A KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME FOR SECURE CLOUD STORAGE
MR.V.Chandra Sekhar 1 , R.Muni Sravani 2 ,
Page No :1-6
SECURE ORGAN DONATION USING BLOCKCHAIN TECHNOLOGY
Mr. K. VENKATA RATHNAM 1, G. TEJRAJ SINGH 2 ,
Page No :7-15
ENABLING EFFICIENT, SECURE AND PRIVACY-PRESERVING MOBILE CLOUD STORAGE
Mr.A.Hemanth Kumar1 , K.Mahesh Babu2 ,
Page No :16-25
Email Spam Detection Using Machine Learning Algorithms
MS.R.JYIOSNA DEVI 1 , YAMMANURI HEMANAND 2 ,
Page No :32-38
Comparative Study Of Machine Learning Algorithm For Fraud Detection In Block Chain
Mv.K. Venkata Rathnam1 , A.Kalpana2 ,
Page No :45-51
MULTI-ACCESS FILTERING FOR PRIVACY-PRESERVING FOG COMPUTING
Mr.V Chandrasekhar1 , K.Latha2 ,
Page No :52-59
NETWORK INTRUSION DETECTION USING SUPERVISED MACHINE LEARNING TECHNIQUES WITH FEATRUES SELECTION
Mr. POKURI VENKATARADHAKRISHNA MURTY 1, SHAIK JAVEED AKTHAR 2 ,
Page No :60-64
Hybrid Posture Detection Framework:integrated Machine learning and Deep Neural Networks
Mr.CH.Dayakar1 ,CH.Mounika2 ,
Page No :65-77
TUMOUR DETECTION USING IMAGE PROCESSING IN DEEP LEARNING
Dr.N.Penchalaiah1 ,Sk.Fairoz2 ,
Page No :78-84
Agriculture land classification based on phenological information from dense satellite images
1 CHENDANSREE SAIDU,2 DR.I.R.KRISHNAM RAJU ,
Page No :85-92
A System for Real Time Botnet Command and Control Traffic Detection
1 YANDAPALLI NAGA MAHALAKSHMI,2 S.K.ALISHA ,
Page No :93-99
Suicidal ideation detection. A review of machine learning and applications
1 SOWJANYA PEEKA ,2 V. SRI VALLI DEVI ,
Page No :100-107
NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
1 VANAPALLI SANTHI,2 S.K. ALISHA ,
Page No :108-118
Suicidal ideation detection. A review of machine learning and applications
1 SOWJANYA PEEKA,2 V. SRI VALLI DEVI ,
Page No :119-126
NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
1 VANAPALLI SANTHI, 2 S.K. ALISHA ,
Page No :127-137
Agriculture land classification based on phenological information from dense satellite images
1CHENDANSREE SAIDU ,2DR.I.R.KRISHNAM RAJU* ,
Page No :138-145
A System for Real Time Botnet Command and Control Traffic Detection
1 YANDAPALLI NAGA MAHALAKSHMI,2 S.K.ALISHA ,
Page No :146-152
Privacy Protection Based Access Control Scheme in Cloud Based Services
Ms. Devupalli Akhila 1, Mr. Saragadam Sridhar 2 ,
Page No :153-173
Utilization-Aware Trip Advisor in Bike sharing Systems Based on User Behavior Analysis
Mr.SUBASH CHANDANA 1, Mr.Saragadam Sridhar2 ,
Page No :174-192
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Ms. Pandiripalli .Roja 1 , Mr. Saragadam.Sridhar 2 ,
Page No :193-204
Anonymous and Traceable Group Data Sharing in Cloud Computing
Ms. Devupalli Sravani 1, Mr. Saragadam Sridhar 2 ,
Page No :205-234
SECURING CLOUD DATA UNDER KEY EXPOSURE
Ms. Kusumanchi Swathi 1, Mr. Saragadam Sridhar 2 ,
Page No :235-251
1 Mahasamudram Rajeev Kumar,2Dr. B. Geetha Vani ,
Page No :252-261
A STUDY ON WORKING CAPITAL MANAGEMENT OF DR REDDY S LABORATORIES LTD
1Dande siddarth,2Dr.K.VENKATA SUBBAIAH,3 Swapna Myakala ,
Page No :262-266
SIGN LANGUAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS
Mr. K. VENKATA RATHNAM 1 , K. BRAHMA TEJA2 ,
Page No :267-273
IMPROVEMENT OF THERMAL EFFICIENCY ON SUPER HEATER TUBES BY CHANGING THE FIN DESIGN
C.RAJDIVYA KUMAR, B.CHINNANAGANNA, G.KRISHNA KISHORE ,
Page No :274-284
AUCTION BASED RESOURCE ALLOCATION MECHANISM IN FEDERATED CLOUD ENVIRONMENT: TARA
Mr.V.Chandrasekhar1 , S.Venkateswarlu2 ,
Page No :289-295
An IOT Based Fire Alarming And Authentication System For Workhouse
Mr.R.ARUN KUMAR, CHINTHALAPALLI SADVITHA ,
Page No :296-301
A DESIGN OF INTELLIGENT WEARABLE HEALTH MONITORING SYSTEM BASED ON IOT
Dr.KRISHNA NAIK, VEMSANI THARANI SHREEJA ,
Page No :308-314
VOICE CONTROLLED ROBOTIC ARM USING BLUETOOTH
Dr. S.NARESH KUMAR, CHIPPA SHIVAKALYANI ,
Page No :315-321
SOFTWARE QUALITY PREDICTION USINF MACHINE LEARNING
Smt. G. HARI PRIYA1 , MOPURU ANIL2 ,
Page No :329-335
AUTOMATING E-GOVERNMENT SERVICES WITH ARTIFICIAL INTELLIGENCE
B. UMA MAHESWARI1 , T. ANIL KUMAR2 ,
Page No :348-353
BLACK FRIDAY SALES PREDECTION USING MACHINE LEARNING
N. SUBRAMANYAM1 , RAMABATTINA MANVITHA 2 ,
Page No :354-360
SUPERVISED MACHINE LEARNING BASED CAMPUS PLACEMENT PREDICTION
K. LAKSHMI1 , B.HARSHITHA 2 ,
Page No :361-367
MACHINE LEARNING BASED SECOND HAND CAR PRICE PREDICTION
Mr. N. ANIL KUMAR CHOWDARI 1, BASAM PAVANI 2 ,
Page No :368-374
CARDIOVASCULAR DISEASE PREDICTION BASED ON ECG IMAGE DATA USING DEEP LEARNING
Dr. U. THIRUPALU1 , A .VAMSI2 ,
Page No :375-381
DIABETIC RETINOPATHY DETECTION BY MEANS OF DEEP LEARNING
MR. POKURI VENKATARADHA KRISHNAMURTY 1, PALA. CHANDANA 2 ,
Page No :382-387
E- HEALTH CARE AND DIET RECOMMENDER SYSTEM USING ARTIFICIAL INTELLIGENT
Mr. G SREENIVASULU1 , BOMMANCHU MANVITHA 2 ,
Page No :388-393
ENHANCING SECURITY USING DUAL SERVER KEY AUTHENTICATION ENCRYPTION WITH KEYWORD SEARCH
Mr. B. HARI BABU1 , D. MAHENDRA2 ,
Page No :394-400
CLASSIFICATION OF MUSHROOMS USING MACHINE LEARNING TECHNIQUES
M. NARMADA1 , KUKATI SREERAM 2 ,
Page No :401-406
PREDICTING THE ELECTRIC VEHICLE ENERGY CONSUMPTION USING MACHINE LEARNING TECHNIQUES
Mr. SYED AKTHAR BASHA1 , SHAIK SHAJAHAN2 ,
Page No :407-416
ESTIMATING FUEL CONSUMPTION OF HEAVY VEHICLES USING MACHINE LEARNING
Smt. G. HARI PRIYA1 , MOPURU ANIL2 ,
Page No :424-429
ARTIFICIAL INTELLIGENCE BASED FITNESS ASSISTANT SYSTEM
Mr. G.RAJESH1 , J.HARATHI 2 ,
Page No :430-436
IMPROVING SECURITY WITH GRAPHICAL PASSWORD AUTHENTICATION SCHEME
N. ANIL KUMAR CHOWDARI1 , J. HEMALATHA2 ,
Page No :437-441
PREDICTION OF FAKE JOB POST USING MACHINE LEARNING
Ms. B. SRAVANI 1 , VENGANNA SIVIDYA 2 ,
Page No :442-448
VIRTUAL PERSONAL ASSISTANT USING ARTIFICIAL INTELLIGENCE
Dr. U. THIRUPALU1 , M. SURESH2 ,
Page No :449-455
UTILIZING SINGLE SHOT MULTI BOX DETECTOR FORWEAPONASCERTAINMENT
Ms. NISHITHA1 , CHEMIRTHIPALLI VINAY 2 ,
Page No :456-461
SOFTWARE QUALITY PREDICTION USING MACHINE LEARNING
Smt. G. HARI PRIYA1 , G.PALGUNA2 ,
Page No :462-468
CARDIOVASCULAR DISEASE PREDICTION BASED ON ECG IMAGE DATA USING DEEP LEARNING
B. SRAVANI 1, G. VIJAY 2 ,
Page No :469-475
CARDIOVASCULAR DISEASE PREDICTION BASED ON ECG IMAGE DATA USING DEEP LEARNING
B. SRAVANI 1, G. VIJAY 2 ,
Page No :469-475
MACHINE LEARNING BASED CHRONIC KIDNEY DISEASE DETECTION
R. JYOSNA DEVI1 , M. ARUNA2 ,
Page No :482-487
CLASSIFICATION OF PLANT SEEDLINGS USING DEEP CNN ARCHITECTURES
Dr. U. THIRUPALU1 , MALLI CHENCHAIAH 2 ,
Page No :488-493
Mr. G SREENIVASULU1 , DABBUGUNTA LAVANYA2 ,
Page No :494-498
Mr. G.RAJESH1 , K. YASWANTH KUMAR 2 ,
Page No :499-506
DETECTION OF MALICIOUS SOCIAL BOTS USING MACHINE LEARNING
G. HARI PRIYA1 , E. KEERTHANA 2 ,
Page No :507-513
MACHINE LEARNING BASED FLIGHT DELAY PREDICTION SYSTEM
A. HEMANTH KUMAR1 , TIRUMURU SREEKANTH 2 ,
Page No :514-519
FRAUD DETECTION AND ANALYSIS FOR INSURANCE CLAIM USING MACHINE LEARNING
G. HARI PRIYA 1 , K. SUPRAJA 2 ,
Page No :520-525
PREDICTION OF FAKE JOB POST USING MACHINE LEARNING
MAVALLURU.SWATHI 1 , KALLURI MOUNIKA 2 ,
Page No :532-538
SECURE DATA SHARING USING WEB CLOUD STORAGE PLATFORM
B. UMA MAHESWARI 1 , L. SRIVIDYA2 ,
Page No :539-545
A PROJECT REPORT ON PRODUCT LIFE CYCLE AT KESORAM LTD
Deepika Kothari¹, Kondaparthi Harika², Dr.K.Venkata subbaiah³ ,
Page No :546-552
EXPERIMENTAL STUDY OF SEWAGE TREATMENT PLANT AND ITS COST COMPARISONS WITH MODERN TREATMENT PROCESS
Chimata. Divya1 , K. Babu Rao2 ,
Page No :553-567
A STUDY ON FINANCIAL ANALYSIS OF TATA STEEL LTD IN ANGEL ONE LTD HYDERABAD
Ch. . Ganesh Yadav¹, Quadhari Sha Fathima², Dr.K.Venkata Subbaiah³ ,
Page No :568-575
CLASSIFICATION OF PLANT SEEDLINGS USING DEEP CNN ARCHITECTURES
Mr. B. HARI BABU1 , MALLI CHENCHAIAH 2 ,
Page No :576-581
Mr. G.RAJESH1 , K. YASWANTH KUMAR 2 ,
Page No :582-589
A DECISION TREE BASED RECOMMENDATION SYSTEM FOR TOURISTS
CH. DAYAKAR¹, G. SREEJA2 ,
Page No :590-598
EFFICIENT LOCATION ESTIMATION IN EARTHQUAKE ALERT SYSTEM USING MACHINE LEARNING
Mr. V. CHANDRASEKHAR¹, SK. SEEMU 2 ,
Page No :599-604
EMPLOYEE SALARY HIKE PREDICTION USING MACHINE LEARNING
Mr. G.RAJESH¹, P. SUPRATHEEKA 2 ,
Page No :605-611
EFFECTIVE DICOVERYING OF PRODUCT EXPERIENCE BASED ON FUSION SENTIMENT ANALYSIS METHOD
G. HARI PRIYA¹, M. MOUNIKA2 ,
Page No :612-620
PREDICTING TRAJECTORY USING MACHINE LEARNING
Dr. N. PENCHALAIAH¹, B. KHYATHI PRIYA 2 ,
Page No :621-628
DEEP FACIAL DIAGNOSIS USING DEEP TRANSFER LEARNING
Mr. V. CHANDRASEKHAR¹, B. BHAVANA 2 ,
Page No :629-636
SMART DISTRIBUTION OF FRESH AGRICULTURE PRODUCTS IN URBAN AREAS
Mr. D. V. VARAPRASAD¹, K. JAGADEESH 2 ,
Page No :637-643
Ms. M. SWATHI1 , K.GOPALREDDY2 ,
Page No :644-654
SECURE AND EFFICIENT DATA MIGRATION USING COUNTING BLOOM FILTERS IN CLOUD ENVIRONMENTS
Mr. G.RAJESH¹, AKULA VISHNU2 ,
Page No :655-662
AIR POLLUTION PREDICTION USING A MACHINE LEARNING
SD.Akhtar Basha1 ,M.Ramakrishna 2 ,
Page No :663-670
Management of Organ Donation and Transplantation Using Blockchain
B. Sumanth1, Mrs. K. Kavitha, ,
Page No :671-677
A Hybrid Deep Learning Approach for Detecting Cyberbullying in the Twitter Social Media Platform
H Yugundhar1 ,2Dr R Maruthumuthu, ,
Page No :678-685
DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING
S.M. Rafi1 , Sk. Allabakash2 ,
Page No :686-691
GENERATING CLOUD MONITORS FROM MODELS TO SECURE CLOUDS
Mr. B. HARI BABU1 , B.SRAVANTHI2 ,
Page No :692-697
DESIGNING RANKING MODEL FOR CLOUD SERVICES BASED ON USER REQUIREMENTS
Mr. V. CHANDRASEKHAR¹, M.ANUHYA2 ,
Page No :698-705
NUMBER PLATE DETECTION WITH OUT HELMET
Mr. N ANIL KUMAR CHOWDARI¹, DEVARAYALA YAMINI2 ,
Page No :706-712
PARKINSON DISEASE DETECTION: USING XGBOOST ALGORITHM TO DETECT EARLY ONSET PARKINSON DISEASE
N. ANIL KUMAR CHOWDARI¹, K.SURYA NARYANA REDDY2 ,
Page No :720-726
PLASTIC DETECTION AND CLASSIFICATION USING DEEP LEARNING
G. SRINEEVASULU¹, GODUGU SIDDU2 ,
Page No :727-732
SECURING LOCATION DATA USING MACHINE LEARNING TECHNIQUES
Mr. B. HARI BABU1 , G. SAI KEERTHI2 ,
Page No :733-739
PROTECTING YOUR SHOPPING PREFERENCE WITH DIFFERENTIAL PRIVACY
Mr. V. CHANDRASEKHAR¹, KUMMARI. SWAPNA2 ,
Page No :740-746
SIGNATURE FORGERY AND REAL VERIFICATION USING DEEP LEARNING
Mr. CH.DAYAKAR¹, D.SUDHEER2 ,
Page No :747-753
DEVELOPING A SOIL CLASSIFICATION AND CROP RECOMMENDATION SYSTEM USING MACHINE LEARNING
N.SUBRAMANYAM¹, KAPA SUVARNA2 ,
Page No :754-761
STRESS DETECTION IN IT PROFESSIONALS BY IMAGE PROCESSING AND MACHINE LEARNING
R.JYOSNA DEVI¹, T.SOWJANYA2 ,
Page No :762-769
PREDICTION STROKE RISK WITH HYBRID DEEP TRANSFER LEARNING FRAMEWORK
MR. POKURI VENKATA RADHAKRISHNA MURTY¹, N.BHARGAVI2 ,
Page No :770-777
SYMPTOMS BASED DISEASE PREDICTION USING MACHINE LEARNING TECHNIQUES
Ms. K. NISHITHA¹, S. TIRUMALA2 ,
Page No :778-784
HANDWRITTEN TELUGU CHARACTER RECOGNITION USING DEEP CNN MODEL
Mr. V. CHANDRASEKHAR¹, B.HEMASRI2 ,
Page No :785-790
G. SRINEEVASULU¹, P. SAI APURVA2 ,
Page No :791-796
A DEEP LEARNING FRAMEWORK FOR VIDEOBASED VEHICLE COUNTING
MAVALLURU SWATHI¹, J. VENKATA KALYANI2 ,
Page No :797-803
ANDROID BASED BUS TICKETING SYSTEM USING QR CODE
Mr. SYED AKHTAR BASHA¹, T. SAI KUMAR2 ,
Page No :804-809
MACHINE LEARNING BASED DIGITAL FORENSICS SYSTEM TO REVIEW TRENDS, CHALLENGES, AND EMERGING TOPICS
G. SRINEEVASULU¹, DABBU PAVAN PUTRA2 ,
Page No :817-824
FIREBASE ENABLED RESCUE WINGS ANDROID APPLICATION
Mr. A.HEMANTH KUMAR¹, GARISAPATI HARIBABU2 ,
Page No :825-830
PRODUCTION SYSTEM USING ML & DL ALGORITHM SECURING SMART SENSING
Mr. A.HEMANTH KUMAR¹, PADALA NAGARAJU2 ,
Page No :831-838
FEEDER PROTECTION SYSTEM FROM EARTH FAULT, SHORT CIRCUIT AND OVERLOAD FAULTS
1J.VENUMADHAV, 2LYAGALA LIKHITHA ,
Page No :839-843
INDUSTRIAL POWER CONTROL BY INTEGRAL CYCLE SWITCHING WITHOUT GENERATRING HARMONICS
B.HARSHINI, DAYYALA DIVYA ,
Page No :849-855
IOT BASED DAM MONITORING AND PRE-DISATER MANAGEMENT
P.ODELU YADAV, KONDABATHINI ARCHANA ,
Page No :856-860
Crop Yield Prediction Using Machine Learning
1 Kalluru Sitarami Reddy 2 Samson Paul ,
Page No :867-871
A Novel Method for the Detection of Malignant Tumors in Breast
1Ashok Kumar Reddy 2 Dr.C. Dhanaraj ,
Page No :884-890
Threat Intelligence Generation for Industrial Control Systems Using Network Telescope Data
1G.saideep 2H. Ateeq Ahmed, ,
Page No :891-898
A Robust Optimization Technique for Cloud Data Center Energy Cost Minimization
1P. Chandana reddy 2Dr C Mohammed Gulzar ,
Page No :899-905
A Deep Learning-Based Approach for Detecting and Classifying Inappropriate Content in YouTube Videos
1 M.GANESH ,2 Dr.J SRINIVASAN ,
Page No :906-911
SIMULATION OF POWER QUALITY IMPROVEMENT OF SOLAR WIND HYBRID POWER SYSTEM WITH STATCOM AND UPQC
1 S. RAJESHYADAV,2 Dr. K. RAJU ,
Page No :912-918
ONLINE FAKE REVIEWS IDENTIFCATION USING SEMI-SUPERVISED AND SUPERVISED LEARNING
CH. DAYAKAR 1, GUNJI ANUSHA 2 ,
Page No :919-924
IMPROVING ENCRYPTED IMAGE SEARCH EFFICIENCY IN SECURE CLOUDS
S. M. RAFI1 , SHAIK SHAHUL HAMEED 2 ,
Page No :925-930
DESIGN YOGA POSTURE COACHING SYSTEM USING ARTIFICIAL INTELLIGENCE
Mr. B. HARI BABU1 , MATLE MAHESH2 ,
Page No :931-937
INAPPROPRIATE CONTENT DETECTION AND CLASSIFICATION OF YOUTUBE VIDEOS USING DEEP LEARNING
B.SRAVANI1 , VENGANNA SRIVIDYA 2 ,
Page No :938-944
DESIGN AND SIMULATION OF IMPROVED HYBRID ELECTRIC VEHICLE CHARGER
1 MEDI.JYOTHI,2 Dr. S. Narasimha ,
Page No :945-952
IOT BASED REMOTE PATIENT HEALTH MONITORING SYSTEM
1Shatrughna Prasad Yadav,2Gangula Saikiran reddy,3Gujjarlapudi Indhu,4Katta Dileep ,
Page No :953-963
An Over View: Analytic Solutions of DifferentialDifference Equations of Order (1, 1)
1DURGADEVI MULAGAPATI, 2BOJJA PAVANI, 3G.JYOTHI , 4M.B.RAJYA LAKSHMI ,
Page No :964-971
Dr. D. Shobha Rani1 , Mrs. Syed Jasmin2 ,
Page No :972-981
A STUDY ON HR PLANNING AT HERO MOTOCORP LTD
JUMIDI ADARSHA, DDR.K VENKATA SUBBAIA, QUADHARISHA FATHIMA ,
Page No :982-989
DETECTION OF MALICIOUS SOCIAL BOTS USING MACHINE LEARNING
G. HARI PRIYA1 , E. KEERTHANA 2 ,
Page No :997-1003
DIGITAL VEHICLE: VEHICLE IDETIFICATION USING NUMBER PLATE
Mr. V. CHANDRASEKHAR1 , Y. NEELIMAA 2 ,
Page No :1004-1009
CLASSIFICATION OF MUSHROOMS USING MACHINE LEARNING TECHNIQUES
M. NARMADA1 , KUKATI SREERAM 2 ,
Page No :1010-1015
MACHINE LEARNING BASED FLIGHT DELAY PREDICTION SYSTEM
A. HEMANTH KUMAR1 , TIRUMURU SREEKANTH 2 ,
Page No :1016-1021
VIRTUAL PERSONAL ASSISTANT USING ARTIFICIAL INTELLIGENCE
Dr. U. THIRUPALU1 , M. SURESH2 ,
Page No :1022-1028
DISASTER ALERTING AND RESILIENCE SYSTEM
1 Madireddy Varsha Reddy, 2 Gundeboina Tejaswi Yadav, 3 Muthyala Vinitha Reddy 4Chaganti B N Lakshmi ,
Page No :1029-1037
Predicting Urban Water Quality With Ubiquitous Data - A Data-Driven Approach
Ms.A.SUNEETHA 1 , Mr.SARVEPALLI NANDA KUMAR 2 ,
Page No :1038-1044
Predicting Brain Age Using Machine Learning Algorithms A Comprehensive Evaluation
Ms.A.SUNEETHA 1 , Mr.C.PRAVEEN KUMAR 2 ,
Page No :1045-1051
HearSmoking Smoking Detection in Driving Environment via Acoustic Sensing on Smartphones
Ms.A.SUNEETHA 1 , Mr.MARUSANI MUKESH 2 ,
Page No :1052-1058
Fake Profiles Identification in Online Social Networks Using Machine Learning and NLP
Ms.A.SUNEETHA 1 , Mr.GUGGULA NIVEDA 2 ,
Page No :1059-1063
Electricity Theft Detection in Smart Grids Based on Deep Neural Network
Ms.A.SUNEETHA 1 , Mr. BACHHA VEERA REDDY 2 ,
Page No :1064-1070
DATA TRUST FRAMEWORK USING BLOCKCHAIN TECHNOLOGY AND ADAPTIVE TRANSACTION VALIDATION
Ms.A.SUNEETHA 1 , Mr. P.GUNA SEKHAR 2 ,
Page No :1071-1077
Child Mortality prediction using Machine Learning Techniques
Ms.A.SUNEETHA 1 , Mr. VALIPI SAI KUMAR 2 ,
Page No :1078-1082
A FAST NEAREST NEIGHBOR SEARCH SCHEME OVER OUTSOURCED ENCRYPTED MEDICAL IMAGES
Ms.A.SUNEETHA 1 , Ms. KADAVAKOLLA PUJITHA 2 ,
Page No :1083-1090
A STUDY ON 360 DEGREES PERFORMANCE APPRAISALHERITAGE
1 S.MD.JAFFAR SADEEK, 2Mula Venkata Prathyusha ,
Page No :1098-1107
A STUDY ON EMPLOYEE SATISFACTION-IIFL
1D.HIMAMSHA, 2 Palla Venkata subba sai Bhavana ,
Page No :1112-1119
A STUDY ON FINANCIAL MANAGEMENT - KESORAM
1DR.K.CHANDRA REKHA, 2 Vadde Hari krishna ,
Page No :1120-1125
A STUDY ON FUNDS FLOW STATEMENT – HERO MOTORS
1 S.MD.JAFFAR SADEEK, 2 Pasuvula Vijay Kumar ,
Page No :1130-1135
A STUDY ON INDIAN STOCK MARKET –INDIABULLS
1 S.SREENIVASULU,2 Vusirikayala Dinesh Goud ,
Page No :1142-1147
A STUDY ON ONLINE TRADING - INDIA INFO LINE
1DR.K.CHANDRA REKHA, 2Mangali .Hussainaiah ,
Page No :1148-1153
A STUDY ON CASH FLOW STATEMENT-RELIGARE
1 S.SREENIVASULU,2Udayagiri.Giri Kailash Nath ,
Page No :1159-1162
A STUDY ON INITIAL PUBLIC OFFER - HDFC
1 S.SREENIVASULU,2 Bhoganatham Guru Mahendra ,
Page No :1163-1168
A STUDY ON JOB SATISFACTION – HERITAGE
1M.NABI RASOOL, 2Nemalipalli Manoj Kumar ,
Page No :1169-1174
A STUDY ON QUALITY OF WORK LIFE – HERITAGE
1 S.ZAKEER HUSSAIN,2Dereddy.Susmitha Reddy ,
Page No :1182-1188
A STUDY ON RECRUITMENT & SELECTION - HYUNDAI
1M.NABI RASOOL, 2Gaireddy.Lakshmi Reddy ,
Page No :1196-1202
A STUDY ON SALES & DISTRIBUTION – TATA MOTORS
1G.RAMAPURUSOTHAM REDDY, 2 Sanem Pavan Kumar ,
Page No :1203-1211
SESPHR: A METHODOLOGY FOR SECURE SHARING OF PERSONAL HEALTH RECORDS IN THE CLOUD
1 Ingilela. Ravi Shireesh,2 Padi Jyothsna, ,
Page No :1217-1224
MALWARE DETECTION USING MACHINE LEARNING TECHNIQUES
Dr.N.Penchalaiah 1 ,V.Niharika2 ,
Page No :1225-1231
Weakly-Supervised Deep Learning for customer Review Sentiment Classification
N. SRINIVASA RAO, CHIKKAM SWATHI ,
Page No :1232-1236
Spammer Detection And Fake User Identification On Social Networks
N. SRINIVASA RAO, GIRUGU KAMALA DEVI ,
Page No :1237-1242
SECURING DATA WITH BLOCK CHAIN AND ARTIFICIAL INTELLIGENCE
N. SRINIVASA RAO, KOMMU VENKATESH ,
Page No :1243-1247
RETRIEVING HIDDEN FRIENDS A COLLUSION PRIVACY ATTACK AGAINST ONLINE FRIEND SEARCH ENGINE
N. SRINIVASA RAO, BANDARU YESURAJU ,
Page No :1266-1278
Privacy Protection Based Access Control Scheme in Cloud Based Services
N. SRINIVASA RAO, ROKKALA RESHMA ,
Page No :1279-1301
Privacy Characterization And Quantification In Data Publishing
N. SRINIVASA RAO, DODDA SANDHYA ,
Page No :1302-1306
NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
N. SRINIVASA RAO, AKULA RAJESWARI ,
Page No :1307-1318
N. SRINIVASA RAO, ADAPA GUNA SRI VARDHAN ,
Page No :1319-1323
Fake profile Detection Using Machine Learning
N. SRINIVASA RAO , PIPPALLA BENARJI ,
Page No :1324-1328
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING ALGORITHM TECHNIQUES
N. SRINIVASA RAO , THANIMKI DIVYA SRI ,
Page No :1329-1336
A STUDY ON NON-PERFORMING ASSETS AT ICICI BANK LTD HYDERABAD
KAMALESHWARI YADAV, Ms. POSANPALLY ALEKHYA, SANDHALA DHANUSHA ,
Page No :1337-1342
A PROJECT REPORT ON WORKING CAPITAL MANAGEMENT ON PHARMACEUTIAL SECTOR
M.S.KEERTHANA¹,Dr.K.VENKATA² SUBBAIA,BASHER AHMEDBEIG ABDUL³ ,
Page No :1343-1353
N. SRINIVASA RAO MANCHEM RAMA VENKATESWARA RAO ,
Page No :1354-1364
SUPERMARKET BILLING SYSTEM USING WEBCAM
N. SRINIVASA RAO, PARAMSETTI SATYA NARASIMHA KUMAR ,
Page No :1365-1369
Stock Market Analysis Using Supervised Machine Learning
N. SRINIVASA RAO, GUBBALA HARI KRISHNA ,
Page No :1374-1380
OPINION MINING FOR SOCIAL NETWORKING SITE
N. SRINIVASA RAO, CHAPPIDI VEERA VENKATA PALLAMSETTI ,
Page No :1381-1384
FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
N. SRINIVASA RAO, CHINTAPENTA MANIKANTA KARTHIK ,
Page No :1385-1390
Farming made Easy using Machine Learning
N. SRINIVASA RAO, MADUGULA VEERA BHADRA RAMA K SAI SANKAR ,
Page No :1391-1395
N. SRINIVASA RAO, KANDREGULA TULASI SAI RAM ,
Page No :1396-1399
Detection and Characterizing Extremist Reviewer Group in Online Product Reviews
N. SRINIVASA RAO, BONAM JAGADISH ,
Page No :1400-1404
FEASIBILITY OF COPPER SLAG CEMENT IN ROAD CONSTRUCTION
TELUGU AJAY KUMAR1 NANDINI2 ,
Page No :1405-1412
A STUDY ON EMOTIONAL INTELLIGENCE AND JOB PERFORMANCE DURING WFH AT FORAY SOFTWARE SOLUTIONS LTD
1Sonali Kumari,2Dr.K. VENKATA SUBBAIAH,3Mrs.Thanugundla Fatima Soni ,
Page No :1413-1421
Achieving Data Truthfulness And Privacy Preservation In Data Markets
N. SRINIVASA RAO , PALEPU HARIKA ,
Page No :1422-1436
ACTIVE ONLINE LEARNING FOR SOCIAL MEDIA ANALYSIS TO SUPPORT CRISIS MANAGEMENT
N.SRINIVASA RAO 1 , KANDERI SUNITHA2 ,
Page No :1437-1442
An Overview on Network Representation Learning Enhanced Recommendation Algorithm
N.SRINIVASA RAO 1 , CHELLUBOINA LAKSHMI TRIVENI2 ,
Page No :1443-1452
Anonymous and Traceable Group Data Sharing in Cloud Computing
N. SRINIVASA RAO , MUSHINI SURYA DURGA ,
Page No :1453-1483
Computing Semantic Similarity of Concepts in Knowledge Graphs
N.SRINIVASA RAO 1 ,AKUMARTHI SUSEELA2 ,
Page No :1484-1487
Prediction of Rumor Diffusion in Social Network Using Game Model
N.SRINIVASA RAO 1 , 2 .KOMANAPALLI SANDHYA RANI ,
Page No :1488-1493
Privacy Preserving-Biometric Identification Scheme Over Cloud Encrypted Data
N.SRINIVASA RAO 1 , 2 . DAKE VENKATA MANIKANTA ,
Page No :1494-1499
Secure Data Group Sharing and Conditional Dissemination with MultiOwner in Cloud Computing
N.SRINIVASA RAO 1 , 2 . DANGETI VEERA VENKATA MUTYA PRASAD ,
Page No :1500-1503
N.SRINIVASA RAO 1 , 2 . GEDDAM SRI USHA ,
Page No :1504-1509
INVESTIGATION REPORT OFVARIOUS TESTS ON CONCRETE WITH NATURALVISCOSITY ENHANCER
P.Ahamad Khan1 , M.Venkata Narasaiah 2 ,
Page No :1510-1516
A MISSING CHILD IDENTIFICATION SYSTEM USING DEEP LEARNING AND MULTI CLASS SVM
1Mrs Y.ANITHA REDDY,2M SIVANI ,
Page No :1517-1528
CONVERGING BLOCK CHAIN AND MACHINE LEARNING FOR HEALTH CARE
1Mr K.AMARENDRANATH,2 S NAGIYA BANU ,
Page No :1538-1546
CROP YIELD PREDICTION USING MACHINE LEARNING TECHNIQUES
1Mrs.B.V.S.N.LAKSHMI,2M HIMA BINDU ,
Page No :1547-1552
MACHINE LEARNING TECHNIQUES FOR CYBER ATTACKS DETECTION
1Mr A.D.SIVARAMA KUMAR,2D MANOJ KUMAR ,
Page No :1553-1564
SPAMMER DETECTION AND FAKE USER IDENTIFICATION ON SOCIAL NETWORKS
1Mrs.A.BINDUKALA,2 A PRUDHVI VENKATA MARUTHI ,
Page No :1565-1573
AN APPROACH TO COMPRESS IMAGE USING STEGANOGRAPHY AND CRYPTOGRAPHY
K.DEEPTHI1 , A.PRASANNA LAXMI2 , A.SRAVANI3 , K.SINDHU REDDY4 ,
Page No :1574-1579
A Blockchain Based Autonomous Decentralized Online Social Network
Ms.A.SUNEETHA 1 , Mr.LANKALAPALLI NARENDRA KUMAR 2 ,
Page No :1580-1585
YALAMARTHI.GANESH ,
Page No :1586-1594
BALAPANOORI SAI SUDHEER, K.MEENENDRANATH REDDY ,
Page No :1595-1602
SOLAR BASED MULTI-OUTPUT DC-DC CONVERTER FOR ELECTRIC VEHICLE APPLICATION
BHUPATHI POORVAJA, Dr.P.SANKAR BABU ,
Page No :1603-1610
1 AVULA PAVAN KUMAR YADAV, 2 S.MADDILETY ,
Page No :1611-1618
YERRAGUDI MOUNIKA, SYED RESHMA ,
Page No :1619-1625
Privacy Preserving Electronic Ticket Scheme with Attribute-based Credentials
Ms.A.SUNEETHA 1 , Ms. . N.HIMABINDU 2 ,
Page No :1626-1632
EPilots A system to predict hard landing during the approach phase of commercial flights
Ms.A.SUNEETHA 1 , Mr. KUMMARA RAKESH 2 ,
Page No :1633-1639
Enabling Fast Public Auditing and Data Dynamics in Cloud Services
Ms.A.SUNEETHA 1 , Mr. NAGUR ABDUL REHMAN 2 ,
Page No :1640-1647
Dynamic Group-Oriented Provable Data Possession in the Cloud
Ms.A.SUNEETHA 1 , Mr. A.RUSHIKESH 2 ,
Page No :1648-1655
Dual-Server Public Key Authenticated Encryption With Keyword Search For Secure Cloud Storage
Ms.A.SUNEETHA 1 , Ms.R.JAYA LAKSHMI SAI 2 ,
Page No :1656-1661
Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud
Ms.A.SUNEETHA 1 , Mr.PEDDINTI SIMHAVARDHAN REDDY 2 ,
Page No :1662-1669
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework
Ms.A.SUNEETHA 1 , Mr.G.YUVAKISHORE REDDY 2 ,
Page No :1670-1678
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Ms.A.SUNEETHA 1 , Mr. .KALVA VENKATESH 2 ,
Page No :1679-1686
Activity Organization for Friend-Making Optimization in Online Social Networks
Ms.A.SUNEETHA 1 , Mr. PERAM RAMESH REDDY 2 ,
Page No :1687-1693
Blockchain-based Management of Blood Donation
Ms.A.SUNEETHA 1 , Ms.G.HASHITHA REDDY 2 ,
Page No :1694-1700
Decentralized Blockchain-Based Trust Management Protocol For The Internet Of Things
Ms.A.SUNEETHA 1 , Mr.M. BALADINESH REDDY 2 ,
Page No :1701-1707
Evaluating Public Anxiety for Topic-based Communities in Social Networks
Ms.A.SUNEETHA 1 , Ms.P.SHASMA PRIYA 2 ,
Page No :1708-1716
Protecting Your Shopping Preference With Differential Privacy
Ms.A.SUNEETHA 1 , Ms. P.SUNITHA 2 ,
Page No :1717-1722
Secure Cloud Data Deduplication with Efficient ReEncryption
Ms.A.SUNEETHA 1 , Ms.G. RANGAMMA 2 ,
Page No :1723-1729
Sensitive Label Privacy Preservation with Anatomization for Data Publishing
Ms.A.SUNEETHA 1 , Ms. N. MOUNIKA 2 ,
Page No :1730-1738
Social Engineering Attacks Prevention A Systematic Literature Review
Ms.A.SUNEETHA 1 , Ms. I. KOUSTUBHA 2 ,
Page No :1739-1746
The Effect of Social Media User Behaviors on Security and Privacy Threats
Ms.A.SUNEETHA 1 , Ms. THANNERU LEHA 2 ,
Page No :1747-1753
A PROJECT REPORT ON EMPLOYEE SATISFACTION AND IT S BENEFITS TO EMPLOYEES AND ORGANIZATIONS
S GANGA BHAVANI¹, DR. B SARATH SIMHA², DR.T.VENKATA RAMANA³ ,
Page No :1754-1761
A STUDY ON JOB SATISFACTION AT HYUNDAI MOTOR LIMITED
RATHOD UMESH, Dr. DANDA UDAYA SHEKHAR, Dr. P. SUBRAHMANYAM³ ,
Page No :1762-1770
A STUDY ON EMPLOYEE SATISFACTION AT HERITAGE FOODS LIMITED
A.K.SHRAVANI¹, Dr. DANDA UDAYA SHEKHAR² ,Dr. P. SUBRAHMANYAM³ ,
Page No :1771-1781
PANTOMIME RECOGNITION USING MACHINE LEARNING
1 S Ritesh Jaiswal, 2 Cherla Mounika, 3 Boddupalli Likitha, 4 Bojja Gopichand ,
Page No :1782-1795
A MODEL TO PREDICT HEART DISEASE USING FISHER SCORE IN MACHINE LEARNING
1 Chilmula Srijan, 2 MD Afsha, 3 Aila Vignesh, 4 Damera Raju, 5 Chaganti B N Lakshmi ,
Page No :1796-1802
A Blockchain Based System for Healthcare Digital Twin
Ms.A.SUNEETHA 1 , Mr.O.NARENDRA REDDY 2 ,
Page No :1803-1809
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme
Ms.A.SUNEETHA 1 , Mr.V.GURUSWAMY 2 ,
Page No :1810-1816
Block Chain Technology For Protecting The Banking Transaction Without Using Tokens
Ms.A.SUNEETHA 1 , Mr. CHALLAKOTHURU GANESH 2 ,
Page No :1817-1822
Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
Ms.A.SUNEETHA 1 , Mr. G. DEVANAGASAI 2 ,
Page No :1823-1828
Intelligent Distribution Of Fresh Agricultural Products In Smart City
Ms.A.SUNEETHA 1 , Ms.U.SRAVANI 2 ,
Page No :1829-1835
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers
Ms.A.SUNEETHA 1 , Mr.T.SAI KUMAR 2 ,
Page No :1836-1842
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
Ms.A.SUNEETHA 1 , Mr. K. AMARENDRA 2 ,
Page No :1843-1848
Detecting suspicious file migration or replication in the cloud
Ms.A.SUNEETHA 1 , Mr. O.CHENCHU SAI LOKA HARSHA2 ,
Page No :1849-1855
DSAS A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System
Ms.A.SUNEETHA 1 , Ms. THATI RAMYASRI2 ,
Page No :1856-1862
Neovascularization And Detection Of Fundus Images Using Deep Learning
Ms.A.SUNEETHA 1 , Mr.A.DILLIBABU 2 ,
Page No :1863-1868
Ms.A.SUNEETHA 1 , Mr.V.LAKSHMIKAR REDDY 2 ,
Page No :1869-1874
Dual Access Control For Cloud-Based Data Storage And Sharing
Ms.A.SUNEETHA 1 , Mr.SK.IMRAN 2 ,
Page No :1875-1882
Accountable Privacy-Preserving Mechanism for Cloud Computing Based On Identity-Based Encryption
Ms.A.SUNEETHA 1 , Mr.K.PURUSHOTTAM NAIDU 2 ,
Page No :1883-1888
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
Ms.A.SUNEETHA 1 , Mr.P.BHARATH 2 ,
Page No :1889-1895
Enabling Trust and Privacy Preserving e-KYC System Using Blockchain
Ms.A.SUNEETHA 1 , Mr.SHAIK SALAM 2 ,
Page No :1896-1903
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud
Ms.A.SUNEETHA 1 , Ms.T.ANIYHA 2 ,
Page No :1904-1910
Ms.A.SUNEETHA 1 , Ms.CHOWDAM THEJASWINI 2 ,
Page No :1911-1917
Liver Disease Prediction using SVM and Naïve Bayes Algorithms
1 Samson Paul 2 Kalluru Sitarami Reddy ,
Page No :1918-1924
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
Ms.A.SUNEETHA 1 , Mr.G.VEERADURGARAO 2 ,
Page No :1925-1931
Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage
Ms.A.SUNEETHA 1 , Ms.K.DHANA KOKILA 2 ,
Page No :1932-1939
5 IN 1 MULTI PURPOSE AGRICULTURAL ROBOT
1MURALA DHARANI ,2MR. P. RAMESH ,3Dr. P. RAJA PRAKASHA RAO ,
Page No :1940-1950
BLIND STICK USING ULTRASONIC SENSOR WITH VOICE ANNOUNCEMENT AND GPS TRACKING
1MANGINIPALLY PRASAD ,2Mr. R.RAMESH NAIK,3Dr. P. RAJA PRAKASHA RAO ,
Page No :1951-1963
Certificateless Public Integrity Checking Of Group Shared Data On Cloud Storage
Ms.A.SUNEETHA 1 , Ms.SHAIK NAZIRA 2 ,
Page No :1964-1970
DEVELOPMENT OF IOT HEARTBEAT AND BODY TEMPERATURE MONITORING SYSTEM FOR COMMUNITY HEALTH VOLUNTEER
1G. RAMYA ,2MR. R. MALLIKHARJUN ,3Dr. P. RAJA PRAKASHA RAO ,
Page No :1971-1982
DESIGN OF ESP8266 SMART HOME USING MQTT AND IOT PLATFORM
1VANGAPELLI SRAVANI ,2Mrs. K. SHYAMALA MURTHY ,3Dr. P. RAJA PRAKASHA RAO ,
Page No :1983-1995
THEFT INTIMATION OF VEHICLE USING GSM AND GPS
1MORUGU NAVANEETHA ,2DR. P. SUMITHABHASHINI ,3Dr. P. RAJA PRAKASHA RAO ,
Page No :1996-2005
APPLICATION OF WIRELESS SYNCHRONIZATION TASKS USING ZIGBEE MODULE
1MOKARA VENKATA PRAVALLIKA ,2DR L. JAGADEESH NAIK,3Dr. P. RAJA PRAKASHA RAO ,
Page No :2006-2017
SMART PATIENT HEALTH MONITORING SYSTEM USING IOT
1KANDUKURI SWETHA ,2Dr. P. RAJA PRAKASHA RAO ,
Page No :2018-2028
1AAKUTHOTA RACHANA ,2Dr. E. KRISHNA HARI ,3Dr. P. RAJA PRAKASHA RAO ,
Page No :2029-2040
DESIGN AND IMPLEMENTATION OF SMART METER FOR APPLIANCES CONTROL AND MONITORING SYSTEM
1PRATHIMA KUMARI ,2Mr. R. MALIKARJUN,3Dr. P. RAJA PRAKASHA RAO ,
Page No :2041-2048
MQTT BASED HOME AUTOMATION USING ESP8266
1PRATHIMA KUMARI ,2Mr. R. MALIKARJUN,3Dr. P. RAJA PRAKASHA RAO ,
Page No :2049-2056
SOLAR BASED ELECTRIC VEHICLE CHARGING CIRCUIT IN G2V, V2G MODES OF OPERATION
1Awaskar Sanket Pramod ,2Prof. L. V. Bagale ,
Page No :2057-2066
Linga Karunakar1 Chandan Kumar Shiva2 ,
Page No :2067-2073
CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage
Ms.A.SUNEETHA 1 , Mr. KUNCHAPU JOSHI 2 ,
Page No :2074-2081
Ms.A.SUNEETHA1 , Mr.RAVVALA VENKATESH2 ,
Page No :2082-2089
ATTACKING AND PROTECTING DATA PRIVACY IN EDGE-CLOUD COLLABORATIVE INFERENCE SYSTEMS
Ms.A.SUNEETHA 1 , Mr.P.LAKSHMI VARAPRASAD BABU2 ,
Page No :2090-2097
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
Mr. M venkatarathnam1 , Pushpalatha.yallala2 ,
Page No :2098-2112
INVESTIGATION INTO SECURITY CHALLENGES AND APPROACHES IN CLOUD COMPUTING
Ponnam Lalitha1, Dr.Rohita Yamaganti2 ,
Page No :2113-2133
Drug Traceability in Healthcare Supply Chain using block chain
1 SANKARARAO GANAPATI 2G. RAJASEKHARAM 3Ch. KODANDARAMU ,
Page No :2134-2145
Web Vulnerability Detection Using Machine Learning Approach with Cross-Site Request Forgery
1YEGIREDDI TEJASRI 2Dr. A. ARJUNA RAO 3Ch. KODANDARAMU ,
Page No :2146-2164
Object Type Clustering Using Markov DirectlyFollow Multigraph in Object-Centric Process Mining
1Dr. A. Avani,2 T. Bharat Krishna ,
Page No :2174-2185
Power Quality Improvement Utilizing Bound Together Power Quality Conditioner (UPQC)
B. Ramesh ,
Page No :2185-2192
S-Blocks:: Lightweight and Trusted Virtual Security Function With SGX
1 T. Bharat Krishna,2Dr. A. Avani ,
Page No :2193-2201
EMERGING HR TRENDS IN INDIAN IT SECTOR AT ZEST WINGS INFORMATICS PVT LTD
1. Dr. G. Hema,2. Ms. S. Rajani ,
Page No :2202-2209
Audio classification using Convolutional Neural Network
G.SUREKHA1 , MD.ZAHEER AHMED2 AND K.SPANDANA KUMARI3 ,
Page No :2231-2237
IMPLEMENTATION OF ADVANCED ERROR RECOGNITION AND AUTO CORRECTION IN SRAM BY USING TCAMS
Mr.R.VINAY KUMAR1 , Mrs. GUTTULA NALINI 2 ,
Page No :2238-2246
BUSINESS PROCESSES TRANSFORMATION IN BUILDING DIGITAL ECONOMY
1Dr Ajmal Hussain, 2Dr Shital Singh ,
Page No :2247-2259
ADVANCING SOCIAL MEDIA PLATFORMS THROUGH MACHINE LEARNING: A COMPREHENSIVE STUDY
Ramesh Polisetti1 , Mounika Nakrekanti2 ,
Page No :2265-2277
WIRELESS DC MOTOR SPEED AND DIRECTION CONTROL USING RF COMMUNICATION
1 ZAREENA BEGUM, 2 ALIGETI NAVEEN ,
Page No :861-866