 |
| |
 |
Previous Issue |
|
| Volume 15, Issue 4, October 2022 |
| Research and Review Articles |
S.No. |
Title & Author's Name |
Page |
| 1 |
ELECTORAL REFORMS IN INDIA: A ROLE OF JUDICIARY
Mr. Rakeshkumar,
[View] [Download PDF]
|
1-7 |
| 2 |
DYNAMIC HAND GESTURE RECOGNITION INCLUDING EFFICIENCY ANALYSIS
DR. KALPANA GUDIKANDULA , KVS. MADHURI , M. RAMYA , M. SRAVYA
[View] [Download PDF]
|
8-13 |
| 3 |
TRAFFIC FORECASTING FOR AN INTELLIGENT TRANSPORTATION SYSTEM USING ML
DR SMITHA CHOWDARY CHAPARALA1 , KOYA JAYASREE , KUMARAM SATHWIKA , NANDALA SANDHYA RANI
[View] [Download PDF]
|
14-20 |
| 4 |
WEAPON DETECTION USING ARTIFICIAL INTELLIGENCE AND DEEP LEARNING FOR SECURITY APPLICATIONS
PREETHI KULKARNI , M. MAANVI REDDY , M.MEGHANA
[View] [Download PDF]
|
21-25 |
| 5 |
DEVELOPMENT OF AN INTELLIGENT TRAFFIC CONTROL SYSTEM WITH BACKTRACKING
DR.L.MALLIGA , GEEKURU AKSHAYA , GOPATHI AKHILA , E. LAHARI
[View] [Download PDF]
|
26-35 |
| 6 |
ADVANCES RESERVATIONAND SMARTPARKING SYSTEM FOR SMART CITIES USING IOT NETWORK
DR.S.M.P.SAMY , K.MAHIRASAGNA , G.RAMYA , G.SHREYA
[View] [Download PDF]
|
36-41 |
| 7 |
A Low Power, 64-Bit, CVNS-Based Adder: Design and Implementation
Ms. BOBBARADA VIJAYALAKSHMI, Mrs K. KANTHI KINEERA, DR. P. S.N. MURTHY
[View] [Download PDF]
|
1-7 |
| 8 |
Performance of Unified Power Quality Conditioner in Presence of Sag, Swell and Harmonics in Supply Voltage
Dr.M.S.Priyadarshini
[View] [Download PDF]
|
1-9 |
| 9 |
Smart Door Lock Using Raspberry Pi and Face Recognition Technology
Mrs. Golla Suseela
[View] [Download PDF]
|
1-6 |
| 10 |
Implementation of a 16-Unit 2.0-ps Resolution Two-Step TDC with Pulse-Shrinking Fine Stage and Built-In Coarse Gain Calibration in 0.18-μm CMOS
Mrs.Kaparaboina Chaithanya
[View] [Download PDF]
|
7-12 |
| 11 |
An Integrated Photonic and Electronic Neuron with Codesigned Architecture
Mrs. Devasath Sarojabai
[View] [Download PDF]
|
13-20 |
| 12 |
Analysis and Design of Microstrip Patch Antennas in Wireless Communication Applications
Mrs.Sattineni Sarinikelani
[View] [Download PDF]
|
21-27 |
| 13 |
A Framework for Assessing User Credibility in Social Review Systems
Mr.Diddela Jagan Mohan, P.Madhavi
[View] [Download PDF]
|
28-33 |
| 14 |
Analyzing Data Poisoning Attacks in Federated Machine Learning Systems
Mr.Diddela Jagan Mohan, N.Charitha
[View] [Download PDF]
|
34-39 |
| 15 |
A Comprehensive Survey of Computer Forensics: Current Trends, Tools, Techniques, Challenges, and Future Directions
Mr.E.Srinivasa Rao, D.V.Dikshitha
[View] [Download PDF]
|
40-46 |
| 16 |
A Study on Forward Privacy Preservation for Secure IoT-Enabled Healthcare Environments
Mr.E.Srinivasa Rao, Ch.Pravallika
[View] [Download PDF]
|
47-52 |
| 17 |
Addressing the Spread of Fake News: Detection Techniques, Mitigation Strategies, and Open Research Challenges
Dr. A Naga Raju
[View] [Download PDF]
|
53-57 |
| 18 |
A Two-Fold Machine Learning Strategy for Detecting and Mitigating IoT Botnet Threats
Dr. Mythili Devi Reddy
[View] [Download PDF]
|
58-74 |
| 19 |
Detection of Sybil Attacks in VANETs Using Proof-of-Work and Location-Based Verification
Dr. L. Praveen Kumar
[View] [Download PDF]
|
75-81 |
|
|
|
|
 |
|
|
|