Published: 2023-07-08

Effect of Dynamic Wind Load on Tall Structure Using Gust Factor Method

AMIT K MALI, Vishalkumar B. Patel, Atul N. Desai

1289-1308

REAL TIME FACE MASK DETECTION SYSTEM FOR COVID 19 APPLICANTS

Sumaiya Samreen, Ch. Arpana, D. Spandana, D. Sheetal, D. Sandhya

1- 14

Natural Language Processing-based Random Forest Classifier for Fake and Genuine Tweet Detection with Polarity Score

Smita Khond, B. Sai Sruthi, A. Manisha Kumari, B. Vaishnavi, Ch. Chandana Priya

15- 25

EMOTION DETECTION MODEL -BASED MUSIC RECOMMENDATION SYSTEM

C. Rashmi, A. Akshaya, B. Sruthi, B. Lavanya, A. Lohitha

26- 33

K-NEAREST NEIGHBOUR CLASSIFIER FOR URL-BASED PHISHING DETECTION MECHANISM

Subba Reddy Borra, B Gayathri, B Rekha, B Akshitha, B. Hafeeza

34- 40

VitaSi: A Real-Time Contactless Vital Signs Estimation System

B. Durga Bhavani, A. Geethika, B. Lakshmi, G. Rakshitha, Ch. Swathi

41- 52

ARTIFICIAL NEURAL NETWORKS FOR FAKE ACCOUNT DETECTION FROM SOCIAL MEDIA

Sumaiya Samreen, A. Joshna, B. Neelima, Ch. Varsha, G. Nikitha

53-64

Machine Learning Algorithms-based Prediction of Botnet Attack for IoT devices

Subba Reddy Borra, Akshaya, B. Swathi, B. Sraveena, B. Satya Sahithi

65- 78

COMPUTER VISION APPLICATION: VEHICLE COUNTING AND CLASSIFICATION SYSTEM FROM REAL TIME VIDEOS

D. Shine Rajesh, T. Vaibhavi, T. Sreeja, V. Gayathri, Sitala Srivalli

79- 89

NLP-based Supervised Learning Algorithm for Cyber Insurance Policy Pattern Prediction

B. Subba Reddy, V. Bhargavi., S. Samhitha, Y. Anjana, V. Saivaishnavi

90- 99

Supervised and Semi-Supervised Text Mining Models for Hotel Reviews Analysis

C. Rashmi, N. Nikhitha, N. Harshitha, N. Sankeerthana, T. Sai Poojitha

100- 114

DETECTION OF IP MASKING USING WHOIS

K. Kumara Swamy, Shivani Teakumalla, Deekshitha Vemula, Shreya Reddy Patil, Palli Deepika

115- 124

STOCHASTIC GRADIENT BOOSTING MODEL-BASED CONTENT ANALYSIS IN ONLINE SOCIAL MEDIA

N. Baby Rani, Sathvika R, Shravani K, N. Bhavani, P. Soumya

125- 135

NOVEL CRIME SCENE INVESTIGATION ACTION TO CONCENTRATE CLIENT ACTION FROM CELL PHONES

K. Jaya Rajan, M. Srinija Reddy, N. Deekshana, P. Samshritha, M. Srija

136- 144

COST SENSITIVE PAYEMENT FRAUD DETECTION BASED ON DYNAMIC RANDOM FOREST AND KNN

K. Ramya Sri, N. Chandrika, M. Sridevi, P. Thanmay Sree, P. Divya

145- 159

IMAGE PIXEL BASED GRAPHICAL PASSWORD AUTHENTICATION

Geetha Prathibha, O. Sri Harshitha, P. Likitha, P. S. Mani Deepthi, P. Likitha Sai

160- 170

CHILD EMOTION DETECTION THROUGH FACIAL EXPRESSION RECOGNITION USING MACHINE LEARNING

S. Venkata Ramana, Ayesha Begum, P. Sindhu, M. Hepsheeba, M. Chandana

171- 177

SENTIMENT ANALYSIS OF CUSTOMER PRODUCT REVIEWS USING MACHINE LEARNING

M V Keerthi, O. Chandana, P. Anjali, P. Revathi

178- 188

SAFEGUARDING AGAINST COUNTERFEITS WITH BLOCKCHAIN BASED QR CODE

G. Bhanu Prasad, P. Shreya, P. Shailaja, M. Akhila, P. Sravani

189- 196

DYNAMIC NETWORK LINK PREDICTION THROUGH INFORMATION PROPAGATION

B.V.S.P Pavan Kumar, M. Sai Thanmai, M. Nandini, M. Ashwini, K. Soujanya

197- 208

Applications of Fermat’s Little Theorem

Noormal Samandari , Nazar Mohammad Nazari , Janat Akbar Olfat , Rafiullah Rafi , Ziaulhaq Azizi, Wali Imam Ulfat, Ikramullah waqar, Mansoor Zahirzai , Mohammad Jawad Niazi

209-215

Find out the innovative techniques of data sharing using cryptography by systematic literature review

Anik Sen , Rasel Ahmed , Samiha Hossain , Sazzad Hossain Tasnim , Tanvir Ahmed

216-224

AN IMPROVED SPEAKER VERIFICATION SYSTEM FOR ROBOTIC APPLICATIONS

Abdul Rahim, Kommera Shravya, Konda Reddy Lakshmi Prasanna, Kuthala Kavya, Komuravelli Varsha

225-234

VISIBLE VIDEO WATERMARKING USING ADAPTIVE TRANSFORMATION TECHNIQUE

T S Ghouse Basha, Konatham Harini, Mandadapu Jhansi Lakshmi, Neeli Akhila, Nelakurthi Utheja

235-249

AN IMPROVED SPEAKER VERIFICATION SYSTEM FOR ROBOTIC APPLICATIONS

Abdul Rahim, Kommera Shravya, Konda Reddy Lakshmi Prasanna, Kuthala Kavya, Komuravelli Varsha

225- 234

VISIBLE VIDEO WATERMARKING USING ADAPTIVE TRANSFORMATION TECHNIQUE

T S Ghouse Basha, Konatham Harini, Mandadapu Jhansi Lakshmi, Neeli Akhila, Nelakurthi Utheja

235- 249

Design And Implementation of a Digital Secure Code-Shifted Reference UWB Transmitter and Receiver

Baburao Silumula, Miriyam Nanditha, Koudadarla Vandana, Kunchala Raja Nikhitha, Lokani Bhanusree

250- 259

A NOVEL DESIGN OF FLIPFLOP CIRCUITS USING QUANTUM DOT CELLULAR AUTOMATA

Harish Kumar Gopadi, Kurelli Shivani, Mamatha Dugyala, Pamera Nikitha, Manchukonda Nandini

260- 269

Design of Practical Parity Generator and Parity Checker Circuits In QCA

K. Raghavendra, Nalla Sarika, Nagandla Deepthi, Muppidi Vahini

270- 280

Chip Design for Turbo Encoder Module for In-Vehicle System

Srikanth Sirimalle, Muchinthala Divya, Nalla Keerthi Priya, Luxetti Akshaya, Palda Srija

281- 289

Random Forest Classifier for the Detection of IoT Botnet Attacks from Data of Provision PT 37E Security Camera

Putta. Srivani, Ch. Vandana, P. Vinusha, S. Sathvika, A. Manimanognya

290- 301

Machine Learning Algorithms-based Prediction of Botnet Attack for IoT devices

L. C. Usha Maheswari, P. Sruthi, Ch. Hamsini, G. Keerthika, M. Sreeja

302- 314

MACHINE LEARNING APPROACH FOR FAKE JOB AD PREDICTION

Putta. Srivani, Syeda Sufiya Rana, Dereddy Tejeswani, K. Noor E Afshan, Chukka Sathvika

315- 331

ARTIFICIAL NEURAL NETWORKS FOR FAKE ACCOUNT DETECTION FROM SOCIAL MEDIA

Sanjeevini S. H, T. Shreya Maadhury, P. Lahari, G. Tejaswini, G. Haripriya

332- 343

CYBER ATTACK DETECTION USING MACHINE LEARNING

C. Gazala Akhtar, N. Sri Harika, K. Pallavi, P. Akhila, T. Srinaina

344- 348

Enhancing Credit Card Fraud Detection using Neural Networks and Adversarial Training

Dharavath Sai Kiran, Mittapelly Luckydhar, Shalini Priya Bairy, Roopa Chandrika R

349-355

Loan Approval Prediction using Adversarial Training and Data Science

Dharavath Sai Kiran, Avula Dheeraj Reddy, Suneetha Vazarla, Dileep P

356-360

Data And Knowledge Driven Named Entity Recognition for Cyber Security

Sanjeevini S. H, B. Mrudulanjali, T. Pavani , V. Sowmya, T. Shivani

361- 367

Detection Of Malicious Social Bots in social media

Sanjeevini S. H, L. Savithri, E. Maha Lakshmi, M. Amulya, P. Sanjana

368- 377

Examining Login URLS to Identify Phishing Threats

M. Sravan Kumar Babu, A. Chandana, A. Anusha, K. Harika, P. Jhansi

378- 383

A Comprehensive Analysis of Machine Learning Approaches for Fake News Detection and Its Effects

MD. Nazmul Hossain , Sadi Al Huda , Samiha Hossain, Anika Saba Ibte Sum, Nafiz Fahad , Anik Sen

384-391

IoT-BASED SYSTEM FOR MONITORING WATER QUALITY

Kaveti Sudheer, Dr .Seelam Koteswararao, Dr.M.Paul Daniel, Daggubati Sunil

428-433

AN ENERGY EFFICIENT SYSTEM FOR WIRELESS SENSOR NETWORKS

Dr.M.Paul Daniel, Dr.P.Sreenivasulu,Dr Seelam Koteswararao,Daggubati Sunil

434-440

Fractional Order Differential Equation In Banach Algebra

Uttara V. Deshmukh Dr.Gajanan C.Lomte

441-453

Mappable Nearly Orthogonal Arrays Using Projective Geometry

POONAM SINGH, MUKTA D. MAZUMDER, SANTOSH BABU

454-464

A Multi-layer Security Scheme (MLSS) for Digital Images Contents

Faraj Ali Faraj Alyaqobi, Nor Adnan Yahaya

465-479

ANALYZE THE GROWTH RATE OF A PREY-PREDATOR SYSTEM WITH SIMULATION USING MATLAB

Mehenaz Aktar Mimi, Md. Eaqub Ali, Kanak Chandra Roy, Shuvo sarker, Rezaul Karim, Pinakee Dey

480- 497

DESIGN AN INTERACTIVE ATMS CABIN FOR HELPING BLIND PEOPLE, BY USING SPECIAL EQUIPMENT AND USER INTERFACES.

ALI NAZAR MAJEED ALAMERY, ALI HUSSEIN MOHAMMED , ALAA NAJI DAKHAL ALHUSSEIN

498-504

Polynomial-Exponential Mixture of Poisson distribution

Binod Kumar Sah, Suresh Kumar Sahani

505-516

Ensemble learning: A review

Maha A. Alellah Mohammad

517-523

Dynamics of the polynomial differential systems

Feneniche Fatima, Rezaoui Med Salem

524-535

Emerging Technology: Cloud Computing for Enhanced Resource Accessibility - A Review

N.B.S Vijay Kumar, Dr.M Paul Daniel, K.John Paul,Daggubati Sunil

536-541

Daily Consumption of Salt and their Effects on Health

Nasratullah Mahboob, Rohullah Hanif ,Waliimam Ulfat

548-555

Cauchy-Schwartz's inequality and its application in telecommunication systems

Noormal Samandari , Rafiullah Rafi ,Janat Akbar Olfat, Nazar Mohammad

568-574

Implication of Data Mining in Healthcare Field

Suzan Katamoura, Layla Hajr, Ahmad Alhamed

575-597

PREDICTION OF AIR POLLUTION USING MACHINE LEARNING

Revathy P ,Venu M , Naveen Kumar Ch

630- 635

Using Machine Learning Approaches to precisely Predict RainFall

Chinta Gouri Sainath P , Anvesh Kumar A , Naveen Kumar A

636- 641

DESIGNING SECURE AND EFFICIENT BIOMETRIC - BASED SECURE ACCESS MECHANISM FOR CLOUD SERVICES ML

K.KUMAR SWAMY, SANKURI NAGA LIKHITHA, P.V.SRI KEERTHI, PADIGALWAR NANDINI, VASIREDDY SRINIDHI

667- 671

EMAIL SPAM DETECTION USING MACHINE LEARNING

AYUB BAIG, R.SREEJA, P.LIKITHA, R.MANASA

677- 683

FAKE DETECT: A DEEP LEARNING ENSEMBLE MODEL FOR FAKE NEWS DETECTION (ML)

C.RASHMI, V.BHARGAVI., S.SAMHITHA, Y.ANJANA, V.SAIVAISHNAVI

684-688

FAKE PROFILE IDENTIFICATION IN SOCIAL NETWORK USING MACHINE LEARNING AND NLP

Dr. K.SMITA, N.HARIKA, N.ADVAITHA, O.LAKSHMI KALYANI, T.KRUTHIKA

689-699

INTELLIGENT AGENT BASED JOB SEARCH SYSTEM

V.ARUNKUMAR, S.NAVYA, Y.NAVYA, N.SRI HARIKA

700- 708

A NOVEL AI-POWERED SYSTEM QUANTIFIES SUICIDE INDICATORS AND IDENTIFIES SUICIDE-RELATED CONTENT IN ONLINE POSTS

Dr.BABY MUNIRATHINAM,G.Sai Pranaya, K.Dakshayani, D.Tejaswini, E.Lavanya

709- 712

A NEW ANOMALY ACTIVITY DETECTION USING CNN & RNN

Mr.BHANU PRASAD GORANTLA G.DEEPTHI, G.VIJAYA LAXMI, G.RAJASREE,G.AKSHAYA REDDY

713- 721

A NEW ARTIFICIAL INTELLIGENCE MODEL FOR AIR QUALITY PREDICTION AND ANALYSIS

Ms.VALAPALA PRABHAVATHI G.SAHITHI,G.AKHILA, K.SAHASRA,G.MANUSHA

722- 727

A NEW STRATEGIC APPROACH TO SEARCH ADVERTISING RECOGNITION THROUGH FEATURE ENGINEERING

Ms.HIMA BINDU B, D.KHYATHI REDDY, G.SHRAVANI, B.HYMAVATHI , K.SWATHI

728- 733

A NEW ALERT SYSTEM FOR DETECTING DRIVER FATIGUE AND RINGING ALARM

Dr.KUNDUNURI RAMAKRISHNA G.VASAVI CHOWDARY , K.RISHITHA ,K.V SOWMYA ,K.SAI SWETHA

734- 740

A NEW RESILIENT SMART MALWARE DETECTION USING DEEP LEARNING

Dr.SWAROOPA RANI DEVIKA PARAMESWARI, FARAH TAZEEN, E.HARSHITHA, P. G.MANEESHA

741- 751

A NOVEL COGNITIVE AGENT SYSTEM TO RETRIEVE RELEVANT CODE COMPONENTS FROM A REPOSITORY

Dr. K. JAYA RAJAN M.SRINIJA REDDY, P.SAMSHRITHA,N.DEEKSHANA,M.SREEJA

752- 756

A NEW SECURE BLOCK-CHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS

K. RAMYA SRI, N.CHANDRIKA, M.SRIDEVI, P.THANMAY SREE, P.DIVY

757- 764

A NOVEL QR-CODE GENERATOR FOR ANY TYPE OF REAL TIME WEBSITES

Mrs. GEETHA PRATHIBA, P.LIKITHA SAI,P.LIKHITHA,O.SRI HARSHITHA,P.S.MANI DEEPTHI

765- 771

A NEW DJANGO WEB FRAMEWORK SOFTWARE METRICS MEASUREMENT USING RADON AND PYLINT

Dr.J.RAJA RAM, MD.AYESHA FATHIMA BEGUM, P.SINDHU, M.CHANDANA, M.HEBSHEEBA

772- 779

A NEW IDENTIFYING POTENTIALLY UNUSUSAL FILE TRANSFERS OR DUPLICATION’S IN CLOUD ENVIRONMENTS

Dr.BASKAR NANJAPPAN, N.CHANDRIKA, M.SRIDEVI, P.THANMAY SREE, P.DIVYA

780- 786

A NOVEL CRYPTOCURRENCY PRICE ANALYSIS WITH ARTIFICIAL INTELLIGENCE

Mrs. G.ANITHA P. SHREYA, P. SHAILAJA, M. AKHILA, P. SRAVANI

787- 792

Differences of high-school sophomores’ performance when solving non-authentic tasks and their authentic versions

David Nexticapan-Cortés, Estela Juárez-Ruiz, José Antonio Juárez-López

793-805

An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning

Dr.Putta.Srivani, Syeda Sufiya Rana, Dereddy Tejeswani, K.Noor E Afshan, Chukka Sathvika

806-816

A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY

T.Sasi Vardhan, B. Vyshnavi, G.Lahari, V.S.S.N.Akhila, Y.Shravya

817-827

A DATA ANALATICS APPROACH TO THE CYBER CRIME UNDERGROUND ECONOMY

M.Sravan Kumar Babu, A.Chandana, A.Anusha, K.Harika, P.Jhansi

828- 833

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

L.C.Usha Maheswari, G. Srivalli, G . Shivani, G. Sai Nikitha, K.Kaveri

834- 845

Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

C.Gazala Akhtar, B. Srija, D. Sneha, D. Deekshitha, T. Bhavana

846- 856

Detecting Sybil Attacks using Proofs of Work and Location in VANETs

Sanjeevini S.H, L.Savithri, E.Maha Lakshmi, M.Amulya, P Sanjana

857- 868

Analytical Approach for Future Blockchain Forensic Investigation of Bitcoin Transaction Network

Sumaiya. Samreen, B.Sai Sruthi, A.Manisha Kumari, B.Vaishnavi, CH. Chandana Priya

869-875

Real-Time CCTV Video Analysis: Deep Learning for Weapon Detection

Subba Reddy Borra, B. Nikitha, B. Anjali, A. Sirichandana, D. Harshitha

876- 882

AI-Powered System Quantifies Suicide Indicators and Identifies Suicide-Related Content in Online Posts

P.Devendar babu, D. Pranathi, D. Pravalika, E. Supraja, G. Harika

889- 897

DEEP LEARNING-BASED LOW LIGHT IMAGE ENHANCEMENT FOR IMPROVED VISIBILITY

N.Baby rani, A. Joshna, B. Neelima, Ch. Varsha, G. Nikitha

898- 903

Network Traffic Analysis for IoT Device Identification and Classification Using ML

J. David Livingston, B. Samyuktha, B. Aishwarya, CH.Hima Bindhu, D.Sneha

911- 918

UNDERWATER IMAGE ENHANCEMENT THROUGH DEHAZING AND COLOR CORRECTION TECHNIQUES

K.Kumar swamy, A.Srirupa, Ch.Kavya , B.Sravya,Ch. Varshini

919-925

Unveiling The Power of Extreme Learning Machine: Combatting Spam and Identifying Fake Users on Twitter

Subba Reddy Borra, K. Ritwika, G. Srujana, G. Jyothirmai, K. Lahari

926-931

Fuel Net: Artificial Intelligence Tool for Fuel Consumption Prediction in Heavy Vehicles

M.PREMCHENDER, K.POOJA BHAVANI, KOYINNI RAJITHA, K.PRATHYUSHA, M.VAISHNAVI

932-938

A BLOCKCHAIN BASED SECURE AND EFFICIENT VALIDATION SYSTEM FOR DIGITAL CERTIFICATES

C.RASHMI, G. ARCHANA, K. RASHMIKA, K. SPANDANA, CH. MANASA

939-946

People Counting System Based on Head Detection using Faster RCNN from Both Images and Videos

N. BABY RANI, J.LAVANYA , K. SATHWIKA, M.LIKHITHA, N. SOWJANYA

947-954

Machine Learning Models for Prediction and Forecasting of CO2 Emission with Exploratory Data Analysis

B. DURGA BHAVANI, K. SREEJA, M. SAI PRASANNA, M. TAPASYA, M. PRIYANKA

955-962

Machine Learning Model for Message Queuing Telemetry Transport Data Analytics

B. HARITHA LAKSHMI, M. NAVYASRI, M. PRASANNA, M. MANASA

963-970

MACHINE LEARNING MODEL FOR AUTISM PREDICTION IN TODDLERS

M. SYAMALA SAI SREE, G SANJANA, SEJAL KADAM, K NANDHINI, M. VAISHNAVI

971-977

Rice Blast Disease Prediction Using Integrated SMOTE With Multilayer Perceptron

V.ARUN KUMAR, L. PRIYANKA, M. PRANATHI, M. SHIVANI, K. VAHINI

985-992

Machine Learning for IoT Security: Random Forest Model for DDoS Attack Detection

Peram Prashanthi, Macha Mahipal Reddy, Appalaneni Lavanya

1029- 1038

Optimizing Crop Forecasts: Leveraging Feature Selection and Ensemble Methods

Jahnavi Reddy G, Sunkavalli Satwika Devi, Shreeya Dheera Parvatham, Koyyalamudi Susrutha Vishal, Sanjana chowdary M

1062-1071

Intrusion Detection System Using Feature Selection and Machine Learning Techniques

NANDINI DEVI, Rashmi Saini, Balwinder Singh Dhaliwal

1072-1184

Enhancing DDoS Attack Detection Using Machine Learning: A Framework with Feature Selection and Comparative Analysis of Algorithms

Rifat Al Mamun Rudro, MD. FARUK ABDULLAH AL SOHAN, Syma Kamal Chaity, Rubina Islam Reya

1185-1192

PREDICTION APPROACH AGAINST DDOS ATTACK BASED ON MACHINE LEARNING MULTICLASSFIER

K Venkatesh, K. Gouri, Laxmi Prasanna, M. Tejaswini, M. Pranavi

1201-1205

DRIVER DROWSINESS MONITORING SYSTEM USING MACHINE LEARNING

DR S PRADEEP, G. JESHWITHA, K. AKANKSHA, G. SAMATHA, T. AKSHAYA

1206-1210

VERIFICATION AND VALIDATION OF CERTIFICATE USING BLOCKCHAIN

M CHANDRA RAO, D. DIVYA SRI, M. SUMANA SRI, M. SAMHITHA, SHREEYA KRISHNA

1211-1216

A MULTI-RIVULET FEATURE SYNTHESIS TACTIC FOR TRAFFIC PREDICTION

Shiva Bhavani k, M. Bhanu, S. Akshitha, P. Swejal, Ch . Divya

1217-1225

IoT Based Single Identification Database Model For Under Development Countries

Syma Kamal Chaity, Md. Estiak Ahmed, MD. Tanzin-Ul-Islam, Samira Sobhan, Shahrin Chowdhury

1226-1231

IMPLEMENTATION OF COST-EFFECTIVE SELF-HEALING APPROACH FOR RELIABLE HARDWARE SYSTEMS

G. Harish Kumar, Mamatha. D, K. Shivani, Nikitha, M. Nandini

1241-1246

LIVER CANCER DETECTION USING MACHINE LEARNING

RAGHAVENDRA, M. VAHINI, N. DEEPTHI, N. SARIKA, P. ABHISRI

1247-1251

DEEP LEARNING METHOD FOR INTRUSION DETECTION IN NETWORK SECURITY

Dr. L. Malliga, T. Sharanya, V. Chandrika, S. Tejashwini, T. Sarala Devi

1252-1258

FACE RECOGNITION BASED SMART ATTENDANCE SYSTEM USING MACHINE LEARNING

DR. S. RAJ KUMAR, P. DHARANI, P. LALITHA SRIJA, R. SNIGDHA, S. LEENA SREE

1259-1263

A Classification and Regression Tree Analysis for Prediction of Surgical Patient Lengths of Stay

K. Umarani, G. Ramakrishna, G. Vinod Reddy, N. Akshay, Manda Varshitha

1329-1341

The Role of Social Media In Promoting The Safety Of Women in Indian Cities

Dr. A. Yashwanth Reddy, Boddu Nikhitha, Bachu Manideep, Alla Vivek, Landeri Akshay

1342-1351

DL BASED IOT ENERGY AUDIT ANALYTICS FOR DETECTING AND IDENTIFYING CYBER-PHYSICAL ATTACKS

J Prashanthi , M. Pravalika, B. Savitha, Ch. Manikanta, M. Balraj, M. Haritha

1352-1361

Deep CNN Model for Condition Monitoring of Road Traffic: An Application Of Computer Vision

Dr. P. Hasitha Reddy, M. Manjunath, M. Rohith, N. Manohar Reddy, A. Satyanarayana

1362-1370

Beyond the Breach: Building Trust through Integrated Security and Customer Relationship Management

Sukender Reddy Mallreddy, Laxmi Sarat Chandra Nunnagupala, Jaipal Reddy Padamati

1371-1377

Some Theorems on Multiplicative Metric Spaces

Priyanka Rani, Dr G. V. V. Jagannadha Rao

1378-1387