Volume 8, Issue 09, September 2022 |
S.No. |
Title of Paper |
PageNo. |
Download
PDF |
1. |
Location Tracking Web Application Using Machine Learning
Authors: Priti Mishra and Poonam Bhogale
DOI: https://doi.org/10.46501/IJMTST0809001 |
01-06 |
|
2. |
Applications of Shape Memory Alloys in Structural Engineering
Authors: Ethesham Mohiuddin and Tarun Raj Goske
DOI: https://doi.org/10.46501/IJMTST0809002 |
07-11 |
|
3. |
Thermal stress in Concrete Bridge
Authors: Yunesh Bhagat and Shaik Faraaz Ahmed
DOI: https://doi.org/10.46501/IJMTST0809003 |
12-20 |
|
4. |
Study on Strength and Durability of Concrete Made of Natural Fibers
Authors: Gouti Vamshi, Rapolu Nishith Sai, B. Sai Charan Reddy, Bhukya Srikanth
DOI: https://doi.org/10.46501/IJMTST0809004 |
21-32 |
|
5. |
Design Analysis and Development of a Micro Gas Turbine Components
Authors: Pasupuleti.Hari Krishna and K. Chandra Sekhar
DOI: https://doi.org/10.46501/IJMTST0809005 |
33-41 |
|
6. |
Fake Review Detection
Authors: Mithil Baria and Swati Mali
DOI: https://doi.org/10.46501/IJMTST0809006 |
42-48 |
|
7. |
Review on Smart Shopping Carts using RFIDs, AI and IoT
Authors: V Arun, S N Vedhika, Bavanika M and Shreemadhi B
DOI: https://doi.org/10.46501/IJMTST0809007 |
49-51 |
|
8. |
Incurring of Cloud Data with Attribute Based Access Control in Decentralized Clouds
Authors: GeethaBhavani P and Antharaju K Chakravarthy
DOI: https://doi.org/10.46501/IJMTST0809008 |
52-56 |
|
9. |
Effect of Mahamritunjay Japa and So-Hum Meditation on Inferiority complex among Adolescents of BPL families
Authors: Prerna
DOI: https://doi.org/10.46501/IJMTST0809009 |
57-62 |
|
10. |
Multi-Dimensional Characterizations of Fine-Grained Features for Identifying Fake Reviews
Authors: A S S Supriya, Dr. K. V Ramana and K. Ravi Kiran
DOI: https://doi.org/10.46501/IJMTST0809010 |
63-67 |
|
11. |
PAPER WITHDRAWN |
68-73 |
|
12. |
An Efficient Prototype for Credit card Fraud Detection using Machine Learning
Authors: Divya C, Harshitha K and Harshitha D J
DOI: https://doi.org/10.46501/IJMTST0809012 |
74-79 |
|
13. |
Deep Learning Based Detection Method for Enhanced Cyber Threat Detection
Authors: Dr.D.J.Samatha Naidu and N.Moulish
DOI: https://doi.org/10.46501/IJMTST0809013 |
80-82 |
|
14. |
Traffic Sign Detection and Recognition by Voice Alert using Image Processing and Deep Learning Techniques
Authors: Megha Rani Raigonda and Parvati Kale
DOI: https://doi.org/10.46501/IJMTST0809014 |
83-87 |
|
15. |
Online Farmers Market
Authors: Balaveera Chittoori and Ivvala Venkata Sivakumar
DOI: https://doi.org/10.46501/IJMTST0809015 |
88-90 |
|
16. |
Spammer Location and Phony Client Id on Informal Communication Framework
Authors: G Bharathi and K Lakshmana Reddy
DOI: https://doi.org/10.46501/IJMTST0809016 |
91-94 |
|
17. |
Geolocation Implication for Non-Geo Tweets in user Timeframes
Authors: P.Naga Kanaka Devi and Ch.Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTST0809017 |
95-100 |
|
18. |
PAPER WITHDRAWN |
|
|
19. |
Privacy Protection Authenticated Medical Document Releasing and Release Control
Authors: K.Harshini and P. Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809019 |
104-107 |
|
20. |
Prediction of Flight Delays Based on Aviation Machine Learning and Big Data
Authors: G.Harshitha and Ch.Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTST0809020 |
108-111 |
|
21. |
Agricultural Crop Recommendation System Based on Productivity and Season
Authors: Tadi Hemalatha and B.N.Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809021 |
112-115 |
|
22. |
Utilizing the AES Technique for Image Encryption
Authors: V.Hima Maheswari and P.Srinivas Reddy
DOI: https://doi.org/10.46501/IJMTST0809022 |
116-118 |
|
23. |
Predicting Stock Market Trends using Machine Learning and Deep Learning Algorithms via Continuous and Binary Data; A Comparative Analysis
Authors: V. Kishore and Ch. Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTST0809023 |
119-123 |
|
24. |
PAPER WITHDRAWN |
|
|
25. |
Comfortable Information Institution Sharing and Conditional Disseminationwith Multi-Owner in Cloud Computing
Authors: K Lokesh and K Lakshmana Reddy
DOI: https://doi.org/10.46501/IJMTST0809024 |
127-130 |
|
26. |
Detective System of Fake Online Reviews using Semi-Supervised an5 Supervised Learning
Authors: M.Bhavya Chamundeswari and B.N.S Gupta
DOI: https://doi.org/10.46501/IJMTST0809026 |
131-133 |
|
27. |
A Simple, Safe Auditing System for Shared Cloud Storage
Authors: M.Hemanth Ravi Kumar and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809027 |
134-137 |
|
28. |
Social Media Data Publication with Privacy Protection for Personalized Ranking-Based Recommendations by using Machine Learning Techniques
Authors: A.Krishna Madhavi and K.Lakshmana Reddy
DOI: https://doi.org/10.46501/IJMTST0809028 |
138-142 |
|
29. |
Rescue Me –A Smartphone Based Disaster Relief Self Rescue System
Authors: V Meghana and K.Lakshmana Reddy
DOI: https://doi.org/10.46501/IJMTST0809029 |
143-145 |
|
30. |
Analyzing Large-Scale Public Transit Records to Identify Pickpocket Suspects
Authors: P Naveen Kumar and B. N. Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809030 |
146-149 |
|
31. |
Online Agriculture Crop Marketing by using Cloud Service
Authors: L Pavani and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809031 |
150-152 |
|
32. |
Evaluation of trust in social networks online
Authors: N Poojitha and B. N. Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809032 |
153-157 |
|
33. |
Social Media Analysis with Active Online Learning to Support Crisis Management
Authors: Ch. Surekha and B. N. Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809033 |
158-161 |
|
34. |
Stochastic Model Predicting Component Failures using JAVA
Authors: P. Somasundar Reddy and B. N. Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809034 |
162-166 |
|
35. |
Spotting Suspecious Cloud File Replication or Migration
Authors: K Hruthpadma Suhasini and B. N. Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809035 |
167-172 |
|
36. |
A Framework for Proof Generation and Verification in Secure and Private Locations (Pasport)
Authors: K Sai Ganesh and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809036 |
173-177 |
|
37. |
Personalized Forward Search with Symmetric Search Encryption
Authors: B Naga Sailaja and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809037 |
178-180 |
|
38. |
Competitive Motor Bike Competitive Evalution and Popularity Prediction of Motorcycle Sharing Apps The use of Multi Source Facts
Authors: Ch.V.V.V.D Ramesh and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809038 |
181-184 |
|
39. |
Dynamic control of Fraud facts Spreading in cell Social Networks
Authors: V.SaiSamyuktha and P Srinivasa Reddy
DOI: https://doi.org/10.46501/IJMTST0809039 |
185-189 |
|
40. |
Prediction of Cardiac Disease using Machine Learning
Authors: Y Sai Sravani and Ch. Srinivasa Rao
DOI: https://doi.org/10.46501/IJMTST0809040 |
190-195 |
|
41. |
Photo Sharing in Online Social Networks that Respects Privacy Based in Trust
Authors: T Padam Santhoshi and K Lakshamana Reddy
DOI: https://doi.org/10.46501/IJMTST0809041 |
196-199 |
|
42. |
L-Injection: Using Uninteresting Items to Facilitate Effective Collaborative Filtering
Authors: G.V.D.Nagababu and B.N.Srinivasa Gupta
DOI: https://doi.org/10.46501/IJMTST0809018 |
200-203 |
|
43. |
Software License Survelliance
Authors: B Lakshmi Durga and K Lakshmana Reddy
DOI: https://doi.org/10.46501/IJMTST0809024 |
204-207 |
|
44. |
Carrot Waste Supplemented Diet Induced Growth and Carotenoid Changes in Fresh Water Ornamental Fish Peacock Cichlid (Aulonocara Hansbaenschi)
Authors: A.Simon Ranjith, Dr. C. Sundaravadivel, Dr. N. Rajeswari and S.Ramesh kumar
DOI: https://doi.org/10.46501/IJMTST0809044 |
208-213 |
|
45. |
ANN Based Grid Interconnection of Solar PV System using Multifunctional Grid-Interactive Converter
Authors: M Gopi Krishna and Dr. M Vasavi Uma Maheswari
DOI: https://doi.org/10.46501/IJMTST0809045 |
214-220 |
|
46. |
Three-Phase Solar PV Design with Integrated UPQC and Performance Monitering by ANN
Authors: Malapati Ratnakar and Dr. M Vasavi Uma Maheswari
DOI: https://doi.org/10.46501/IJMTST0809046 |
221-230 |
|
47. |
Compare The effectiveness of SSSC in Transmission network using PI and ANN control with POD Controller
Authors: Dr. M Vasavi Uma Maheswari and P Mahesh
DOI: https://doi.org/10.46501/IJMTST0809047 |
231-236 |
|
48. |
Fuzzy Based FOPID for Improvement of Power Quality by using Unified Power Flow Controller
Authors: S Venkata Ramana and Dr. R S Srinivas
DOI: https://doi.org/10.46501/IJMTST0809048 |
237-244 |
|
49. |
A Novel Control Strategy of Electric Vehicle with Hybrid Energy Storage System using Interval Type 2.0 Fuzzy Logic Controller
Authors: Yogesh Shekhar and Adeeb Uddin Ahmad
DOI: https://doi.org/10.46501/IJMTST0809049 |
245-262 |
|
50. |
ANFIS based D-FACTS for Power Quality Enhancement in Microgrid
Authors: L.Chandana and Dr. R S Srinivas
DOI: https://doi.org/10.46501/IJMTST0809050 |
263-269 |
|
51. |
Active and Reactive Power Control for PV based Single-Phase Electric Springs
Authors: B. Shanmukha Mahesh Babu and Dr. R S Srinivas
DOI: https://doi.org/10.46501/IJMTST0809051 |
270-277 |
|
52. |
Improvement of Power Quality by using Active Power Filters in EV Charging Stations
Authors: K. Hema Sai and Dr. M Vasavi Uma Maheswari
DOI: https://doi.org/10.46501/IJMTST0809052 |
278-284 |
|
53. |
A study on the links between music and mathematics with respect to interval, scales, tuning and temperament
Authors: Kabir Gupta
DOI: https://doi.org/10.46501/IJMTST0809053 |
285-289 |
|
54. |
A Multilayer CNN based approach for Question Answering System
Authors: Devina Chaitanya and Dr. G.N.V.G. Sirisha
DOI: https://doi.org/10.46501/IJMTST0809054 |
290-294 |
|
55. |
Detection of Skin Diseases using Ensemble Machine Learning Approach
Authors: M Sree Ram Kiran Nag
DOI: https://doi.org/10.46501/IJMTST0809055 |
296-301 |
|