|
|
|
Previous Issue |
|
Volume 12, Issue 3, July 2024 |
Research and Review Articles |
S.No. |
Title & Author's Name |
Page |
1 |
A MEMORY-EFFICIENT DEEP CNN APPROACH FOR RETINAL DISEASE DETECTION
Dasari Sekhar, Dr. V Uma Rani
[View] [Download PDF]
|
1-14 |
2 |
Enhancing Early Detection of Kidney Diseases with an Explainable AI Model
Anumandla Supriya, Dr. V Uma Rani
[View] [Download PDF]
|
15-30 |
3 |
A Robust Approach for Effective Spam Detection Using Supervised Learning Techniques
Pravallika, G Sreeramulu, Dr.D.William Albert
[View] [Download PDF]
|
31-39 |
4 |
DETECTING MALICIOUS TWITTER BOTS USING MACHINE LEARNING
Darzi Mehtaab Siddiqa, Dr.D. William Albert
[View] [Download PDF]
|
40-44 |
5 |
CROSS SITE REQUEST FORGERY DETECTION USING MACHINE LEARNING
Chittari Deepika, Mrs. M. Sivamma, Dr.D.William Albert
[View] [Download PDF]
|
45-51 |
6 |
EFFICIENT MACHINE LEARNING TECHNIQUES FOR PREDICTION OF LIVER DISEASE
Mr. Jayanthi Balaji, Mr. Arjun Kurava, Dr.D.William Albert
[View] [Download PDF]
|
52-58 |
7 |
SECURITY ISSUES AND SOLUTIONS IN VEHICLE ADHOC NETWORKS
Kadari Shireesha, Burugula Sunitha, Mohammad Raziuddin, Kummari Vasantha
[View] [Download PDF]
|
59-68 |
8 |
IMAGE PROCESSING AND MACHINE LEARNING FOR HUMAN STRESS DETECTION
T Pravallika, G Sreeramulu, Dr.D.William Albert
[View] [Download PDF]
|
69-77 |
9 |
A FINE-GRAINED OBJECT DETECTION MODEL FOR AERIAL IMAGES BASED ON YOLOV5 DEEP NEURAL NETWORK
Nadia Anjun, Khansa Nazeer, Hamda Nadeem, Syeda Saniya Razvi
[View] [Download PDF]
|
78-93 |
10 |
An Application of a Deep Learning Algorithm for Automatic Detection of Unexpected Accidents under bad CCTV monitoring conditions in tunnels
P MOUNIKA, V.HARIKA LAKSHMI
[View] [Download PDF]
|
94-100 |
11 |
Malware Detection A Framework for Reverse Engineered Android Applications through Machine Learning Algorithms
A NAGARAJU, P.DIVAKAR
[View] [Download PDF]
|
101-106 |
12 |
HEALTH MONITORING ON SOCIAL MEDIA OVER TIME
A NAGARAJU, S. DURGA NAGA VENKATA UPENDRA
[View] [Download PDF]
|
107-113 |
13 |
INTERNET FINANCIAL FRAUD DETECTION BASED ON A DISTRIBUTED BIG DATA APPROACH WITH NODE2VEC
A NAGARAJU, S. AYESHA
[View] [Download PDF]
|
114-122 |
14 |
PREDICTIVE ANALYSIS FOR BIG MART SALES USING MACHINE LEARNING ALGORITHMS
K SUPARNA, S. SUSMITHA RANI
[View] [Download PDF]
|
123-130 |
15 |
FAKE DETECH ADEEP LEARNING ENSEMBLE MODEL FOR SFAKE NEWS DETECTION
P MOUNIKA, V. SOMA SRI RAMA NAGESWARA RAO
[View] [Download PDF]
|
131-136 |
16 |
Water Neta Network for Monitoring and Assessing Water Quality for Drinking and Irrigation Purposes
P MOUNIKA, V.UPENDHRA
[View] [Download PDF]
|
137-145 |
17 |
Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis
P MOUNIKA, Y.CHAITHANYA SAI
[View] [Download PDF]
|
146-152 |
18 |
USE OF ARTIFICIAL NEUTRAL NETWORKS BY IDENTIFY FAKE PROFILE
P MOUNIKA, T. PALLAVI SURYA
[View] [Download PDF]
|
153-156 |
19 |
HEARTDISEASE PREDICTION USINGBIO INSPIRED ALGORITHMS
P MOUNIKA, V. VINAY KUMAR
[View] [Download PDF]
|
157-162 |
20 |
DETECTING SYBIL ATTACK SUSING PROOFS OF WORK AND LOCATION INVANETS
K SUPARNA, S.RAVI TEJA
[View] [Download PDF]
|
163-171 |
21 |
A MULTI STREAM FUTURE FUSION APPROACH FOR TRAFFIC PREDICTION
P MOUNIKA, V. SAI SINDHU
[View] [Download PDF]
|
172-179 |
22 |
Identifying Health Insurance Claim Frauds Using Mixture of Clinical Concepts
P MOUNIKA, V.SAI KRISHNAM RAJU
[View] [Download PDF]
|
180-189 |
23 |
Diabetes Disease Prediction Using Machine Learning Algorithms
P MOUNIKA, V. ISAIAH
[View] [Download PDF]
|
190-198 |
24 |
An Efficient Spam Detection Technique for IoT Devices using Machine Learning
P MOUNIKA, V.DURGA BHAVANI
[View] [Download PDF]
|
199-205 |
25 |
PERFORMANCE ANALYSIS ON STUDENT FEEDBACK USING MACHINE LEARNING ALGORITHMS
P MOUNIKA, V. SAIPRIYA
[View] [Download PDF]
|
206-215 |
26 |
Detect DUI_ An In-Car Detection System for Drink Driving and BACs
P MOUNIKA, V. RAJESWARI MAHA LAKSHMI
[View] [Download PDF]
|
216-224 |
27 |
Machine Learning for Fast and Reliable Source-Location Estimation in Earthquake Early Warning
P MOUNIKA, V.LALITHA
[View] [Download PDF]
|
225-230 |
28 |
Predicting Flight Delays With Error Calculation Using Machine Learned Classifiers
P MOUNIKA, U. SIREESHA
[View] [Download PDF]
|
231-241 |
29 |
Fraud Detection in Online Product Review Systems via Heterogeneous Graph Transformer
P MOUNIKA, T.LOKESH
[View] [Download PDF]
|
242-250 |
30 |
PREDICTION OF USED CAR PRICES USING ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING
P MOUNIKA, T.CHANAKYA VIJAYAKUMAR
[View] [Download PDF]
|
251-258 |
31 |
A ROAD ACCIDENT PREDICTION MODEL USING DATA MINING TECHNIQUES
P MOUNIKA, T.KUSUMITHA
[View] [Download PDF]
|
259-268 |
32 |
Deep Learning Anti-Fraud Model for Internet Loan Where We Are Going
K SUPARNA, S. HALIMUNNISA
[View] [Download PDF]
|
269-277 |
33 |
Detection of Cyber bullying on Social Media Using Machine Learning
K SUPARNA, S. FARHEEN
[View] [Download PDF]
|
278-288 |
34 |
AGRICULTURAL CROP RECOMMENDATIONS BASED ON PRODUCTIVITY AND SEASON
K SUPARNA, S. SAIVENKATESH
[View] [Download PDF]
|
289-296 |
35 |
SOCIAL MEDIA AND MISLEADING INFORMATION IN A DEMOCRACY: A MECHANISM DESIGN APPROACH
K SUPARNA, S. DEEKSHITHA
[View] [Download PDF]
|
297-308 |
36 |
A MULTI STREAM FUTURE FUSION APPROACH FOR TRAFFIC PREDICTION
K SUPARNA, R. NARAYANA
[View] [Download PDF]
|
309-316 |
37 |
A COMPARATIVE STUDY ON FAKE JOB POST PREDICTION USING DIFFERENT DATAMINING TECHNIQUES
K SUPARNA, R. ANIL KUMAR
[View] [Download PDF]
|
317-323 |
38 |
A Machine Learning Approach for Rainfall Estimation Integrating Heterogeneous Data Sources
K. SUPARNA, R. DEEPIKA
[View] [Download PDF]
|
324-332 |
39 |
HAND GESTURES RECOGNITION USING CONVOLUTION NEURAL NETWORKS
K SUPARNA, R. DEEPIKA
[View] [Download PDF]
|
333-340 |
40 |
HEALTH MONITORING ON SOCIAL MEDIA OVER TIME
K SUPARNA, R. PRABHAVATHI
[View] [Download PDF]
|
341-348 |
41 |
A SYSTEMATIC REVIEW OF PREDICTING ELECTIONS BASED ON SOCIAL MEDIA DATA
K SUPARNA, R. VENKATA NARESH
[View] [Download PDF]
|
349-357 |
42 |
FAKE PROFILE IDENTIFICATION ON SOCIAL NETWORK USING MACHINE LEARNING AND NLP
K SUPARNA, P. MADHAVI
[View] [Download PDF]
|
358-365 |
43 |
Defensive Modelling of Fake News Through Online Social Networks
K SUPARNA, P. DURGA
[View] [Download PDF]
|
366-371 |
44 |
Prediction Of Air Pollution By Using Machine Learning
K SUPARNA, P.DHANESWARI
[View] [Download PDF]
|
372-377 |
45 |
Heart disease identification method in E-Health care using machine learning
A NAGARAJU, P. ANANTH KUMAR
[View] [Download PDF]
|
378-390 |
46 |
Hotel review analysis for the prediction of business using deep learning approach
A NAGARAJU, P. DEDEEPTHI
[View] [Download PDF]
|
391-397 |
47 |
An Efficient Spam Detection Technique for IoT Devices using Machine Learning
P MOUNIKA, V.DURGA BHAVANI
[View] [Download PDF]
|
398-404 |
48 |
Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks
A NAGARAJU, P.CHARAN TEJA
[View] [Download PDF]
|
405-412 |
49 |
RECOMMENDATION OF INDIAN CUSINE RECIPIES BASED ON INGREDIENTS
A. NAGARAJU, P.LAKSHMI DEVI
[View] [Download PDF]
|
413-420 |
50 |
A MACHINE LEARNING BASED CLASSIFICATION AND PREDICTION TECHNIQUE FOR DDOS ATTACKS
DANTULURI NARAYANA RAJU
[View] [Download PDF]
|
421-431 |
51 |
IMPROVING LIVES OF INDEBTED FARMERS USING DEEP LEARNING
A NAGARAJU, P. VIJAY
[View] [Download PDF]
|
432-439 |
52 |
B2B SALES SUCCESS PREDICTION WITH MACHINE LEARNING
A NAGARAJU, P. TULASI MOUNIKA
[View] [Download PDF]
|
440-448 |
53 |
Evapotranspiration in Agri AI Tech: Analyzing Implementation of ANN Models
Kaustubh Shah
[View] [Download PDF]
|
449-458 |
54 |
AI in Gaming - A Critical Analysis of Video Games and Exploring Future Potential
Divyam Gupta
[View] [Download PDF]
|
459-477 |
55 |
DETECTION OF CARDIOVASCULAR DISEASES IN ECG IMAGES USING MACHINE LEARNING AND DEEP LEARNING METHODS
Dr.V VENKATAIAH, BALABOINA MAMATHA
[View] [Download PDF]
|
478-494 |
56 |
DATA AUGMENTATION WITH PGGAN & MULTICLASS CLASSIFICATION WITH VGG16
BATTU VAMSHI KRISHNA, MR. MD REHAMAN PASHA
[View] [Download PDF]
|
495-504 |
57 |
Utilizing Machine Learning To Identify URL Detection
M. Jasar Jibran,M. Deepika Sai Mani,Y. Samyuktha,A.Bhuvan Reddy,Mrs. B. Rajeshwari
[View] [Download PDF]
|
505-513 |
58 |
STUDY ON CAPITAL MARKET
R. SHIVANI, T. RAKESH
[View] [Download PDF]
|
514-522 |
59 |
A NOVEL INTRUSION DETECTION SYSTEM (IDS) FOR MULTI-CLASS CLASSIFICATION YARS-IDS
K BHASKAR, A R SNEHA, A DHANASEKHAR REDDY, G DAKSHAYANI
[View] [Download PDF]
|
523-535 |
60 |
MALARIA DIAGNOSIS USING DOUBLE HIDDEN LAYER EXTREME LEARNING MACHINE ALGORITHM WITH CNN FEATURE EXTRACTION AND PARASITE INFLATOR
G SWAPNA, KARLAPOODI THEJA, KANIPAKKAM DHANAMJAY, K BHASKAR, Monisha B H
[View] [Download PDF]
|
536-547 |
61 |
ALGORITHM FOR DETECTING FLAMES AND SMOKE UTILIZING ODCONVBS-YOLOV5S
K YATHEENDRA, MELAM DILEEP, P RAJYALAKSHMI, P GOPICHAND
[View] [Download PDF]
|
548-560 |
62 |
BLOCK CHAIN TECHNOLOGY WITH QR CODE FOR MEDICAL DEVICE OWNERSHIP
S TEJA, T SUNIL KUMAR REDDY, K YATHEENDRA
[View] [Download PDF]
|
561-571 |
63 |
BLOCKCHAIN-BASED DECENTRALIZED SECURE CLOUD STORAGE
T ANIL KUMAR, A KIRAN SAI, A DHANASEKHAR REDDY, K PAVANI
[View] [Download PDF]
|
572-579 |
64 |
CYBERBULLYING DETECTION ON SOCIAL NETWORKS COMPARING MACHINE LEARNING AND TRANSFER LEARNING
K BHASKAR, S ANUDEEP REDDY, K YATHEENDRA, G PRATHYUSHA
[View] [Download PDF]
|
580-594 |
65 |
DETECTING FOG-ASSISTED IOVS NETWORK ANOMALIES USING DEEP LEARNING
B AJITH KUMAR, ALLAGADDA LEELASAI, A DHANASEKHAR REDDY, G DAKSHAYANI
[View] [Download PDF]
|
595-607 |
66 |
E VOTING SYSTEM WITH FACE RECOGNITION
K YATHEENDRA, N RAMYA , B AJITH KUMAR, M RANJITHIKUMAR REDDY
[View] [Download PDF]
|
608-619 |
67 |
EFFICIENCY-BASED DEEP ENSEMBLE FRAMEWORK FOR NETWORK ATTACK DETECTION
G LAKSHMINARAYANA, D NAGA RAJU, K LAKSHMAN KUMAR, M RANJITHIKUMAR REDDY
[View] [Download PDF]
|
620-633 |
68 |
ENSEMBLE-LEARNING-BASED DEEP NEURAL NETWORK ATTACK CLASSIFICATION OF IMBALANCED IOT INTRUSION DATA
AMBATI VAISHNAVI, B RAMA GANESH, A DHANASEKHAR REDDY, K LAKSHMAN KUMAR
[View] [Download PDF]
|
634-646 |
69 |
FALSE POSITIVE IDENTIFIERS IN XAI-BASED INTRUSION DETECTION
G VISWANATH, S MUNIPRATHAP, K BHASKAR, D VIDYASAGARI
[View] [Download PDF]
|
647-657 |
70 |
IMPROVED LIGHTGBM MODEL PERFORMANCE ANALYSIS AND COMPARISON FOR CORONARY HEART DISEASE PREDICTION
P RAJYALAKSHMI, ALATHURU YAMINI, A DHANASEKHAR REDDY, G VISWANATH
[View] [Download PDF]
|
658-672 |
71 |
IS IT PHISHING OR NOT? A SURVEY ON PHISHING WEBWEBSITE DETECTION
T ANIL KUMAR, P VINODH, K BHASKAR, N SRIDEVI
[View] [Download PDF]
|
673-687 |
72 |
MODEL FOR DETECTING SAFETY HELMET WEARING USING IMPROVED YOLO-M
K YATHEENDRA, A N HEMALATHA, A DHANASEKHAR REDDY, K PAVANI
[View] [Download PDF]
|
688-700 |
73 |
USING BLOCKCHAIN FOR VERIFICATION AND VALIDATE CERTIFICATES
B PAVANI PRIYANKA, T SUNIL KUMAR REDDY, A DHANASEKHAR REDDY,K LAKSHMAN KUMAR
[View] [Download PDF]
|
701-713 |
74 |
DESIGN AND DEVELOPMENT OF BOMB DETECTION & DISPOSAL ROBOT WITH GPS LOCATION & LIVE VIDEO STREAMING USING RASPBERRY PI
MD. SHAFI, M. RAMANA REDDY
[View] [Download PDF]
|
714-723 |
75 |
Deep Learning-Based Liver Fibrosis Classification: A Multi-Domain Approach
Akhila Muddala, Sri N. Naveen Kumar
[View] [Download PDF]
|
724-734 |
76 |
Precision Disease Diagnosis in Aquaculture Using Aqua Spectra Imaging and Machine Learning
Vijay Kumar Padala
[View] [Download PDF]
|
735-741 |
77 |
Bird Species Identification Through Vocalization Analysis Using Machine Learning
Veera Siva Prasad
[View] [Download PDF]
|
742-749 |
78 |
Early Detection of Cardiac Arrest in Newborns Using Machine Learning
Musunuru Ratnakar
[View] [Download PDF]
|
750-757 |
79 |
Ransomware Detection Through Processor and Disk Usage Patterns Using Machine Learning
G Venkata Pradeep Kumar
[View] [Download PDF]
|
758-765 |
80 |
A Review on Mathematics for Engineers: Fundamentals and Applications
Shiva Adithya Velagapudi, Usha Hasini Velagapudi, Mohammed Mukthar Hussain
[View] [Download PDF]
|
766-777 |
81 |
WISH LIST PRODUCTS PRICE COMPARISON WEBSITE PROJECT
Ms.Radha Rani Akula, R. Navya Sri, S. Lavanya, V. Harisha
[View] [Download PDF]
|
778-783 |
82 |
PUPILHEART: HEART RATE VARIABILITY MONITORING VIA PUPILLARY FLUCTUATIONS ON MOBILE DEVICES
Dr. T.Ram Kumar, S. Srinaya Reddy, V. Archana, V. Vennela
[View] [Download PDF]
|
784-790 |
83 |
DETECTION OF FRAUD CLAIMS IN HEALTH INSURANCE INDUSTRY
Mr. V. Ranadheer Reddy, R. Jhansi, T. Bhavitha, T. Deepthi
[View] [Download PDF]
|
791-800 |
84 |
IMAGE FORGERY DETECTION BASED ON FUSION OF LIGHTWEIGHT DEEP LEARNING MODELS
G. Anjali, T. Jyothilatha, T. Priyadarshini, S. Ankitha
[View] [Download PDF]
|
801-809 |
85 |
UNSUPERVISED DOMAIN ADAPTATION FOR CRIME RISK PREDICTION ACROSS CITIES
Dr. Y. Geetha Reddy, T.V.L. Manaswini, S. Sony, T. Shruthi
[View] [Download PDF]
|
810-818 |
86 |
IMPROVING SHOPPING MALL REVENUE BY REAL TIME CUSTOMIZED DIGITAL COUPON ISSUANCE
G. Anjali, M. Rachana Priya, M. Swapna, M. Sridevi
[View] [Download PDF]
|
819-827 |
87 |
GEO TRACKING OF WASTE, TRIGGERING ALERTS AND MAPPING AREAS WITH HIGH WASTE INDEX
Mr. M Sravan Kumar Babu, M. Naga Srevika, P. Sai Sanjana, M. Lavanya
[View] [Download PDF]
|
828-836 |
88 |
ENHANCING SPAM COMMENT DETECTION ON SOCIAL MEDIA WITH EMOJI FEATURE AND POST-COMMENT PAIRS APPROACH USING ENSEMBLE METHODS OF MACHINE LEARNING
Mrs. Sri Lavanya Sajja, Lokineni Yuktha, N. Esther, P. Charitha
[View] [Download PDF]
|
837-845 |
89 |
DETECTION OF DEEPFAKE VIDEOS USING LONG DISTANCE ATTENTION
Mr.V. Rajashekhar, P. Srujana, P. Aishwarya, N.Anuja
[View] [Download PDF]
|
846-852 |
90 |
FAKE PROFILES IDENTIFICATION IN ONLINE SOCIAL NETWORKS USING MACHINE LEARNING AND NLP
Mrs.Bethapudi ArunaSri, M. Rajeshwari, P. Yashaswini, P. Joshna
[View] [Download PDF]
|
853-857 |
91 |
SMART CARD FOR PUBLIC TRANSPORT
Mr.M. Chandra Rao, K. Yashaswi, L. Shriya, N. Bindu, T. Aparna
[View] [Download PDF]
|
858-868 |
92 |
SMART BILLING METER
Putta Srivani, S. Akhila, S.B.V.N. Rajeshwari, S. Swathi
[View] [Download PDF]
|
869-880 |
93 |
SOS WOMEN SAFETY DEVICE
Mr.G. Prabhakar, K. Harshini, M. Madhu Meghana, R.V. Vyshnavi
[View] [Download PDF]
|
881-890 |
94 |
FOOD PRINT ENERGY GENERATION SYSTEM
Mr.M. Chandra Rao, A. Sreenitha, B. Harshitha, D.Vyshnavi
[View] [Download PDF]
|
891-901 |
95 |
AUTONOMOUS LUGGAGE HANDLING SYSTEM
Sunkari Pradeep, B. Srivani, B. Naga Supriya, D. Bhavana, K. Srinidhi
[View] [Download PDF]
|
902-911 |
|
|
|
|
|
|
|
|