Published: 2023-07-08

REAL TIME FACE MASK DETECTION SYSTEM FOR COVID 19 APPLICANTS

Sumaiya Samreen, Ch. Arpana, D. Spandana, D. Sheetal, D. Sandhya

1- 14

Natural Language Processing-based Random Forest Classifier for Fake and Genuine Tweet Detection with Polarity Score

Smita Khond, B. Sai Sruthi, A. Manisha Kumari, B. Vaishnavi, Ch. Chandana Priya

15- 25

EMOTION DETECTION MODEL -BASED MUSIC RECOMMENDATION SYSTEM

C. Rashmi, A. Akshaya, B. Sruthi, B. Lavanya, A. Lohitha

26- 33

K-NEAREST NEIGHBOUR CLASSIFIER FOR URL-BASED PHISHING DETECTION MECHANISM

Subba Reddy Borra, B Gayathri, B Rekha, B Akshitha, B. Hafeeza

34- 40

VitaSi: A Real-Time Contactless Vital Signs Estimation System

B. Durga Bhavani, A. Geethika, B. Lakshmi, G. Rakshitha, Ch. Swathi

41- 52

ARTIFICIAL NEURAL NETWORKS FOR FAKE ACCOUNT DETECTION FROM SOCIAL MEDIA

Sumaiya Samreen, A. Joshna, B. Neelima, Ch. Varsha, G. Nikitha

53-64

Machine Learning Algorithms-based Prediction of Botnet Attack for IoT devices

Subba Reddy Borra, Akshaya, B. Swathi, B. Sraveena, B. Satya Sahithi

65- 78

COMPUTER VISION APPLICATION: VEHICLE COUNTING AND CLASSIFICATION SYSTEM FROM REAL TIME VIDEOS

D. Shine Rajesh, T. Vaibhavi, T. Sreeja, V. Gayathri, Sitala Srivalli

79- 89

NLP-based Supervised Learning Algorithm for Cyber Insurance Policy Pattern Prediction

B. Subba Reddy, V. Bhargavi., S. Samhitha, Y. Anjana, V. Saivaishnavi

90- 99

Supervised and Semi-Supervised Text Mining Models for Hotel Reviews Analysis

C. Rashmi, N. Nikhitha, N. Harshitha, N. Sankeerthana, T. Sai Poojitha

100- 114

DETECTION OF IP MASKING USING WHOIS

K. Kumara Swamy, Shivani Teakumalla, Deekshitha Vemula, Shreya Reddy Patil, Palli Deepika

115- 124

STOCHASTIC GRADIENT BOOSTING MODEL-BASED CONTENT ANALYSIS IN ONLINE SOCIAL MEDIA

N. Baby Rani, Sathvika R, Shravani K, N. Bhavani, P. Soumya

125- 135

NOVEL CRIME SCENE INVESTIGATION ACTION TO CONCENTRATE CLIENT ACTION FROM CELL PHONES

K. Jaya Rajan, M. Srinija Reddy, N. Deekshana, P. Samshritha, M. Srija

136- 144

COST SENSITIVE PAYEMENT FRAUD DETECTION BASED ON DYNAMIC RANDOM FOREST AND KNN

K. Ramya Sri, N. Chandrika, M. Sridevi, P. Thanmay Sree, P. Divya

145- 159

IMAGE PIXEL BASED GRAPHICAL PASSWORD AUTHENTICATION

Geetha Prathibha, O. Sri Harshitha, P. Likitha, P. S. Mani Deepthi, P. Likitha Sai

160- 170

CHILD EMOTION DETECTION THROUGH FACIAL EXPRESSION RECOGNITION USING MACHINE LEARNING

S. Venkata Ramana, Ayesha Begum, P. Sindhu, M. Hepsheeba, M. Chandana

171- 177

SENTIMENT ANALYSIS OF CUSTOMER PRODUCT REVIEWS USING MACHINE LEARNING

M V Keerthi, O. Chandana, P. Anjali, P. Revathi

178- 188

SAFEGUARDING AGAINST COUNTERFEITS WITH BLOCKCHAIN BASED QR CODE

G. Bhanu Prasad, P. Shreya, P. Shailaja, M. Akhila, P. Sravani

189- 196

DYNAMIC NETWORK LINK PREDICTION THROUGH INFORMATION PROPAGATION

B.V.S.P Pavan Kumar, M. Sai Thanmai, M. Nandini, M. Ashwini, K. Soujanya

197- 208

Applications of Fermat’s Little Theorem

Noormal Samandari , Nazar Mohammad Nazari , Janat Akbar Olfat , Rafiullah Rafi , Ziaulhaq Azizi, Wali Imam Ulfat, Ikramullah waqar, Mansoor Zahirzai , Mohammad Jawad Niazi

209-215

Find out the innovative techniques of data sharing using cryptography by systematic literature review

Anik Sen , Rasel Ahmed , Samiha Hossain , Sazzad Hossain Tasnim , Tanvir Ahmed

216-224

AN IMPROVED SPEAKER VERIFICATION SYSTEM FOR ROBOTIC APPLICATIONS

Abdul Rahim, Kommera Shravya, Konda Reddy Lakshmi Prasanna, Kuthala Kavya, Komuravelli Varsha

225-234

VISIBLE VIDEO WATERMARKING USING ADAPTIVE TRANSFORMATION TECHNIQUE

T S Ghouse Basha, Konatham Harini, Mandadapu Jhansi Lakshmi, Neeli Akhila, Nelakurthi Utheja

235-249

AN IMPROVED SPEAKER VERIFICATION SYSTEM FOR ROBOTIC APPLICATIONS

Abdul Rahim, Kommera Shravya, Konda Reddy Lakshmi Prasanna, Kuthala Kavya, Komuravelli Varsha

225- 234

VISIBLE VIDEO WATERMARKING USING ADAPTIVE TRANSFORMATION TECHNIQUE

T S Ghouse Basha, Konatham Harini, Mandadapu Jhansi Lakshmi, Neeli Akhila, Nelakurthi Utheja

235- 249

Design And Implementation of a Digital Secure Code-Shifted Reference UWB Transmitter and Receiver

Baburao Silumula, Miriyam Nanditha, Koudadarla Vandana, Kunchala Raja Nikhitha, Lokani Bhanusree

250- 259

A NOVEL DESIGN OF FLIPFLOP CIRCUITS USING QUANTUM DOT CELLULAR AUTOMATA

Harish Kumar Gopadi, Kurelli Shivani, Mamatha Dugyala, Pamera Nikitha, Manchukonda Nandini

260- 269

Design of Practical Parity Generator and Parity Checker Circuits In QCA

K. Raghavendra, Nalla Sarika, Nagandla Deepthi, Muppidi Vahini

270- 280

Chip Design for Turbo Encoder Module for In-Vehicle System

Srikanth Sirimalle, Muchinthala Divya, Nalla Keerthi Priya, Luxetti Akshaya, Palda Srija

281- 289

Random Forest Classifier for the Detection of IoT Botnet Attacks from Data of Provision PT 37E Security Camera

Putta. Srivani, Ch. Vandana, P. Vinusha, S. Sathvika, A. Manimanognya

290- 301

Machine Learning Algorithms-based Prediction of Botnet Attack for IoT devices

L. C. Usha Maheswari, P. Sruthi, Ch. Hamsini, G. Keerthika, M. Sreeja

302- 314

MACHINE LEARNING APPROACH FOR FAKE JOB AD PREDICTION

Putta. Srivani, Syeda Sufiya Rana, Dereddy Tejeswani, K. Noor E Afshan, Chukka Sathvika

315- 331

ARTIFICIAL NEURAL NETWORKS FOR FAKE ACCOUNT DETECTION FROM SOCIAL MEDIA

Sanjeevini S. H, T. Shreya Maadhury, P. Lahari, G. Tejaswini, G. Haripriya

332- 343

CYBER ATTACK DETECTION USING MACHINE LEARNING

C. Gazala Akhtar, N. Sri Harika, K. Pallavi, P. Akhila, T. Srinaina

344- 348

Enhancing Credit Card Fraud Detection using Neural Networks and Adversarial Training

Dharavath Sai Kiran, Mittapelly Luckydhar, Shalini Priya Bairy, Roopa Chandrika R

349-355

Loan Approval Prediction using Adversarial Training and Data Science

Dharavath Sai Kiran, Avula Dheeraj Reddy, Suneetha Vazarla, Dileep P

356-360

Data And Knowledge Driven Named Entity Recognition for Cyber Security

Sanjeevini S. H, B. Mrudulanjali, T. Pavani , V. Sowmya, T. Shivani

361- 367

Detection Of Malicious Social Bots in social media

Sanjeevini S. H, L. Savithri, E. Maha Lakshmi, M. Amulya, P. Sanjana

368- 377

Examining Login URLS to Identify Phishing Threats

M. Sravan Kumar Babu, A. Chandana, A. Anusha, K. Harika, P. Jhansi

378- 383

A Comprehensive Analysis of Machine Learning Approaches for Fake News Detection and Its Effects

MD. Nazmul Hossain , Sadi Al Huda , Samiha Hossain, Anika Saba Ibte Sum, Nafiz Fahad , Anik Sen

384-391

IoT-BASED SYSTEM FOR MONITORING WATER QUALITY

Kaveti Sudheer, Dr .Seelam Koteswararao, Dr.M.Paul Daniel, Daggubati Sunil

428-433

AN ENERGY EFFICIENT SYSTEM FOR WIRELESS SENSOR NETWORKS

Dr.M.Paul Daniel, Dr.P.Sreenivasulu,Dr Seelam Koteswararao,Daggubati Sunil

434-440

Fractional Order Differential Equation In Banach Algebra

Uttara V. Deshmukh Dr.Gajanan C.Lomte

441-453

Mappable Nearly Orthogonal Arrays Using Projective Geometry

POONAM SINGH, MUKTA D. MAZUMDER, SANTOSH BABU

454-464

A Multi-layer Security Scheme (MLSS) for Digital Images Contents

Faraj Ali Faraj Alyaqobi, Nor Adnan Yahaya

465-479

ANALYZE THE GROWTH RATE OF A PREY-PREDATOR SYSTEM WITH SIMULATION USING MATLAB

Mehenaz Aktar Mimi, Md. Eaqub Ali, Kanak Chandra Roy, Shuvo sarker, Rezaul Karim, Pinakee Dey

480- 497

DESIGN AN INTERACTIVE ATMS CABIN FOR HELPING BLIND PEOPLE, BY USING SPECIAL EQUIPMENT AND USER INTERFACES.

ALI NAZAR MAJEED ALAMERY, ALI HUSSEIN MOHAMMED , ALAA NAJI DAKHAL ALHUSSEIN

498-504

Polynomial-Exponential Mixture of Poisson distribution

Binod Kumar Sah, Suresh Kumar Sahani

505-516

Ensemble learning: A review

Maha A. Alellah Mohammad

517-523

Dynamics of the polynomial differential systems

Feneniche Fatima, Rezaoui Med Salem

524-535

Emerging Technology: Cloud Computing for Enhanced Resource Accessibility - A Review

N.B.S Vijay Kumar, Dr.M Paul Daniel, K.John Paul,Daggubati Sunil

536-541

Daily Consumption of Salt and their Effects on Health

Nasratullah Mahboob, Rohullah Hanif ,Waliimam Ulfat

548-555

Cauchy-Schwartz's inequality and its application in telecommunication systems

Noormal Samandari , Rafiullah Rafi ,Janat Akbar Olfat, Nazar Mohammad

568-574

Implication of Data Mining in Healthcare Field

Suzan Katamoura, Layla Hajr, Ahmad Alhamed

575-597

PREDICTION OF AIR POLLUTION USING MACHINE LEARNING

Revathy P ,Venu M , Naveen Kumar Ch

630- 635

Using Machine Learning Approaches to precisely Predict RainFall

Chinta Gouri Sainath P , Anvesh Kumar A , Naveen Kumar A

636- 641