Email:editor.ijmtst@gmail.com

Volume 8, Special Issue 03, May 2022

Total Received Papers: 97     |  Total Accepted Papers: 40   |  Total Rejected Papers: 57    |  Acceptance Rate: 41.23%

 
Volume 8, Special Issue 03, May 2022
S.No. Title of Paper PageNo.   Download
PDF
1. Extraction of Text from Images using Machine Learning
Authors: Dr.B Sujatha, K.Sri Lasya, N.NagaSuneetha Devi, A.Gnana Surya Bhavani Prasad and P.Dileep Surya Manikanta
DOI: https://doi.org/10.46501/IJMTST08S0301
1-5
2. Deep Learning of Face Based Age Estimation using CNN
Authors: Dr.N.Leelavathy, B.Sireesha, N.Sai Charan, E.Ambika and Sk.Umar Farooque
DOI: https://doi.org/10.46501/IJMTST08S0302
6-8
3. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
Authors: Dr. J.M.S.V. Ravi Kumar, M. Bhagya Sri, S. Tarun Kumar, A.S.V. Raghunandan and V. Gowtham
DOI: https://doi.org/10.46501/IJMTST08S0303
9-12
4. Crime Data Analysis using Machine Learning
Authors: Dr. P. Sriram Chandra, N. Sowmya, M. SyamaSundari, A. Prahrudyani and K. Nitesh
DOI: https://doi.org/10.46501/IJMTST08S0304
13-15
5. Efficient Data Analysis using Python with Machine Learning
Authors: Vandana Peter, Srivasu, Sandeep, Divya and Eswar
DOI: https://doi.org/10.46501/IJMTST08S0305
16-21
6 PAPER WITHDRAWN BY AUTHOR
7. Detection of Non-Helmet Riders And Extraction of LicensePlate Number Using Yolo V2,V3 And OCR
Authors: D.Phanikumar, M.Manmadha, N.SatyaKurpa, T.Darshan and D.Prudhvi
DOI: https://doi.org/10.46501/IJMTST08S0307
22-26
8. E-commerce Product Review Sentiment AnalyzerUsing NLP
Authors: K.Sasikanth, Ventrapati Deepak, Pritabrata Mallik, T.Koteswara Rao and I.Joshua Raju
DOI: https://doi.org/10.46501/IJMTST08S0308
27-30
9. Solving Onion Market Instability by Forecasting Onion Price Using Machine Learning Approach
Authors: V.Ajay Kumar, A.Durga Sai, V.Mounika, B.Sindhu and K.N.Manisha
DOI: https://doi.org/10.46501/IJMTST08S0309
31-35
10. Facial Expression Recognition using Machine Learning
Authors: D. Suseela, S. Jyothirmai, N.Tejaswini, P.Vinai Kumar and K.H.V Kiranmai
DOI: https://doi.org/10.46501/IJMTST08S0310
36-39
11. Spammer Detection and Fake user Identification on Social Networks
Authors: N.GowriSreeLakshmi, M.B.S.ALakshmi, S.AkhilSai, B.Charan and K.Srikanth
DOI: https://doi.org/10.46501/IJMTST08S0311
40-43
12. Biometric Palm Recognition and Classification using Machine Learning
Authors: D. Sattibabu, V. Reshma Joseph, Y.DevaVarshini, Shubham Kumar and M.Manaswi
DOI: https://doi.org/10.46501/IJMTST08S0312
44-48
13. Fascinated Youtube Recommendations
Authors: Dr.J.M.S.V.Ravi Kumar, CH.SreeHarshitha, B.Sowmya, M.V.V.S.Vinay Raj and P.Nikhil
DOI: https://doi.org/10.46501/IJMTST08S0313
49-53
14. Density Based Smart Traffic Control System Using Machine Learning
Authors: Dr. P. Sriram Chandra, Ch. Tulasi, G. Divya, K.Siva Kumar and P.R.S.V. Trinadh
DOI: https://doi.org/10.46501/IJMTST08S0314
54-58
15. Crop Pest Identification using Deep Learning Techniques
Authors: Ashok. K, A. Uma Venkatesh, R.V.V. Sai Yaswanth, G. Akhil Ankith and S. Roselinn
DOI: https://doi.org/10.46501/IJMTST08S0315
59-61
16. Hand Gestures Recognition and Voice Conversion for Deaf and Dumb
Authors: D.Phani Kumar, G.Siva Naga Mallika, NandaniKumari and T.Polaiah
DOI: https://doi.org/10.46501/IJMTST08S0316
62-65
17. Spam Transformer Model for SMS Spam Detection
Authors: K.SasiKanth, A.Sri Shiva Ganga, K.SumaLatha, A.Rohit Varma and Thoto T Chopy
DOI: https://doi.org/10.46501/IJMTST08S0317
66-69
18. Automated Classification of Breast CancerUsing Stacking Classifier
Authors: V. Ajay Kumar, M. T. N. Sri Sowmya, Ch. Vinay Babu, D. Yesuraju and V. Krupa Rani
DOI: https://doi.org/10.46501/IJMTST08S0318
70-74
19. Cyber Threat Detection Based on Artificial Neural Networks using Event Profiles
Authors: K. Suryakala, CH. Sujitha, N. Nikhil Sai Raj, D. Surendra Kumar and A.N.V.B Sai Kiran
DOI: https://doi.org/10.46501/IJMTST08S0319
75-78
20. Forecasting Stock Market Tendencies using Machine Learning and Deep Learning Algorithms
Authors: Dr.J.M.S.V.Ravi Kumar, K.Karthik, B.Teja Venkata Satish, V.Puneeth Kumar and K.Rajesh
DOI: https://doi.org/10.46501/IJMTST08S0320
79-83
21. An automatic method to prevent and Classify cyber crime incidents using artificial intelligence
Authors: N. Gowri Sree Lakshmi, S. Sai Prasanna Kumar, G. Sathvika, K. Jacob Joy, L.Nani Babu
DOI: https://doi.org/10.46501/IJMTST08S0321
84-87
22. Machine learning algorithms based on lengthy short-term memory for predicting Bitcoin market prices Network of Recurrent Neural Networks
Authors:Dr.B.Sujatha, Ch.Nithin, M.S.M.Bhargav, K.Puneeth Roy and P.Raghavulu
DOI: https://doi.org/10.46501/IJMTST08S0322
88-91
23. Chatbot for College Information using Python
Authors: Dr. N.Leelavathy, M. Hema Harshini, M.SriLakshmiAnuhya, M.Sandeep Kumar and K.Vamsi Krishna
DOI: https://doi.org/10.46501/IJMTST08S0323
92-95
24. A Study on Prediction Of Health Care Data Using Machine Learning
Authors: D.Sattibabu, K.V.Trilokya, V.S.S.Nageswari, N.Sujai and P.V.V.S.K.Vivek
DOI: https://doi.org/10.46501/IJMTST08S0324
96-100
25. An Approach Based on a Machine Learning Algorithm for Predicting of Loan Approval
Authors: Dr.J.M.S.VRaviKumar, P.DurgaPrasad, P.Sangeetha and P.LakshmanVinay
DOI: https://doi.org/10.46501/IJMTST08S0325
101-105
26. A Novel Framework To Provide Security For Medical Documents With Flexible Access Control
Authors: D.Suseela, B.Ramya Venkata Supriya, P.Malleswari, J.Rupas and G.Susmanth Kumar
DOI: https://doi.org/10.46501/IJMTST08S0326
106-109
27. Efficient Malware Detection in Android Devices
Authors: Suryakala, D.Lakshmi Priyanka, M.Abhinav, S. Rohit and K. Jithesh Kumar
DOI: https://doi.org/10.46501/IJMTST08S0327
110-113
28. Building Image Caption Generator using CNN and LSTM
Authors: Dr.N. Leelavathy, B. Renuka Devi, D. Venkat, M. Gopal and M. Lohitha. Building
DOI: https://doi.org/10.46501/IJMTST08S0328
114-116
29. Research on Key Combination Management System Based on Identity Authentication
Authors: Dr . J. M. S. V. Ravi Kumar, K. Renuka, M. Kanthi Rekha, T. Radha Ravi Sankar and Y.Pradeep
DOI: https://doi.org/10.46501/IJMTST08S0329
117-120
30. As a Supervised Machine learning Estimator, using Natural Language to Identify in-Article Attribution, Classifying Fake News Articles
Authors: Dr.K.Ashok, R.Tirupatigopi, NagaNitheesh. K, M.RohitSarma and B.SaiSamanvitha
DOI: https://doi.org/10.46501/IJMTST08S0330
121-124
31. Credit Card Fraud Detection using Random Forest and Cart Algorithm
Authors: Dr.JMSV Ravi Kumar, K.Vijaya Lakshmi, S.Vijayanand, Soro Periguegnon Cheick Raimane and K.Surya Bhagavan
DOI: https://doi.org/10.46501/IJMTST08S0331
127-131
32. Predicting and Defining Business to Business Sales Success with Machine Learning
Authors: Dr. B. Sujatha, P. Sandeep Chandra, N. Manaswini and G. Ashok Reddy
DOI: https://doi.org/10.46501/IJMTST08S0332
132-136
33. Identify Fake Accounts on Instagram
Authors: I.Aditya and D.Sattibabu
DOI: https://doi.org/10.46501/IJMTST08S0333
137-143
34. Identification of Malicious Reviewer Groups in Online Product Reviews
Authors: Mandapati Rajesh and Dr. RM Pattanayak
DOI: https://doi.org/10.46501/IJMTST08S0334
144-151
35. Machine Learning Algorithm for Brain Stroke Detection
Authors: P. Durga Prasad and Dr. JMSV Ravi Kumar
DOI: https://doi.org/10.46501/IJMTST08S0335
152-161
36. Face Identificationusing Computer Vision and CNN Algorithm
Authors: Uppalapati Vasavisukanya and Dr. T. Prabhakara Rao
DOI: https://doi.org/10.46501/IJMTST08S0337
162-166
37. Group Key Management Protocol for File Sharing on Cloud Storage using Verification Scheme
Authors: T. Srinivasarao and Dr. N. Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0338
167-172
38. SIE: A Novel Cryptosystem to Secure Confidential Images
Authors: M. Harini Naga Sai, Dr. Sri Ram Chandra Polisetty, Dr. G. Venkateswara Rao and Dr. G.V.Swamy
DOI: https://doi.org/10.46501/IJMTST08S0339
173-177
39. Human MisbehaviourPredicition By Real Time CCTV Footages Using Deep Learning
Authors: D.Sattibabu, Ch.S.L.D.S.N.Manisha, P .Yaswanth, L.N.M.Anudeep and T.S.D.Abhishek
DOI: https://doi.org/10.46501/IJMTST08S0306
178-183
40. Resiliency in AWS Cloud
Authors: K. Tirumala Rao, Dr. Sujatha and Dr. N. Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0340
184-189
41. Human Effort Reduction in Stock Market Trend Analysis: RPA
Authors: K. Radhasri, Dr. Sri Ram Chandra Polisetty and D.Sattibabu
DOI: https://doi.org/10.46501/IJMTST08S0341
190-194
42. Maleria Detection Using Deep Learning
Authors: Prayaga Atchyut Pavan, D. Sattibabu and D.Phani Kumar
DOI: https://doi.org/10.46501/IJMTST08S0342
195-199
43. Intracranial Hemorrhage Detection in Human Brain Using Deep Learning
Authors: Bhanu Revathi Ch, Ravi Kumar JMSV and Sujatha B
DOI: https://doi.org/10.46501/IJMTST08S0343
200-207
44. Classification of Genetic Mutations for Cancer Treatment Using Machine Learning Approaches
Authors: Adduri.Harika, Dr.N.Leelavathy and Dr.B.Sujatha
DOI: https://doi.org/10.46501/IJMTST08S0344
208-214
45. Predicting the Risk Level of Heart Disease using Machine Learning
Authors: Sravani.Ch.V.K, Dr.Sujatha.B and Dr.Leelavathy.N
DOI: https://doi.org/10.46501/IJMTST08S0345
215-224
46. Performance Analysis of Generating Cartoon like Images from Realistic Images Using Various Cycle GAN Techniques
Authors: Kanchi Ramya and Dr.N.Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0346
225-230