Volume 13 Issue 1

S.No Article Details Page-No
1

Hand Gesture Recognition using Convolution neural networks


Author: Dr.Vaka Murraali Mohan ., Nilesh Kumar Methri.,Nishitha Aluri.,Nithin Gaddam.,Pranay Kunta.
1-7
2

THE REPRESENTATION OF STUDENTS PARTICIPATION


Author: Dr.Y.Madhusekhar., Aishwarya Kathi.,Humera Banu.,Rakesh Kadamanda.,Vikas Gundeti .
8-11
3

PHISHING WEBSITE CLONE DETECTION USING MACHINE LEARNING RULES WITH CRYPTOGRAPHY TECHNIQUE


Author: A Karthikeyan S Sekar , S Sathish Kumar , S Sampath , U Tharun Kumar , V Vignesh
1-7
4

Strategies for Vibration Testing of Decision TreeBased Classification Systems.


Author: Kandimalla Gopi ,Veera Swamy Pittala
1-9
5

AUTOMATED STREET LIGHT CONTROL AND MANHOLE MONITORING WITH FAULIT DECTION AND REPORTING SYSTEM


Author: DR S PRADEEP, CH. DIVYA, M. BHANU, P. SWEJAL
1-10
6

CULTIVATION OF PLANTS UNDER ARTIFICIAL ENVIRONMENTAL PARAMETERS TO INCREASE PRODUCTIVITY RATE


Author: K. SIVA BHAVANI, B.SAI RUCHITHA, S. SUSHMA, S. ANJALI
1-10
7

REMOTE OPERATED SMART ELECTRONIC VOICE GUIDER FOR PHYSICALLY DISABLED BED RIDDEN PATIENTS OR OLD AGE PEOPLE


Author: K VENKATESH, B. SUSHMA, G. VYSHNAVI, T. AKSHAYA
1-10
8

SMART MATTRESS BASED ON MULTIPOINT FIBER BRAGGGRATINGS FOR RESPIRATORY RATE MONITORING


Author: DR S PRADEEP, B. JOSHNA, K. MANOHARSHITHA, K. HEMA SIRISHA
1-17
9

Crop Prediction Using Machine Learning with Internet of Things and Embedded systems


Author: V.Meghana, T. Sushmitha, R. Dhanalakshmi, Dr. S Raj Kumar
1-8
10

Embedded Solutions for Spring Shed Health and Management


Author: S.Varshitha Reddy , S.Navya sri, R.Sathwika, Dr.Jagadeeshan
1-6
11

Fake Profile Identification Using Machine Learning


Author: S. Supraja, T. Pravalika, V. Ramya, Dr. K. Sudhakar
1-8
12

Fire Fighting and Health Check-up Robot


Author: Shaik Shabana, S. Pravalika, T. Snigdha, Mr. V. Naga Mahesh
1-7
13

Solar PV Fed System for Water Pumping and Domestic Load by using Bidirectional Grid


Author: K.Ramya , T.Bhagya sri , Dr.K.Kiran Kumar
1-10
14

Enhancing Sustainable Agriculture: A Case Study on Vermicomposting Manure Preparation at Sadakathullah Appa College Campus, Tirunelveli


Author: Dr.S. Peer Mohamed
1-15
15

Music Recommendation Based on Real-Time Emotion Detection


Author: Seshadri Rao
1-11
16

Medicine Recommendation Using Machine Learning


Author: Seshadri Rao
1-14
17

Accelerating and Improving Wafer Defect Classification based via Data-Centric Deep Optimized Learning


Author: Mrs. k. Nandini1, Bejjanki Venkata Rao2, Dokku Yaswanth3, Darla Indravathi4, Gajula Ajay Kumar5
1-11
18

Efficiently Storing and Accessing Medical Records by Providing Security Using AWS Cloud


Author: Mr. MN Satish Kumar1, J. Naga Nandini Devi2, K. Sowjanya3, K. Murali Krishna4, G. Venkata Gopichand5
1-9
19

Versatile Face Recognition and Tracking System


Author: P Rajeshr1, K. Sai Yashwitha2, K. Lakshmi Narasimha Naidu3, K. Tharun Kumar4, G. Jagadish5 Seshadri Rao
1-10
20

IMPLEMENTATION OF EMPLOYEE RETENTION PREDICTION USING ADAM OPTIMIZER


Author: Ms. Y. Geetha sri1, K. Tejaswi gayathri2, J. Koteswrarao3,G. Dijendra pavan kumar4, J. Naga Sai Ram5 Seshadri Rao
1-9
21

BOOK RECOMMENDATION SYSTEM USING ANN


Author: Dr. N. Rajeswari1, K. Jhansi Naga Santhoshini2, G. Geetha3,G.Venkata Raghu Ram4, G. Karthik 5 Seshadri Rao
1-10
22

Remote Solar Power Monitoring and Fault Detection With IOT Integration


Author: G.Jayasri1, K.Nagamani Harika2,K.Pavan Krishna3, K.Haasitha4, Mrs.A.Apparna5
1-6
23

IOT BASED SMART TV FOR CHILD EYES SAFETY


Author: K.Balaji1 , G.Naga Sivaram 2, G.Lavanya Sai3 , K.Reddy Merson4 , Mrs. Y. Aditya5
1-9
24

IOT Real Time-Led Display Board Using Raspberry Pi


Author: G.Srikanth 1, Kotha Sai Saketh2, Kota Chaitanya 3, Kanchi Yaswanth Sai 4 , Gujjarlapudi Mamatha 5 ,Kodali Srinivas 6
1-10
25

Harnessing Ai For SMS Security


Author: 1.G. Swathi.G.Madhurya, G.Rakshitha, K.Usha Sree, M.Lakshmi Narayana Rao, J.Suresh
1-7
26

HAND GESTURE RECOGNITION USING ANN


Author: Mr.J.Raghunath, S.Srujana, A.Ameesha Naaz, K.Naveen, K. Navaneetha, student, P.Sunil Kumar
1-5
27

Securing Information Integrity with Block Chain


Author: Dr .O. Bhaskar, N. Likhitha, K. Om Sai Kumar, .B. Mohini devi, K. Meghashyam, student, A. Vani,
1-9
28

CALORIES BURNT PREDICTION BY XGBBOOST MODEL


Author: 1. Mr K. Ramesh, 2.C.Indira ,Student, 3.D.Sharmila, 4.S.Asha , 5.M.Prashanth, 6.D.Pavan Kalyan,
1-9
29

Text and Image Plagiarism Detection Using Deep Learning


Author: Mrs.G. Swathi, 2.D. Supraja, 3.J.Yashwanth, 4.N. Zuberia, 5.B. Sreehari, 6.O. Uday Kiran,
1-14
30

Lung Disease Recognition Method Using Audio- Based Analysis With Machine Learning


Author: Mr.A.Chandra Sekhar, 2.B. Chenna Kesava Reddy , 3. S. Haritha ,student, 5. G.Raghava Vandana, 6. S.Mohammed 7. D.Vijay Kumar,
1-4
31

Data Analytics Using Generative AI


Author: 1 Kunal Soni , 2 Priyanshu Pipliwal , 3 Jatin Bhardwaj, 4 Shashank Sharma
1-14
32

The Role of Artificial Intelligence in Cyber Security


Author: 1Ankit Kumar Taneja, 2Green Maraiya, 3Aman Gupta, 4 Rohit Sharma
1-5
33

The MERN Stack Revolution: A Review of its Impact on Modern Web Development


Author: 1Dr. Rajeev Yadav, 2Abha Sharma, 3Amir Khan Sk, 4J Jerone Gonsalvez
1-11
34

Accessing and Enhancing UPS Efficiency using SNMP


Author: 1Chirag Arora, 2Akash Rawat, 3Anjali Kumari Soni, 4Harleen Kour
1-7
35

Airlines Management System Using Salesforce


Author: 1Kiran Ahuja, 2Jyoti Sain, 3Lakshya Soni, 4Harish Yadav, 5Lakshay Sharma, 6Naveen Kumar Jangid
1-5
36

Design and Implementation of Web Based Online Examination System


Author: 1Shilpi Mishra, 2Tapendra Tailor, 3Priti Singh, 4Samarth Maheshwari, 5Aradhana, 6Abhishek Saxena
1-8
37

Unveiling the Future: Exploring the Synergy of AI and Machine Learning


Author: 1Pawan Sen, 2 Dr. Sunil Kumar Jangir, 3 Sakshi Swami, 4 Harsh Bhatt, 5Tanu Jhadotiya, 6Shalini Yadav
1-8
38

Advancements in Computerized ECG Analysis for Efficient Diagnosis of Cardiac Diseases


Author: 1Rahul Sharma, 2 Isha Yadav, 3Simran kaur, 4 Lakshita Goyal
1-4
39

SIGN LANGUAGE TRANSLATION BASED ON HAND GESTURE SCONVERTING INTO TEXT AND SPEECHING ENGLISH AS WELL AS TAMIL USING RANDOM FOREST ALGORITHM


Author: GayathriM#1, KaviyaK#2, PriyankaS#3,Dr.MadhurikkhaS#4
1-10
40

HUMAN ABNORMAL EVENT DETECTION FOR VEDIO SURVEILLANCE AND NON-SURVEILLANCE USING RNN


Author: Harshitha Shree S#1, Meenakshi R#2, Monisha M#3 Dr.MadhurikkhaS#4
1-8
41

EYE CATARACT DISEASE DETECTION BY USING TRANSFER LEARNING


Author: Gade Shiva Kumar 1, Javini Likhitha Reddy2,Devarapalli Ankitha3, Gayam Sahithi4
1-12
42

BRAIN TUMOR CLASSIFICATION AND DETECTION USING CNN WITH MRI IMAGES


Author: Ranabothu Srija 1,Pachineelam Pranathi2,Masina Karthik Reddy3,Maragouni Ashrith Goud4 Mr. V. Basha
1-9
43

LUNG NODULE DETECTION USING DEEP LEARNING


Author: B.Raviteja 1, K.Sidda Reddy2,L.Sharath Kumar3, Guru Devender4 Mrs. S. Pavani
1-12
44

Artificial Neural Networks Based Detection of Cyber Threats or Event Profiles


Author: 1 K. Ramesh 2 A. Manasa, 3 A. Sai Archana, 4 K. Supraja, 5 S. Ansar Basha, 6 S. Md. Arifullah, 7 G. Rohith Reddy,
1-10
45

FORENSIC EVIDENCE FOR DIGITAL IMAGES USING CNN


Author: Boddu Balakoti 1,Batharaju Vaishnavi2,Gunda Ashwak Kumar3, Gunagartti Sandeep4,Mr. J.Raju
1-12
46

Distributed of services in SDN using machine learning


Author: SAMEERA BEGUM1 . , SUMRANA SIDDIQUI 2 ., AFROZE BEGUM3
1-8
47

FAKE CURRENCY DETECTION USING CONVOLUTIONAL NEURAL NETWORK AND IMAGE PROCESSING


Author: Godasu Tharun 1,Challamalla Jagadishwar2,Gaddam Sravani3, Athikam Vishwa Sai4,Praveen Reddy
1-9
48

SPOT FRAUDULENT HEALTH INSURANCE CLAIMS WITH VARIOUS MACHINE LEARNING ALGORITHMS


Author: Ms. B .TRIVENI1 , MS. MUPPALLA HIMABINDU2
1-11
49

Price Negotiating with Text and voice on an E-commerce website


Author: Ms. BOMMISETTI TRIVENI 1, Mr. MANIKUMAR NANNEPAMULA 2
1-10
50

A DBSCAN-BASED DATA DEDUPLICATION SCHEME WITH ACCEPTABLE CLUSTERING DEVIATIONS


Author: Mr. SURESH GORANTLA , Ms. SABBINENI HARSHITHA
1-10
51

Safe Data Erasure and Transfer from Cloud Computing’s Counting Bloom Filter


Author: Mr. K. MAHANTHI 1, Ms. GADIDESI PAVITHRA2
1-9
52

Determining Air Quality Index with an Improved Extreme Learning Machine Based on Genetic Algorithms


Author: Mrs. K. HARIKA 1, Mr. V. GANESH KUMAR2
1-16
53

A Food Recommender System Based on Time-Aware Using Machine Learning


Author: Mrs.HARIKA.K 1, Ms.ANUSHA.V2
1-7
54

Data Structure for the Automated Categorization of News Text


Author: MR.SK.UDDANDU SAHEB1, MISS.R LEELA MALEKYA2
1-7
55

Applying a Gaussian blur filter to Grayscale Photos and Videos


Author: MRS. S.LAVANYA 1, MISS.J.SIVA KUMARI2
1-6
56

Electronic Health Record Databases That are Dynamically Shared and Verifiable by the Public


Author: Mrs. MOUNIKA.S 1, Mr. MURAHARI.P 2
1-8
57

The Use of Deep Learning Algorithms for the Determination of Authentic Images


Author: Mrs. MOUNIKA.S 1, Ms. PRAVEENA.P. 2
1-7
58

A Convolutional Neural Network (CNN) Based System to detect network intrusions


Author: Mrs. Anuradha A.¹, Ms. Sri Varsha Bh.²
1-9
59

An Object Detection and Recognition Framework for the Visually Impaired Using YOLO


Author: Mrs. S. LAVANYA 1, Mr. JADDU MOHAN KISHORE 2
1-10
60

DEEP LEARNING AND BLOCKCHAIN BASED MACHINE LEARNING FOR EVENT DETECTION AND TRUST VERIFICATION


Author: Mr. P.NARASIMHARAO, Ms. K.SAI SIRI
1-11
61

INTEGRATE AND MINE SEVERAL SOURCES OF MEDICAL DATA FOR HEALTH CARE SERVICES


Author: Mrs. Vijaya Ramineni 1, Mr. Krishna Prasad Chowdam 2
1-13
62

PREDICTION OF WATER QUALITY USING ML ALGORITHMS


Author: Mr. G. RAMAMOHANA RAO 1, Mr. VENKATESH MADINNI
1-10
63

Safe Data Erasure and Transfer from Cloud Computing’s Counting Bloom Filter


Author: PUSULURI SRIDHAR1, SK.MALINA 2 Mr. K. MAHANTHI 1, Ms. GADIDESI PAVITHRA2
1-10
64

Socially Enhanced suggestion Via Folded Bipartite network Integration


Author: Mrs. S.LAVANYA 1, Mr. KODURU YASWANTH 2
1-8
65

Neural Network-Based Analysis of User Behavior in Social Hotspots


Author: Mr. G. RAMAMOHANA RAO 1, Mr. MANOJ MARUBOINA 2
1-9
66

Cryptocurrency Transaction Fraud Detection: An Advanced Machine Learning And Deep Learning Approach


Author: Mr. K. MAHANTHI 1, Ms. ENDLA MOUNIKA 2
1-11
67

A STUDY CLOUD BASED SOLUTION FOR CROSS PLATFORM DATA SECURITY: WEB GUARDIAN


Author: Mrs. VIJAYA RAMINENI 1, Mr. MAHESH DANDE 2
1-11
68

ESTIMATION OF SOFTWARE DEFECTS USING MACHINE LEARNING ALGORITHMS


Author: Mr. P. NARASIMHA RAO1, Ms. KONKAYALA SRILAKSHMI
1-6
69

Improving Forest Fire Detection with Deep Learning: A Machine Vision Course Experiment


Author: MR.SK UDDANDU SAHEB1, Mr. ABDUL MALIK SHAIK2
1-11
70

Identifying and combating fraudulent behaviour in large-scale mobile social Networks


Author: Mr. K. MAHANTHI 1, Mr. GOLI GIRI BABU2
1-10
71

A System for Recommending Products with Personality Based on Metapath


Author: MS. ANURADHA ANUMOLU1, MR. CHALAPATI KESAVARAO2
1-10
72

AN ATTACK ON PRIVACY Via STATISTICAL INFERENCE IN A BIOMETRIC IDENTIFICATION SCHEME


Author: Mrs.Vijaya Ramineni1, Ms. Lavanya Damerla 2
1-12
73

AUDITING SECURE STORAGE AND PROVIDING EFFECTIVE KEY UPDATES


Author: Mrs Anuradha Anumolu,Mr. Bulleswarao Bathula
1-12
74

Cyber Hacking Breaches Prediction and Detection Using Machine Learning


Author: Mr. P. NARASIMHA RAO,Ms. LAKSHMI DURGA NAGA VASAVI DEVISETTY
1-9
75

Enhanced Security For Cloud Data Sharing And Outsourcing Through User-Side Encrypted File System


Author: Mrs.HARIKA.K, Ms.KRISHNAPRIYA.U
1-10
76

An investigation of software management utilizing agile principles and big data analytics


Author: Dr THARINI BENARJI
11-18
77

A Survey Paper on Navigating the Complex Terrain of Social Networking Data Analysis


Author: Shriya Sahu,Prerna Verma,Puspesh Kashyap
19-28
78

AI and Machine Learning in Smart Agriculture: A Comprehensive Analysis


Author: Shriya Sahu,Puspesh Kashyap,Prerna Verma
29-35
79

Effect of Frustration Tolerance on Emotional Stability of Sportspersons


Author: Dr. Manees Saxena
36-42
80

Yoga in Physical education: A Fruitful Benefits


Author: Dr. Manees Saxena
43-51
81

Predicting Autism Spectrum Disorders Through Machine Learning Techniques


Author: Dr. MALLISHETTY PRAVEEN KUMAR, CHILKAPATI SAI SUDHA
52-57
82

Predictive Modeling and Classification of DDoS Incidents Using Machine Learning


Author: GUMMADI TIRUMALA, KATAMREDDY MAHENDRA
58-66
83

Bidispersed fluid analysis: Possible Uses


Author: Vijayapuram Keerthi, Chiranjeevi Kommulu
67-71
84

ASSESSING THE EDGE SERVER USER'S PERSONAL PREFERENCE FUNCTION UTILIZING SOCIAL NETWORK- BASED RANK


Author: A SRIKANTH , YEMBULURI RAMA KRISHNA , B MRUDHULA, N.TEAJA PRAKASH
72-80
85

INDOOR ROBOT LOCALIZATION SYSTEM USING WIFI SIGNAL


Author: HANISH CHAITANYA BODEPUDI, M PARAMESWARARAO, POKURI PRAKASH, POLAKATI MANEESHA
81-89
86

A Hybrid Secure Routing Mechanism in IoT-based Wireless Sensor Networks


Author: E.ADINARAYANA , VENKATASUBRAMANYAMY , A SRIKANTH , CHALLA VINOD
90-105
87

Seating Arrangement System for Examination


Author: SYED RESHMA , G.SIDDHANTH , Y. YESU BABU
106-110
88

IOT BASED WAR FIELD SPYING ROBOT


Author: Dr.M.NAGESWARARAO , CH SRIKANYA , E DASARADHA RAMIREDDY , MUPPALLA NARENDRA
111-115
89

A CONCRETE AND PROVABLE APPROACH FOR SECURING CLOUD DATA USING IDENTITY-BASED DATA POSSESSION MODEL


Author: M VENKATA RAMANA , K.ANUSHA , CHALLA VINOD , Dr.S .GOPI KRISHNA
116-124
90

DETECTION AND ANALYSIS OF MALICIOUS CODE ON ANDROID


Author: TADIKAMALA VINEELA, JAINA SAICHAND , SYED RESHMA , P.RAJASEKHARAN
125-131