Citizen Perspectives on Government Policy
Mr.DADI.VENKATA VARAPRASAD1, challa Gowthami2 ,
Page No :11-17
Enhanced Estimation of Software Defects Using Machine Learning Techniques
Mr. A. Hemantha Kumar1, Golla Akhila2 ,
Page No :18-23
Machine Learning Models for Accurate House Price Estimation
Mr DADI VENKATA VARAPRASAD 1 , ANAMALA PRAVALIKA 2 ,
Page No :24-35
DETECTING ACCIDENT SEVERIETY VEHICLE TO VEHICLE COMMUNICATION
Dr. UMMADI. THIRUPALU1 , S.SRINU2 ,
Page No :36-43
A GENERAL FRAMEWORK FOR IMPLICIT AND EXPLICIT SOCIAL RECOMMENDATION
A. Durga Devi Madam 1, K.Shanmukha Varma2 ,
Page No :63-72
A HYBRID E-LEARNING RECOMMENDATION APPROACH BASED ON LEARNER’S INFLUENCE PROPAGATION
K. Venkatesh 1, K. Sravani2 ,
Page No :73-88
AI-BASED FAQ CHATBOT WITH VOICE ASSISTANCE
A. DURGA DEVI MADAM 1, Kattula Suma Latha 2 ,
Page No :102-121
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEASE CONTROL
V.Sarala 1 E.Venkat Kumar 2 ,
Page No :122-134
DATA TRUST FRAMEWORK USING BLOCKCHAIN TECHNOLOGY AND ADAPTIVE TRANSACTION VALIDATION
B.S.Murthy sir ,1 G.Sudha Maheswari 2 ,
Page No :145-147
DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL MEDIA
K. Rambabu 1, A.Varsha Deepika.2 ,
Page No :148-169
DETECTION AND ATTRIBUTION OF CYBER ATTACKS IN IOT ENABLED CYBER PHYSICAL SYSTEM
Mr B.S Murthy 1 , I. Mary Sujatha 2 ,
Page No :170-178
EFFICIENT AND DEPLOYABLE CLICK FRAUD DETECTION FOR MOBILE APPLICATIONS
A. DURGA DEVI MADAM 1 , Jami Harisha Jyothi 2 ,
Page No :179-189
FILTERING INSTAGRAM HASH TAGS THROUGH CROWD TAGGING AND THE HITS ALGORITHM
V. Sarala 1 , Ch. Pooja Kiranmai2 ,
Page No :190-199
Flighting Money Laundering With Statistics And Machine Learning
Mr. K. RAMBABU SIR 1 , A.N.S.L. MANASA 2 ,
Page No :200-211
FUNDAMENTAL VISUAL CONCEPT LEARNING FROM CORRELATED IMAGES AND TEXT ANNOTATION
Mr. B.S Murthy 1 , G.Sowmya 2 ,
Page No :212-221
FUTURE OF LOAN APPROVALS WITH EXPLAINABLE AI
A. DURGA DEVI MADAM 1, KATHULA KARUNA 2 ,
Page No :222-236
1 B. S. Murthy, 2 Komati .Vinay ,
Page No :251-264
A. Durga Devi Madam 1, K. Mahesh 2 ,
Page No :265-272
SOCIAL DISTANCING USING DEEP LEAENING MODELS AND YOLO FRAMEWORK
Setti Vidya Sagar Appaji1 , S.Samyukta 2 , Ramya Golla3 ,
Page No :287-290
SOFTWARE VULNERABILITY DETECTION TOOL USING MACHINE LEARNING
V. Sarala 1 , G. Venu Madhuri 2 ,
Page No :291-302
SPAMMER DETECTION AND FAKE USER IDENTIFICATION IN SOCIAL NETWORKS
K. Rambabu 1, A.Sai Sravani 2 ,
Page No :303-325
A. DURGA DEVI MADAM 1, K. HARIPRIYA 2 ,
Page No :326-343
TRUST RELATIONSHIP PREDECTION IN ALIBABA ECOMMERCE PALTFORM
B. S. Murthy 1 , G.Balaashish Kumar 2 ,
Page No :344-354
USING DATA MINING TO PREDICT HOSPITAL ADMISSIONS FROM THE EMERGENCY DEPARTMENT
K. Rambabu 1, A.Harika 2 ,
Page No :355-373
ENHANCING COMMERCIAL BLOCKCHAIN SERVICES WITH IDENTITY-BASED NETWORK SECURITY
Mr. J. U. ARUN KUMAR 1, CH.VENKATA SRIHARI 2 ,
Page No :374-380
INTERNET OF VEHICLE THINGS (IOVT) SECURITY SYSTEM WITH BLOCKCHAIN INTEGRATION
PRAKASH KRISHNA SHINDE ,
Page No :388-405
PILL DETECTION AND IDENTIFICATION: A DEEP LEARNING PERSPECTIVE
Mr. A. HEMANTHA KUMAR1 , K. DEEPTHI2 ,
Page No :406-414
AUTOMATED URBAN ROAD DETECTION IN HIGH-RESOLUTION SATELLITE IMAGES WITH MACHINE LEARNING
Mr.T.NARESH1 , SK.ALLA HASHID2 ,
Page No :415-422
CRITICAL CLOUD STORAGE SERVICES - A SECURE, SEARCHABLE ENCRYPTION FRAMEWORK FOR PRIVATE USE
Mrs.G.HARIPRIYA 1 , B.VARALAKSHMI 2 ,
Page No :423-435
An Auto ground Mechanism for Distributed Generation’s Anti-Islanding Protection
B.Divya Thejeswini 1 , Salma Khathun2 ,
Page No :436-441
COMPARATIVE STUDY OF RCC BUILDING WITH COMPOSITE COLUMN AND STEEL COLUMNS BY ETABS
K.VENU GOPAL1 S.VENKATESH2 ,
Page No :442-450
SEISMIC ANALYSIS OF G+10 BUILDING WITH SHEAR WALLS AT DIFFERENT LOCATIONS USING ETABS
K.VENU GOPAL1 N. BABU2 ,
Page No :451-457
EFFECT OF WIND LOAD ON LOW, MEDIUM, HIGH RISE BUILDINGS IN DIFFERENT TERRAIN CATEGORY
K.VENU GOPAL1 J.PRASAD 2 ,
Page No :458-466
Deep learning-based approach for detecting similar questions on stack overflow
Mrs. SK. KARIMUNNI1 , K. VENKATA PADMAVATHI2 ,
Page No :467-479
Revolutionizing Drug Traceability: Implementing Blockchain Technology in Healthcare Supply Chains
G. Sudheer Kumar1 , Navya Reddy Bokkala2 , Purushotham Shirin2 , CH. Pavan Kumar2 ,
Page No :480-495
A FAST NEAREST NEIGHBOR SEARCH SCHEME OVER OUTSOURCED ENCRYPTED CLOUD DATA
G. Sreelekha1 , Sk. Shayeer Hussain2 ,
Page No :496-503
ASTUDY OFBLOCKCHAIN TECHNOLOGYINFARMER’SPORTAL
Mr.VChandrasekhar1 ,A.Srinivasulu2 ,
Page No :504-511
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Ch. Rushyendra Mani1 , Sk. Shahida2 ,
Page No :512-518
Attribute based Cloud Data Integrity Auditing for Secure Cloud Storage
Mr.V.Chandrasekhar 1 , Shaik Haseena2 ,
Page No :519-526
Classification Of Online Toxic Comments Using Machine Learning
G.Sreelekha1, V.Kousalya2 ,
Page No :527-536
Detection of Stress In IT Employees Using Machine Learning Technique
Ms.V.R.Swetha1 , K. Madhavi2 ,
Page No :537-543
DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
B. Uma Maheswari1 , K. Chandra Sekhar2 ,
Page No :544-549
DUAL ACCESS CONTROL FOR CLOUD BASED DATA STORAGE AND SHARING
Mrs. B. UMA MAHESWARI1 , SK. MOBEENA2 ,
Page No :550-558
EFFICIENT RETRIEVAL OVER DOCUMENTS ENCRYPTED BY ATTRIBUTES IN CLOUD COMPUTING
V.Savithri1 , P.Pushpa2 ,
Page No :559-568
ENERGY EFFICIENT LINK DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
Mr. V. SURENDRA REDDY1 , S. LAKSSHMI DEEPIKA2 ,
Page No :569-574
FAKE DETECT: A DEEP LEARNING ENSEMBLE MODEL FOR FAKE NEWS DETECTION
A. Yamuna1 , Ch. Sreenu2 ,
Page No :575-582
FISH DISEASE DETECTION USING IMAGE BASED ON MACHINE LEARNING IN AQUACULTURE
G. Sreelekha1 , V. Kavya2 ,
Page No :583-590
Frequent Itemsets Mining with Differential Privacy over Largescale Data
Ms.V.R.SWETHA1 , P.POOJITHA2 ,
Page No :602-612
Future gold price prediction using machine learning techniques
G.Sreelekha1 , T.Leelasri2 ,
Page No :613-618
Hand Gestures Based Sign Language Recognition Using Deep Learning
Mrs. SK. Karimunni1 , M. Dharani2 ,
Page No :619-624
IMPROVING SECURITY AND PRIVACY ATTRIBUTE BASED DATA SHARING IN CLOUD COMPUTING
B. Uma Maheswari1 , K. Siri Chandana2 ,
Page No :625-632
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
Mrs. A. Yamuna1 , E. Mercy2 ,
Page No :633-639
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
Mr. N. SUBRAMANYAM1 , K. VYSHNAVI MALA2 ,
Page No :648-656
MULTI-AUTHORITY ATTRIBUTE-BASED KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA
A. Bharathi1 , Sk. Karimulla2 ,
Page No :657-665
K. Lakshmi1 , D. Sai pranavi2 ,
Page No :666-673
PHISHING URL DETECTION: A REAL-CASE SCENARIO THROUGH LOGIN URLS
V.Savithri1 ,V.Surendra2 ,
Page No :674-685
PP-CSA: A PRIVACY-PRESERVING CLOUD STORAGE AUDITING SCHEME FOR DATA SHARING
Ch. Rushyendra Mani1 , Sk. Mariem Siddikha2 ,
Page No :686-692
Semi Supervised Machine Learning Approach for DDOS Detection
Mr. D. Venkata Varaprasad1 , CH. Venkatesh2 ,
Page No :693-697
SESPHR:AMETHODOLOGYFORSECURESHARINGOFPERS ONALHEALTHRECORDSINTHECLOUD
G.Sreelekha1 ,Sd.Ahmed2 ,
Page No :698-710
THREAT MODEL AND DEFENSE SCHEME FOR SIDE- CHANNEL ATTACKS IN CLIENT SIDE DEDUPLICATION
V.Savithri1 , Y.Mounika2 ,
Page No :718-723
Mr.SYED.AKHTAR BASHA1 , ANNAPAREDDY MADHU BABU2 ,
Page No :724-735
Unwanted Messages From OSN User Wall Can Be Filtered
Mr.BOLIGARLA HARIBABU1 , B.NAGENDRA BABU2 ,
Page No :736-742
Innovative Approaches to Malware Detection in Health Sensor Data Through Machine Learning
Mrs.T. NARESH1 , S. NARENDRA2 ,
Page No :743-752
Machine Learning Approaches to Sarcasm Detection
Mr.G.SREENIVASULU1 , Y.ANANTHA LAKSHMI2 ,
Page No :753-761
STUDY ON MACHINING CHARACTERISTICS OF METAL MATRIX COMPOSITES USING ABRASIVE FLOW MACHINING
B LIKITESHWAR1 Dr.P.SRIKAR2 ,
Page No :762-773
NUMERICAL ANALYSIS AND MODELLING OF TOOL WEAR IN FRICTION STIR WELDING PROCESS
ERUKULA NARSIMHA1 Dr.CHANDRA SEKHAR2 ,
Page No :774-781
B. LIKITA SRI1 T. GAYATRI2 ,
Page No :782-785
SECURE KEY AGREEMENT AND KEY PROTECTION FOR MOBIL DEVICE USER AUTHENTICATION
V.Sarala 1, D.Kiran, ,
Page No :786-796
OPTIMIZING INFORMATION LEAKAGE IN MULTICLOUD SERVICES
K.Rambabu 1 , B Naga Venkata Jyothi, ,
Page No :797-810
ONLINE PUBLIC SHAMING ON TWITTER(X): DETECTION, ANALYSIS AND MITIGATION
B.S.Murthy 1 , G. Venkata Lakshmi ,
Page No :810-821
A LIGHT WEIGHT SECURE DATA SHARING SCHEME FOR MOBILE COLUD COMPUTING
K. Rambabu 1, B. Gnaneswara Rao, ,
Page No :822-838
A RESILIENT DISPERSAL SCHEME FOR MULTI-CLOUD STORAGE
V. Sarala 1 , Ch. Rakesh Kumar, ,
Page No :839-850
ACHIEVING DATA TRUTHFULNESS AND PRIVACY PRESERVATION IN DATA MARKETS
A. Durga Devi 1 , K. Chandu ,
Page No :851-862
B.S. Murthy 1, M. Laksmi Prasanna ,
Page No :882-892
PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
B S Murthy 1 , G.Mani Kanta Swamy, ,
Page No :893-905
ROBUST DEFENSE SCHEME AGAINST SELECTIVE DROP ATTACK IN WIRELESS AD HOC NETWORKS
B.S.Murthy 1 , G.Naveena 2, ,
Page No :906-914
SEC-HEALTH A BLOCKCHAIN-BASED PROTOCOL FOR SECURING HEALTH RECORDS
Sarala1 , Gangula.Pratap, ,
Page No :915-930
SECURE AND EFFICIENT DATA DEDUPLICATION IN JOINT CLOUD STORAGE
A. Durga Devi 1, Kopparthi Sai Teja2 ,
Page No :931-943
SMART CONTROL OF TRAFFIC LIGHTS USING ARTIFICAL INTLIGENCE
B.S. Murthy 1 , G. Satish, ,
Page No :959-972
SMART CONTROL OF TRAFFIC LIGHTS USING ARTIFICAL INTLIGENCE
B.S. Murthy 1 , K.Lakshmanarao, ,
Page No :973-986
USING DATA MINING TO PREDICT HOSPITAL ADMISSIONS FROM THE EMERGENCY DEPARTMENT
K. Rambabu 1, A.Harika, ,
Page No :987-1005
Developing a Search Engine Using XGB Algorithm
Mr. A. HEMANTHA KUMAR1 , Y. VARSHITHA2 ,
Page No :1006-1014
INFORMATION SYSTEM FOR AUTOMATICALLY CLASSIFYING NEWS TEXTS
Mr. N. SUBRAMANYAM1 , G. KRISHNA KUMARI2 ,
Page No :1015-1026
Impact of Education and Work Participation on Improvement of Women’s Status
Veena Siddaramappa ,
Page No :1027-1032
A framework for authenticating with an identity management server in mobile cloud computing
Mr. Mantripragada Satya Venu Gopalarao ,
Page No :1033-1039
The Dawn of Industry 5.0: A New Era of HumanMachine Collaboration
Swarali S. Patil1 , Piyusha Kesare2 ,
Page No :1040-1046
PARAMETRIC OPTIMIZATION OF TURNING PROCESS PARAMETERS DURING MACHINING OF AISI 304 MATERIAL
Peelam Suresh1*, S.M.Jameel Basha1 ,
Page No :1047-1054
Enhancing Efficiency: Predictive Maintenance Strategies for Factory Equipment
MS.V.SAVITHRI1 , T.MUNI SIREESHA2 ,
Page No :1055-1062
Designing On-Grid Solar/Wind Hybrid Power System for Charging Electric Vehicles
1 Kamble Vinod ,2 Dr.P. Nagasekhar Reddy ,
Page No :1063-1071
LIGHT WEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING
K. Rambabu , A.Vijaya Surya Kumari ,
Page No :1072-1081
Mr.N. SUBRAMANYAM1 , P. ANUSHA2 ,
Page No :1082-1089
Deep Learning Framework for Object Detection and Recognition to Aid the Visually Impaired
Mr. G. SREENIVASULU1 , S. KALYAN2 ,
Page No :1090-1097
Identifying Ransomware Attacks through Processor and Disk Usage Analysis
Mrs. R. JYOSNA DEVI1 , G.YASASWINI2 ,
Page No :1098-1110
FAULTY NODE DETECTION IN DELAY TOLERANT NETWORKS
Mr.P.V.R.K.MURTHY1 , A.LAKSHMI SUPRIYA2 ,
Page No :1111-1120
DATA DRIVEN ENERGY ECONOMY PREDICTION FOR ELECTRIC CITY BUSES USING MACHINE LEARNING
N.ANIL KUMAR CHOWDARI1 , S.VIGHNESWARA REDDY2 ,
Page No :1121-1128
Characterizing and predicating early reviewers for effective product marketing on Ecommerce website
Mrs. A. YAMUNA1 , KAMATHAM. MAMATHA2 ,
Page No :1129-1136
Child mortality prediction using a machine learning approach
Dr. M. Rajaiah1 , P. Lavanya2 ,
Page No :1137-1142
CROP YIELD PREDICTION USING MACHIN ALGORITHMS
Dr.M. RAJAIAH 1 , PILLI. THULASI 2 ,
Page No :1143-1152
Detecting Multi Stage Attacks Using Sequence to Sequence Model
1Mrs. Sk.Karimunni ,2K.Sumanthi ,
Page No :1153-1159
DRUG RECOMMENDATION SYSTEM BASED ON SENTIMENT ANALYSIS OF DRUG REVIEWS USING MACHINE LEARNING
Ms.V.R. Swetha1 , Pasam.Rajani2 ,
Page No :1160-1169
Aderla Anjaiah1 , P. Veera Raghava Reddy2 and Eerla Mamatha3 ,
Page No :1170-1180
Fighting Money Laundering with Statistics and Machine Learning
Mrs. B. Uma Maheswari1 , K. Bharathi2 ,
Page No :1181-1187
Missing child identification system using deep learning and multiclass SVM
Mrs. A. Yamuna1 , K. Devi2 ,
Page No :1188-1197
A UNIFIED VIEW OF EMBEDDED DESIGN SECURITY USING CRYPTOGRAPHIC MECHANISMS
BANAVATHU RAMYASREE1 , VARIKUTI TRIVENI2 ,
Page No :1198-1205
Secure key word search and data sharing mechanism for cloud computing
A. Bharathi1 , SD. Sumiya2 ,
Page No :1206-1213
Mrs.VenkataRadhaKrishnaMurty 1 , G. VaishnavaTeja2 ,
Page No :1214-1219
REDUCED SENSOR BASED PMSM DRIVEN AUTONOMOUS SOLAR WATER PUMPING SYSTEM
1HOUJI HEMANTH SAGAR ,2V.VIJAYA LAKSHMI ,
Page No :1227-1238
Building a Robust Media Streaming Server on AWS
CH.RUSHYENDRA MANI, K.MARY SRAVANTHI ,
Page No :1239-1249
TRAFFIC SIGN DETECTION AND RECOGNITION SYSTEM USING CNN
Ms. K.NISHITHA1 , P.VANI2 ,
Page No :1250-1258
1G Raga mounika,2 kuchipudi Nandini, 3M Prajawala Priyanka ,
Page No :1259-1265
Pothedar Chandana 1 , V.Sangeeta Sarali 2 and S.Manohar Reddy 3 ,
Page No :1266-1277
LOCATION PREDICTION ON TWITTER USING MACHINE LEARNING TECHNIQUES
M.Swathi1 , P. Rohini2 ,
Page No :1289-1295
IMAGE BASED BIRD SPECIES IDENTIFICATION USING MACHINE LEARNING
K. Kavitha1 , Sk. Farhana2 ,
Page No :1296-1305
AUTOMATIC BILLING TROLLEY FOR AN ENHANCED SUPERMARKET USING RFID
K. NISHITHA1 , P. BHANU TEJASWINI2 ,
Page No :1306-1312
Ch.Dayakar1 , Y.Mounika2 ,
Page No :1313-1323
Burugu Naveen1 , Dr.S.Narasimha 2 ,
Page No :1336-1346
ARDUINO BASED SMART AUTOMATED PlANT WATERING SYSTEM
Dr.K.SUDHAKAR1 , YAMINI RAMINDLA2 ,
Page No :1353-1361
A STUDY ON TRANING AND DEVELOPMENT AT TEXTUS INFO SOLUTIONS
SIRUR PREETHI¹, SRINIVAS REDDY ², K. VEERAIAH³ ,
Page No :1376-1382
A STUDY ON FINANCIAL STATEMENT ANALYSIS AT HERITAGE FOODS IND LTD
G SAI DEEPIKA ¹, Dr. G. Aruna ², Dr. M. V. Narasimha Rao³, Dr.K.Srinivas Rao ⁴ ,
Page No :1383-1389
Ms. Janagam Sai Ramya¹, Mr. Srinivas Reddy², Dr.K.Veeraiah ³ ,
Page No :1390-1394
A PROJECT REPORT ON “PERFORMANCE OF SELECTED INDEX MUTUAL FUNDS AT DBFS SECURITIES LIMITED
Mr. Neelam Bhargav¹, Mr. Manukonda Shiva², Dr.K.Veeraiah3 ,
Page No :1395-1401
Innovative AI Approach for Forecasting Robbery Behavior with Indoor Surveillance
G. Sreenivasulu1 , K. Vineela2 ,
Page No :1402-1411
A PROJECT REPORT ON EMPLOYEE RELATIONSHIP MANAGEMENT AT SUMEGHA TECHNOLOGIES
Ms. Varimalla likitha¹, Mr. Shaik firoz khan², Dr.K.Veeraiah ³ ,
Page No :1412-1416
IOT BASED COLD STORAGE MONITORING SYSTEM
Mrs.Y.Jalajakshi 1,Ms.sriram Rani2, Ms.Jivilikapally Ramya Sri3, Mr.Regunta Raja ravindra4, Mr.Pandula Sai Kiran5 ,
Page No :1417-1421
A MACHINE LEARNING APPROACH TO PREDICT AUTISM SPECTRUM DISORDER
1M. NARMADHA, 2CH. LAVANYA SIVA PRIYA ,
Page No :1422-1430
REAL-TIME DETECTION OF APPLICATION BASED ATTACKS THROUCH BEHAVIORAL MODELING
1K. NISHITHA, 2 P.USHA ,
Page No :1431-1438
DESIGN AND IMPLEMENT CHURN RATE ESTIMATION MODEL BASED ON CLICK STREAM DATA USING MACHINE LEARNING
1Dr. S V PADMAVATHI DEVI, 2A. HARI ,
Page No :1455-1461
DISASTER IDENTIFICATION USING DEEP LEARNING APPROACH FROM SOCIAL MEDIA POSTS
1G. SREENIVASULU, 2 S. ARAVIND ,
Page No :1462-1469
DISASTER VICTIM DETECTION UNDER DEBRIS ENVIRONMENTS USING DEEP LEARNING
Ms. V. Savithri1 , E. LAKSHMI2 ,
Page No :1470-1477
ESTIMATING SOFTWARE EFFORT USING MACHINE LEARNING FOR DIGITAL ERA
1 J. U. ARUN KUMAR, 2G. VENKATA CHENNA REDDY ,
Page No :1478-1485
DETECTION OF LUNG ABNORMALITY USING DEEP TRANSFER LEARNING
1G. SREENIVASULU, 2KALYANI .M ,
Page No :1486-1494
MACHINE LEARNING APPROACH FOR DETECTING FAULT DIAGNOSIS
1CH.RUSHYENDRA MANI, 2 S.VASEEM ,
Page No :1495-1502
STATISTICS BASED MONEY LAUNDERING DETECTION USING MACHINE LEARNING
1K. NISHITHA,2VEGURU PAVANI ,
Page No :1503-1511
EFFICIENT FIREARMS DETECTION USING DEEP LEARNING FOR BUILDING SECURE SMART CITIES
1G.SREENIVASULU, 2B. NARAYANA REDDY ,
Page No :1512-1519
MOBILE DEVICE USER ACTIVITY EXTRACTION WITH FORENSIC LOGGING
1K. KAVITHA, 2A. SAI NIKHILA ,
Page No :1520-1526
SECURE AND EFFICIENT MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS IN P2P NETWORKS
1Dr. UMMADI. THIRUPALU, 2A. GUNASANKAR ,
Page No :1527-1534
IDENTIFICATION POISONING ATTACK USING TWOPHASE DEFENSE ALGORITHM ON FEDERATED LEARNING
1M. KOTAMMA, 2K. RUCHITHA ,
Page No :1543-1549
DETECTING SOFTWARE INTEGRITY ATTACKS IN TIME DISTRIBUTION NETWORKS
1MAVALLURU SWATHI, 2A. ALEKHYA ,
Page No :1550-1557
MUSIC GENRE CLASSIFIER USING MACHINE LEARNING
1CHEKURI DAYAKAR, 2 I. MD. UMAR ANSARI ,
Page No :1558-1566
HEART DISEASE IDENTIFICATION BASED ON RETINAL IMAGES USING DEEP LEARNING
1G. HARIPRIYA, 2O. MADHAVI ,
Page No :1573-1580
IMPROVING AUTONOMOUS VEHICLES DRIVING USING ROAD ACCIDENT AWARENESS DATA
Mrs.R. JYOSNA DEVI1 , G.VENKATA RAMANAMMA2 ,
Page No :1581-1590
ESTIMATION OF SHELF LIFE OF FRESH FRUITS AND VEGETABLES USING MACHINE LEARNING
1CH. RUSHYENDRA MANI, 2M. MANASA ,
Page No :1591-1599
REAL-TIME STRESS DETECTION USING MACHINE LEARNIG
1N. ANIL KUMAR CHOWDARI, 2 P. NARENDRA ,
Page No :1600-1607
TOURISM AND TRAVEL PREDICTION SYSTEM USING MACHINE LEARNING
1M. KOTAMMA, 2T.DEEPIKA ,
Page No :1608-1616
VOICE BASED E-MAIL SYSTEMFOR VISUALLYCHALLENGED PEOPLE
1K. VENKATA RATHNAM, 2K. MANASA SAI ,
Page No :1624-1633
DESIGN AND IMPLEMENTATION OF VULNERABILITIESDETECTION METHOD IN ECOMMERCE TRANSACTION SYSTEMS
Mrs. R. JYOSNA DEVI1 , M. LALITHA2 ,
Page No :1634-1641
A New Model for Calculating the Maximum Trust in Online Social Networks using ABC, Firefly & MABC
Mr. B.Hari Babu1 ,Konda Venkateswarlu2 ,
Page No :1642-1647
SMART CONTROL OF TRAFFIC LIGHTS USING AI
Mr. DADI VENKATA VARAPRASAD1 ,CHINTHAALA MAHESH2 ,
Page No :1653-1656
Social Media and Misleading Information in a Democracy
Mrs. M. KOTAMMA1 , P. VENKATA DIVYA 2 ,
Page No :1657-1665
Trilochan Sahu, 2Dr.Tapan Kumar Panda ,
Page No :1666-1674
A STUDY ON “EMPLOYEE RECRUITMENT” AT “TATA AIG INSURANCE LIMITED”
VASTRALA SHIREESHA¹, Mrs.M.Umrez 2 ,
Page No :1675-1679
A STUDY ON “TAX PLANNING-BENEFITS” AT “HDFC BANK”
BANDA SHAMBHAVI ¹, Dr.G.ARUNA GUDIMETLA ² ,
Page No :1680-1685
A STUDY ON INITIAL PUBLIC OFFERING AND ANALYSIS
Ms. Lingala Akanksha ¹, Manukonda shiva², Dr.K.Veeraiah ³ ,
Page No :1686-1692
A Novel High Step-Up DC-DC Converter for Solar PV Cell Applications
N.Paripurna Chary, Dr. A.Mallikarjuna Prasad ,
Page No :1693-1697
A STUDY ON HUMAN RESOURCE INFORMATION SYSTEM IN HR PROCESS AT CIPLA LTD
Ms. Relangi Sai Geetha ¹, Gottam Pranay Kumar², Dr.K.Veeraiah ³ ,
Page No :1698-1704
Machine Learning-Based Garbage Data Filtering for SNS Big Data Processing
Mrs.M.KOTAMMA1 , M.KALYANI2 ,
Page No :1705-1714
Enhanced Bug Report Prediction Using Nature-Inspired Ensemble Machine Learning Models
A.Hemantha Kumar1 , A.Penchalaiah2 ,
Page No :1715-1723
A STUDY ON “JOB SATISFACTION”AT“TATA MOTORS PRIVATE LIMITED”
Ms. BATTU RUSHITHA¹, Dr. P. RAMYA PATLOLLA ,
Page No :1724-1729
NEW FUND OFFER PROCESS FOR LONG-TERM INVESTMENT GOALS AT ICICI BANK LTD
Mr. SYED ZUBER AHMED ¹, DR. K VEERAIAH² ,
Page No :1730-1737
A PROJECT REPORT ON IMPACT OF LEADERSHIP ON EMPLOYEE PERFORMANCE
Mr. B.Mallikarjun¹, MrMr.Shaik Firoz Khan², Dr.K.Veeraiah³ ,
Page No :1738-1746
A STUDY ON HUMAN RESOURCE DEVELOPMENT PRACTICES- MAHA CEMENT
Ms. DIVYA SHREE¹, Mr. Dr. K. Niranjan ², Dr.K.Veeraiah ³ ,
Page No :1760-1765
A STUDY ON COMPETENCY MAPPING AT HERO MOTO CORP LTD
Ms. Jonnada Likitha Reddy ¹, Mr. Srinivas Reddy², Dr.K.Veeraiah ³ ,
Page No :1766-1771
A STUDY ON RECRUITMENT PRACTICES AT BAJAJ AUTOMOBILES LTD
Ms. Chityala Ramya¹, Gottam Pranay Kumar ², Dr.K.Veeraiah ³ ,
Page No :1772-1778
SEISMIC ANALYSIS OF DOME STRUCTURE BY USING STAAD PRO V8I SOFTWARE
KATRA VENKATESWARA RAO1, K NARESH BABU2 ,
Page No :1779-1786
A PROJECT REPORT ON FINANCIAL RISK MANAGEMENT AT INDIABULLS SECURITIES
M KARTHIK ¹, Mr. R Harish Chandra², Dr.K.Veeraiah3 ,
Page No :1787-1793
A STUDY ON “RECRUITMENT AND SELECTION PROCESS” AT “TATA MOTORS PRIVATE LIMITED”
NALLURI LAKSHMI PRASANNA ¹, Dr. K.Suryanarayana ², Dr.M.V.Narasimha Rao³ ,
Page No :1794-1800
DESIGN AND ANALYSIS OF GAS TURBINE BLADE WITH DIFFRENT COMPOSITION MATERIAL
Kanna Ramarao1 , Pulipati Kiran Babu2 ,
Page No :1801-1808