System for Internet of Things Authors : Z. Harith Ahamed, A. Abdul Samathu  | 
          129-134  | 
        
26.   | 
          A Study on Clustering Techniques in Data Mining Authors : Dr. K.N. Abdul Kader Nihal  | 
          135-138  | 
        
27.   | 
          An Experimental Study on Performance Evaluation of K Star Algorithm Using Diverse Datasets Authors : M. Ibramsha, K. Nafees Ahmed  | 
          139-145  | 
        
28.   | 
          Forecasting of Student Performance using Data Mining Techniques Authors : Dr. M. Mohamed Surputheen, S. Peerbasha  | 
          146-152  | 
        
29.   | 
          Text Classification Approach using Machine Learning and Rule-Based Automated Learning Authors : M. Durairaj, A. Alagu Karthikeyan  | 
          153-158  | 
        
30.   | 
          A Review on Mobile Cloud Computing Authors: S. Vaaheedha kfatheen, S. Hani nasreen, A. Parveen sulthana  | 
          159-164  | 
        
31.   | 
          A Comparative Study on Big Data Frameworks Authors: Dr. K. Mohan Kumar, D. Maghesh Kumar  | 
          165-169  | 
        
32.   | 
          A Study on Task Scheduling Types in Cloud Computing Authors: O. S. Abdul Qadir, Dr. G. Ravi, S. Kalaiarasi  | 
          170-176  | 
        
33.   | 
          Smart Home Automation System Based On IoT Through Fingerprint Recognition Authors : S. Vaaheedha Kfatheen, S. Shapna Begum  | 
          177-180  |