Deepfake Detection Using Deep Learning and Fast Text Embeddings
1 Vita Divya, 2 Dr. P.P. Sadhu Naik ,
Page No :1-5
IMPROVING RECRUITMENT OUTCOMES: THE EFFECTIVENESS OF MARUTHI MOTORS SELECTION PROCESS
1Mr. D. PRADEEP KUMAR, 2 REDDYMALLA SHESHANK ,
Page No :22-27
AXPPA: A POWER-EFFICIENT APPROACH TO APPROXIMATE PARALLEL PREFIX ADDERS
1VELPULA CHANDU, 2CH.ANIL KUMAR ,
Page No :28-37
A FRAME WORK FOR A CLOUD -BASED ELECTRONIC HEALTH RECORDS SYSTEM FOR DEVELOPING COUNTRIES
Dr.CH.V Phani krishna1 , Peddi Akhila Reddy 2 ,
Page No :38-44
1 D Neeraja, 2 V Bhavanisree ,
Page No :45-61
EXPERIMENTAL STUDIES ON THE MECHANICAL PROPERTIES OF LIGHT WEIGHT AGGREGATE CONCRETE
1 T Mohammad Shahill, 2 G Rajesh ,
Page No :62-74
1 M Naresh, 2B Fayaz ,
Page No :75-89
A SMART AI/ML FRAMEWORK FOR DYNAMIC ROUTING AND PROACTIVE MANAGEMENT IN NEXT-GENERATION 6G NETWORKS
G.Srilekha, C.H. Sri Lakshmi Prasanna ,
Page No :90-99
ADAPTIVE CLOUD RESOURCE MANAGEMENT IN SAAS: TACKLING VARIABILITY AND DEMAND UNCERTAINTY
1KAMSALI SUMANTH, 2DR. C. GULZAR ,
Page No :100-107
CONSISTENT INTERPRETATION OF ENSEMBLE CLASSIFIERS IN TROJAN HORSE DETECTION
1 VILLA VENKATA SATYANARAYANA, 2MANIKYAM HEMALATHA, 3NIKHITA CHEELA, 4BANTUMILLI MANOJ KUMAR, 5 KALAGARLA RAVI RAJU ,
Page No :108-115
FRONESIS DIGITAL FORENSICS – BASED EARLY DETECTION OF ONGOING CYBER - ATTACKS
1 SANKA SANKEERTH SUBBA RAO,2 KANDI BHARATH BALAJI,3 KADAMBALA SAIKIRAN, 4 TORAM CHANDU, 5 KALAGARLA RAVI RAJU ,
Page No :116-122
SOFTWARE VULNERABILITY DETECTION TOOL USING MACHINE LEARNING ALGORITHMS
1 D. Pujitha, 2 G. Mohan Krishna Prasad, 3 V. Manoj Kumar, 4 D. Lohit Kumar ,
Page No :123-132
KURUVA SIVA KESHAV1, CK.OMPRAKASH2 ,
Page No :133-138
COMPARATIVE ANALYSIS OF G+23 BUILDING WITH VARIOUS SLENDERNESS RATIOS BY USING ETABS SOFTWARE
SYED YASEEN PASHA1 , S.SEKHAR2 ,
Page No :139-145
INTRUSION DETECTION IN CLOUD COMPUTING BASED ON TIME SERIES ANOMALIES UTILIZING MACHINE LEARNING
MRS.P.SOWJANYA 1, G.PUSHPIKA2 , A.PAVAN KUMAR 3 , E.GOPINADH 4 , M.MANIKANTA5 ,
Page No :146-160
Dr. Ch. CHAKRADHARA RAO 1, M. YASHASWINI 2, K. APARNA 3 , G. KARTHIK4 , S. CHANDRA SEKHAR 5 ,
Page No :161-172
AI Powered Drone for Solar Panel Cleaning – A Review
1 Dr. M. T. Hasan, 2 Mr. Mohammad Yasir Zaheer Sheikh, 3 Mr. Mohammad Nomaan, 4 Mr. Abhishek Sawankar, 5 Mr. Tabish Ahmad Khan, 6 Mr. Rafe Quraishi ,
Page No :173-188
Optimizing the CA-YOLO Model for Remote Sensing Image Object Recognition
1SATHWIK SINGIREDDY 2MAYANK KALERU 3VARSHITH REDDY 4N. SWAPNA ,
Page No :189-200
TRUST-BASED PRIVACY-PRESERVING PHOTO SHARING IN ONLINE SOCIAL NETWORKS
Kuncham Ramya1, M. KUMAR REDDY2 ,DERANGULA VENUGOPAL3 ,GANDHAM VIGNESH4 ,GUDURI KUMAR5 ,MADDASANI LOKESH BABU6 ,
Page No :201-207
EFFICIENT CLOUD DATA MANAGEMENT USING ADAPTIVE DEDUPLICATION VERIFICATION PROTOCOL
Kuncham Ramya1, Muchumari Kowsalya2 , Mastik Vijaya Kumar3 , Parsapu Venkata Balu4 , Rongali Mohan5 , Thiruveedhula Sreenivasulu6 ,
Page No :208-218
OPTIMIZED RESOURCE ALLOCATION IN CLOUD-FOG ENVIRONMENTS USING LOAD EFFICIENT SCHEDULING
Kuncham Ramya1,BELLAMKONDA BABJI2 ,SHAIK MUDAM MAHMAD KASHIM3 ,TUMATI VINEETH4 , ULLI JAGADISH MANIKUMAR4 ,PASUPULETI DILEEP KUMAR5 ,
Page No :219-225
A Web-Based Cloud Storage Solution for Secure Cross-Platform Data Sharing
KUNCHAM RAMYA1, MALE MANOGNA2 ,VALLEPU DAYAKAR3 ,YERRAJONNA NAVEEN4 ,MORLA NAGA JAGADISH5 ,BADDRIPALLI GURU VIJAY6 ,
Page No :226-230
ENDANGERED BIRD SPECIES IDENTIFICATION USING CNN
1 P.Muneel, 2 P.Preetham, 3 S.Madhusudhan, 4 M.Uma Mahesh, 5 Dr.Rajkumar P,6 Dr.Antony Xavier Bronson ,
Page No :231-241