Detecting Fake News on Social Media using Fine-Grained Classification and Deep Learning Techniques
1Goli Sravya, 2 Dr. K. Santhi Sree ,
Page No :1-15
DDoS Attack Detection Using Entropy-Based Network Traffic Analysis
PEDAPUDI V BHASKARA NAGA RAGHU TEJA,Mr. K. RAJESH ,
Page No :16
A MEASUREMENT APPROACH FOR INLINE INTRUSION DETECTION FOR HEARTBLEED-LIKE ATTACKS IN IOT FRAMEWORKS
1DR.K.SMITA, 2GANGISETTY FALKI, 3GOUDI RITHIKA,4GOURISHETTY SREEJA ,
Page No : 16-21
DEEP LEARNING-BASED CLASSIFICATION FOR MELANOMA DETECTION USING XCEPTIONNET AND DENSENET121
1DR.Y.GEETHA REDDY, 2MAHMAD SANA, 3MALOTH SRAVANI, 4MIRALA AKHILA ,
Page No :22-28
ILLUMINATING AUTONOMY FEDERATED LEARNING FOR OBJECT DETECTION IN AUTONOMOUS VEHICLES UNDER LOW LIGHT
1DR.C.V.P.R PRASAD, 2AAYUSHI HOTTA, 3B.SNEHA, 4ADITI CHINTAREVULA, 5D. SRI SINDHU ,
Page No :29-38
FRAUD DETECTION IN BANKING DATA BY MACHINE LEARNING TECHNIQUES
1 NAGARAJ MEGHASHREE, 2 KALAI SELVI R, 3 SUBHA A ,
Page No :39-50
PREDICTING EMPLOYEES UNDER STRESS FOR PREEMPTIVE REMEDIATION USING MACHINE LEARNING ALGORITHM
1KAYUB BAIG, 2K.VAISHNAVI, 3GERIGANTI UMA, 4 SRINIJA ,
Page No :51-56
PREDICTION OF AIR POLLUTION BY USING MACHINE LEARNING ALGORITHM
1N.TEJA SREE, 2KARKALA NAVYA REDDY, 3KOTAGIRI HARINI, 4K.AKSHAYA ,
Page No :57-63
REPRESENTING FINE GRINED CO-OCCURANCES FOR BEHAVIOR BASED FRAUD DETECTION IN ONLINE SYSTEM
1GEETHA PRATHIBA, 2MENDE MANEESHA, 3G.SHARANYA, 4K.SONYSANDHYA ,
Page No :64-70
ROBUST DETECTION OF LINK COMMUNITIES WITH SUMMARY DESCRIPTION IN SOCIAL NETWORKS
1MRS B DURGA BHAVANI, 2NANDIGAMA NIHARIKA, 3LOYAPALLY PRANITHA, 4KONDU ARCHITHA ,
Page No :71-81
SCA: SYBIL-BASED COLLIONS ATTACKS OF IIOT DATA POISOING IN FEDERATED LEARNING
1DAVID LIVINGSTON, 2G.SINDHU, 3G.GEETHA, 4K.SONIYA ,
Page No :82-88
TRUSTWORTHINESS ASSESSMENT OF USERS IN SOCIAL REVIEWING SYSTEMS
1B.HARITHA LAKSHMI, 2KANOOR KEERTHI, 3GANDU SAHITHI, 4G.RAMYA ,
Page No :89-102
USE ARTIFICIAL NEURAL NETWORKS TO IDENTIFY FAKE PROFILES X_0005
1M.SYMALA SAI SREE, 2K.TEJASWI, 3K.SREEJA, 4K.SNEHA REDDY ,
Page No :103-109
WATERNET A NETWORK FOR MONITORING AND ASSESSING WATER QUALITY FOR DRINKING AND IRRIGATION PURPOSES
1M.SYMALA SAI SREE, 2M.HARIKA, 3L.NAMRATHA, 4KUNTALA.AKSHITHA ,
Page No :110-112
WEB CLOUD WEB-BASED CLOUD STORAGE FOR SECURE DATA SHARING ACROSS PLATFORMS
1M. MAHESHWARI, 2 JINNARAM PRANATHI, 3K. MOKSHAGNANJALI, 4K. VARSHITHA ,
Page No :122-130
HASHTAG-BASED TWEET EXPANSION FOR IMPROVED TOPIC MODELLING
1V.DIVYA VANI, 2K.ASFIYA, 3B.SRAVANI, 4G.HARIN ,
Page No :131-138
CHRONIC KIDNEY DISEASE DETECTION
1P. MURALI, 2B.JHANSI, 3G.SRILEKHA, 4 J.LIKHITHA ,
Page No :139-147
1K.SHIVA BHAVANI, 2B.ASHRITHA, 3 P.SUSHMA, 4 J.THRIVARNA ,
Page No :148-156
1 S.PRATHAP, 2A.RAJITHA, 3B.RAJESHWARI, 4G.PALLAVI ,
Page No :157-164
MACHINE LEARNING BASED ANALYSIS OF CRYPTOCURRENCY MARKET FINANCIAL RISK MANAGEMENT
1 S.DURGA HIMA BINDU, 2 S.JASHNAVI, 3N.NIKHITHA, 4CH.SREEJA ,
Page No :165-172
MACHINE LEARNING FOR FAST AND RELIABLE SOURCE-LOCATION ESTIMATION IN EARTHQUAKE EARLY WARNING
1P.MONIKA, 2GOLLA MEGHANA, 3CH.TEJASWINI, 4D NAVYA SRI ,
Page No :173-179
MADNET: A FAST AND LIGHTWEIGHT NETWORK FOR SINGLE-IMAGE SUPER RESOLUTION
1V. SUNDARARATNAM, 2KOKKULA ASHRITHA, 3V. LAKSHMI SHIVANI, 4K. SATHVIKA ,
Page No :180-186
THYROID DISEASE PREDICTION USING CNN
1DR.PRADEEP VENUTHURUMILLI, 2 INTURI BHUVANA SRI, 3 SAMINENI USHA SRI, 4MADESHI SAI MANASA ,
Page No :187-193
GEFA: EARLY FUSION APPROACH IN DRUG-TARGET AFFINITY PREDICTION
1B.VASANTHA, 2 SINGI BHANU SRI, 3 SOMISHETTY DEDEEPYA, 4 POTHEPANGARI DEEPTHI ,
Page No :194-201
LANGUAGE IDENTIFICATION FOR MULTILINGUAL MACHINE
1GEETHA PRATHIBA, 2VELPULA SHRAVYA PATEL, 3 PATHAK SHIVANI, 4UPPUTALLA DIVYA ,
Page No :202-212
MACNINE LEARNING BASED ANALYSIS OF CRYPTOCURRENCY MARKET FINANCIAL RISK MANAGEMENT
1MRS B DURGA BHAVANI, 2NAREDDY NEHA SRI, 3 PENCHALA SIRI, 4NOMULA ANUSHA ,
Page No :213-220
1C RASHMI, 2VADLAMUDI ALEKYA, 3NASA SRIDEVI, 4 PENDYALA ARCHANA ,
Page No :221-229
NATURE-BASED PREDICTION MODEL OF BUG REPORTS BASED ON ENSEMBLE MACHINE LEARNING MODEL
1M.SYMALA SAI SREE, 2PACHIPULUSU SAI DEEKSHITHA, 3P JHANSI, 4RAVUTLA ALEKYA ,
Page No :230-240
NAVIGATING THE PATH TO ACADEMIC SUCCESS
1M.PREMCHANDER, 2VAIKUNTA SRUTHI, 3VARA PRATIMA, 4VASAM INDHU SRI ,
Page No :241-250
NEURAL COLLABORATIVE FILTERING BASED GROUP RECOMMENDATIONS
1DR.AR.SIVAKUMARAN, 2YETUKURI GOUTHAMI MAHESWARI, 3TANGIRALA M N S KALYANI, 4TELAKAPALLY RENUSRI ,
Page No :251-261
SECURING DATA IN THE IMAGE USING SHA & ECC
1O.RAMYA TEJA, 2UPPALA NIKITHA, 3PATLOLLA NANDINI, 4NETHRIKA REDDY GOGU ,
Page No :262-270
INTEGRATED THREE-PHASE MULTIPORT CHARGER SIMULATION FOR V2G, G2V, AND V2H APPLICATIONS
1 GUDLA SREENIVASULU, 2 Mr. V.Pratapa Rao ,
Page No :271-277
Maturi Rajeshwari 1 , Revathy P 2 , Dr Dileep P 3 ,
Page No :278-286
Control of load frequency in a power system with multiple areas in the presence of a V2G scheme
1Chippagiri Narasaiah ,2 B. Venkata Prasanth ,
Page No :287-300