S.No | Article Details | Page-No |
---|---|---|
1 | Hand Gesture Recognition using Convolution neural networksAuthor: Dr.Vaka Murraali Mohan ., Nilesh Kumar Methri.,Nishitha Aluri.,Nithin Gaddam.,Pranay Kunta. |
1-7 |
2 | THE REPRESENTATION OF STUDENTS PARTICIPATIONAuthor: Dr.Y.Madhusekhar., Aishwarya Kathi.,Humera Banu.,Rakesh Kadamanda.,Vikas Gundeti . |
8-11 |
3 | PHISHING WEBSITE CLONE DETECTION USING MACHINE LEARNING RULES WITH CRYPTOGRAPHY TECHNIQUEAuthor: A Karthikeyan S Sekar , S Sathish Kumar , S Sampath , U Tharun Kumar , V Vignesh |
1-7 |
4 | Strategies for Vibration Testing of Decision TreeBased Classification Systems.Author: Kandimalla Gopi ,Veera Swamy Pittala |
1-9 |
5 | AUTOMATED STREET LIGHT CONTROL AND MANHOLE MONITORING WITH FAULIT DECTION AND REPORTING SYSTEMAuthor: DR S PRADEEP, CH. DIVYA, M. BHANU, P. SWEJAL |
1-10 |
6 | CULTIVATION OF PLANTS UNDER ARTIFICIAL ENVIRONMENTAL PARAMETERS TO INCREASE PRODUCTIVITY RATEAuthor: K. SIVA BHAVANI, B.SAI RUCHITHA, S. SUSHMA, S. ANJALI |
1-10 |
7 | REMOTE OPERATED SMART ELECTRONIC VOICE GUIDER FOR PHYSICALLY DISABLED BED RIDDEN PATIENTS OR OLD AGE PEOPLEAuthor: K VENKATESH, B. SUSHMA, G. VYSHNAVI, T. AKSHAYA |
1-10 |
8 | SMART MATTRESS BASED ON MULTIPOINT FIBER BRAGGGRATINGS FOR RESPIRATORY RATE MONITORINGAuthor: DR S PRADEEP, B. JOSHNA, K. MANOHARSHITHA, K. HEMA SIRISHA |
1-17 |
9 | Crop Prediction Using Machine Learning with Internet of Things and Embedded systemsAuthor: V.Meghana, T. Sushmitha, R. Dhanalakshmi, Dr. S Raj Kumar |
1-8 |
10 | Embedded Solutions for Spring Shed Health and ManagementAuthor: S.Varshitha Reddy , S.Navya sri, R.Sathwika, Dr.Jagadeeshan |
1-6 |
11 | Fake Profile Identification Using Machine LearningAuthor: S. Supraja, T. Pravalika, V. Ramya, Dr. K. Sudhakar |
1-8 |
12 | Fire Fighting and Health Check-up RobotAuthor: Shaik Shabana, S. Pravalika, T. Snigdha, Mr. V. Naga Mahesh |
1-7 |
13 | Solar PV Fed System for Water Pumping and Domestic Load by using Bidirectional GridAuthor: K.Ramya , T.Bhagya sri , Dr.K.Kiran Kumar |
1-10 |
14 | Enhancing Sustainable Agriculture: A Case Study on Vermicomposting Manure Preparation at Sadakathullah Appa College Campus, TirunelveliAuthor: Dr.S. Peer Mohamed |
1-15 |
15 | Music Recommendation Based on Real-Time Emotion DetectionAuthor: Seshadri Rao |
1-11 |
16 | Medicine Recommendation Using Machine LearningAuthor: Seshadri Rao |
1-14 |
17 | Accelerating and Improving Wafer Defect Classification based via Data-Centric Deep Optimized LearningAuthor: Mrs. k. Nandini1, Bejjanki Venkata Rao2, Dokku Yaswanth3, Darla Indravathi4, Gajula Ajay Kumar5 |
1-11 |
18 | Efficiently Storing and Accessing Medical Records by Providing Security Using AWS CloudAuthor: Mr. MN Satish Kumar1, J. Naga Nandini Devi2, K. Sowjanya3, K. Murali Krishna4, G. Venkata Gopichand5 |
1-9 |
19 | Versatile Face Recognition and Tracking SystemAuthor: P Rajeshr1, K. Sai Yashwitha2, K. Lakshmi Narasimha Naidu3, K. Tharun Kumar4, G. Jagadish5 Seshadri Rao |
1-10 |
20 | IMPLEMENTATION OF EMPLOYEE RETENTION PREDICTION USING ADAM OPTIMIZERAuthor: Ms. Y. Geetha sri1, K. Tejaswi gayathri2, J. Koteswrarao3,G. Dijendra pavan kumar4, J. Naga Sai Ram5 Seshadri Rao |
1-9 |
21 | BOOK RECOMMENDATION SYSTEM USING ANNAuthor: Dr. N. Rajeswari1, K. Jhansi Naga Santhoshini2, G. Geetha3,G.Venkata Raghu Ram4, G. Karthik 5 Seshadri Rao |
1-10 |
22 | Remote Solar Power Monitoring and Fault Detection With IOT IntegrationAuthor: G.Jayasri1, K.Nagamani Harika2,K.Pavan Krishna3, K.Haasitha4, Mrs.A.Apparna5 |
1-6 |
23 | IOT BASED SMART TV FOR CHILD EYES SAFETYAuthor: K.Balaji1 , G.Naga Sivaram 2, G.Lavanya Sai3 , K.Reddy Merson4 , Mrs. Y. Aditya5 |
1-9 |
24 | IOT Real Time-Led Display Board Using Raspberry PiAuthor: G.Srikanth 1, Kotha Sai Saketh2, Kota Chaitanya 3, Kanchi Yaswanth Sai 4 , Gujjarlapudi Mamatha 5 ,Kodali Srinivas 6 |
1-10 |
25 | Harnessing Ai For SMS SecurityAuthor: 1.G. Swathi.G.Madhurya, G.Rakshitha, K.Usha Sree, M.Lakshmi Narayana Rao, J.Suresh |
1-7 |
26 | HAND GESTURE RECOGNITION USING ANNAuthor: Mr.J.Raghunath, S.Srujana, A.Ameesha Naaz, K.Naveen, K. Navaneetha, student, P.Sunil Kumar |
1-5 |
27 | Securing Information Integrity with Block ChainAuthor: Dr .O. Bhaskar, N. Likhitha, K. Om Sai Kumar, .B. Mohini devi, K. Meghashyam, student, A. Vani, |
1-9 |
28 | CALORIES BURNT PREDICTION BY XGBBOOST MODELAuthor: 1. Mr K. Ramesh, 2.C.Indira ,Student, 3.D.Sharmila, 4.S.Asha , 5.M.Prashanth, 6.D.Pavan Kalyan, |
1-9 |
29 | Text and Image Plagiarism Detection Using Deep LearningAuthor: Mrs.G. Swathi, 2.D. Supraja, 3.J.Yashwanth, 4.N. Zuberia, 5.B. Sreehari, 6.O. Uday Kiran, |
1-14 |
30 | Lung Disease Recognition Method Using Audio- Based Analysis With Machine LearningAuthor: Mr.A.Chandra Sekhar, 2.B. Chenna Kesava Reddy , 3. S. Haritha ,student, 5. G.Raghava Vandana, 6. S.Mohammed 7. D.Vijay Kumar, |
1-4 |
31 | Data Analytics Using Generative AIAuthor: 1 Kunal Soni , 2 Priyanshu Pipliwal , 3 Jatin Bhardwaj, 4 Shashank Sharma |
1-14 |
32 | The Role of Artificial Intelligence in Cyber SecurityAuthor: 1Ankit Kumar Taneja, 2Green Maraiya, 3Aman Gupta, 4 Rohit Sharma |
1-5 |
33 | The MERN Stack Revolution: A Review of its Impact on Modern Web DevelopmentAuthor: 1Dr. Rajeev Yadav, 2Abha Sharma, 3Amir Khan Sk, 4J Jerone Gonsalvez |
1-11 |
34 | Accessing and Enhancing UPS Efficiency using SNMPAuthor: 1Chirag Arora, 2Akash Rawat, 3Anjali Kumari Soni, 4Harleen Kour |
1-7 |
35 | Airlines Management System Using SalesforceAuthor: 1Kiran Ahuja, 2Jyoti Sain, 3Lakshya Soni, 4Harish Yadav, 5Lakshay Sharma, 6Naveen Kumar Jangid |
1-5 |
36 | Design and Implementation of Web Based Online Examination SystemAuthor: 1Shilpi Mishra, 2Tapendra Tailor, 3Priti Singh, 4Samarth Maheshwari, 5Aradhana, 6Abhishek Saxena |
1-8 |
37 | Unveiling the Future: Exploring the Synergy of AI and Machine LearningAuthor: 1Pawan Sen, 2 Dr. Sunil Kumar Jangir, 3 Sakshi Swami, 4 Harsh Bhatt, 5Tanu Jhadotiya, 6Shalini Yadav |
1-8 |
38 | Advancements in Computerized ECG Analysis for Efficient Diagnosis of Cardiac DiseasesAuthor: 1Rahul Sharma, 2 Isha Yadav, 3Simran kaur, 4 Lakshita Goyal |
1-4 |
39 | SIGN LANGUAGE TRANSLATION BASED ON HAND GESTURE SCONVERTING INTO TEXT AND SPEECHING ENGLISH AS WELL AS TAMIL USING RANDOM FOREST ALGORITHMAuthor: GayathriM#1, KaviyaK#2, PriyankaS#3,Dr.MadhurikkhaS#4 |
1-10 |
40 | HUMAN ABNORMAL EVENT DETECTION FOR VEDIO SURVEILLANCE AND NON-SURVEILLANCE USING RNNAuthor: Harshitha Shree S#1, Meenakshi R#2, Monisha M#3 Dr.MadhurikkhaS#4 |
1-8 |
41 | EYE CATARACT DISEASE DETECTION BY USING TRANSFER LEARNINGAuthor: Gade Shiva Kumar 1, Javini Likhitha Reddy2,Devarapalli Ankitha3, Gayam Sahithi4 |
1-12 |
42 | BRAIN TUMOR CLASSIFICATION AND DETECTION USING CNN WITH MRI IMAGESAuthor: Ranabothu Srija 1,Pachineelam Pranathi2,Masina Karthik Reddy3,Maragouni Ashrith Goud4 Mr. V. Basha |
1-9 |
43 | LUNG NODULE DETECTION USING DEEP LEARNINGAuthor: B.Raviteja 1, K.Sidda Reddy2,L.Sharath Kumar3, Guru Devender4 Mrs. S. Pavani |
1-12 |
44 | Artificial Neural Networks Based Detection of Cyber Threats or Event ProfilesAuthor: 1 K. Ramesh 2 A. Manasa, 3 A. Sai Archana, 4 K. Supraja, 5 S. Ansar Basha, 6 S. Md. Arifullah, 7 G. Rohith Reddy, |
1-10 |
45 | FORENSIC EVIDENCE FOR DIGITAL IMAGES USING CNNAuthor: Boddu Balakoti 1,Batharaju Vaishnavi2,Gunda Ashwak Kumar3, Gunagartti Sandeep4,Mr. J.Raju |
1-12 |
46 | Distributed of services in SDN using machine learningAuthor: SAMEERA BEGUM1 . , SUMRANA SIDDIQUI 2 ., AFROZE BEGUM3 |
1-8 |
47 | FAKE CURRENCY DETECTION USING CONVOLUTIONAL NEURAL NETWORK AND IMAGE PROCESSINGAuthor: Godasu Tharun 1,Challamalla Jagadishwar2,Gaddam Sravani3, Athikam Vishwa Sai4,Praveen Reddy |
1-9 |
48 | SPOT FRAUDULENT HEALTH INSURANCE CLAIMS WITH VARIOUS MACHINE LEARNING ALGORITHMSAuthor: Ms. B .TRIVENI1 , MS. MUPPALLA HIMABINDU2 |
1-11 |
49 | Price Negotiating with Text and voice on an E-commerce websiteAuthor: Ms. BOMMISETTI TRIVENI 1, Mr. MANIKUMAR NANNEPAMULA 2 |
1-10 |
50 | A DBSCAN-BASED DATA DEDUPLICATION SCHEME WITH ACCEPTABLE CLUSTERING DEVIATIONSAuthor: Mr. SURESH GORANTLA , Ms. SABBINENI HARSHITHA |
1-10 |
51 | Safe Data Erasure and Transfer from Cloud Computing’s Counting Bloom FilterAuthor: Mr. K. MAHANTHI 1, Ms. GADIDESI PAVITHRA2 |
1-9 |
52 | Determining Air Quality Index with an Improved Extreme Learning Machine Based on Genetic AlgorithmsAuthor: Mrs. K. HARIKA 1, Mr. V. GANESH KUMAR2 |
1-16 |
53 | A Food Recommender System Based on Time-Aware Using Machine LearningAuthor: Mrs.HARIKA.K 1, Ms.ANUSHA.V2 |
1-7 |
54 | Data Structure for the Automated Categorization of News TextAuthor: MR.SK.UDDANDU SAHEB1, MISS.R LEELA MALEKYA2 |
1-7 |
55 | Applying a Gaussian blur filter to Grayscale Photos and VideosAuthor: MRS. S.LAVANYA 1, MISS.J.SIVA KUMARI2 |
1-6 |
56 | Electronic Health Record Databases That are Dynamically Shared and Verifiable by the PublicAuthor: Mrs. MOUNIKA.S 1, Mr. MURAHARI.P 2 |
1-8 |
57 | The Use of Deep Learning Algorithms for the Determination of Authentic ImagesAuthor: Mrs. MOUNIKA.S 1, Ms. PRAVEENA.P. 2 |
1-7 |
58 | A Convolutional Neural Network (CNN) Based System to detect network intrusionsAuthor: Mrs. Anuradha A.¹, Ms. Sri Varsha Bh.² |
1-9 |
59 | An Object Detection and Recognition Framework for the Visually Impaired Using YOLOAuthor: Mrs. S. LAVANYA 1, Mr. JADDU MOHAN KISHORE 2 |
1-10 |
60 | DEEP LEARNING AND BLOCKCHAIN BASED MACHINE LEARNING FOR EVENT DETECTION AND TRUST VERIFICATIONAuthor: Mr. P.NARASIMHARAO, Ms. K.SAI SIRI |
1-11 |
61 | INTEGRATE AND MINE SEVERAL SOURCES OF MEDICAL DATA FOR HEALTH CARE SERVICESAuthor: Mrs. Vijaya Ramineni 1, Mr. Krishna Prasad Chowdam 2 |
1-13 |
62 | PREDICTION OF WATER QUALITY USING ML ALGORITHMSAuthor: Mr. G. RAMAMOHANA RAO 1, Mr. VENKATESH MADINNI |
1-10 |
63 | Safe Data Erasure and Transfer from Cloud Computing’s Counting Bloom FilterAuthor: PUSULURI SRIDHAR1, SK.MALINA 2 Mr. K. MAHANTHI 1, Ms. GADIDESI PAVITHRA2 |
1-10 |
64 | Socially Enhanced suggestion Via Folded Bipartite network IntegrationAuthor: Mrs. S.LAVANYA 1, Mr. KODURU YASWANTH 2 |
1-8 |
65 | Neural Network-Based Analysis of User Behavior in Social HotspotsAuthor: Mr. G. RAMAMOHANA RAO 1, Mr. MANOJ MARUBOINA 2 |
1-9 |
66 | Cryptocurrency Transaction Fraud Detection: An Advanced Machine Learning And Deep Learning ApproachAuthor: Mr. K. MAHANTHI 1, Ms. ENDLA MOUNIKA 2 |
1-11 |
67 | A STUDY CLOUD BASED SOLUTION FOR CROSS PLATFORM DATA SECURITY: WEB GUARDIANAuthor: Mrs. VIJAYA RAMINENI 1, Mr. MAHESH DANDE 2 |
1-11 |
68 | ESTIMATION OF SOFTWARE DEFECTS USING MACHINE LEARNING ALGORITHMSAuthor: Mr. P. NARASIMHA RAO1, Ms. KONKAYALA SRILAKSHMI |
1-6 |
69 | Improving Forest Fire Detection with Deep Learning: A Machine Vision Course ExperimentAuthor: MR.SK UDDANDU SAHEB1, Mr. ABDUL MALIK SHAIK2 |
1-11 |
70 | Identifying and combating fraudulent behaviour in large-scale mobile social NetworksAuthor: Mr. K. MAHANTHI 1, Mr. GOLI GIRI BABU2 |
1-10 |
71 | A System for Recommending Products with Personality Based on MetapathAuthor: MS. ANURADHA ANUMOLU1, MR. CHALAPATI KESAVARAO2 |
1-10 |
72 | AN ATTACK ON PRIVACY Via STATISTICAL INFERENCE IN A BIOMETRIC IDENTIFICATION SCHEMEAuthor: Mrs.Vijaya Ramineni1, Ms. Lavanya Damerla 2 |
1-12 |
73 | AUDITING SECURE STORAGE AND PROVIDING EFFECTIVE KEY UPDATESAuthor: Mrs Anuradha Anumolu,Mr. Bulleswarao Bathula |
1-12 |
74 | Cyber Hacking Breaches Prediction and Detection Using Machine LearningAuthor: Mr. P. NARASIMHA RAO,Ms. LAKSHMI DURGA NAGA VASAVI DEVISETTY |
1-9 |
75 | Enhanced Security For Cloud Data Sharing And Outsourcing Through User-Side Encrypted File SystemAuthor: Mrs.HARIKA.K, Ms.KRISHNAPRIYA.U |
1-10 |
76 | An investigation of software management utilizing agile principles and big data analyticsAuthor: Dr THARINI BENARJI |
11-18 |
77 | A Survey Paper on Navigating the Complex Terrain of Social Networking Data AnalysisAuthor: Shriya Sahu,Prerna Verma,Puspesh Kashyap |
19-28 |
78 | AI and Machine Learning in Smart Agriculture: A Comprehensive AnalysisAuthor: Shriya Sahu,Puspesh Kashyap,Prerna Verma |
29-35 |
79 | Effect of Frustration Tolerance on Emotional Stability of SportspersonsAuthor: Dr. Manees Saxena |
36-42 |
80 | Yoga in Physical education: A Fruitful BenefitsAuthor: Dr. Manees Saxena |
43-51 |
81 | Predicting Autism Spectrum Disorders Through Machine Learning TechniquesAuthor: Dr. MALLISHETTY PRAVEEN KUMAR, CHILKAPATI SAI SUDHA |
52-57 |
82 | Predictive Modeling and Classification of DDoS Incidents Using Machine LearningAuthor: GUMMADI TIRUMALA, KATAMREDDY MAHENDRA |
58-66 |
83 | Bidispersed fluid analysis: Possible UsesAuthor: Vijayapuram Keerthi, Chiranjeevi Kommulu |
67-71 |
84 | ASSESSING THE EDGE SERVER USER'S PERSONAL PREFERENCE FUNCTION UTILIZING SOCIAL NETWORK- BASED RANKAuthor: A SRIKANTH , YEMBULURI RAMA KRISHNA , B MRUDHULA, N.TEAJA PRAKASH |
72-80 |
85 | INDOOR ROBOT LOCALIZATION SYSTEM USING WIFI SIGNALAuthor: HANISH CHAITANYA BODEPUDI, M PARAMESWARARAO, POKURI PRAKASH, POLAKATI MANEESHA |
81-89 |
86 | A Hybrid Secure Routing Mechanism in IoT-based Wireless Sensor NetworksAuthor: E.ADINARAYANA , VENKATASUBRAMANYAMY , A SRIKANTH , CHALLA VINOD |
90-105 |
87 | Seating Arrangement System for ExaminationAuthor: SYED RESHMA , G.SIDDHANTH , Y. YESU BABU |
106-110 |
88 | IOT BASED WAR FIELD SPYING ROBOTAuthor: Dr.M.NAGESWARARAO , CH SRIKANYA , E DASARADHA RAMIREDDY , MUPPALLA NARENDRA |
111-115 |
89 | A CONCRETE AND PROVABLE APPROACH FOR SECURING CLOUD DATA USING IDENTITY-BASED DATA POSSESSION MODELAuthor: M VENKATA RAMANA , K.ANUSHA , CHALLA VINOD , Dr.S .GOPI KRISHNA |
116-124 |
90 | DETECTION AND ANALYSIS OF MALICIOUS CODE ON ANDROIDAuthor: TADIKAMALA VINEELA, JAINA SAICHAND , SYED RESHMA , P.RAJASEKHARAN |
125-131 |