Title | Page No | Download | Author |
HEALTHCARE SYSTEM Authors: M.Anitha , G.Ramya Doi: 10.48047/IJARST/V14/I05/1 |
1-8 | ||
Teacher Record Management System Authors: M.Anitha ,B.Nikitha Doi: 10.48047/IJARST/V14/I05/2 |
9-14 | ||
"IMPACT OF CLIMATE CHANGE ON FLOWERING PATTERNS OF
MORUS ALBA LINN" Authors: SANJEEV KUMAR DWIVEDI,DR.ADESH KUMAR Doi: 10.48047/IJARST/V14/I05/3 |
15-19 | ||
Predicting Online Shopping Behavior Through Clickstream
Analysis Authors: M.Anitha , K.Baby Ramya ,MD.Zeenath Doi: 10.48047/IJARST/V14/I05/4 |
20-30 | ||
Predicting Obesity Levels Using Eating Habits and Physical
Condition Estimation Authors: M.Anitha , Y.Naga Malleswarao ,K.Harish Doi: 10.48047/IJARST/V14/I05/5 |
31-43 | ||
OZONE LEVEL DETECTION Authors: M.Anitha, K.Baby Ramya, P.Mani Deepika Doi: 10.48047/IJARST/V14/I05/6 |
44-58 | ||
HANDS-ON IMU SENSOR DATA FOR RECOGNITION OF
HUMAN ACTIVITY Authors: M.Anitha , E.Nagaraju ,SD.Chinna Kalesha Doi: 10.48047/IJARST/V14/I05/7 |
59-73 | ||
AIR QUALITY INDEX PREDICTION USING DIFFERENT ML
ALGORITHMS Authors: M.Anitha ,Y.Naga Malleswarao ,G.Sri Tharun Naidu Doi: 10.48047/IJARST/V14/I05/8 |
74-84 | ||
Enhancing Gamma Particle Prediction from MAGIC Telescope Data through
Machine Learning Techniques Authors: M.Anitha , K.Baby Ramya ,SK.Moulali Doi: 10.48047/IJARST/V14/I05/9 |
85-91 | ||
CRICKET WIN PREDICTION Authors: M.Anitha , Y.Naga Malleswarao , B.Sai Kumar Doi: 10.48047/IJARST/V14/I05/10 |
92-102 | ||
CHATBOT-CUM-VOICE ASSISTANT Authors: M.Anitha , Ch.Satyanarayana ,M.Sarath Kumar Doi: 10.48047/IJARST/V14/I05/11 |
103-112 | ||
Classification of Diabetic Retinopathy Disease Levels by
Extracting Topological Features Using Graph Authors: Yannam Vasudha , Ms. Anusha Bondili Doi: 10.48047/IJARST/V14/I05/12 |
113-121 | ||
DATA ANALYSIS BY WEB SCRAPING USING PYTHON Authors: P.SRINADH, G.RAMESH KUMAR Doi: 10.48047/IJARST/V14/I05/13 |
122-129 | ||
DATA SECURITY APPROACH ON CYBER CRIME WITH WEB
VULNERACALBILITY Authors: A PAVANI, S.K.ALISHA Doi: 10.48047/IJARST/V14/I05/14 |
130-137 | ||
Decision Tree Model For Email Classification Authors: Y.KUMAR , Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/15 |
138-146 | ||
Deduplicatable dynamic Proof Of Storage For Multi - User Environment Authors: KARUTURI YAGNA HARIKA , Y.SRINIVASA RAJU Doi: 10.48047/IJARST/V14/I05/16 |
147-157 | ||
DiploCloud: Efficient and Scalable Management Of RDF Data in the
Cloud Authors: GEDDADA SAI TEJASRI , K RAJA RAJESWARI Doi: 10.48047/IJARST/V14/I05/17 |
158-163 | ||
E-Health Monitoring System With Diet and Fitness Recommendation
Using Machine Learning Authors: VEMULA JHANSI RANI , Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/19 |
164-170 | ||
ENRON EMAIL USING MACHINE LEARNING WITH DATA ANALYSIS Authors: B.NEELIMA , S.K.ALISHA Doi: 10.48047/IJARST/V14/I05/20 |
171-179 | ||
EVALUATION BASED APPROACHES FOR LIVER DISEASE PREDICTION
USING MACHINELEARNING ALGORITHMS Authors: T.ANILBABU , Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/21 |
180-183 | ||
EXPLORATORY DATA ANALYSIS AND MACHINE LEARNING
ON TITANIC DISASTER DATASET Authors: N.ANJANI KUMAR , G.RAMESH KUMAR Doi: 10.48047/IJARST/V14/I05/22 |
184-188 | ||
FAKE NEWS DETECTION USING ML APPROACHES: A SYSTEMATIC
REVIEW Authors: V.KESAVA KUMAR MURTHY , Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/23 |
189-194 | ||
FINDING TRUSTWORTHY SERVICE PROVIDER IN TRUSTED
NETWORK Authors: R.C.S.S.S.RAMYA LATHA , VADDI SRIVALLI Doi: 10.48047/IJARST/V14/I05/24 |
195-206 | ||
HEART DISEASE PREDICTION USING MACHINE LEARNING Authors: R.JNANESWARI , VADDI SRIVALLI Doi: 10.48047/IJARST/V14/I05/25 |
207-212 | ||
Image Captioning Using Convolutional Neural Networks And Recurrent
Neural Network Authors: S.SAI KRISHNA REDDY , VADDI SRIVALLIDEVI Doi: 10.48047/IJARST/V14/I05/26 |
213-225 | ||
IMAGE RECOGNITION USING ARTIFICIAL INTELLIGENCE Authors: K.AKASH, Y.SRINIVASA RAJU Doi: 10.48047/IJARST/V14/I05/27 |
226-234 | ||
INTELLIGENT CROP RECOMMENDATION SYSTEM USING
MACHINE LEARNING Authors: CH.BHAVYA SRI , S.K.ALISHA Doi: 10.48047/IJARST/V14/I05/28 |
235-242 | ||
International Stock Index Prediction Using Artificial Neural
Network With Python Programming Authors: Y.VEERA BABU, Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/30 |
243-249 | ||
LAND RESOURCE MANAGEMENT INFORMATION
PLATFORM BASED ON ARTIFICIAL INTELLIGENCE
TECHNOLOGY Authors: M.VAMSI VARMA , G.RAMESH KUMAR Doi: 10.48047/IJARST/V14/I05/31 |
250-255 | ||
LEVERAGING CNN AND TRANSFER LEARNING FOR VISION-BASED
HUMAN ACTIVITY RECOGNITION Authors: ADABALA TRINADH , S.K.ALISHA Doi: 10.48047/IJARST/V14/I05/32 |
256-267 | ||
Machine Learning Application For Black Friday Sales Prediction Framework Authors: V.POOJITHA , Dr.V.Bhaskara Murthy Doi: 10.48047/IJARST/V14/I05/33 |
268-274 | ||
LEARNING MANAGEMENT SYSTEM Authors: M.Anitha ,S.Koteswarao Doi: 10.48047/IJARST/V14/I05/34 |
275-281 | ||
IMPLEMENT HIGH-EFFICIENCY BIDIRECTIONAL
CONVERTER FOR BLDC MOTOR DRIVE CONTROL Authors: K. PRABHAVATHI, M.Tech, USTHELA. RANJITH KUMAR, GENIKE. CHANDRA SEKHAR, GENIKA. CHANDU, DUVVURI. DYANI Doi: 10.48047/IJARST/V14/I05/35 |
282-288 | ||
MODEL FOR PREDICTION OF ROAD ACCIDENTS Authors: M.Anitha, K.Hareesh ,R.Anil Kumar Doi: 10.48047/IJARST/V14/I05/36 |
289-300 | ||
BLOCK ANALYTICS: GETTING REAL-TIME INSIGHTS FROM ADVANCED
BLOCKCHAIN DATA ANALYSIS Authors: M.Anitha,K.Pavani ,R.Bharathi Doi: 10.48047/IJARST/V14/I05/37 |
301-307 | ||
Predicting Adult Census Income with Machine Learning
Techniques Authors: M.Anitha , Y.Naga Malleswarao ,B.Mohan Doi: 10.48047/IJARST/V14/I05/38 |
308-318 | ||
अनूपपुर जिलेके अनुसूजित िनिाजत के छात्रोंके व्यवहार का अध्ययन Authors: जवनरद जसोंह,डॉ. देबदास मोंडल Doi: 10.48047/IJARST/V14/I05/39 |
319-327 | ||
Predictive Analytics for Crime Prevention and Analysis Authors: M.Anitha1 ,K.Pavani,Ch.Nagalakshmi Doi: 10.48047/IJARST/V14/I05/40 |
328-339 | ||
APP for Real-Time Chatting Authors: M.Anitha , Y.Naga Malleswarao ,P.Hema Latha Doi: 10.48047/IJARST/V14/I05/41 |
340-347 | ||
SMART PARKING MANAGEMENT SYSTEM Authors: Mrs. D. Swarna , Sirichandana pothkanoori , Uppula Snehitha ,Dindigala Rishitha,Varre Mahesh ,Vallapu Ajay Doi: 10.48047/IJARST/V14/I05/42 |
348-358 | ||
Attendance Management System Using Face Recognition Authors: Dr. P.U. Anitha , D. Aravind , D. Sanjay Nandha , P. Rakesh , V. Nikhil Reddy P. Karthik Doi: 10.48047/IJARST/V14/I05/43 |
359-367 | ||
Blockchain Technology in the Financial Sector to Increase
Scalability Authors: M.Anitha , Y.Naga Malleswara Rao ,G.Poornima Doi: 10.48047/IJARST/V14/I05/44 |
368-379 | ||
Enhanced Driver Drowsiness Monitoring System
Utilizing Visual Behavior Analysis and Machine
Learning Authors: M.Anitha, E.Naga raju ,CH.Harini Doi: 10.48047/IJARST/V14/I05/45 |
380-389 | ||
EVALUATING BIOCHEMICAL PARAMETERS OF CATLA RAISED IN DOMESTIC
SEWAGE OXIDATION PONDS Authors: DR. RASHMI Doi: 10.48047/IJARST/V14/I05/46 |
390-398 | ||
Improved cyber threat detection using artificial neural networks using
event profiles Authors: M.Anitha , Mr.E.Nagaraju , A.Sudhamayi Doi: 10.48047/IJARST/V14/I05/47 |
399-407 | ||
Machine Learning-Based Drug Recommendation System
Based On Sentiment Analysis Of Drug Reviews Authors: M.Anitha , K.Pavani ,Y.Sravani Doi: 10.48047/IJARST/V14/I05/48 |
408-417 | ||
Cross-Platform Secure Data Sharing through Web-Based Cloud
Storage Authors: M.Anitha ,K.Pavani ,K.Durga Pavan Kalyan Doi: 10.48047/IJARST/V14/I05/49 |
418-428 | ||
Advanced Data Protection Techniques: Proxy Re-Encryption in
Cloud Environments Authors: M.Anitha , Y.Naga Malleswarao ,S.Chandra Sekhar Doi: 10.48047/IJARST/V14/I05/50 |
429-438 | ||
Enhanced Data Security Secure and Expressive Access Control
Mechanisms for Cloud Storage Authors: M.Anitha ,K.Venkata Durga Prasad Doi: 10.48047/IJARST/V14/I05/51 |
439-449 | ||
PREDICTION OF CUSTOMER CHURN USING MACHINE LEARNING IN THE TELECOM INDUSTRY Authors: M.Anitha,K.Pavani,K.Dhatrika Doi: 10.48047/IJARST/V14/I05/52 |
450-458 | ||
Book Recommendation System By Using K-Nearest Neighbors Authors: T. USHA RANI , K.J.V.R.S.S.N.R. S SURENDRA , M.G.V.N. SANTOSHI LASYA SRI ,M.SAI KUMAR , N. NIKHIL KUMAR Doi: 10.48047/IJARST/V14/I05/53 |
459-466 | ||
Machine Learning-Based Forensic Scanner Identification for
Enhanced Digital Investigations Authors: M.Anitha , Y.Nagamalleswara Rao , L.Lakshmi Thirupatamma Doi: 10.48047/IJARST/V14/I05/54 |
467-475 | ||
A Convolutional Neural Network-based Method for
Identifying COVID19 Face Masks Authors: M.Anitha , Y.Nagamalleswara Rao , Miss.V. Pavani Doi: 10.48047/IJARST/V14/I05/55 |
476-488 | ||
ANOMALY DETECTION IN NETWORK TRAFFIC USING KITSUNE
NETWORK ATTACK Authors: M.Anitha, Ch.Satyanarayana ,M.Sarath Kumar Doi: 10.48047/IJARST/V14/I05/56 |
489-503 | ||
HAND WRITTEN DIGIT RECOGNITION Authors: M.Anitha, Ch.Satyanarayana ,M.Sarath Kumar Doi: 10.48047/IJARST/V14/I05/57 |
504-511 | ||
Sentinel: An Integrated Model for Predicting Political Security
Threats Authors: M.Anitha , K.Hareesh ,B.Vasavi Swarajya Lakshmi Doi: 10.48047/IJARST/V14/I05/58 |
512-520 | ||
CHESS WIN PREDICTION USING MACHINE LEANING Authors: M.Anitha ,K.Pavani ,J.Vinay Doi: 10.48047/IJARST/V14/I05/59 |
521-532 | ||
Cybersecurity Knowledge Graph for Advanced Persistent Threat
Attribution: CSKG4APT Authors: M.Anitha , Ch.Satyanarayana ,K.Hemanth Doi: 10.48047/IJARST/V14/I05/60 |
533-543 | ||
Automated Satellite Image Analysis with Convolutional Neural Networks Authors: M.Anitha ,D.Sravani Doi: 10.48047/IJARST/V14/I05/61 |
544-553 | ||
Machine Learning for Industrial Accident Prediction and Analysis Authors: M.Anitha , K. Baby Ramya , N.Komali Daisy Doi: 10.48047/IJARST/V14/I05/62 |
554-564 | ||
Secure Data Vault with Flask: Fortifying Cloud Security Measures Authors: M.Anitha , Ch.Satyanarayana ,P.Gopi Doi: 10.48047/IJARST/V14/I05/63 |
565-577 | ||
Cloud-Based CDA Health Information Exchange: Generation and
Integration Authors: M.Anitha ,K.Pavani ,T. Gayathri Varaha Lakshmi Doi: 10.48047/IJARST/V14/I05/64 |
578-588 | ||
E-PILOTS: Real-Time Hard Landing Prediction During Commercial
Flight Approaches Authors: M. Anitha , CH. Satyanarayana Reddy , K. Sri Ram Doi: 10.48047/IJARST/V14/I05/65 |
589-598 | ||
Efficient and Secure Cloud Storage Using Revocable MultiAuthority Attribute-Based Encryption Authors: M.Anitha ,K.Pavani , K.Mahendra Doi: 10.48047/IJARST/V14/I05/66 |
599-607 | ||
Deep Learning-Driven Prediction System for Early Detection of
Oral Cancer Authors: M.Anitha, E. Nagaraju , D. Anitha Doi: 10.48047/IJARST/V14/I05/67 |
608-616 | ||
Cloud Security Enhancement via Data Integrity and Replication
Detection Authors: M. Anitha, CH. Satyanarayana Reddy , L. Anil Kumar Doi: 10.48047/IJARST/V14/I05/68 |
617-624 | ||
Predicting Low Birth Weight: A Machine Learning Approach Authors: M. Anitha , K. Hareesh , G. Mounika Doi: 10.48047/IJARST/V14/I05/69 |
625-633 | ||
User Authentication and Symmetric Keys Using
Cryptographic Technique Authors: M.Anitha , K . Venkata Sai Rohini Doi: 10.48047/IJARST/V14/I05/70 |
634-644 | ||
Deep Learning-Driven Object Detection and Recognition for Improved
Visual Accessibility Authors: M.Anitha , Ch.Satyanarayana ,M.Bhargav Ram Doi: 10.48047/IJARST/V14/I05/71 |
645-653 | ||
Airport Data Analysis Dashboard Development Authors: M.Anitha,K.Baby Ramya,J.Benarjy Doi: 10.48047/IJARST/V14/I05/72 |
654-663 | ||
Secure and Efficient Public Key Encryption with Keyword Search for Outsourced Cloud Storage Authors: M.Anitha,K.Pavani,M.Shresta Doi: 10.48047/IJARST/V14/I05/73 |
664-671 | ||
PREDICTION OF MAJOR EARTH QUAKE EVENTS USING DIFFERENT MACHINE LEARNING ALGORITHMS Authors: M.Anitha, K.Hareesh,P. Bhuvaneswari Doi: 10.48047/IJARST/V14/I05/74 |
672-681 | ||
Voice Prescription System For Doctors Authors: M.Anitha,K.Baby Ramya,B.Durga Rao Doi: 10.48047/IJARST/V14/I05/75 |
682-692 | ||
ONLINE SRK NEWS PORTAL SYSTEM Authors: M.Anitha ,K.baby Ramya ,A.vasavi Doi: 10.48047/IJARST/V14/I05/76 |
693-700 | ||
FACIAL EXPRESSION RECOGNITION USING CMU FACE IMAGES
DATASET Authors: M.Anitha , Ch.Satyanarayana , Ms.S.Veena Vani Doi: 10.48047/IJARST/V14/I05/77 |
701-711 | ||
A Comparative Study for Improved Network Intrusion Detection Authors: M.Anitha ,E.Nagaraju ,T.Soniya Doi: 10.48047/IJARST/V14/I05/78 |
712-720 | ||
A DEEP LEARNING-BASED EFFICIENT FIREARMS
MONITORING TECHNIQUE FOR BUILDING SECURE SMART
CITIES Authors: Gali Ramesh Kumar,Peddireddy Naga Venkatesh Doi: 10.48047/IJARST/V14/I05/79 |
721-734 | ||
ACTIVITY MINIMIZATION OF MISINFORMATION
INFLUENCE IN ONLINE SOCIAL NETWORKS Authors: Gali Ramesh Kumar, Medidi Naga Venkata Sri Mahalakshmi Doi: 10.48047/IJARST/V14/I05/80 |
735-749 | ||
DEEPSIDE A DEEP LEARNING FRAMEWORK FOR DRUG
SIDE EFFECT PREDICTION Authors: VADDI SRIVALLIDEVI, Sk. Ruhi Doi: 10.48047/IJARST/V14/I05/81 |
750-763 | ||
EFFECTIVE SOFTWARE EFFORT ESTIMATION
LEVERAGING MACHINE LEARNING FOR DIGITAL
TRANSFORMATION Authors: Y.Srinivasa Raju, K.Haricharan Doi: 10.48047/IJARST/V14/I05/82 |
764-777 | ||
EXPLAINABLE ARTIFICIAL INTELLIGENCE FOR PATIENT
SAFETY A REVIEW OF APPLICATION IN
PHARMACOVIGILANCE Authors: Mr. S. K. Alisha, Bellamkonda Roshini Jyothi Doi: 10.48047/IJARST/V14/I05/83 |
778-789 | ||
PREDICTIVE ANALYSIS FOR BIG MART SALES USING
MACHINE LEARNING ALGORITHMS Authors: Y.SRINIVASA RAJU, Kancharla Venkata Hemanth Doi: 10.48047/IJARST/V14/I05/84 |
790-801 | ||
SIMILARITY SEARCH FOR ENCRYPTED IMAGES IN
SECURE CLOUD COMPUTING Authors: Raja Rajeswari kalidindi, Gullapalli Bhargavi Doi: 10.48047/IJARST/V14/I05/85 |
802-812 | ||
PREDICTION OF POLITICAL SECURITY THREAT USING ML Authors: V Mounica , K.Sirisha, K.Vandana, K.Nikhil, K.Krishna Babu Doi: 10.48047/IJARST/V14/I05/86 |
813-819 | ||
CATEGORIZATION OF PNEUMONIA USING DEEP LEARNING Authors: D. Keerthi Reddy, K.Swetha, E.Laxmi Manasa, K.Rakesh, K.Shiva Doi: 10.48047/IJARST/V14/I05/87 |
820-824 | ||
Block Chain Technology with Centralized Database For
Conventional Data Integrity Verification schemes Authors: G.Manasa , K.Rajesh, E.Lokesh Goud, G.Shriya, K.Srijani Doi: 10.48047/IJARST/V14/I05/88 |
825-834 | ||
AGRICULTURAL TRADE INTELLIGIBILITY AND PROTECTION USING
BLOCKCHAIN Authors: T. Sai Santhoshi, K. Vaishnavi, G. Revanth, I. Nikhil Kumar, J. Giridhar Doi: 10.48047/IJARST/V14/I05/89 |
835-841 | ||
ADVANCEMENTS IN AUTONOMOUS VEHICLE SYSTEM
PARKING Authors: E. Pavithra, K. Chinna , J. Srikanth, G. Shreya, G. Vinay Doi: 10.48047/IJARST/V14/I05/90 |
842-851 | ||
LANGUAGE TRANSLATOR FOR SPEECH TO INDIAN SIGN Authors: A.Sandeep, K.Saisree reddy, G.Karthik Chary, J.Rakshitha, G.Raghuram Doi: 10.48047/IJARST/V14/I05/91 |
852-860 | ||
HEART DIAGNOSIS AS A CLASSIFICATION WITH MEANINGFUL
PATTERNS DATA MINING TECHNIQUES. Authors: P. Pravallika Chandar , K. Vasu, K. Varun Sai, G. Madhu, M.Ramya Doi: 10.48047/IJARST/V14/I05/92 |
861-867 | ||
IDENTIFYING HEALTH INSURANCE CLAIM FRAUDS USING MIXTURE
OF CLINICAL CONCEPTS Authors: Avula Lakshmaiah, K.Meghana Sree, J.Karthik Reddy, K.Jaya Prakash, K.Bhanu Teja Doi: 10.48047/IJARST/V14/I05/93 |
868-876 | ||
PREDICTION OF PARKINSON’S DISEASE USING ML
TECHNIQUES Authors: Kondapalli Krishna , K. Naveena, K. Gnanisree, J. Sairam, J. Shiva Sai Doi: 10.48047/IJARST/V14/I05/94 |
877-885 | ||
A DEEP LEARNING BASED APROACH FOR INAPPROPRIATE CONTENT
AND CLASSIFICATION OF YOUTUBE VIDEOS Authors: Kadali Vijayalakshmi, Maheen Fatima, G.Jayasree Reddy, M.Gnaneshwar Reddy, K.Manideep Doi: 10.48047/IJARST/V14/I05/95 |
886-894 | ||
AI BASED CHATBOT FOR HOSPITAL Authors: K.Rajitha, K.Sriharshitha, G.Pavani, K.Vineeth, V.Surya Prakash Doi: 10.48047/IJARST/V14/I05/96 |
895-902 | ||
CONTENT BASED IMAGE RETRIVAL USING FEATURE
EXTRACTION Authors: Polishetty Sridevi , M.Saraswathi, M.Madhavi, M.Mahesh Chandra, P.Sai Chaitanya Doi: 10.48047/IJARST/V14/I05/97 |
903-909 | ||
PATTERNMATCHING ALGORITHM FOR FACERECOGNITION
USING NEURAL NETWORKS Authors: M Sampoorna , N. Bhavani, M. Shreya, M. Vamshi Krishna, M. Harish Doi: 10.48047/IJARST/V14/I05/98 |
910-917 | ||
Semantic Cyber security Monitoring using Machine Learning Authors: Ramavath Vinod Kumar, P.Manikanta, P.Sai Linga, P.Prashanth, S.Paramesh Doi: 10.48047/IJARST/V14/I05/99 |
918-923 | ||
A SYSTEM FOR BIRD CLASSIFIER USING MACHINE
LEARNING APPROACH Authors: Sirisha Godavari , M. Srivani, M. Harshavardhan Reddy, M. Shiva Prasad Reddy, S. Vinay kumar Doi: 10.48047/IJARST/V14/I05/100 |
924-933 | ||
TRANSFER-LEARNING MACHINE-LEARNING MODEL TO
PREDICT DEMENTIA Authors: Ch GVN Prasad , M. Manisha, A. P. Navya, MD. Yasin, Srikanth Doi: 10.48047/IJARST/V14/I05/101 |
934-942 | ||
SECURE STORAGE AUDITING WITH EFFICIENT KEY UPDATES
FOR COGNITIVE INDUSTRIAL IOT ENVIRONMENT Authors: Raja Rajeswari kalidindi, Eppili Sai Bhargav Doi: 10.48047/IJARST/V14/I05/102 |
943-954 | ||
SIMILARITY SEARCH FOR ENCRYPTED IMAGES IN
SECURE CLOUD COMPUTING Authors: Gullapalli Bhargavi , Raja Rajeswari kalidindi Doi: 10.48047/IJARST/V14/I05/103 |
955-965 | ||
Predictive Analysis on Big market sales by Machine learning Authors: Tasneem Rahath, Bodhu Harshini, Ramavath Hrishitha, Mula Kavya Sri Doi: 10.48047/IJARST/V14/I05/104 |
966-975 | ||
Advanced Road Damage Detection via UAV Imagery and Deep
Learning Authors: N. MAHENDRA, MULE RAJA MOHAN REDDY Doi: 10.48047/IJARST/V14/I05/105 |
976-988 | ||
Autism Spectrum Disorder Analysis and Detection Using Machine Learning Techniques Authors: Mavilla Kavya , Danti Srinivasulu Doi: 10.48047/IJARST/V14/I05/106 |
989-993 | ||
IMAGE CLASSIFICATION USING DEEP LEARNING MODELS FOR RICE VARIETIES Authors: Kotthollu Akshitha L. Gopi Krishna Doi: 10.48047/IJARST/V14/I05/107 |
994-998 | ||
A CAPABLE ACCESS CONTROL SYSTEM FOR PROTECTED CLOUD
STORAGE ANTI ATTACKING DATA Authors: G Naga Kumar Kakarla, Spurthi K, Kishore Kumar K Doi: 10.48047/IJARST/V14/I05/108 |
999-1010 | ||
VIDEO ANALYSIS FOR WEAPON DETECTION AND ALERTING Authors: KANDIMALLA SRINIDHI, ARAVALAPALLI LOHITHA SATYA LAKSHMI, NAREDLA SAMITHA Doi: 10.48047/IJARST/V14/I05/109 |
1011-1018 | ||
Machine Learning-Based Data-Driven Energy Economy Forecasting for Electric City Buses Authors: S. SRIDHAR , GORU TARUN Doi: 10.48047/IJARST/V14/I05/110 |
1019-1028 | ||
Innovative Deep Learning Methods for Image Authenticity Verification Authors: S. SRIDHAR , BOTTA DIVYA DEEPIKA Doi: 10.48047/IJARST/V14/I05/111 |
1029-1036 | ||
CREATION AND ASSESSMENT OF MIST COMPUTING
CENTERED ENCODED MANAGEMENT SYSTEM Authors: S. Vijayarangam, C.Sravani Reddy Doi: 10.48047/IJARST/V14/I05/112 |
1037-1043 | ||
PROTECT DATA IN THE CLOUD WITH DYNAMIC SECURITY
VIA NETWORK CONNECTIVITY Authors: T.Charan Sing , M.Youraj Doi: 10.48047/IJARST/V14/I05/113 |
1044-1054 |