;

Volume-13 Publications

TitlePage NoDownloadAuthor
SENTIMENT BASED RACISM DETECTION OF TWEETS USING DEEP LEARNING MODULES
Authors: ABDUL NAZMA CH SRINIVASA RAO
Doi: 10.48047/IJARST/V13/I08/01
1-10
A PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN CLOUD FOR DATA SECURITY
Authors: TANETI JAYA DARSHAN B.N.S. GUPTA
Doi: 10.48047/IJARST/V13/I08/02
11-19
SECURE FINANCIAL TRANSACTIONS WITHOUT THE NEED OF TOKENS AND BY USING BLOCK CHAIN TECHNOLOGY
Authors: V LAVANYA, K LAKSHMANA REDDY
Doi: 10.48047/IJARST/V13/I08/03
20-24
A SYSTEMATIC EVALUATION OF RESEARCH ON SOCIAL ENGINEERING ATTACKS PREVENTION
Authors: D.MAHESH P SRINIVASA REDDY
Doi: 10.48047/IJARST/V13/I08/04
25-30
PSYCHOLOGICAL AND BEHAVIOURAL INDICATORS OF THE SOCIAL MEDIA BREAK-UP
Authors: M. MURALI KRISHNA A. N. RAMAMANI
Doi: 10.48047/IJARST/V13/I08/05
31-38
LEARNING ASYMMETRIC HASH CODE FOR REMOTE SENSING IMAGE RETREIVAL
Authors: G RAMYA, A N RAMA MANI
Doi: 10.48047/IJARST/V13/I08/06
39-45
TRUST MANAGEMENT PROTOCOL BASED ON BLOCKCHAIN FOR THE INTERNET OF THINGS
Authors: G. SANTHI KUMARI CH. SRINIVAS RAO
Doi: 10.48047/IJARST/V13/I08/07
46-56
DISTRIBUTED CONCURRENCY BUGS DETECTION SYSTEM USING IMPROVED LOG MINING
Authors: R SUMA, K LAKSHMAN REDDY
Doi: 10.48047/IJARST/V13/I08/08
57-62
Blockchain Technology is Being Utilized for Developing a Secure E-Coupon Service
Authors: N SWETHA KANAKA RATNAM P SRINIVASA REDDY
Doi: 10.48047/IJARST/V13/I08/09
63-68
An Advanced Healthcare System with IOT at its core and cloud support for safe, portable and accessible sharing of Information
Authors: CH. SRI VALLI DHANA LAKSHMI B.N.Srinivasa Gupta
Doi: 10.48047/IJARST/V13/I08/11
81-88
Enhancing Resource Utilization and Performance in IoT with Fog Computing: A Novel Data Migration Approach Using SCCSO and SCPSO
Authors: Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
Doi: 10.48047/IJARST/V13/I08/12
89-104
IOT BASED HOME APPLICATIONS CONTROLING USING VISION AND GESTURE THROUGH RASPBERRY PI
Authors: J L SARWANI THEEPARTHI, S CHITTIBABULU
Doi: 10.48047/IJARST/V13/I08/13
105-108
A REVIEW ON PRIVACY OF PHOTO SHARING ON SOCIAL MEDIA NETWORKS
Authors: S CHITTIBABULU, J L SARWANI THEEPARTHI
Doi: 10.48047/IJARST/V13/I08/14
109-113
Transformative Forces: Exploring the Role of Christian Missionaries in the Development Women’s Education in Kashmir
Authors: Sameena Bashir
Doi: 10.48047/IJARST/V13/I08/15
114-121
Ensemble Framework-based Diabetes Detection and Diet Plan Suggestion for Healthcare Big Data Clouds Big Data-AI
Authors: Mrs.Sharanya Dr. D.B.K. Kamesh,
Doi: 10.48047/IJARST/V13/I08/16
122-126
PROGNOSTICATE DRUG-DRUG SYNERGY BASED ON INTEGRATED SIMILARITY AND SEMI-SUPERVISED ERUDITION
Authors: 1Mrs.A Sneha Dr. D.B.K. Kamesh
Doi: 10.48047/IJARST/V13/I08/17
127-131
IMPROVING QUALITY OF SERVICE IN WIRELESS NETWORKS USING CONSENSUS ALGORITHM
Authors: Dr.R.Baby.Munirathinam
Doi: 10.48047/IJARST/V13/I08/18
132-137
A MACHINE LEARNING ANALYSIS ON IDENTIFYING AND DETECTION OF THE IMAGE FORGERY USING CNN
Authors: Dr. K. Ramakrishna, Dr. Pradeep Venuthurumilli
Doi: 10.48047/IJARST/V13/I08/19
138-144
A BIG DATA ANALYTICALS WITH HADOOP
Authors: S. VENKATA RAMANA
Doi: 10.48047/IJARST/V13/I08/20
145-151
Effective Human Performance Assessment And Prediction Using Machine Learning In Collaborative Learning Environments
Authors: Mrs. B.HARITHA LAKSHMI
Doi: 10.48047/IJARST/V13/I08/21
152-156
FUEL CONSUMPTION PREDICTION AND ANALYSIS IN HEAVY VEHICLES USING MACHINE LEARNING
Authors: C RASHMI
Doi: 10.48047/IJARST/V13/I08/22
157-161
RESULTS OF EXPERIMENTS ON DIFFERENT ELLIPTIC CURVES AND APP LAYOUTS FOR MULTI-KEY SEARCHABLE ENCRYPTION
Authors: Dr Sumaiya Samreen, Putta Srivani,Sanjeevini Harwalkar
Doi: 10.48047/IJARST/V13/I08/23
162-169
Optimized Resource Provisioning in Cloud Ecosystem via Load Balancing
Authors: N TEJASRI
Doi: 10.48047/IJARST/V13/I08/24
170-176
Detection of dropped Packets Forgery Attack via AODV with Location Based Hierarchy in Wireless Sensor Networks
Authors: M SYAMALA SAISREE
Doi: 10.48047/IJARST/V13/I08/25
177-184
AN INTELLIGENT TRAFFICMANAGEMENTSYSTEMUSINGMACHINE LEARNING
Authors: GANJI KAVYA, P.Raveendra Babu, D SUDHA
Doi: 10.48047/IJARST/V13/I08/26
185-192
ML BASED SURVILLIANCE SYSTEM FOR DETECTION OF BIKE RIDE WITHOUT HELMET
Authors: BOINI VINAY KUMAR , Dr. B PREMA LATHA ,D. SUDHA
Doi: 10.48047/IJARST/V13/I08/27
193-199
SMART VEHICLE SURVEILLANCE SYSTEM USING RASPBERRY PI
Authors: K. V. S Pavan Kumar D. Sudha E. N. V Purnachandra Rao
Doi: 10.48047/IJARST/V13/I08/28
200-208
A comparison of the physical abilities of athletes and non-athletes
Authors: Dr. Nirav A. Pandya
Doi: 10.48047/IJARST/V13/I08/29
209-214
Protecting Critical Infrastructure from Cyber Attacks: A Multifaceted Approach
Authors: 1 Avinash Gupta Desetty, 2Srinivas Reddy Pulyala, 3 Vinay Dutt Jangampet
Doi: 10.48047/IJARST/V13/I08/30
221-230
Necessity to improve kick boxing for adult students: Study of Techniques
Authors: Suryawanshi Mahadeo Sukhadeo
Doi: 10.48047/IJARST/V13/I08/31
231-236
A Case Study on Application Artificial Intelligence need in libraries of Higher Education System in India
Authors: Vaishali M. Choudhari
Doi: 10.48047/IJARST/V13/I08/32
237-246