Citizen Perspectives on Government Policy
Mr.DADI.VENKATA VARAPRASAD1, challa Gowthami2 ,
Page No :11-17
Enhanced Estimation of Software Defects Using Machine Learning Techniques
Mr. A. Hemantha Kumar1, Golla Akhila2 ,
Page No :18-23
Machine Learning Models for Accurate House Price Estimation
Mr DADI VENKATA VARAPRASAD 1 , ANAMALA PRAVALIKA 2 ,
Page No :24-35
DETECTING ACCIDENT SEVERIETY VEHICLE TO VEHICLE COMMUNICATION
Dr. UMMADI. THIRUPALU1 , S.SRINU2 ,
Page No :36-43
A GENERAL FRAMEWORK FOR IMPLICIT AND EXPLICIT SOCIAL RECOMMENDATION
A. Durga Devi Madam 1, K.Shanmukha Varma2 ,
Page No :63-72
A HYBRID E-LEARNING RECOMMENDATION APPROACH BASED ON LEARNER’S INFLUENCE PROPAGATION
K. Venkatesh 1, K. Sravani2 ,
Page No :73-88
AI-BASED FAQ CHATBOT WITH VOICE ASSISTANCE
A. DURGA DEVI MADAM 1, Kattula Suma Latha 2 ,
Page No :102-121
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEASE CONTROL
V.Sarala 1 E.Venkat Kumar 2 ,
Page No :122-134
DATA TRUST FRAMEWORK USING BLOCKCHAIN TECHNOLOGY AND ADAPTIVE TRANSACTION VALIDATION
B.S.Murthy sir ,1 G.Sudha Maheswari 2 ,
Page No :145-147
DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL MEDIA
K. Rambabu 1, A.Varsha Deepika.2 ,
Page No :148-169
DETECTION AND ATTRIBUTION OF CYBER ATTACKS IN IOT ENABLED CYBER PHYSICAL SYSTEM
Mr B.S Murthy 1 , I. Mary Sujatha 2 ,
Page No :170-178
EFFICIENT AND DEPLOYABLE CLICK FRAUD DETECTION FOR MOBILE APPLICATIONS
A. DURGA DEVI MADAM 1 , Jami Harisha Jyothi 2 ,
Page No :179-189
FILTERING INSTAGRAM HASH TAGS THROUGH CROWD TAGGING AND THE HITS ALGORITHM
V. Sarala 1 , Ch. Pooja Kiranmai2 ,
Page No :190-199
Flighting Money Laundering With Statistics And Machine Learning
Mr. K. RAMBABU SIR 1 , A.N.S.L. MANASA 2 ,
Page No :200-211
FUNDAMENTAL VISUAL CONCEPT LEARNING FROM CORRELATED IMAGES AND TEXT ANNOTATION
Mr. B.S Murthy 1 , G.Sowmya 2 ,
Page No :212-221
FUTURE OF LOAN APPROVALS WITH EXPLAINABLE AI
A. DURGA DEVI MADAM 1, KATHULA KARUNA 2 ,
Page No :222-236
1 B. S. Murthy, 2 Komati .Vinay ,
Page No :251-264
A. Durga Devi Madam 1, K. Mahesh 2 ,
Page No :265-272
SOCIAL DISTANCING USING DEEP LEAENING MODELS AND YOLO FRAMEWORK
Setti Vidya Sagar Appaji1 , S.Samyukta 2 , Ramya Golla3 ,
Page No :287-290
SOFTWARE VULNERABILITY DETECTION TOOL USING MACHINE LEARNING
V. Sarala 1 , G. Venu Madhuri 2 ,
Page No :291-302
SPAMMER DETECTION AND FAKE USER IDENTIFICATION IN SOCIAL NETWORKS
K. Rambabu 1, A.Sai Sravani 2 ,
Page No :303-325
A. DURGA DEVI MADAM 1, K. HARIPRIYA 2 ,
Page No :326-343
TRUST RELATIONSHIP PREDECTION IN ALIBABA ECOMMERCE PALTFORM
B. S. Murthy 1 , G.Balaashish Kumar 2 ,
Page No :344-354
USING DATA MINING TO PREDICT HOSPITAL ADMISSIONS FROM THE EMERGENCY DEPARTMENT
K. Rambabu 1, A.Harika 2 ,
Page No :355-373
ENHANCING COMMERCIAL BLOCKCHAIN SERVICES WITH IDENTITY-BASED NETWORK SECURITY
Mr. J. U. ARUN KUMAR 1, CH.VENKATA SRIHARI 2 ,
Page No :374-380
INTERNET OF VEHICLE THINGS (IOVT) SECURITY SYSTEM WITH BLOCKCHAIN INTEGRATION
PRAKASH KRISHNA SHINDE ,
Page No :388-405
PILL DETECTION AND IDENTIFICATION: A DEEP LEARNING PERSPECTIVE
Mr. A. HEMANTHA KUMAR1 , K. DEEPTHI2 ,
Page No :406-414
AUTOMATED URBAN ROAD DETECTION IN HIGH-RESOLUTION SATELLITE IMAGES WITH MACHINE LEARNING
Mr.T.NARESH1 , SK.ALLA HASHID2 ,
Page No :415-422
CRITICAL CLOUD STORAGE SERVICES - A SECURE, SEARCHABLE ENCRYPTION FRAMEWORK FOR PRIVATE USE
Mrs.G.HARIPRIYA 1 , B.VARALAKSHMI 2 ,
Page No :423-435
An Auto ground Mechanism for Distributed Generation’s Anti-Islanding Protection
B.Divya Thejeswini 1 , Salma Khathun2 ,
Page No :436-441
COMPARATIVE STUDY OF RCC BUILDING WITH COMPOSITE COLUMN AND STEEL COLUMNS BY ETABS
K.VENU GOPAL1 S.VENKATESH2 ,
Page No :442-450
SEISMIC ANALYSIS OF G+10 BUILDING WITH SHEAR WALLS AT DIFFERENT LOCATIONS USING ETABS
K.VENU GOPAL1 N. BABU2 ,
Page No :451-457
EFFECT OF WIND LOAD ON LOW, MEDIUM, HIGH RISE BUILDINGS IN DIFFERENT TERRAIN CATEGORY
K.VENU GOPAL1 J.PRASAD 2 ,
Page No :458-466
Deep learning-based approach for detecting similar questions on stack overflow
Mrs. SK. KARIMUNNI1 , K. VENKATA PADMAVATHI2 ,
Page No :467-479
Revolutionizing Drug Traceability: Implementing Blockchain Technology in Healthcare Supply Chains
G. Sudheer Kumar1 , Navya Reddy Bokkala2 , Purushotham Shirin2 , CH. Pavan Kumar2 ,
Page No :480-495
A FAST NEAREST NEIGHBOR SEARCH SCHEME OVER OUTSOURCED ENCRYPTED CLOUD DATA
G. Sreelekha1 , Sk. Shayeer Hussain2 ,
Page No :496-503
ASTUDY OFBLOCKCHAIN TECHNOLOGYINFARMER’SPORTAL
Mr.VChandrasekhar1 ,A.Srinivasulu2 ,
Page No :504-511
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Ch. Rushyendra Mani1 , Sk. Shahida2 ,
Page No :512-518
Attribute based Cloud Data Integrity Auditing for Secure Cloud Storage
Mr.V.Chandrasekhar 1 , Shaik Haseena2 ,
Page No :519-526
Classification Of Online Toxic Comments Using Machine Learning
G.Sreelekha1, V.Kousalya2 ,
Page No :527-536
Detection of Stress In IT Employees Using Machine Learning Technique
Ms.V.R.Swetha1 , K. Madhavi2 ,
Page No :537-543
DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
B. Uma Maheswari1 , K. Chandra Sekhar2 ,
Page No :544-549
DUAL ACCESS CONTROL FOR CLOUD BASED DATA STORAGE AND SHARING
Mrs. B. UMA MAHESWARI1 , SK. MOBEENA2 ,
Page No :550-558
EFFICIENT RETRIEVAL OVER DOCUMENTS ENCRYPTED BY ATTRIBUTES IN CLOUD COMPUTING
V.Savithri1 , P.Pushpa2 ,
Page No :559-568
ENERGY EFFICIENT LINK DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
Mr. V. SURENDRA REDDY1 , S. LAKSSHMI DEEPIKA2 ,
Page No :569-574
FAKE DETECT: A DEEP LEARNING ENSEMBLE MODEL FOR FAKE NEWS DETECTION
A. Yamuna1 , Ch. Sreenu2 ,
Page No :575-582
FISH DISEASE DETECTION USING IMAGE BASED ON MACHINE LEARNING IN AQUACULTURE
G. Sreelekha1 , V. Kavya2 ,
Page No :583-590
Frequent Itemsets Mining with Differential Privacy over Largescale Data
Ms.V.R.SWETHA1 , P.POOJITHA2 ,
Page No :602-612
Future gold price prediction using machine learning techniques
G.Sreelekha1 , T.Leelasri2 ,
Page No :613-618
Hand Gestures Based Sign Language Recognition Using Deep Learning
Mrs. SK. Karimunni1 , M. Dharani2 ,
Page No :619-624
IMPROVING SECURITY AND PRIVACY ATTRIBUTE BASED DATA SHARING IN CLOUD COMPUTING
B. Uma Maheswari1 , K. Siri Chandana2 ,
Page No :625-632
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
Mrs. A. Yamuna1 , E. Mercy2 ,
Page No :633-639
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
Mr. N. SUBRAMANYAM1 , K. VYSHNAVI MALA2 ,
Page No :648-656
MULTI-AUTHORITY ATTRIBUTE-BASED KEYWORD SEARCH OVER ENCRYPTED CLOUD DATA
A. Bharathi1 , Sk. Karimulla2 ,
Page No :657-665
K. Lakshmi1 , D. Sai pranavi2 ,
Page No :666-673
PHISHING URL DETECTION: A REAL-CASE SCENARIO THROUGH LOGIN URLS
V.Savithri1 ,V.Surendra2 ,
Page No :674-685
PP-CSA: A PRIVACY-PRESERVING CLOUD STORAGE AUDITING SCHEME FOR DATA SHARING
Ch. Rushyendra Mani1 , Sk. Mariem Siddikha2 ,
Page No :686-692
Semi Supervised Machine Learning Approach for DDOS Detection
Mr. D. Venkata Varaprasad1 , CH. Venkatesh2 ,
Page No :693-697
SESPHR:AMETHODOLOGYFORSECURESHARINGOFPERS ONALHEALTHRECORDSINTHECLOUD
G.Sreelekha1 ,Sd.Ahmed2 ,
Page No :698-710
THREAT MODEL AND DEFENSE SCHEME FOR SIDE- CHANNEL ATTACKS IN CLIENT SIDE DEDUPLICATION
V.Savithri1 , Y.Mounika2 ,
Page No :718-723
Mr.SYED.AKHTAR BASHA1 , ANNAPAREDDY MADHU BABU2 ,
Page No :724-735
Unwanted Messages From OSN User Wall Can Be Filtered
Mr.BOLIGARLA HARIBABU1 , B.NAGENDRA BABU2 ,
Page No :736-742
Innovative Approaches to Malware Detection in Health Sensor Data Through Machine Learning
Mrs.T. NARESH1 , S. NARENDRA2 ,
Page No :743-752
Machine Learning Approaches to Sarcasm Detection
Mr.G.SREENIVASULU1 , Y.ANANTHA LAKSHMI2 ,
Page No :753-761
STUDY ON MACHINING CHARACTERISTICS OF METAL MATRIX COMPOSITES USING ABRASIVE FLOW MACHINING
B LIKITESHWAR1 Dr.P.SRIKAR2 ,
Page No :762-773
NUMERICAL ANALYSIS AND MODELLING OF TOOL WEAR IN FRICTION STIR WELDING PROCESS
ERUKULA NARSIMHA1 Dr.CHANDRA SEKHAR2 ,
Page No :774-781
B. LIKITA SRI1 T. GAYATRI2 ,
Page No :782-785
SECURE KEY AGREEMENT AND KEY PROTECTION FOR MOBIL DEVICE USER AUTHENTICATION
V.Sarala 1, D.Kiran, ,
Page No :786-796
OPTIMIZING INFORMATION LEAKAGE IN MULTICLOUD SERVICES
K.Rambabu 1 , B Naga Venkata Jyothi, ,
Page No :797-810
ONLINE PUBLIC SHAMING ON TWITTER(X): DETECTION, ANALYSIS AND MITIGATION
B.S.Murthy 1 , G. Venkata Lakshmi ,
Page No :810-821
A LIGHT WEIGHT SECURE DATA SHARING SCHEME FOR MOBILE COLUD COMPUTING
K. Rambabu 1, B. Gnaneswara Rao, ,
Page No :822-838
A RESILIENT DISPERSAL SCHEME FOR MULTI-CLOUD STORAGE
V. Sarala 1 , Ch. Rakesh Kumar, ,
Page No :839-850
ACHIEVING DATA TRUTHFULNESS AND PRIVACY PRESERVATION IN DATA MARKETS
A. Durga Devi 1 , K. Chandu ,
Page No :851-862
B.S. Murthy 1, M. Laksmi Prasanna ,
Page No :882-892
PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
B S Murthy 1 , G.Mani Kanta Swamy, ,
Page No :893-905
ROBUST DEFENSE SCHEME AGAINST SELECTIVE DROP ATTACK IN WIRELESS AD HOC NETWORKS
B.S.Murthy 1 , G.Naveena 2, ,
Page No :906-914
SEC-HEALTH A BLOCKCHAIN-BASED PROTOCOL FOR SECURING HEALTH RECORDS
Sarala1 , Gangula.Pratap, ,
Page No :915-930
SECURE AND EFFICIENT DATA DEDUPLICATION IN JOINT CLOUD STORAGE
A. Durga Devi 1, Kopparthi Sai Teja2 ,
Page No :931-943
SMART CONTROL OF TRAFFIC LIGHTS USING ARTIFICAL INTLIGENCE
B.S. Murthy 1 , G. Satish, ,
Page No :959-972
SMART CONTROL OF TRAFFIC LIGHTS USING ARTIFICAL INTLIGENCE
B.S. Murthy 1 , K.Lakshmanarao, ,
Page No :973-986
USING DATA MINING TO PREDICT HOSPITAL ADMISSIONS FROM THE EMERGENCY DEPARTMENT
K. Rambabu 1, A.Harika, ,
Page No :987-1005
Developing a Search Engine Using XGB Algorithm
Mr. A. HEMANTHA KUMAR1 , Y. VARSHITHA2 ,
Page No :1006-1014
INFORMATION SYSTEM FOR AUTOMATICALLY CLASSIFYING NEWS TEXTS
Mr. N. SUBRAMANYAM1 , G. KRISHNA KUMARI2 ,
Page No :1015-1026
Impact of Education and Work Participation on Improvement of Women’s Status
Veena Siddaramappa ,
Page No :1027-1032
A framework for authenticating with an identity management server in mobile cloud computing
Mr. Mantripragada Satya Venu Gopalarao ,
Page No :1033-1039
The Dawn of Industry 5.0: A New Era of HumanMachine Collaboration
Swarali S. Patil1 , Piyusha Kesare2 ,
Page No :1040-1046
PARAMETRIC OPTIMIZATION OF TURNING PROCESS PARAMETERS DURING MACHINING OF AISI 304 MATERIAL
Peelam Suresh1*, S.M.Jameel Basha1 ,
Page No :1047-1054
Enhancing Efficiency: Predictive Maintenance Strategies for Factory Equipment
MS.V.SAVITHRI1 , T.MUNI SIREESHA2 ,
Page No :1055-1062
Designing On-Grid Solar/Wind Hybrid Power System for Charging Electric Vehicles
1 Kamble Vinod ,2 Dr.P. Nagasekhar Reddy ,
Page No :1063-1071
LIGHT WEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING
K. Rambabu , A.Vijaya Surya Kumari ,
Page No :1072-1081
Mr.N. SUBRAMANYAM1 , P. ANUSHA2 ,
Page No :1082-1089
Deep Learning Framework for Object Detection and Recognition to Aid the Visually Impaired
Mr. G. SREENIVASULU1 , S. KALYAN2 ,
Page No :1090-1097
Identifying Ransomware Attacks through Processor and Disk Usage Analysis
Mrs. R. JYOSNA DEVI1 , G.YASASWINI2 ,
Page No :1098-1110
FAULTY NODE DETECTION IN DELAY TOLERANT NETWORKS
Mr.P.V.R.K.MURTHY1 , A.LAKSHMI SUPRIYA2 ,
Page No :1111-1120
DATA DRIVEN ENERGY ECONOMY PREDICTION FOR ELECTRIC CITY BUSES USING MACHINE LEARNING
N.ANIL KUMAR CHOWDARI1 , S.VIGHNESWARA REDDY2 ,
Page No :1121-1128
Characterizing and predicating early reviewers for effective product marketing on Ecommerce website
Mrs. A. YAMUNA1 , KAMATHAM. MAMATHA2 ,
Page No :1129-1136
Child mortality prediction using a machine learning approach
Dr. M. Rajaiah1 , P. Lavanya2 ,
Page No :1137-1142
CROP YIELD PREDICTION USING MACHIN ALGORITHMS
Dr.M. RAJAIAH 1 , PILLI. THULASI 2 ,
Page No :1143-1152
Detecting Multi Stage Attacks Using Sequence to Sequence Model
1Mrs. Sk.Karimunni ,2K.Sumanthi ,
Page No :1153-1159
DRUG RECOMMENDATION SYSTEM BASED ON SENTIMENT ANALYSIS OF DRUG REVIEWS USING MACHINE LEARNING
Ms.V.R. Swetha1 , Pasam.Rajani2 ,
Page No :1160-1169
Aderla Anjaiah1 , P. Veera Raghava Reddy2 and Eerla Mamatha3 ,
Page No :1170-1180
Fighting Money Laundering with Statistics and Machine Learning
Mrs. B. Uma Maheswari1 , K. Bharathi2 ,
Page No :1181-1187
Missing child identification system using deep learning and multiclass SVM
Mrs. A. Yamuna1 , K. Devi2 ,
Page No :1188-1197
A UNIFIED VIEW OF EMBEDDED DESIGN SECURITY USING CRYPTOGRAPHIC MECHANISMS
BANAVATHU RAMYASREE1 , VARIKUTI TRIVENI2 ,
Page No :1198-1205
Secure key word search and data sharing mechanism for cloud computing
A. Bharathi1 , SD. Sumiya2 ,
Page No :1206-1213
Mrs.VenkataRadhaKrishnaMurty 1 , G. VaishnavaTeja2 ,
Page No :1214-1219
REDUCED SENSOR BASED PMSM DRIVEN AUTONOMOUS SOLAR WATER PUMPING SYSTEM
1HOUJI HEMANTH SAGAR ,2V.VIJAYA LAKSHMI ,
Page No :1227-1238
Building a Robust Media Streaming Server on AWS
CH.RUSHYENDRA MANI, K.MARY SRAVANTHI ,
Page No :1239-1249
TRAFFIC SIGN DETECTION AND RECOGNITION SYSTEM USING CNN
Ms. K.NISHITHA1 , P.VANI2 ,
Page No :1250-1258
1G Raga mounika,2 kuchipudi Nandini, 3M Prajawala Priyanka ,
Page No :1259-1265
Pothedar Chandana 1 , V.Sangeeta Sarali 2 and S.Manohar Reddy 3 ,
Page No :1266-1277
LOCATION PREDICTION ON TWITTER USING MACHINE LEARNING TECHNIQUES
M.Swathi1 , P. Rohini2 ,
Page No :1289-1295
IMAGE BASED BIRD SPECIES IDENTIFICATION USING MACHINE LEARNING
K. Kavitha1 , Sk. Farhana2 ,
Page No :1296-1305
AUTOMATIC BILLING TROLLEY FOR AN ENHANCED SUPERMARKET USING RFID
K. NISHITHA1 , P. BHANU TEJASWINI2 ,
Page No :1306-1312
Ch.Dayakar1 , Y.Mounika2 ,
Page No :1313-1323
Burugu Naveen1 , Dr.S.Narasimha 2 ,
Page No :1336-1346
ARDUINO BASED SMART AUTOMATED PlANT WATERING SYSTEM
Dr.K.SUDHAKAR1 , YAMINI RAMINDLA2 ,
Page No :1353-1361
A STUDY ON TRANING AND DEVELOPMENT AT TEXTUS INFO SOLUTIONS
SIRUR PREETHI¹, SRINIVAS REDDY ², K. VEERAIAH³ ,
Page No :1376-1382
A STUDY ON FINANCIAL STATEMENT ANALYSIS AT HERITAGE FOODS IND LTD
G SAI DEEPIKA ¹, Dr. G. Aruna ², Dr. M. V. Narasimha Rao³, Dr.K.Srinivas Rao ⁴ ,
Page No :1383-1389