|
|
Financial Risk Management In The Cryptocurrency Market: An Analysis Driven By Machine Learning
1P. MURTHUJA, 2GORLA PRASHANTH KUMAR
PDF
|
|
Social Media Based Cyber Bullying Detection
Jeevana Priya Chintala, Dr. A. Radhika
PDF
|
|
A PROTECTING DATA SHARING AND TRUSTED SEARCHABLE STRUCTURE FOR ONLINE HEALTHCARE SYSTEM IN CLOUD
Spurthi K 1 ,Dr. Kishore Kumar K2 , Mr. G Naga Kumar Kakarla3
PDF
|
|
Behavior Of Steel Reinforced Ternary Blended Concrete Subjected To Elevated Temperature
J. NAGARAJU1 SYED MUSKAN2 JANAPANENI SWATHI3 DUPPATI LAVANYA4 THODETI MANI DWEEPA5
PDF
|
|
Influence Of Coarse Aggregate Shape Factors On Bituminous Mixtures
A SAITEJA1 BHUKYA PAVANI2 YASA RAVALI3 TURSA LAHARIKA4 PUTTA PAVANI5
PDF
|
|
ASSESSING USER TRUSTWORTHINESS IN SOCIAL REVIEWING SYSTEMS
1Mrs. CHAITANYA NUKALA, 2CHAKALI RAMA TULASI
PDF
|
|
DETECTING ELECTRICITY THEFT IN SMART GRIDS USING DEEP NEURAL NETWORKS
1M. VINAY KUMAR, 2KATTUBADI SHAIK AMEENUDDIN
PDF
|
|
MULTI CLASS STRESS DETECTION THROUGH HEART RATE VARIABILITY USING LOGISTIC REGRESSION ALGORITHM
G.Kusuma Harinadh, K.Siva Venkata Ramana
PDF
|
|
Secret File Exchange Between Two Parties
Mr.K.V.SivaPrasadReddy [1], K.Naveen[2], J.Ganesh[3], T.Keshav[4] and SK.Masthan[5]
PDF
|
|
A KNN BASED APPROACH FOR PREDICTION OF STOCK MARKET TRENDS
1 Ch. Sindhu Priyanka, 2 Gudavalli Tarun Sindhuja
PDF
|
|
CLOUD-ENABLED AUTOMATED IMAGE ANALYSIS FOR FRUIT DISEASE DETECTION
1Aswani Kumar Unnam , 2Aanchal Thakur, 3Bhukya Vishnuvardhan,4 P Sri Harsha Kumar
PDF
|
|
ATTENDANCE TRACKING SYSTEM USING QR CODE TECHNOLOGY
1S. Sushmitha, 2Mamidi. Sainikhitha, 3Chillara. Mahesh,4 Ramavath Venkatesh, 5 Dharavath Vishnuvardhan
PDF
|
|
ENHANCING INDUSTRIAL NETWORK EFFICIENCY WITH ADAPTIVE P4 DATA PLANE SOLUTIONS
J. Sudheer Kumar, Bejjenki Chaithanya, Meghana. Akula, Vavilla Sandeep, Manee Jayanth Kumar
PDF
|
|
HATE SPEECH DETECTION IN ONLINE SHORT-FORM VIDEOS THROUGH AUDIO CLASSIFICATION
1B.Nirupama, 2Nara Taruni, 3Bingi Sathwika,4 Pyata Tarun,
PDF
|
|
INVESTIGATING THE GENERATION AND DETECTION METHODS FOR FACE MORPHING ATTACKS
1G.Raj Kumar, 2Chelimela Keerthana, 3S. Nivas,4 Jolge Ajay, 5Ch. Akshay Kumar
PDF
|
|
IMPLEMENTING AN ACCIDENT DETECTION AND NOTIFICATION SYSTEM USING AWS
1 E.Aruna , 2D. Aadityaa, 3C. Ankitha,4 Gaddam avinash Reddy, 5Erla Eshwar Prasad
PDF
|
|
ADAPTIVE CHATBOT FOR STREAMLINING PARKING SERVICE
1G.Archana, 2Damidi Maheshwar, 3Godala Mahitha Reddy,4 Yash Wasnik
PDF
|
|
QR CODE-ENABLED INTELLIGENT SYSTEM FOR MONITORING SCHOOL BUS LOCATIONS
1J.Praveen Kumar, 2G. Raveena, 3Kusuma Vishwesh,4 Midde Varun Kumar
PDF
|
|
DESIGN AND IMPLEMENTATION OF AN SQL CHATBOT USING CONTEXT-FREE GRAMMAR
1S.Pavani, 2K Niharika Reddy, 3Kuchipudi Sai Kumar,4 Kurakula Rahul
PDF
|
|
IDENTIFICATION OF FAKE IMAGES THROUGH CONVOLUTIONAL NEURAL NETWORKS
1A.Jyoshna, 2Akavaram Tejaswini, 3Sirandasu Sairaj,4 V. Sampath Kumar
PDF
|
|
CONVOLUTIONAL NEURAL NETWORK-BASED NAVIGATION SYSTEM FOR AUTONOMOUS VEHICLES
1 A.Vijetha, 2Nagamalla Rohith Kumar, 3Singireddy Sindhu,4 Mohammad Abdhur Rahman
PDF
|
|
INTEGRATING TENSOR DECOMPOSITION WITH GRAPH CONVOLUTIONAL NETWORKS FOR FAKE NEWS CLASSIFICATION
1S.Pavani, 2Neerati Uday Kumar, 3Nallala Krishna Chaitanya,4 Yanamadala Jaya Vardhan, 5Mohammed Muzammil Hussain
PDF
|
|
DEVELOPING A BLOCKCHAIN-BASED SYSTEM FOR IDENTIFYING COUNTERFEIT PRODUCTS
1E.Aruna,, 2Nethi sathvika, 3Polasa Vyshnavi ,4 Maroju Sathish, 5Chintada Bhavya Saikiran
PDF
|
|
DIABETES PREDICTION USING MACHINE LEARNING TECHNIQUES ON AWS CLOUD
1N.Priyanka, 2Pundra Raga Sree Reddy, 3Kothapally Sai Sumanth,4 Enukonda Harshavardhan Reddy
PDF
|
|
COUNTERFEIT CURRENCY IDENTIFICATION THROUGH IMAGE PROCESSING METHODS
1Dr M.Ramu, 2Racharla Naresh, 3Oruganti Vinod,4 B Manohar Reddy
PDF
|
|
LEVERAGING DEEP LEARNING APPROACHES FOR BRAIN TUMOR IDENTIFICATION
1S.Sravan Kumar, 2Yanagandhula Varun, 3Inapanuri Kavya,4 Neela Sunil
PDF
|