LOGO

Current Issue


volume 14 ,issue1 january 2024

S.No Title of The Paper Page No Download
1 huc999.casinoAnalytical Approach for Future Blockchain Forensic Investigation of Bitcoin Transaction Network
Author(s): N. Sateesh , A. Rohini , A. Sravika , A. Harini
DOI : https://ijcnwc.2024.v14.i01.pp01-11
1-11
2 Proactive Stress Detection Among Employees: Leveraging Machine Learning Algorithms for Early Interventions
Author(s): N. Sateesh , A. Lohitha , B. Swathi, Ch. Swathi
DOI : https://ijcnwc.2024.v14.i01.pp01-11
1-11
3 Machine Learning Approaches for Stress Affect Detection using WESAD Data
Author(s): D. Shine Rajesh , K. Sahithi , K. Ramya , N. Pravalika
DOI : https://ijcnwc.2024.v14.i01.pp01-8
1-8
4 MACHINE LEARNING FOR ROBOT NAVIGATION CLASSIFICATION USING ULTRASOUND SENSOR DATA
Author(s): J. David Livingston , L. Priyanaka , M. Pranathi , M. Shivani
DOI : https://ijcnwc.2024.v14.i01.pp01-10
1-10
5 SOFTWARE DEFECT PREDICTION USING ENSEMBLE LEARNING
Author(s): Putta.Srinivani , B. Vyhnavi , D. Tejeswani , G. Keerthika
DOI : https://ijcnwc.2024.v14.i01.pp01-12
1-12
6 DDOSNET: DETECTION AND CLASSIFICATION OF DDOS ATTACKS IN IOT ENVIRONMENT
Author(s): Sanjeevini S.H , M. Sreeja , T. Shreya Madhuri , P. Jhansi
DOI : https://ijcnwc.2024.v14.i01.pp01-11
1-11
7 AI-ENHANCED SECURITY: ROBUST DATA TRANSMISSION IN ADHOC NETWORKS
Author(s): L.C. Usha Maheswari , P. Sanjana , P. Akhila , M. Shruthi
DOI : https://ijcnwc.2024.v14.i01.pp01-10
1-10
8 QUALITY OF SERVICE ASSURANCE THROUGH SOFTWAREDEFINED NETWORK TRAFFIC CLASSIFICATION
Author(s): Sanjeevini S. H , G. Tejaswini , K.Sriya Chandrika , Noor Afshan
DOI : https://ijcnwc.2024.v14.i01.pp01-9
1-9
9 LEVERAGING MACHINE LEARNING FOR PHYSICAL LAYER AUTHENTICATION IN SATELLITE COMMUNICATION SYSTEMS
Author(s): M.Sravan Kumar Babu , V. S. S. N. Akhila , T. Bhavana , K. Kaveri
DOI : https://ijcnwc.2024.v14.i01.pp01-9
1-9
10 SECURING WIRELESS NETWORKS: ENHANCED INTRUSION DETECTION THROUGH ADAPTIVE SAMPLING AND ADVANCED CONVOLUTIONAL NEURAL NETWORKS
Author(s): Putta Srivani , V. Sowmya , K. Akshitha , M. Harshini
DOI : https://ijcnwc.2024.v14.i01.pp01-9
1-8
11 DEEP ENSEMBLE FRAMEWORK WITH SUPERVISED LEARNING FOR SECURE IOT NETWORK
Author(s): Sanjeevini S. H , B. Udaysri , B. Mrudulanjanli , P. Sanjana
DOI : https://ijcnwc.2024.v14.i01.pp01-10
1-10
12 thaibet55.comDATA ACCESS CONTROL USING COMBINED COMPRESSION AND SECURITY MODEL FOR CLOUD STORAGE
Author(s): M. Sravan Kumar Babu , Ch. Nikitha , Ch. Hamsini , Shivani Gentyala , D. Sneha
DOI : https://ijcnwc.2024.v14.i01.pp01-09
1-9
13 prediction of road accident spot based upon wheather and road conditions using Machine learning
Author(s): Mr.MV.Satyanarayana , G.Akshaya Reddy ,G.Deepthi ,G.Vijaya Laxmi
DOI : https://ijcnwc.2024.v14.i01.pp01-10
1-10
14 kuyuluk.comPREDICTIVE TRAFFIC AND INCIDENT ANALYSIS THROUGH INTEGRATED DATA FUSION SYSTEM
Author(s): Dr.Kundunuri Ramakrishna , G.Akhila , Pavani , Sahasra
DOI : https://ijcnwc.2024.v14.i01.pp01-15
1-15
15 RAISE FUNDS ONLINE FOR MEDICAL EMERGENCIES AND SOCIAL CAUSES USING DJANGO
Author(s): Ms.Aarthi Kasthuri ,G. Spoorthy, G. Sri Tejaswi , G. Akshaya
DOI : https://ijcnwc.2024.v14.i01.pp01-10
1-10
16 Real Estate appraisal based on images using RNN
Author(s): Ms.Manasa Spandana ,Swathi , Khyathi ,Rajasree
DOI : https://ijcnwc.2024.v14.i01.pp01-14
1-14
17 soccer918.comReject-aware Multi-Task Network: Advancing Credit Scoring through Modeling Missing-not-at-random Data in Finance
Author(s): Dr.DBK.Kamesh , Farah Tazeen ,Harshitha ,Bhuvana Ramya
DOI : https://ijcnwc.2024.v14.i01.pp01-16
1-16
18 CONTINUOUS PEOPLE CROWD MONITORING DEFINED AS A REGRESSION PROBLEM USING RADAR NETWORKS
Author(s): B.Sandhya, Gajji Chakrapani, Bethi Divya,Vuppala Likitha, Avula Rishikesh Shivadhar Reddy
DOI : https://ijcnwc.2024.v14.i01.pp01-08
1-8
19 Analysis and Prediction of Road Accident using machine learning techniques
Author(s): B.HARIKUMAR, GADDAM MANISHA REDDY, JAKKIDI GIRIKANTH REDDY, PEMMARAJU VENKATA SRICHARAN, SILIVERU PAVAN TEJA
DOI : https://ijcnwc.2024.v14.i01.pp09-13
9-13
20 PREDICTING WATER QUALITY USING MACHINE LEARNING
Author(s): DR.ADELINA JOHNSANA, MASHETTY BHAVYA, T BHUVANESHWAR REDDY, THUMMA SUPRIYA, SETTI JASWANTH
DOI : https://ijcnwc.2024.v14.i01.pp14-25
14-25
21 Sentiment Based Product Recommendation System Using Machine Learning Techniques
Author(s): DEEPA D, BEEREDDY NIKHILA, PEDELLI SAI KRISHNA, BARRY BENRICH MARTIN, PENUGONDA RISHITHA
DOI : https://ijcnwc.2024.v14.i01.pp26-33
26-33
22 Integrating artificial intelligence in cyber security for cyber-physical systems
Author(s): G.UMA MAHESHWARI, THOKALA N SHREYA, CHERUKUPALLI AKSHITHA, B SAI CHARAN, A RAHUL
DOI : https://ijcnwc.2024.v14.i01.pp34-54
34-54
23 COMPARATIVE ANALYSIS OF INTRUSION DETECTION SYSTEMS AND MACHINE LEARNING BASED MODEL ANALYSIS THROUGH DECISION TREE
Author(s): K.Jothsna, Vallakonda Hyndavi, Siga Devayani, Pinneboina Sridhar Kumar,Devarai Nikhileshwari
DOI : https://ijcnwc.2024.v14.i01.pp55-62
55-62
24 ROBUST ADVERSARIAL ATTACKS DETECTION BASED ON EXPLAINABLE DEEP REINFORCEMENT LEARNING FOR UAV GUIDANCE AND PLANNING
Author(s): K.Jothsna, Arsha Saketh,Golla Guna Sindhu,Amirineni Nikhil,Choutukuri Rohith
DOI : https://ijcnwc.2024.v14.i01.pp63-68
63-68
25 PRIVACY-PRESERVING ON-SCREEN ACTIVITY TRACKING AND CLASSIFICATION IN E-LEARNING USING FEDERATED LEARNING
Author(s): Dr. K.Gunasekaran, Ravi Vaishnavi, B.Yashaswini, B.Hupsika, P.Abhishek
DOI : https://ijcnwc.2024.v14.i01.pp69-77
69-77
26 CONSUMER BEHAVIOUR ANALYTICS USING MACHINE LEARNING
Author(s): C.Priyanga, B.Ventkata Ranga Sai Teja ,G.Srujan Chandra, M.Gayathri, D.Manish Kumar
DOI : https://ijcnwc.2024.v14.i01.pp78-86
78-86
27 DETECTION OF SOCIAL NETWORK SPAM BASED ON IMPROVED MACHINE LEARNING
Author(s): M.Kavitha, J.Akanksha, K.Ashwitha, P.Sai Kumar, P.Sai Kiran, C.Soumya
DOI : https://ijcnwc.2024.v14.i01.pp87-95
87-95
28 Brain tumor detection using deep learning
Author(s): K. PRIYANKA, SATHURU MOUNUSHA, VENEPALLY THAPASWI, VOGGU AKHIL, A KESHAVA, BONTHA VIVEK REDDY
DOI : https://ijcnwc.2024.v14.i01.pp96-101
96-101
29 An object oriented web text model for testing web application
Author(s): J. SASIREKHA, KADAR HARIKA, ATIF ABDUL RAHEEM, CHANDA VINAY KUMAR REDDY, NAREDDY VARUN REDDY
DOI : https://ijcnwc.2024.v14.i01.pp102-109
102-109
30 A HYBRID METHOD TO ENHANCE SMART TRAFFIC MANAGEMENT IN CITIES USING MACHINE LEARNING
Author(s): Y.HARATHI, G.AKSHITHA REDDY, DURGAM ROHAN YADAV, KANDULA VAMSHI, KAMBHAMPATI SHILPAUG
DOI : https://ijcnwc.2024.v14.i01.pp110-113
110-113
31 Prediction of crop yield
Author(s): Mr.B.Suresh Ballala, Guda Reshma,K.Srujana,Karthikeya Kotagiri,Gorige Nagaraju
DOI : https://ijcnwc.2024.v14.i01.pp114-132
114-132
32 IMAGE DEHAZING WITH BOUNDARY CONSTRAINT AND CONTEXTUAL REGULARIZATION BASED ON PYTHON
Author(s): Dr.Martin Sahayaraj, Lakkireddy Adhikeshava Reddy, Kotla Karthikeya, Kota Praneeth Reddy, M Rajashekar
DOI : https://ijcnwc.2024.v14.i01.pp133-139
133-139
33 SOLDIER HEALTH AND POSITION TRACKING SYSTEM USING GPS AND GSM
Author(s): Mr. P. Prashanth, Ganta Abhisri, Gurram Surender Reddy, Kaki Harshavardhan Goud, Gatla Varshith Reddy
DOI : https://ijcnwc.2024.v14.i01.pp140-149
140-149
34 WIRELESS BLACK BOX FOR VEHICLES USING GSM AND GPS
Author(s): Mr.A.Venugopal, R.Vinesh kumar, R.Vignesh Goud, P.Sai Shashank, N.Pranay reddy
DOI : https://ijcnwc.2024.v14.i01.pp150-156
150-156
35 BLUETOOTH BASED TRAFFIC AMBULANCE SYSTEM
Author(s): Ms. B.Hemavathi, P.Amulya, M.Gopi, M.Srinadh, M.Arun Kumar
DOI : https://ijcnwc.2024.v14.i01.pp157-166
157-166
36 RFID BASED SECURITY AND ACCESS CONTROL SYSTEM
Author(s): Mr. K.Jail Singh, Sama Pallavi, Mannepally Mahendar Reddy, S Harshavardhan, Pathlavath Bharath Raj
DOI : https://ijcnwc.2024.v14.i01.pp167-172
167-172
37 MLP-CNN AND SVR APPROACH FOR MONTHLY RAINFALL PREDICTION USING PYTHON
Author(s): MR. E. PARASHU RAMU, SIRIGIREDDY HARSHITHA, TALLA SADHANA, KAMPASATI SHIVA KRISHNA, NIMMAGADDA SRI SAI RUTHWIK
DOI : https://ijcnwc.2024.v14.i01.pp173-178
173-178
38 CNG AND LPG GAS ACCIDENT PREVENTION USING GSM
Author(s): Mr. B. THIRUPATHI, Tahrin, Thangellapalli Saiteja, Kethiri Sriharsha, Usirikapalli Pranay Kumar
DOI : https://ijcnwc.2024.v14.i01.pp179-185
179-185
39 FAKE ACCOUNT IDENTIFICATION ON SOCIAL NETWORKING SITES USING MACHINE LEARNING
Author(s): Ms. K.Sravani, Vadrangi Aakanksha, Yerrolla Anusha, Shaik Sameer, Yeluguri Shashank
DOI : https://ijcnwc.2024.v14.i01.pp186-191
186-191
40 ARTIFICIAL INTELLIGENCE IN MUSCULOSKELETAL X-RAY FRACTURE DIAGNOSIS
Author(s): Mrs. R. Rachel Kaveti Risheek, G Nithin Kumar, M Siddartha Chowhan
DOI : https://ijcnwc.2024.v14.i01.pp192-196
192-196
41 DEEP LEARNING TECHNIQUES FOR OBJECT DETECTION USING OPENCV AND YOLO
Author(s): Mr. B Pradeep Kumar, Bommineni Vedavyas Reddy, Nethi Murali, Chinthaboina Ravi Teja, Vijay Gidde
DOI : https://ijcnwc.2024.v14.i01.pp197-201
197-201
42 LEAF DISEASE IDENTIFICATION AND CLASSIFICATION USING DEEP LEARNING TECHNIQUES
Author(s): Mr.Mandala Rajkumar, Manthena Rajitha, Kamavaram Sai Prathik, Muppanapalli Alekhya Sri, Tekula Karthik Reddy
DOI : https://ijcnwc.2024.v14.i01.pp202-209
202-209
43 EMOTI SCORE: HARMONISING MUSIC AND EMOTION WITH VGG 19 AND RESNET
Author(s): Ms. CH Sandhya, Chennaram Vidyananda, Gobburi Yeshwanth, Tanguturi Venkata Sai Sharath, Kandewar Harshith Reddy
DOI : https://ijcnwc.2024.v14.i01.pp210-214
210-214
44 FAKE JOB RECRUITMENT DETECTION
Author(s): Ms. V.Prathyusha, A.Sukesh Reddy, A. Nandan Kumar, E. Gowtham Reddy, T. Akhileshwar Reddy
DOI : https://ijcnwc.2024.v14.i01.pp215-220
215-220
45 PREDICTION OF AIR USING MACHINE LEARNING
Author(s): Dr. NC Senthil Kumar, B.Poojitha, B.Ramu, B.Shravana Lakshmi, C.Shailesh
DOI : https://ijcnwc.2024.v14.i01.pp221-230
221-230
46 CREDIT CARD FRAUD DETECTION
Author(s): Ms, V. Sunitha, CH.SaiPragathi, D.Manasa, A.HarshaVardhan, D.Vikas
DOI : https://ijcnwc.2024.v14.i01.pp231-241
231-241
47 Smart System for the Neonatal Intensive Care Unit
Author(s): Mr. N. Murugan, Dr. L. Vigneash, Dr. D. Satyaraj, Mr. P. A. Prassath Mrs. D. Chitra
DOI : https://ijcnwc.2024.v14.i01.pp242-252
242-252
48 An Effective Solution for Riders: An Analysis of Smart Helmets and the Design of an Internet of Things (IoT) Based Smart Helmet
Author(s): Dr. L. Vigneash , Dr. D. Satyaraj , Mr. P. A. Prassath , Ms. C. Sasikala Mrs. D. Chitra
DOI : https://ijcnwc.2024.v14.i01.pp253-259
253-259
49 An Extensive Model for Short-Term Wind Speed Forecasting Based on a Combination of Classical and Quantum Theories
Author(s): Dr. D. Satyaraj , Mrs. D. Chitra , Ms. C. Sasikala , Dr. L. Vigneash Mr. N. Murugan
DOI : https://ijcnwc.2024.v14.i01.pp260-272
260-272
50 DATA MESH: DECENTRALISED DATA MANAGEMENT
Author(s): Krishna Prasanth Brahmaji Kanagarla
DOI : https://ijcnwc.2024.v14.i01.pp273-278
273-278
51 An Algorithm for Facial Recognition and Tracking Through Serial Communication Between MATLAB and Arduino
Author(s): Dr. A. Venkateswarlu, Mr. T. Gangadhar, Mrs. K. Yojana, Mrs.G.Usha
DOI : https://ijcnwc.2024.v14.i01.pp279-282
279-282
52 A Raspberry-PI-Based System for Vehicle Number Plate Recognition
Author(s): Dr. K. Amit Bindaj, Mrs. K. Yojana, Mrs. G. Usha, Mr Ch. Gopala Rao
DOI : https://ijcnwc.2024.v14.i01.pp283-285
283-285
53 Detection And Prediction Of Comorbidities Of Diabetes Using ML Techniques
Author(s): J.Vijaya lakshmi, CH.Archana, V.Sravanthi, THALLAGUDEM GOUTHAM
DOI : https://ijcnwc.2024.v14.i01.pp286-293
286-293
54 Classification of plant seedlings using deep convolutional neural network architecture
Author(s): B.Raghupathi, G.Venkatesh, Dr.U.Naresh, TARUNOJU KOMALIKA
DOI : https://ijcnwc.2024.v14.i01.pp294-301
294-301
55 Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain- Based IIoT Networks
Author(s): S.Varalakshmi, CH.Sangeetha, K.Lakshmi Kalpana, NENDUGURI SAI NITHIN
DOI : https://ijcnwc.2024.v14.i01.pp302-309
302-309
56 A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution
Author(s): Dr.P.Satish Reddy, Asif Ahmed Algur, Dr.M.Muthukumaran, PUNNA VYSHNAVI
DOI : https://ijcnwc.2024.v14.i01.pp310-317
310-317
57 Optimized Design and Modelling of Microstrip Patch Antenna for 5G Mobiles
Author(s): Dr. Y. Srinivas, K. Keerthi, K. Revanth, M. Sai Pavan
DOI : https://ijcnwc.2024.v14.i01.pp318-321
318-321
58 Emerging Cyber Threat Detection and Profiling via Natural Language Processing
Author(s): Mrs.T.Sashirekha, G.Yashaswini
DOI : https://ijcnwc.2024.v14.i01.pp322-330
322-330
59 Enhancing IoT Device Security and Transparency in Healthcare Through Blockchain Technology
Author(s): Mrs.K.Sheetal, K.Hindhu
DOI : https://ijcnwc.2024.v14.i01.pp331-338
331-338
60 study using the K-means clustering method
Author(s): B.Sai teja, M.Muthukumaran, C.Manikandan
DOI : https://ijcnwc.2024.v14.i01.pp339-342
339-342

We are working in partnership with