Vehicle Number Plate Detection System using KNN
1Vemula Abhigna, 2Dr.T. Charan Singh, 3 Sathvik Prasad, 4K. Raju, 5B.Suresh ,
Page No :1-8
THE INFORMATION TECHNOLOGY SECTORS EXPLORING FINANCIAL KNOWLEDGE AND INVESTMENT DECISION
Dr S.Chand Basha ,
Page No :9-22
[1] Sakapuram Divya, [2] Dr.Donapati Ramakrishna Reddy ,
Page No :23-31
DESIGN AND SIMULATION OF PV-BRIDGELESS CUK CONVERTER FOR EV CHARGER TO INCRESE THE POWER QUALITY
[1] Chakrapani. Ramyasanthoshi, [2] Dr.Donapati Ramakrishna Reddy ,
Page No :32-41
BRAIN TUMOR DETECTION FROM MRI SCAN USING SEGMENT BASED SVM CLASSIFICATION
[1] Pendyala Amulya, [2] Prathapagiri Balakrishna,[3] Maddhi Raju ,
Page No :42-51
Chandupatla Suresh, Dr. K . Vinay Kumar ,
Page No :52-59
H.SREEHITHA1, N.SAI MANVITHA2, G.TEJA SIMHA3 ,
Page No :60-67
Simulation on a new modular multilevel cycloconverter using HF Transformer
[1] Peddoju Vasavi, [2] Dr.Rajender Boini ,
Page No :68-90
WORK LIFE BALANCE OF WOMEN EMPLOYEES WORKING IN IT SECTOR WITH REFERENCE MUMBAI REGION
VIJAYALAKSHMI SUBBAYYA RAI, DR. (PROF.) T. K. GEDAM ,
Page No :81-87
A Review on Noise Cancellation by LMS Adaptive Filters
G. Sunil Kumar, Dr.A.A.Ansari, Dr.S.M.Ramesh ,
Page No :88-96
DESIGN OF A POWER EFFICIENT 32- BIT POSIT MULTIPLIER
L.SRAVANI, Mr. MIDDE ADISESHAIAH ,
Page No :97-101
Cashless Society: Managing Privacy and Security in the Technological Age
1Hemalatha Meruva , 2Dr.G.Rajesh Chandra ,
Page No :102-105
Machine Learning for Web Vulnerability detection: The Case of Cross-Site Request Forgery
VANNAM SUJATHA1, K.AMARENDRANATH2 ,
Page No :106-112
SPAMMER DETECTION AND FAKE USER IDENTIFICATION ON TWITTER
Shaik Parveen1, H.C.VenkataRamanaRao2 ,
Page No :113-118
CROP RECOMMENDATION SYSTEM TO MAXIMIZE CROP YIELD USING DEEP NEURAL NETWORK
1 Pasupuleti Jyothika, 2Dr. K. Venkata Ramana, 3Ch Lakshmi Narayana ,
Page No :119-130
LSTM-VGG-16: A Novel and Modular Model for Image Captioning Using Deep Learning Approaches
1Tirumanisetty Venkata Sneha, 2 Dr.S.Jhansi Rani ,
Page No :131-141
M .Yogi Reddy ,Gokul Prathin Asamani ,Gollapudi E S Saketh ,
Page No :142-146
SECURE AND EFFECTIVE SCHEME FOR DATA MANIPULATION FROM CBF IN CLOUD
R. Spandana1, V.murali krishna2 ,
Page No :147-154
NECESSITY OF AI-ENABLED APPLICATIONS TO IMPROVE SECURITY IN COMPUTER NETWORKS
K. LILLY GRACY MARY ,
Page No :155-159
BAHADUR AYESHA 1 , C. MURALI MOHAN 2 ,
Page No :160-166
CHOPPA SANDHYA ¹, DR.N.A.V. PRASAD ² ,
Page No :167-174
DESIGN OF EFFICIENT THREE-OPERAND BINARY ADDER USING PREFIX COMPUTATION LOGIC
V.SWATHI 1, T.RANJITHA DEVI 2 ,
Page No :175-181
IMPLEMENTATION OF OPTIMIZED WALLACE TREE MULTIPLIER USING HIGH SPEED ADDERS FOR VLSI CIRCUIT DESIGNS
V SAI JYOTHI1, N. A. V. PRASAD2 ,
Page No :182-188
DESIGN AND ANALYSIS OF NOVEL ARCHITECTURE OF SIGNED CARRY SAVE MULTIPLICATION
THALAPANENI JHANSI 1, CH RAMA MOHAN 2 ,
Page No :185-195
EFFICIENT NETWORK ON CHIP (NOC) BY USING CONTENT-ADDRESSABLE MEMORY (CAM)
M. SUDARSHAN1, N. NAVEEN KUMAR2, Dr.Y.L.AJAY KUMAR 3 ,
Page No :196-202
Design of single precision floating point multiplier using FPGA
Rapaka. Sravani 1, Dr. MD. Salauddin 2 ,
Page No :203-211
A Deep Learning Facial Expression Recognition Based Scoring System For Restaurants
Dr.A.ANJAIAH ,
Page No :212-215
NOVEL DESIGN OF FIR FILTER USING REVERSE CARRY PROPAGATE ADDERS FOR ENERGY EFFICIENT
K. ROJAMANI1, K. KAVITHA2 ,
Page No :216-223
G. SAI CHANDRA,Mr. S. RAVI KUMAR ,
Page No :224-230
A Novel Artificial Intelligence and COVID-19: Deep Learning Approaches for Diagnosis and Treatment
B.Nirosha1 ,V.Sudhakar2 ,
Page No :230-240
Study of wireless communication through modulation technique by MHPM
Kota Laxma Reddy ,
Page No :421-428
Implementation of Machine Learning Techniques for Diagnosing Alzheimer’s Disease
Vanteru Sudha,Bingi Manorama Devi ,
Page No :429-437
Secure Cloud-based Health Monitoring Services by using SVM Classification
1kiran Kumar Bollam ,
Page No :438-443
ENHANCING ONE TO MANY DATA SHARING USING BLOCKCHAIN IN VEHICULAR SOCIAL NETWORKS
1B.SUPRAJA, 2A.VENKATESWATLU, 3Dr. N. KRISHNA KUMAR ,
Page No :444-452
Data Protection Protocol for Data Exchange in Order to Reduce Cloud Storage
1Dr. K. Gunasekaran, 2G. Akhila, 3G. Swarnalatha ,
Page No :453-460
Normalization of Duplicate Information fetched from Multiple Sources in Big Data
1K. Raju, 2SNVASRK Prasad, 3K. Naveen Chakravarthy ,
Page No :461-468
Implementation of IOT based Security System for Data Storage in cloud: A Study
1Chinnala Balakrishna,2 K VIGNESHWAR,3 D.NAVANITHA,4 T.S.VIJAYALAKSHMI ,
Page No :469-474
IMPLEMENTATION OF MIMO-OFDM SYSTEM USING DECISION FEEDBACK EQUALIZER (DFE)
R.RAMYA,G.SWETHA ,
Page No :475-483
Shaik Ilyas, B.K Shivang Yadav, Ms. Kotagi Sneha latha ,
Page No :484-502
A PROJECT REPORT ON WASTE MANAGEMENT IN HYDERABAD
1Shaik Ilyas, 2M Manoj Kumar, 3Ms. Kotagi Sneha latha ,
Page No :503-509
EXPERIMENTAL STUDY ON PROTECTION & STRENGTHENING OF EXISTING STRUCTURE BY RETROFITTING METHOD
1SHAIK ILYAS, 2Dr. K. MOHAN DAS, 3Dr K BHASKAR ,
Page No :510-519
P Anupama Dheravath Janu, R Priyanka ,
Page No :520-529
DISTRIBUTED NEURAL ENGINE-DRIVEN K-MEANS CLUSTERING FOR BIG DATA ON SMARTPHONES
#1Billakanti Srinivasa Rao, #2Dr. S.K.Yadav, #3Dr. K.Srinivas ,
Page No :530-541