Volume 8, Special Issue 03, May 2022 |
S.No. |
Title of Paper |
PageNo. |
Download
PDF |
1. |
Extraction of Text from Images using Machine Learning
Authors: Dr.B Sujatha, K.Sri Lasya, N.NagaSuneetha Devi, A.Gnana Surya Bhavani Prasad and P.Dileep Surya Manikanta
DOI: https://doi.org/10.46501/IJMTST08S0301 |
1-5 |
|
2. |
Deep Learning of Face Based Age Estimation using CNN
Authors: Dr.N.Leelavathy, B.Sireesha, N.Sai Charan, E.Ambika and Sk.Umar Farooque
DOI: https://doi.org/10.46501/IJMTST08S0302 |
6-8 |
|
3. |
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
Authors: Dr. J.M.S.V. Ravi Kumar, M. Bhagya Sri, S. Tarun Kumar, A.S.V. Raghunandan and V. Gowtham
DOI: https://doi.org/10.46501/IJMTST08S0303 |
9-12 |
|
4. |
Crime Data Analysis using Machine Learning
Authors: Dr. P. Sriram Chandra, N. Sowmya, M. SyamaSundari, A. Prahrudyani and K. Nitesh
DOI: https://doi.org/10.46501/IJMTST08S0304 |
13-15 |
|
5. |
Efficient Data Analysis using Python with Machine Learning
Authors: Vandana Peter, Srivasu, Sandeep, Divya and Eswar
DOI: https://doi.org/10.46501/IJMTST08S0305 |
16-21 |
|
6 |
PAPER WITHDRAWN BY AUTHOR |
|
|
7. |
Detection of Non-Helmet Riders And Extraction of LicensePlate Number Using Yolo V2,V3 And OCR
Authors: D.Phanikumar, M.Manmadha, N.SatyaKurpa, T.Darshan and D.Prudhvi
DOI: https://doi.org/10.46501/IJMTST08S0307 |
22-26 |
|
8. |
E-commerce Product Review Sentiment AnalyzerUsing NLP
Authors: K.Sasikanth, Ventrapati Deepak, Pritabrata Mallik, T.Koteswara Rao and I.Joshua Raju
DOI: https://doi.org/10.46501/IJMTST08S0308 |
27-30 |
|
9. |
Solving Onion Market Instability by Forecasting Onion Price Using Machine Learning Approach
Authors: V.Ajay Kumar, A.Durga Sai, V.Mounika, B.Sindhu and K.N.Manisha
DOI: https://doi.org/10.46501/IJMTST08S0309 |
31-35 |
|
10. |
Facial Expression Recognition using Machine Learning
Authors: D. Suseela, S. Jyothirmai, N.Tejaswini, P.Vinai Kumar and K.H.V Kiranmai
DOI: https://doi.org/10.46501/IJMTST08S0310 |
36-39 |
|
11. |
Spammer Detection and Fake user Identification on Social Networks
Authors: N.GowriSreeLakshmi, M.B.S.ALakshmi, S.AkhilSai, B.Charan and K.Srikanth
DOI: https://doi.org/10.46501/IJMTST08S0311 |
40-43 |
|
12. |
Biometric Palm Recognition and Classification using Machine Learning
Authors: D. Sattibabu, V. Reshma Joseph, Y.DevaVarshini, Shubham Kumar and M.Manaswi
DOI: https://doi.org/10.46501/IJMTST08S0312 |
44-48 |
|
13. |
Fascinated Youtube Recommendations
Authors: Dr.J.M.S.V.Ravi Kumar, CH.SreeHarshitha, B.Sowmya, M.V.V.S.Vinay Raj and P.Nikhil
DOI: https://doi.org/10.46501/IJMTST08S0313 |
49-53 |
|
14. |
Density Based Smart Traffic Control System Using Machine Learning
Authors: Dr. P. Sriram Chandra, Ch. Tulasi, G. Divya, K.Siva Kumar and P.R.S.V. Trinadh
DOI: https://doi.org/10.46501/IJMTST08S0314 |
54-58 |
|
15. |
Crop Pest Identification using Deep Learning Techniques
Authors: Ashok. K, A. Uma Venkatesh, R.V.V. Sai Yaswanth, G. Akhil Ankith and S. Roselinn
DOI: https://doi.org/10.46501/IJMTST08S0315 |
59-61 |
|
16. |
Hand Gestures Recognition and Voice Conversion for Deaf and Dumb
Authors: D.Phani Kumar, G.Siva Naga Mallika, NandaniKumari and T.Polaiah
DOI: https://doi.org/10.46501/IJMTST08S0316 |
62-65 |
|
17. |
Spam Transformer Model for SMS Spam Detection
Authors: K.SasiKanth, A.Sri Shiva Ganga, K.SumaLatha, A.Rohit Varma and Thoto T Chopy
DOI: https://doi.org/10.46501/IJMTST08S0317 |
66-69 |
|
18. |
Automated Classification of Breast CancerUsing Stacking Classifier
Authors: V. Ajay Kumar, M. T. N. Sri Sowmya, Ch. Vinay Babu, D. Yesuraju and V. Krupa Rani
DOI: https://doi.org/10.46501/IJMTST08S0318 |
70-74 |
|
19. |
Cyber Threat Detection Based on Artificial Neural Networks using Event Profiles
Authors: K. Suryakala, CH. Sujitha, N. Nikhil Sai Raj, D. Surendra Kumar and A.N.V.B Sai Kiran
DOI: https://doi.org/10.46501/IJMTST08S0319 |
75-78 |
|
20. |
Forecasting Stock Market Tendencies using Machine Learning and Deep Learning Algorithms
Authors: Dr.J.M.S.V.Ravi Kumar, K.Karthik, B.Teja Venkata Satish, V.Puneeth Kumar and K.Rajesh
DOI: https://doi.org/10.46501/IJMTST08S0320 |
79-83 |
|
21. |
An automatic method to prevent and Classify cyber crime incidents using artificial intelligence
Authors: N. Gowri Sree Lakshmi, S. Sai Prasanna Kumar, G. Sathvika, K. Jacob Joy, L.Nani Babu
DOI: https://doi.org/10.46501/IJMTST08S0321 |
84-87 |
|
22. |
Machine learning algorithms based on lengthy short-term memory for predicting Bitcoin market prices Network of Recurrent Neural Networks
Authors:Dr.B.Sujatha, Ch.Nithin, M.S.M.Bhargav, K.Puneeth Roy and P.Raghavulu
DOI: https://doi.org/10.46501/IJMTST08S0322 |
88-91 |
|
23. |
Chatbot for College Information using Python
Authors: Dr. N.Leelavathy, M. Hema Harshini, M.SriLakshmiAnuhya, M.Sandeep Kumar and K.Vamsi Krishna
DOI: https://doi.org/10.46501/IJMTST08S0323 |
92-95 |
|
24. |
A Study on Prediction Of Health Care Data Using Machine Learning
Authors: D.Sattibabu, K.V.Trilokya, V.S.S.Nageswari, N.Sujai and P.V.V.S.K.Vivek
DOI: https://doi.org/10.46501/IJMTST08S0324 |
96-100 |
|
25. |
An Approach Based on a Machine Learning Algorithm for Predicting of Loan Approval
Authors: Dr.J.M.S.VRaviKumar, P.DurgaPrasad, P.Sangeetha and P.LakshmanVinay
DOI: https://doi.org/10.46501/IJMTST08S0325 |
101-105 |
|
26. |
A Novel Framework To Provide Security For Medical Documents With Flexible Access Control
Authors: D.Suseela, B.Ramya Venkata Supriya, P.Malleswari, J.Rupas and G.Susmanth Kumar
DOI: https://doi.org/10.46501/IJMTST08S0326 |
106-109 |
|
27. |
Efficient Malware Detection in Android Devices
Authors: Suryakala, D.Lakshmi Priyanka, M.Abhinav, S. Rohit and K. Jithesh Kumar
DOI: https://doi.org/10.46501/IJMTST08S0327 |
110-113 |
|
28. |
Building Image Caption Generator using CNN and LSTM
Authors: Dr.N. Leelavathy, B. Renuka Devi, D. Venkat, M. Gopal and M. Lohitha. Building
DOI: https://doi.org/10.46501/IJMTST08S0328 |
114-116 |
|
29. |
Research on Key Combination Management System Based on Identity Authentication
Authors: Dr . J. M. S. V. Ravi Kumar, K. Renuka, M. Kanthi Rekha, T. Radha Ravi Sankar and Y.Pradeep
DOI: https://doi.org/10.46501/IJMTST08S0329 |
117-120 |
|
30. |
As a Supervised Machine learning Estimator, using Natural Language to Identify in-Article Attribution, Classifying Fake News Articles
Authors: Dr.K.Ashok, R.Tirupatigopi, NagaNitheesh. K, M.RohitSarma and B.SaiSamanvitha
DOI: https://doi.org/10.46501/IJMTST08S0330 |
121-124 |
|
31. |
Credit Card Fraud Detection using Random Forest and Cart Algorithm
Authors: Dr.JMSV Ravi Kumar, K.Vijaya Lakshmi, S.Vijayanand, Soro Periguegnon Cheick Raimane and K.Surya Bhagavan
DOI: https://doi.org/10.46501/IJMTST08S0331 |
127-131 |
|
32. |
Predicting and Defining Business to Business Sales Success with Machine Learning
Authors: Dr. B. Sujatha, P. Sandeep Chandra, N. Manaswini and G. Ashok Reddy
DOI: https://doi.org/10.46501/IJMTST08S0332 |
132-136 |
|
33. |
Identify Fake Accounts on Instagram
Authors: I.Aditya and D.Sattibabu
DOI: https://doi.org/10.46501/IJMTST08S0333 |
137-143 |
|
34. |
Identification of Malicious Reviewer Groups in Online Product Reviews
Authors: Mandapati Rajesh and Dr. RM Pattanayak
DOI: https://doi.org/10.46501/IJMTST08S0334 |
144-151 |
|
35. |
Machine Learning Algorithm for Brain Stroke Detection
Authors: P. Durga Prasad and Dr. JMSV Ravi Kumar
DOI: https://doi.org/10.46501/IJMTST08S0335 |
152-161 |
|
36. |
Face Identificationusing Computer Vision and CNN Algorithm
Authors: Uppalapati Vasavisukanya and Dr. T. Prabhakara Rao
DOI: https://doi.org/10.46501/IJMTST08S0337 |
162-166 |
|
37. |
Group Key Management Protocol for File Sharing on Cloud Storage using Verification Scheme
Authors: T. Srinivasarao and Dr. N. Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0338 |
167-172 |
|
38. |
SIE: A Novel Cryptosystem to Secure Confidential Images
Authors: M. Harini Naga Sai, Dr. Sri Ram Chandra Polisetty, Dr. G. Venkateswara Rao and Dr. G.V.Swamy
DOI: https://doi.org/10.46501/IJMTST08S0339 |
173-177 |
|
39. |
Human MisbehaviourPredicition By Real Time CCTV Footages Using Deep Learning
Authors: D.Sattibabu, Ch.S.L.D.S.N.Manisha, P .Yaswanth, L.N.M.Anudeep and T.S.D.Abhishek
DOI: https://doi.org/10.46501/IJMTST08S0306 |
178-183 |
|
40. |
Resiliency in AWS Cloud
Authors: K. Tirumala Rao, Dr. Sujatha and Dr. N. Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0340 |
184-189 |
|
41. |
Human Effort Reduction in Stock Market Trend Analysis: RPA
Authors: K. Radhasri, Dr. Sri Ram Chandra Polisetty and D.Sattibabu
DOI: https://doi.org/10.46501/IJMTST08S0341 |
190-194 |
|
42. |
Maleria Detection Using Deep Learning
Authors: Prayaga Atchyut Pavan, D. Sattibabu and D.Phani Kumar
DOI: https://doi.org/10.46501/IJMTST08S0342 |
195-199 |
|
43. |
Intracranial Hemorrhage Detection in Human Brain Using Deep Learning
Authors: Bhanu Revathi Ch, Ravi Kumar JMSV and Sujatha B
DOI: https://doi.org/10.46501/IJMTST08S0343 |
200-207 |
|
44. |
Classification of Genetic Mutations for Cancer Treatment Using Machine Learning Approaches
Authors: Adduri.Harika, Dr.N.Leelavathy and Dr.B.Sujatha
DOI: https://doi.org/10.46501/IJMTST08S0344 |
208-214 |
|
45. |
Predicting the Risk Level of Heart Disease using Machine Learning
Authors: Sravani.Ch.V.K, Dr.Sujatha.B and Dr.Leelavathy.N
DOI: https://doi.org/10.46501/IJMTST08S0345 |
215-224 |
|
46. |
Performance Analysis of Generating Cartoon like Images from Realistic Images Using Various Cycle GAN Techniques
Authors: Kanchi Ramya and Dr.N.Leelavathy
DOI: https://doi.org/10.46501/IJMTST08S0346 |
225-230 |
|