S.No | Title of The Paper | Page No | Download |
---|---|---|---|
1 | OPTIMIZING FIELD SERVICE MANAGEMENT WITH AI- POWERED VIRTUAL AGENTS AND REAL-TIME DATA INTEGRATION Author(s): Joshin Kumar Reddy Darreddy |
1-8 | ![]() |
2 | Integration of IoT in 2wheeler vehicle Author(s): B.Gnana Chandra sekhar, 2M.lalith kumar, 3M.Gayatri, N.Himakiran, S.Poorna Chandra rao, V.Chandra sekhar, |
9-18 | ![]() |
3 | Pedal Assist E-Bicycle with Motor Supply Cutoff System Author(s): K. S Ramanjaneyulu, A.Das, K.Jitendra, M.Bhanu, 5P.Gowthami, P.Radhika |
19-32 | ![]() |
4 | DEPLOYING HONEYPOTS FOR PROACTIVE THREAT MONITORING SOC'S Author(s): K.Jothsna, Mamidi Nithin Goud, Mada Balaji, Chinthakindi Bhanu, Vasa Varshith Kumar |
42-47 | ![]() |
5 | THREAT ACTORS PROFILING USING OPEN SOURCE INTELLIGENCE Author(s): K.Shwetha, Akshitha Shakkeri, Somidi Akshay, Vadithya Yogender, Telugu Venu Gopal |
48-65 | ![]() |
6 | AI-LEGAL ASSISTANT Author(s): B.Sndhya, Dubba Pallavi, Donipati Anusri, Mohammad Al Huraiz, Puligilla Yashwanth Rao |
66-80 | ![]() |
7 | CROP RECOMMENDATION Author(s): G.Uma Maheswari, Kammampaty Vamshi, Kambala Saiteja, Mettu Manichandan ,Valmiki Ganesh |
81-84 | ![]() |
8 | MULTILINGUAL LANGUAGE TRANSLATOR Author(s): K.Anjaneyulu, Jukanti Ruchitha, Goshika Manohar, Duvvuri Sainath, Bandi Akanksha |
85-96 | ![]() |
9 | Building A Soc Dashboard Using Splunk Author(s): K.SHWETHA, ARTHAM SANJANA, ADI NAVEEN, CHITTIPOLUSAINIKHIL, GANDAMALA RAVITEJA |
97-104 | ![]() |
10 | SPEED CONTROL OF INDUCTION MOTOR USING FUZZY LOGIC APPROACH Author(s): Mr.R.Naresh, N. Shiva Ram, S. Sowmya, P. Shivanjaneya, G. Praveen Reddy |
33-41 | ![]() |
11 | DESIGNANDANALYSISOFPOPPETVALVEUSING COMPOSITE MATERIAL Author(s): K.Arun, V.Govind, K.Shruthi, K.Dhanush, Ms.B.Shuthi, |
105-112 | ![]() |
12 | Enhanced Android Malware Detection using Optimized Ensemble Learning Author(s): Vaddikasulu kasani, Mahalakshmi Potluri, Naga Thanusha Thota, Kowshik Gedela, Mahesh Banne |
113-118 | ![]() |
13 | ENHANCED STOCK PRICE PREDICTION USING INVESTOR SENTIMENT AND MACHINE LEARNING Author(s): GUIDE : B. ROJA SRI ,K. TEJASWI, M. JITHIN VIJAY SAI, L. AKANKSHA, B. PAVAN KUMAR |
119-123 | ![]() |
14 | CANCER AI Author(s): A.Rayudu, B.Ashwini, B.Asritha, A.Umashankar, Mrs.Kalpana, |
124-131 | ![]() |
15 | FOOD TECH BLOCK CHAIN USING PYTHON Author(s): A.Pavan Kumar Reddy, B. Ganesh, A. Santhosh, B. Mukesh, B. DEEPIKA RATHOD |
132-138 | ![]() |
16 | HOSPITAL MANAGEMENT SYSTEM WITH CHATBOT Author(s): N.Niveditha, M.Tharun, M.Bhaskar, M.Akhil, N.Srikanth, |
139-154 | ![]() |
17 | AEROGUIDE: STAGE-2 Author(s): JANARDHAN PAVAN, KASHA SAI SHRUJAN, KARVA NAGESH, GOUNI SAI TEJA, Mr. E. Parusha Ramu, |
155-162 | ![]() |
18 | Human Activity Recognition usin python and data analysis Author(s): k.venkata rama krishna goud, J.Aravinda chary, k.venkatesh, J.Bharath, sk.nageena, |
163-169 | ![]() |
19 | The Influence of AI on E-governance & Cyber security Author(s): E.Sriyatha, D.Sai Kumar, G.Anusha, E.Pavan Kumar, Mrs. Palle Swetha |
170-183 | ![]() |
20 | DEEP FAKE IMAGES AND VIDEOS DETECTION USING DEEP LEARNING TECHNIQUES Author(s): M.Harshavardhan, N.Madhu, M.Chanikya, M. Sai Hrushikesh, Mrs. Sandhya Rani, |
184-195 | ![]() |
21 | Hospital Management System with Chatbot Author(s): NAAREDDY Niveditha, M. Tharun, M. Bhaskar, M. Akhil, SK. Nageena, |
196-212 | ![]() |
22 | Object Detection Using CNN Author(s): N. Ramesh, P. Rakshitha Reddy, K. Mahesh, L. Vishnu, Dr. Lakshmaiah, |
213-218 | ![]() |
23 | A DEEP LEARNING-BASED APPROACH FOR INAPPROPRIATE CONTENT DETECTION AND CLASSIFICATION OF YOUTUBE VIDEOS Author(s): Dr. MD. ASHFAKUL HASAN, ROSHINI SINGH, S SANJANA, SUBHADIP MUDI, SIMRAN SINGH |
219-220 | ![]() |
24 | A ROAD ACCIDENT PREDICTION MODEL USING DATA MINING TECHNIQUES Author(s): SHANBHAGAM, RAI DIVYASRI, SHAMANTHULA VISHAL, SHIVAGOUNI KALYANI, VERASANI LAVANYA |
221-231 | ![]() |
25 | CHILD MORTALITY PREDICTION USING MACHINE LEARNING TECHNIQUES Author(s): T SATHISH, PAIDI RISHIKA, A LALITH ADITYA, Y.MANIDEEP REDDY, T.VENKATESWARLU |
232-239 | ![]() |
26 | DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform Author(s): T SATHISH, R.SHARATH CHANDRA, S. LIKITH SAINADH, V. ASHWANTH REDDY, VEERAMALLI UDAY SAI |
240-247 | ![]() |
27 | DETECTION OF CYBERBULLYING ON SOCIAL MEDIA USING MACHINE LEARNING Author(s): Dr.SASI KUMAR, R. RAJU SAI KEERTHI, SAMA ANITH REDDY, SHIVARLA LAASHYA, YADAMA DEEPAK REDDY |
248-255 | ![]() |
28 | DISCOVER CUSTOMERS’ GENDER FROM ONLINE SHOPPING BEHAVIOR Author(s): V VIVEKANANDHAN1, RACHURI AKHIL, RAPOLU JAYANTH, VANNAWADA ROHITH, JAKKULA VARSHA, N.NITHISH RAO |
256-262 | ![]() |
29 | ILLEGAL FISHING DETECTION Author(s): PROF. SURESH BALLALA, N. SREEJA, JPREM SAI, M SHIVA PRASAD, Y SRAVAN |
263-271 | ![]() |
30 | IRIS RECOGNITION USING ML TECHNIQUES Author(s): M. NARESH, J RAJU, CH AJAY, D MAHESH, S UDAY KUMAR |
272-281 | ![]() |
31 | SOCIAL MOOD MATRIX Author(s): DR. MAHESH, U. HARSHITHA, D SRUTHI, P. ABHIVARDHAN REDDY, J CHAITANYA |
282-292 | ![]() |
32 | SECURE THE DATA WITH AI & BC Author(s): A. THARUN KUMAR, CH. RAKESH, K. SHIVAJI, K. RAJITH, M.SHARADHA |
293-311 | ![]() |
33 | A Forest Fire Identification Method For Unmanned Aerial Vehicle Monitoring Video Images Author(s): J. YESHWANTH, TIRTH PATEL, CH. SHIVAMANI, B. RITESH, C.MADHUSUDANAMMA |
312-316 | ![]() |
34 | Fake Product Review Monitoring System Author(s): A.PRANAY KUMAR, S. SAMRUTH, A. ADITHYA REDDY, M. SAI GNANESHWAR, M. SAI GNANESHWAR, |
317-321 | ![]() |
35 | MISSING CHILD IDENTIFICATION USING DEEP LEARING AND MULTICLASS SVM Author(s): Mr.S.Narsimulu, Martha Kavya, Elagandula Vignasree, Banda Sathwik Reddy, 5Banaka Kalyan Reddy |
322-343 | ![]() |
36 | Towards Detection and Attribution of Cyber- Attacks in IOT- Enabled Cyber - Physical Systems Author(s): Ms.CH.SANDHYA, BATHULA VEEKSHITHA, BUYYA DINESH GOUD, GUNDRATHI THANUJA, BHUSHANI SAKETH REDDY |
344-353 | ![]() |
37 | You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems Author(s): MR. M. RAJ KUMAR, EDULAKANTI ANIL, RAMAGIRI VARSHA, ROHAN REDDY DOPATHI, VOORADI SRINATH |
354-373 | ![]() |
38 | UGC-CARE Journal Article: Influence of Mother Tongue in Teaching English in Konthapoda Block, Cuttack, Odisha Author(s): Mr. Susanta Sahu, Mrs. Jhili Patro |
374-378 | ![]() |
39 | SDN-NFV Based IoT Architecture for Efficient Network Management Author(s): Kranti Kumar Appari |
379-391 | ![]() |
40 | SECURE AND SCALABLE INTRUSION DETECTION USING AI AND POST- QUANTUM CRYPTOGRAPHY Author(s): D.PAULRAJ |
392-404 | ![]() |
Home
About Us
Editorial Board
Authors
Topics
Current Issue
October 2023
Impact Factor
Indexing
FAQ
Policies
Contact Us
Copyright © 2021 IJMRSET All Rights Reserved