Title | Page No | Download | Author |
SENTIMENT BASED RACISM DETECTION OF TWEETS USING DEEP LEARNING MODULES Authors: ABDUL NAZMA CH SRINIVASA RAO Doi: 10.48047/IJARST/V13/I08/01 |
1-10 | ||
A PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN CLOUD FOR DATA SECURITY Authors: TANETI JAYA DARSHAN B.N.S. GUPTA Doi: 10.48047/IJARST/V13/I08/02 |
11-19 | ||
SECURE FINANCIAL TRANSACTIONS WITHOUT THE NEED OF TOKENS AND BY USING BLOCK CHAIN TECHNOLOGY Authors: V LAVANYA, K LAKSHMANA REDDY Doi: 10.48047/IJARST/V13/I08/03 |
20-24 | ||
A SYSTEMATIC EVALUATION OF RESEARCH ON SOCIAL ENGINEERING ATTACKS PREVENTION Authors: D.MAHESH P SRINIVASA REDDY Doi: 10.48047/IJARST/V13/I08/04 |
25-30 | ||
PSYCHOLOGICAL AND BEHAVIOURAL INDICATORS OF THE SOCIAL MEDIA BREAK-UP Authors: M. MURALI KRISHNA A. N. RAMAMANI Doi: 10.48047/IJARST/V13/I08/05 |
31-38 | ||
LEARNING ASYMMETRIC HASH CODE FOR REMOTE SENSING IMAGE RETREIVAL Authors: G RAMYA, A N RAMA MANI Doi: 10.48047/IJARST/V13/I08/06 |
39-45 | ||
TRUST MANAGEMENT PROTOCOL BASED ON BLOCKCHAIN FOR THE INTERNET OF THINGS Authors: G. SANTHI KUMARI CH. SRINIVAS RAO Doi: 10.48047/IJARST/V13/I08/07 |
46-56 | ||
DISTRIBUTED CONCURRENCY BUGS DETECTION SYSTEM USING IMPROVED LOG MINING Authors: R SUMA, K LAKSHMAN REDDY Doi: 10.48047/IJARST/V13/I08/08 |
57-62 | ||
Blockchain Technology is Being Utilized for Developing a Secure E-Coupon Service Authors: N SWETHA KANAKA RATNAM P SRINIVASA REDDY Doi: 10.48047/IJARST/V13/I08/09 |
63-68 | ||
An Advanced Healthcare System with IOT at its core and cloud support for safe, portable and accessible sharing of Information Authors: CH. SRI VALLI DHANA LAKSHMI B.N.Srinivasa Gupta Doi: 10.48047/IJARST/V13/I08/11 |
81-88 | ||
Enhancing Resource Utilization and Performance in IoT with Fog Computing: A Novel Data Migration Approach Using SCCSO and SCPSO Authors: Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray Doi: 10.48047/IJARST/V13/I08/12 |
89-104 | ||
IOT BASED HOME APPLICATIONS CONTROLING USING VISION AND GESTURE THROUGH RASPBERRY PI Authors: J L SARWANI THEEPARTHI, S CHITTIBABULU Doi: 10.48047/IJARST/V13/I08/13 |
105-108 | ||
A REVIEW ON PRIVACY OF PHOTO SHARING ON SOCIAL MEDIA NETWORKS Authors: S CHITTIBABULU, J L SARWANI THEEPARTHI Doi: 10.48047/IJARST/V13/I08/14 |
109-113 | ||
Transformative Forces: Exploring the Role of Christian Missionaries in the Development Women’s Education in Kashmir Authors: Sameena Bashir Doi: 10.48047/IJARST/V13/I08/15 |
114-121 | ||
Ensemble Framework-based Diabetes Detection and Diet Plan Suggestion for Healthcare Big Data Clouds Big Data-AI Authors: Mrs.Sharanya Dr. D.B.K. Kamesh, Doi: 10.48047/IJARST/V13/I08/16 |
122-126 | ||
PROGNOSTICATE DRUG-DRUG SYNERGY BASED ON INTEGRATED SIMILARITY AND SEMI-SUPERVISED ERUDITION Authors: 1Mrs.A Sneha Dr. D.B.K. Kamesh Doi: 10.48047/IJARST/V13/I08/17 |
127-131 | ||
IMPROVING QUALITY OF SERVICE IN WIRELESS NETWORKS USING CONSENSUS ALGORITHM Authors: Dr.R.Baby.Munirathinam Doi: 10.48047/IJARST/V13/I08/18 |
132-137 | ||
A MACHINE LEARNING ANALYSIS ON IDENTIFYING AND DETECTION OF THE IMAGE FORGERY USING CNN Authors: Dr. K. Ramakrishna, Dr. Pradeep Venuthurumilli Doi: 10.48047/IJARST/V13/I08/19 |
138-144 | ||
A BIG DATA ANALYTICALS WITH HADOOP Authors: S. VENKATA RAMANA Doi: 10.48047/IJARST/V13/I08/20 |
145-151 | ||
Effective Human Performance Assessment And Prediction Using Machine Learning In Collaborative Learning Environments Authors: Mrs. B.HARITHA LAKSHMI Doi: 10.48047/IJARST/V13/I08/21 |
152-156 | ||
FUEL CONSUMPTION PREDICTION AND ANALYSIS IN HEAVY VEHICLES USING MACHINE LEARNING Authors: C RASHMI Doi: 10.48047/IJARST/V13/I08/22 |
157-161 | ||
RESULTS OF EXPERIMENTS ON DIFFERENT ELLIPTIC CURVES AND APP LAYOUTS FOR MULTI-KEY SEARCHABLE ENCRYPTION Authors: Dr Sumaiya Samreen, Putta Srivani,Sanjeevini Harwalkar Doi: 10.48047/IJARST/V13/I08/23 |
162-169 | ||
Optimized Resource Provisioning in Cloud Ecosystem via Load Balancing Authors: N TEJASRI Doi: 10.48047/IJARST/V13/I08/24 |
170-176 | ||
Detection of dropped Packets Forgery Attack via AODV with Location Based Hierarchy in Wireless Sensor Networks Authors: M SYAMALA SAISREE Doi: 10.48047/IJARST/V13/I08/25 |
177-184 | ||
AN INTELLIGENT TRAFFICMANAGEMENTSYSTEMUSINGMACHINE LEARNING Authors: GANJI KAVYA, P.Raveendra Babu, D SUDHA Doi: 10.48047/IJARST/V13/I08/26 |
185-192 | ||
ML BASED SURVILLIANCE SYSTEM FOR DETECTION OF BIKE RIDE WITHOUT HELMET Authors: BOINI VINAY KUMAR , Dr. B PREMA LATHA ,D. SUDHA Doi: 10.48047/IJARST/V13/I08/27 |
193-199 | ||
SMART VEHICLE SURVEILLANCE SYSTEM USING RASPBERRY PI Authors: K. V. S Pavan Kumar D. Sudha E. N. V Purnachandra Rao Doi: 10.48047/IJARST/V13/I08/28 |
200-208 | ||
A comparison of the physical abilities of athletes and non-athletes Authors: Dr. Nirav A. Pandya Doi: 10.48047/IJARST/V13/I08/29 |
209-214 | ||
Protecting Critical Infrastructure from Cyber Attacks: A Multifaceted Approach Authors: 1 Avinash Gupta Desetty, 2Srinivas Reddy Pulyala, 3 Vinay Dutt Jangampet Doi: 10.48047/IJARST/V13/I08/30 |
221-230 | ||
Necessity to improve kick boxing for adult students: Study of
Techniques Authors: Suryawanshi Mahadeo Sukhadeo Doi: 10.48047/IJARST/V13/I08/31 |
231-236 | ||
A Case Study on Application Artificial Intelligence need in libraries of Higher
Education System in India Authors: Vaishali M. Choudhari Doi: 10.48047/IJARST/V13/I08/32 |
237-246 | ||
"GLOBALIZATION AND CONSUMER PREFERENCES IN BANKING AND INSURANCE: A DYNAMIC INTERACTION" Authors: Mahadeva N C, Dr. Yadvendra Pratap Singh Doi: 10.48047/IJARST/V13/I08/33 |
247-252 | ||
EVALUATING THE EFFECT OF DEMONETIZATION ON BANK PERFORMANCE AND EMPLOYEE VIEWS Authors: lyas khan, Dr. Sapna Rathore Doi: 10.48047/IJARST/V13/I08/34 |
253-257 |