Published: 2025-04-16

WIND FORM STABLISATION USING UPQC SYSTEM

Mr.T.Srinivas, J. Lakshman, S. Mahitha Reddy, Ch. Praveen Kumar, P.Sai Ram (Author)

1-11

IMPLEMENTING THREAT HUNTING STRATEGIES USING MITRE ATTACK FRAMEWORK

Dr.B.Karunaiah, Anugu Sannihitha, Regu Prashanthi, Nagilla Mithun Krishna, Durgam Gnaneshwar, Gillepally Jai Rohan (Author)

12-33

OPTIMIZING SOC OPERATIONS WITH AUTOMATION AND THREAT INTELLIGENCE

K.Jothsna, Thamirchi Dharmateja, Vanasha Sai Krishna, Gourishetty Dhanush, Yekula Naveen, Peddigouni Saketh Goud (Author)

34-42

AI POWERED SMART SURVEILLANCE AND THREAT DETECTION

Laxmaiah, Myadam Anirudh Jayakar, Pathepuram Udaykiran, Sai Charan Shikharammetla, Bandi Abhinay (Author)

43-51

AI-VIRTUAL INTERVIEW COACH WITH REAL-TIME FEEDBACK

Avinash, Sneha George, Chenreddy Akshay Reddy, Kamalla Muralidhar, Gaddam Akhil (Author)

52-59

GESTURE RECOGNITION -AI

Dr.Karunaiah, Polamoni Akhil Kumar, P.Shyamala, Katamoni Lokesh, Chiluveru Sreeja (Author)

60-65

Design and Analysis of Leaf Spring

A.Chaitanya, P.Sai Kiran, A.Shekar, D.Deepak Reddy, Dr.P.Mallesham (Author)

66-69

A Machine Learning Perspective On Improving Numerical Weather Prediction

Guide: K. Vaddi Kasulu, M. Rakshitha, K. Kalyani, B. Jagadeesh, V. Siva Ganga Raju (Author)

70-75

A Multi-Model Approach to Cryptocurrency Risk Prediction Using Reinforcement Learning and Machine Learning

Guide: B. Roja Sri, Ch. Krupajyothi, J. Ashok Venkata Sai, P. Swathi, M. Navaneeth (Author)

76-83

A MULTI-VIEW FRAUD DETECTION APPROACH FOR MULTI- PARTICIPANT E-COMMERCE TRANSACTIONS

GUIDE : K.Vaddi Kasulu, P. CHENNARAO, K. RAMESH, D. PRASANNA KUMAR, SK. RIZWANA (Author)

84-91

Block chain driven of organ donation and transplantation

B.sowmya, B.koushik, B.Saikiran, B.Mahesh, Mr.P.Mukunthan (Author)

92-103

Face Recognition Attendance System

B.Ashwini, B.praveen, ch.sharvani, A.Ganesh, G.sravanthi (Author)

104-116

FAKE NEWS CLASSIFIER USING MACHINE LEARNING

SOUJANYA BADDAM, SHIVANI.A, AJITH KUMAR.B, PRIYANKA.B, DR.NEELAKANDAPILLAI SUBASH (Author)

117-121

Credit Card Fraud Detection Using Random Forest& Cart Algorithm

Donikala Shambavi, Dontham Raghavender Reddy, Jarpula Sai Kumar, K.Vamshi, Ms N.Manjula (Author)

122-129

LED DOT Matrix Text Recognition method in Natural Scene

1K.Snehanjali, K.Pravalika, J.Madhav, K.Vineeth, Ms.Manjula (Author)

130-134

TO PREDICT PLANT GROWTH AND YIELD IN GREEN ENVIRONMENT USING DEEP LEARNING

D.AKANKSHA, D.VINAY, G.AKHILA, E.SAI GANESH, Mr B. TIRUPATHI (Author)

135-142

CURRENCY RECOGNITION SYSTEM USING CONVOLUTIONAL NEURAL NETWORK ALGORITHM

P Mounika, N Vishal, K Mahesh, L Manideep, Ms. Sandhya Rani (Author)

143-147

Integrated Land Management Information System

M.Siddhartha, P.Chandana, L.Sunil Kumar, P.Vamshidhar Reddy, Mr. B.Thirupathi (Author)

148-152

AN IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN FORENSIC EVIDENCE MANAGEMENT

k.chiranjeevi, n.bharath, n.swathi, p.sai Naveen, Mr. K RAM MOHAN RAO (Author)

153-161

DRUG RECOMMENDATION SYSTEM BASED ON SENTIMENT ANALYSIS OF DRUG REVIEWS USING MACHINE LEARNING

SHANBHAGAM, P.PRAVEEN KUMAR, THODETI SAI GANESH, CHETHAN PRABHATH, V.SURESH NAYAK (Author)

162-168

Vehicle Detection Based on Semantic-Context Enhancement for High-Resolution SAR Images in Complex Background

Dr. M NARENDHAR, S. BINDHU REDDY, S.NAGA ABHINAV VISHWAKARMA, SANKU PHANINDRA, SURYAVAMSHI PREETHAM (Author)

169-178

WATERNET A NETWORK FOR MONITORING AND ASSESSING WATER QUALITY FOR DRINKING AND IRRIGATION PURPOSES

Dr. M NARENDHAR, THADAKA SHRUTHI, SOMA NAGA GANESH, TANDADA JAISAI, VELPULA VARUN (Author)

179-186

A MULTI-STREAM FEATURE FUSION APPROACH FOR TRAFFIC PREDICTION

Dr. S PRABAHARAN, T. SHARATH CHANDRA, SONABOINA VAMSHI, THOLETI SAI, S. EM UDAY KIRAN (Author)

187-200

CREDIT CARD FRAUD DETECTION USING STATE-OF-THE-ART MACHINE LEARNING AND DEEP LEARNING ALGORITHMS

SHANBHAGAM, S.SHIVA SHRAYA, SHAIK NAYEEM ALI, SUNKA RISHIKA, UPPARI SAI TEJASHWINI (Author)

201-210

CROP YIELD PREDICTION USING MACHINE LEARNING

V VIVEKANANDHAN, T.BHARGAV, VADTHYA SANDEEP, VAJRALA SAI REDDY, RANAVENI AJAY (Author)

211-220

AUNTHENTICATION OF PRODUCT &COUNTERFEITS ELIMINATION USING BLOCK CHAIN

G. ANITHA, S. SANJAY, ANIKHILSAI, K. ROHITHREDDY, G SAIKISHAN, G. JASHWANTHREDDY (Author)

221-227

FAKE NEWS DETECTION USING DS APPLICATIONS

R. DIVYA, S. DEEPIKA, M NIHARIKA, P MAHESHWAR, CH. KALYANKUMAR (Author)

228-234

RESPIRATORY ANALYSIS DETECTION OF VARIOUS LUNG INFECTIONS USING COUGH SIGNAL

QAMER AHMED, A. SRIVIJAYALAXMI, C. SURYACHANDRA, D. ANUSHA, GVISHNUVARDHAN (Author)

235-237

Detecting At-Risk Students with Early Interventions Using Machine Learning Techniques

D. AKSHITH REDDY, P. NITHIN, P. SHIVA, B. RAHUL, J.SASIREKHA (Author)

238-254

MISSING CHILD IDENTIFICATION SYSTEM USING DEEP LEARNING AND MULTI CLASS SUM

C. VIJAY, G. VAMSHI, K. SONU, MOHAMMED TAJUDDIN, Y. HARATHI (Author)

255-264

Social Media and Misleading Information in a Democracy: A Mechanism Design Approach

B. VAGESH DATTA, CH. SAI KARTHIK,, M. RACHIT KUMAR, MOHAMMED SAJID, J.SASIREKHA (Author)

265-287

Detection of cyber-attacks and network attacks using Machine Learning

Ms.CH.SANDHYA, DODDI SAHASRA, MOTHERAMGARI PRADEEPTHI,, RAMGIRI THARUN,, CHANDRA SHEKHA (Author)

288-292

Inventory Management Systems (IMS)

Mr. S. Narsimulu, Racharla Dhanraj, S. Tharun reddy, K. Venkat krishna, S. Arun Kumar Yadav (Author)

293-300

MITIGATING DDOS ATTACK IN IOT NETWORK ENVIRONMENT

MR. M. RAJ KUMAR, GOLLA SAHISHNA YADAV, P. HEMANAND, K. BHARATH (Author)

301-305