Current Issue
volume 14 ,issue1 january 2024
S.No | Title of The Paper | Page No | Download |
---|---|---|---|
1 | huc999.casinoAnalytical Approach for Future Blockchain Forensic Investigation of Bitcoin Transaction Network Author(s): N. Sateesh , A. Rohini , A. Sravika , A. Harini DOI : https://ijcnwc.2024.v14.i01.pp01-11 |
1-11 | ![]() |
2 | Proactive Stress Detection Among Employees: Leveraging Machine Learning Algorithms for Early Interventions Author(s): N. Sateesh , A. Lohitha , B. Swathi, Ch. Swathi DOI : https://ijcnwc.2024.v14.i01.pp01-11 |
1-11 | ![]() |
3 | Machine Learning Approaches for Stress Affect Detection using WESAD Data Author(s): D. Shine Rajesh , K. Sahithi , K. Ramya , N. Pravalika DOI : https://ijcnwc.2024.v14.i01.pp01-8 |
1-8 | ![]() |
4 | MACHINE LEARNING FOR ROBOT NAVIGATION CLASSIFICATION USING ULTRASOUND SENSOR DATA Author(s): J. David Livingston , L. Priyanaka , M. Pranathi , M. Shivani DOI : https://ijcnwc.2024.v14.i01.pp01-10 |
1-10 | ![]() |
5 | SOFTWARE DEFECT PREDICTION USING ENSEMBLE LEARNING Author(s): Putta.Srinivani , B. Vyhnavi , D. Tejeswani , G. Keerthika DOI : https://ijcnwc.2024.v14.i01.pp01-12 |
1-12 | ![]() |
6 | DDOSNET: DETECTION AND CLASSIFICATION OF DDOS ATTACKS IN IOT ENVIRONMENT Author(s): Sanjeevini S.H , M. Sreeja , T. Shreya Madhuri , P. Jhansi DOI : https://ijcnwc.2024.v14.i01.pp01-11 |
1-11 | ![]() |
7 | AI-ENHANCED SECURITY: ROBUST DATA TRANSMISSION IN ADHOC NETWORKS Author(s): L.C. Usha Maheswari , P. Sanjana , P. Akhila , M. Shruthi DOI : https://ijcnwc.2024.v14.i01.pp01-10 |
1-10 | ![]() |
8 | QUALITY OF SERVICE ASSURANCE THROUGH SOFTWAREDEFINED NETWORK TRAFFIC CLASSIFICATION Author(s): Sanjeevini S. H , G. Tejaswini , K.Sriya Chandrika , Noor Afshan DOI : https://ijcnwc.2024.v14.i01.pp01-9 |
1-9 | ![]() |
9 | LEVERAGING MACHINE LEARNING FOR PHYSICAL LAYER AUTHENTICATION IN SATELLITE COMMUNICATION SYSTEMS Author(s): M.Sravan Kumar Babu , V. S. S. N. Akhila , T. Bhavana , K. Kaveri DOI : https://ijcnwc.2024.v14.i01.pp01-9 |
1-9 | ![]() |
10 | SECURING WIRELESS NETWORKS: ENHANCED INTRUSION DETECTION THROUGH ADAPTIVE SAMPLING AND ADVANCED CONVOLUTIONAL NEURAL NETWORKS Author(s): Putta Srivani , V. Sowmya , K. Akshitha , M. Harshini DOI : https://ijcnwc.2024.v14.i01.pp01-9 |
1-8 | ![]() |
11 | DEEP ENSEMBLE FRAMEWORK WITH SUPERVISED LEARNING FOR SECURE IOT NETWORK Author(s): Sanjeevini S. H , B. Udaysri , B. Mrudulanjanli , P. Sanjana DOI : https://ijcnwc.2024.v14.i01.pp01-10 |
1-10 | ![]() |
12 | thaibet55.comDATA ACCESS CONTROL USING COMBINED COMPRESSION AND SECURITY MODEL FOR CLOUD STORAGE Author(s): M. Sravan Kumar Babu , Ch. Nikitha , Ch. Hamsini , Shivani Gentyala , D. Sneha DOI : https://ijcnwc.2024.v14.i01.pp01-09 |
1-9 | ![]() |
13 | prediction of road accident spot based upon wheather and road conditions using Machine learning Author(s): Mr.MV.Satyanarayana , G.Akshaya Reddy ,G.Deepthi ,G.Vijaya Laxmi DOI : https://ijcnwc.2024.v14.i01.pp01-10 |
1-10 | ![]() |
14 | kuyuluk.comPREDICTIVE TRAFFIC AND INCIDENT ANALYSIS THROUGH INTEGRATED DATA FUSION SYSTEM Author(s): Dr.Kundunuri Ramakrishna , G.Akhila , Pavani , Sahasra DOI : https://ijcnwc.2024.v14.i01.pp01-15 |
1-15 | ![]() |
15 | RAISE FUNDS ONLINE FOR MEDICAL EMERGENCIES AND SOCIAL CAUSES USING DJANGO Author(s): Ms.Aarthi Kasthuri ,G. Spoorthy, G. Sri Tejaswi , G. Akshaya DOI : https://ijcnwc.2024.v14.i01.pp01-10 |
1-10 | ![]() |
16 | Real Estate appraisal based on images using RNN Author(s): Ms.Manasa Spandana ,Swathi , Khyathi ,Rajasree DOI : https://ijcnwc.2024.v14.i01.pp01-14 |
1-14 | ![]() |
17 | soccer918.comReject-aware Multi-Task Network: Advancing Credit Scoring through Modeling Missing-not-at-random Data in Finance Author(s): Dr.DBK.Kamesh , Farah Tazeen ,Harshitha ,Bhuvana Ramya DOI : https://ijcnwc.2024.v14.i01.pp01-16 |
1-16 | ![]() |
18 | CONTINUOUS PEOPLE CROWD MONITORING DEFINED AS A REGRESSION PROBLEM USING RADAR NETWORKS Author(s): B.Sandhya, Gajji Chakrapani, Bethi Divya,Vuppala Likitha, Avula Rishikesh Shivadhar Reddy DOI : https://ijcnwc.2024.v14.i01.pp01-08 |
1-8 | ![]() |
19 | Analysis and Prediction of Road Accident using machine learning techniques Author(s): B.HARIKUMAR, GADDAM MANISHA REDDY, JAKKIDI GIRIKANTH REDDY, PEMMARAJU VENKATA SRICHARAN, SILIVERU PAVAN TEJA DOI : https://ijcnwc.2024.v14.i01.pp09-13 |
9-13 | ![]() |
20 | PREDICTING WATER QUALITY USING MACHINE LEARNING Author(s): DR.ADELINA JOHNSANA, MASHETTY BHAVYA, T BHUVANESHWAR REDDY, THUMMA SUPRIYA, SETTI JASWANTH DOI : https://ijcnwc.2024.v14.i01.pp14-25 |
14-25 | ![]() |
21 | Sentiment Based Product Recommendation System Using Machine Learning Techniques Author(s): DEEPA D, BEEREDDY NIKHILA, PEDELLI SAI KRISHNA, BARRY BENRICH MARTIN, PENUGONDA RISHITHA DOI : https://ijcnwc.2024.v14.i01.pp26-33 |
26-33 | ![]() |
22 | Integrating artificial intelligence in cyber security for cyber-physical systems Author(s): G.UMA MAHESHWARI, THOKALA N SHREYA, CHERUKUPALLI AKSHITHA, B SAI CHARAN, A RAHUL DOI : https://ijcnwc.2024.v14.i01.pp34-54 |
34-54 | ![]() |
23 | COMPARATIVE ANALYSIS OF INTRUSION DETECTION SYSTEMS AND MACHINE LEARNING BASED MODEL ANALYSIS THROUGH DECISION TREE Author(s): K.Jothsna, Vallakonda Hyndavi, Siga Devayani, Pinneboina Sridhar Kumar,Devarai Nikhileshwari DOI : https://ijcnwc.2024.v14.i01.pp55-62 |
55-62 | ![]() |
24 | ROBUST ADVERSARIAL ATTACKS DETECTION BASED ON EXPLAINABLE DEEP REINFORCEMENT LEARNING FOR UAV GUIDANCE AND PLANNING Author(s): K.Jothsna, Arsha Saketh,Golla Guna Sindhu,Amirineni Nikhil,Choutukuri Rohith DOI : https://ijcnwc.2024.v14.i01.pp63-68 |
63-68 | ![]() |
25 | PRIVACY-PRESERVING ON-SCREEN ACTIVITY TRACKING AND CLASSIFICATION IN E-LEARNING USING FEDERATED LEARNING Author(s): Dr. K.Gunasekaran, Ravi Vaishnavi, B.Yashaswini, B.Hupsika, P.Abhishek DOI : https://ijcnwc.2024.v14.i01.pp69-77 |
69-77 | ![]() |
26 | CONSUMER BEHAVIOUR ANALYTICS USING MACHINE LEARNING Author(s): C.Priyanga, B.Ventkata Ranga Sai Teja ,G.Srujan Chandra, M.Gayathri, D.Manish Kumar DOI : https://ijcnwc.2024.v14.i01.pp78-86 |
78-86 | ![]() |
27 | DETECTION OF SOCIAL NETWORK SPAM BASED ON IMPROVED MACHINE LEARNING Author(s): M.Kavitha, J.Akanksha, K.Ashwitha, P.Sai Kumar, P.Sai Kiran, C.Soumya DOI : https://ijcnwc.2024.v14.i01.pp87-95 |
87-95 | ![]() |
28 | Brain tumor detection using deep learning Author(s): K. PRIYANKA, SATHURU MOUNUSHA, VENEPALLY THAPASWI, VOGGU AKHIL, A KESHAVA, BONTHA VIVEK REDDY DOI : https://ijcnwc.2024.v14.i01.pp96-101 |
96-101 | ![]() |
29 | An object oriented web text model for testing web application Author(s): J. SASIREKHA, KADAR HARIKA, ATIF ABDUL RAHEEM, CHANDA VINAY KUMAR REDDY, NAREDDY VARUN REDDY DOI : https://ijcnwc.2024.v14.i01.pp102-109 |
102-109 | ![]() |
30 | A HYBRID METHOD TO ENHANCE SMART TRAFFIC MANAGEMENT IN CITIES USING MACHINE LEARNING Author(s): Y.HARATHI, G.AKSHITHA REDDY, DURGAM ROHAN YADAV, KANDULA VAMSHI, KAMBHAMPATI SHILPAUG DOI : https://ijcnwc.2024.v14.i01.pp110-113 |
110-113 | ![]() |
31 | Prediction of crop yield Author(s): Mr.B.Suresh Ballala, Guda Reshma,K.Srujana,Karthikeya Kotagiri,Gorige Nagaraju DOI : https://ijcnwc.2024.v14.i01.pp114-132 |
114-132 | ![]() |
32 | IMAGE DEHAZING WITH BOUNDARY CONSTRAINT AND CONTEXTUAL REGULARIZATION BASED ON PYTHON Author(s): Dr.Martin Sahayaraj, Lakkireddy Adhikeshava Reddy, Kotla Karthikeya, Kota Praneeth Reddy, M Rajashekar DOI : https://ijcnwc.2024.v14.i01.pp133-139 |
133-139 | ![]() |
33 | SOLDIER HEALTH AND POSITION TRACKING SYSTEM USING GPS AND GSM Author(s): Mr. P. Prashanth, Ganta Abhisri, Gurram Surender Reddy, Kaki Harshavardhan Goud, Gatla Varshith Reddy DOI : https://ijcnwc.2024.v14.i01.pp140-149 |
140-149 | ![]() |
34 | WIRELESS BLACK BOX FOR VEHICLES USING GSM AND GPS Author(s): Mr.A.Venugopal, R.Vinesh kumar, R.Vignesh Goud, P.Sai Shashank, N.Pranay reddy DOI : https://ijcnwc.2024.v14.i01.pp150-156 |
150-156 | ![]() |
35 | BLUETOOTH BASED TRAFFIC AMBULANCE SYSTEM Author(s): Ms. B.Hemavathi, P.Amulya, M.Gopi, M.Srinadh, M.Arun Kumar DOI : https://ijcnwc.2024.v14.i01.pp157-166 |
157-166 | ![]() |
36 | RFID BASED SECURITY AND ACCESS CONTROL SYSTEM Author(s): Mr. K.Jail Singh, Sama Pallavi, Mannepally Mahendar Reddy, S Harshavardhan, Pathlavath Bharath Raj DOI : https://ijcnwc.2024.v14.i01.pp167-172 |
167-172 | ![]() |
37 | MLP-CNN AND SVR APPROACH FOR MONTHLY RAINFALL PREDICTION USING PYTHON Author(s): MR. E. PARASHU RAMU, SIRIGIREDDY HARSHITHA, TALLA SADHANA, KAMPASATI SHIVA KRISHNA, NIMMAGADDA SRI SAI RUTHWIK DOI : https://ijcnwc.2024.v14.i01.pp173-178 |
173-178 | ![]() |
38 | CNG AND LPG GAS ACCIDENT PREVENTION USING GSM Author(s): Mr. B. THIRUPATHI, Tahrin, Thangellapalli Saiteja, Kethiri Sriharsha, Usirikapalli Pranay Kumar DOI : https://ijcnwc.2024.v14.i01.pp179-185 |
179-185 | ![]() |
39 | FAKE ACCOUNT IDENTIFICATION ON SOCIAL NETWORKING SITES USING MACHINE LEARNING Author(s): Ms. K.Sravani, Vadrangi Aakanksha, Yerrolla Anusha, Shaik Sameer, Yeluguri Shashank DOI : https://ijcnwc.2024.v14.i01.pp186-191 |
186-191 | ![]() |
40 | ARTIFICIAL INTELLIGENCE IN MUSCULOSKELETAL X-RAY FRACTURE DIAGNOSIS Author(s): Mrs. R. Rachel Kaveti Risheek, G Nithin Kumar, M Siddartha Chowhan DOI : https://ijcnwc.2024.v14.i01.pp192-196 |
192-196 | ![]() |
41 | DEEP LEARNING TECHNIQUES FOR OBJECT DETECTION USING OPENCV AND YOLO Author(s): Mr. B Pradeep Kumar, Bommineni Vedavyas Reddy, Nethi Murali, Chinthaboina Ravi Teja, Vijay Gidde DOI : https://ijcnwc.2024.v14.i01.pp197-201 |
197-201 | ![]() |
42 | LEAF DISEASE IDENTIFICATION AND CLASSIFICATION USING DEEP LEARNING TECHNIQUES Author(s): Mr.Mandala Rajkumar, Manthena Rajitha, Kamavaram Sai Prathik, Muppanapalli Alekhya Sri, Tekula Karthik Reddy DOI : https://ijcnwc.2024.v14.i01.pp202-209 |
202-209 | ![]() |
43 | EMOTI SCORE: HARMONISING MUSIC AND EMOTION WITH VGG 19 AND RESNET Author(s): Ms. CH Sandhya, Chennaram Vidyananda, Gobburi Yeshwanth, Tanguturi Venkata Sai Sharath, Kandewar Harshith Reddy DOI : https://ijcnwc.2024.v14.i01.pp210-214 |
210-214 | ![]() |
44 | FAKE JOB RECRUITMENT DETECTION Author(s): Ms. V.Prathyusha, A.Sukesh Reddy, A. Nandan Kumar, E. Gowtham Reddy, T. Akhileshwar Reddy DOI : https://ijcnwc.2024.v14.i01.pp215-220 |
215-220 | ![]() |
45 | PREDICTION OF AIR USING MACHINE LEARNING Author(s): Dr. NC Senthil Kumar, B.Poojitha, B.Ramu, B.Shravana Lakshmi, C.Shailesh DOI : https://ijcnwc.2024.v14.i01.pp221-230 |
221-230 | ![]() |
46 | CREDIT CARD FRAUD DETECTION Author(s): Ms, V. Sunitha, CH.SaiPragathi, D.Manasa, A.HarshaVardhan, D.Vikas DOI : https://ijcnwc.2024.v14.i01.pp231-241 |
231-241 | ![]() |
47 | Smart System for the Neonatal Intensive Care Unit Author(s): Mr. N. Murugan, Dr. L. Vigneash, Dr. D. Satyaraj, Mr. P. A. Prassath Mrs. D. Chitra DOI : https://ijcnwc.2024.v14.i01.pp242-252 |
242-252 | ![]() |
48 | An Effective Solution for Riders: An Analysis of Smart Helmets and the Design of an Internet of Things (IoT) Based Smart Helmet Author(s): Dr. L. Vigneash , Dr. D. Satyaraj , Mr. P. A. Prassath , Ms. C. Sasikala Mrs. D. Chitra DOI : https://ijcnwc.2024.v14.i01.pp253-259 |
253-259 | ![]() |
49 | An Extensive Model for Short-Term Wind Speed Forecasting Based on a Combination of Classical and Quantum Theories Author(s): Dr. D. Satyaraj , Mrs. D. Chitra , Ms. C. Sasikala , Dr. L. Vigneash Mr. N. Murugan DOI : https://ijcnwc.2024.v14.i01.pp260-272 |
260-272 | ![]() |
50 | DATA MESH: DECENTRALISED DATA MANAGEMENT Author(s): Krishna Prasanth Brahmaji Kanagarla DOI : https://ijcnwc.2024.v14.i01.pp273-278 |
273-278 | ![]() |
51 | An Algorithm for Facial Recognition and Tracking Through Serial Communication Between MATLAB and Arduino Author(s): Dr. A. Venkateswarlu, Mr. T. Gangadhar, Mrs. K. Yojana, Mrs.G.Usha DOI : https://ijcnwc.2024.v14.i01.pp279-282 |
279-282 | ![]() |
52 | A Raspberry-PI-Based System for Vehicle Number Plate Recognition Author(s): Dr. K. Amit Bindaj, Mrs. K. Yojana, Mrs. G. Usha, Mr Ch. Gopala Rao DOI : https://ijcnwc.2024.v14.i01.pp283-285 |
283-285 | ![]() |
53 | Detection And Prediction Of Comorbidities Of Diabetes Using ML Techniques Author(s): J.Vijaya lakshmi, CH.Archana, V.Sravanthi, THALLAGUDEM GOUTHAM DOI : https://ijcnwc.2024.v14.i01.pp286-293 |
286-293 | ![]() |
54 | Classification of plant seedlings using deep convolutional neural network architecture Author(s): B.Raghupathi, G.Venkatesh, Dr.U.Naresh, TARUNOJU KOMALIKA DOI : https://ijcnwc.2024.v14.i01.pp294-301 |
294-301 | ![]() |
55 | Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain- Based IIoT Networks Author(s): S.Varalakshmi, CH.Sangeetha, K.Lakshmi Kalpana, NENDUGURI SAI NITHIN DOI : https://ijcnwc.2024.v14.i01.pp302-309 |
302-309 | ![]() |
56 | A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution Author(s): Dr.P.Satish Reddy, Asif Ahmed Algur, Dr.M.Muthukumaran, PUNNA VYSHNAVI DOI : https://ijcnwc.2024.v14.i01.pp310-317 |
310-317 | ![]() |
57 | Optimized Design and Modelling of Microstrip Patch Antenna for 5G Mobiles Author(s): Dr. Y. Srinivas, K. Keerthi, K. Revanth, M. Sai Pavan DOI : https://ijcnwc.2024.v14.i01.pp318-321 |
318-321 | ![]() |
58 | Emerging Cyber Threat Detection and Profiling via Natural Language Processing Author(s): Mrs.T.Sashirekha, G.Yashaswini DOI : https://ijcnwc.2024.v14.i01.pp322-330 |
322-330 | ![]() |
59 | Enhancing IoT Device Security and Transparency in Healthcare Through Blockchain Technology Author(s): Mrs.K.Sheetal, K.Hindhu DOI : https://ijcnwc.2024.v14.i01.pp331-338 |
331-338 | ![]() |
60 | study using the K-means clustering method Author(s): B.Sai teja, M.Muthukumaran, C.Manikandan DOI : https://ijcnwc.2024.v14.i01.pp339-342 |
339-342 | ![]() |