DRIVER DROWSINESS MONITORING SYSTEM USING MACHINE LEARNING
Authors: NAILA FATHIMA, T.ANITA |
1-11 |
 |
 |
FACIAL RECOGNITION ATTENDANCE SYSTEM
Authors: MOHAMMED ISHTIYAQ, Dr. PATHAN AHMED KHAN, DR. AKHIL KHARE |
12-22 |
 |
 |
Predicting Heart Disease using Machine Learning Techniques
Authors: Velicheti Srinivas |
23-30 |
 |
 |
IMPACT OF PLUG-IN HEV ON POWER DISTRIBUTION SYSTEM CONSIDERING VEHICLE TO GRID TECHNOLOGY
Authors: B. Venkata Lakshmi |
31-36 |
 |
 |
Gb/s Underwater Wireless Optical Communications Using Series-Connected GaN Micro-LED Arrays
Authors: B.V.Sai Koushik |
37-43 |
 |
 |
Self-disassembly of swarm robots with collision avoidance
Authors: V.Nikith Varma, M.Ajay Kumar, Shaik Shajahan |
44-49 |
 |
 |
FACIAL RECOGNITION ATTENDANCE SYSTEM
Authors: MOHAMMED ISHTIYAQ, Dr. PATHAN AHMED KHAN, DR. AKHIL KHARE |
12-22 |
 |
 |
AADHAAR BASED FINGERPRINT ELECTRONIC VOTING SYSTEM
Authors: MASEERA FATHIMA, M. TAISEEN, M.SAI SRUTHI, Mr.NAGADASARADHA |
50-54 |
 |
 |
AMBULANCE DETECTION AND TRAFFIC CLEARANCE USING RASPBERRY PI PICO
Authors: MONIKA CHOUDHARY, M.VARSHA, L.SWETHA, MR.V.NAGAMAHESH |
55-60 |
 |
 |
AUTOMATIC GARBAGE COLLECTION INTIMATION SYSTEM USING IOT
Authors: P.AKSHAYA, P.CHAITANYA, P.VINISHA, Dr. K. Sudhakar |
61-66 |
 |
 |
AUTOMATIC IRRIGATION SYSTEM USING RASPBERRY PI PICO
Authors: P. MANASWENI, M. NAVYA SRI, O.NIVEDITHA, Mrs.SUSHMA |
67-72 |
 |
 |
BANK LOCKER SECURITY SYSTEM WITH 2 STEP VERIFICATION USING GSM
Authors: M. SHRESHTA, P. BHAVANA , P. MANASA, Mr.G. HARISH KUMAR |
73-39 |
 |
 |
FINGERPRINT AUTHENTICATION SYSTEM FOR VEHICLE USING GPS AND GSM
Authors: M.VYSHNAVI, N.ABHIGNA, P.LAHARIKA, DR.S.MANTHANDI PERIANNA SAMY |
80-84 |
 |
 |
GPS BASED AUTOMATIC IMAGE CAPTURING AND EMAIL ALERTING SYSTEM
Authors: M.SOUMYA, P.POOJWALA, L.USHA RANI, Dr.S.SATISH |
85-89 |
 |
 |
LOCATION PREDICTION ON TWITTER USING MACHINE LEARNING TECHNIQUES
Authors: A.MANASA, A.BHAVANI, A.PRANAVI, MR.VENKATA RAJESH |
90-99 |
 |
 |
PLANT DISEASE IDENTIFICATION AND PESTICIDES RECOMMDATION USING CNN
Authors: CH.MEGHANA, CH.SAMYUKTHA, CH.RASHMITHA, HARSHINI |
100-109 |
 |
 |
PUBLIC INTEGRITY CHECKING WITHOUT CERTIFICATE AUTHORITY OF GROUP SHARED DATA ON CLOUD STORAGE
Authors: M.B.Bhavana Reddy, Mrs.B.Charishma |
110-117 |
 |
 |
Identifying Fraud in Online Product Review Systems via Heterogeneous Graph Transformer
Authors: Yannam Divya Ramana Reddy, G.ChennaKesava Reddy |
117-124 |
 |
 |
Spammer Detection and Fake User Identification on Social Network
Authors: A.Pradeep kumar, A.Swetha |
125-132 |
 |
 |
Privacy-Aware Personal Data Storage to Protect User Privacy from External Applications
Authors: N.Raja Rajeswari, Mrs.B.Charishma |
133-140 |
 |
 |
Cryptography and Steganography Techniques for Securing Data in Internet of Things (IoT)
Authors: Kambham Sravani , A.Swetha |
141-147 |
 |
 |
Cloud-Based Data Storage and Sharing using Dual Access Control
Authors: M.Swathi, B.Charishma |
148-156 |
 |
 |
A Procedure for Secure Personal Health Records Sharing over cloud
Authors: Nimma Vishali, G.Chenna Kesava Reddy |
157-165 |
 |
 |
DESIGN AND ANALYSIS OF ACCUMULATOR
Authors: V.K.SIVAKUMAR ADAPA |
166-174 |
 |
 |
DESIGN AND ANALYSIS OF ACCUMULATOR
Authors: V.K.SIVAKUMAR ADAPA |
166-174 |
 |
 |
Agricultural Crop Recommendations based on Productivity and Season
Authors: P.SUBHAN BASHA , MANDLA VIJAYA KUMAR |
175-184 |
 |
 |
Cyberbullying Prediction on Social Media using Big Data by implementing Machine Learning Algorithms
Authors: P.SUBHAN BASHA , DANDU RAJASEKHARREDDY |
185-197 |
 |
 |
A SECURE AND EFFICIENT CLOUD CENTRIC INTERNET OF MEDICAL THINGS ENABLED SMART HEALTH CARE SYSTEM WITH PUBLIC VERIFICABILITY
Authors: 1DR.M.SURESH KUMAR, 2BOGI ADARSHA |
198-206 |
 |
 |
SPAMMING DETECTION AND FAKE USER IDENTIFICATION
Authors: Dr . E. BALAKRISHNA , BANOTHU SHIREESHA |
207-214 |
 |
 |
THE STABILITY OF A DC DISTRIBUTION SYSTEM THAT INTEGRATES PLUG-IN HYBRID ELECTRIC VEHICLES (PHEVS) WITH AN AC POWER GRID
Authors: VIJAYA BABU MANIKE, P LAKSHMI NARAYANA |
215-222 |
 |
 |