List of Accepted Papers For Both Proceedings and Presentation

Paper ID Authors Title
11 Pankaj Rawat Blockchain based Federated Deep Learning Framework for Malware Attacks Detection in IoT Edge Devices
12 Ekrem Savas On Some Sequence Spaces of Fuzzy numbers Defined by Sequence of Infinite Matrices
16 Kalaiselvi T and Yegnanarayanan Venkataraman Computation of Various Domination Numbers of a Family of 3-regular Graphs
22 Aadi Gupta, Priya Gulati and Siddhartha Chakrabarty Classification based credit risk analysis: The case of Lending Club
27 Anshuman Tyagi, Pawan Singh and Harsh Dev Self-Improved Namib beetle optimization Trained Hybrid Model for Human Activity Recognition
29 Biman Sarkar, Priya Sharma and Soumen De Analysis of oblique wave scattering by a thick bottom-standing barrier placed in between a pair of thin partially immersed barriers
35 Rachna Sachdeva and Ashok Agarwal Modified lattice paths and Gordon-McIntosh eighth order mock theta functions
36 Redwan Walid, Lavanya Elluri and Karuna Joshi Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations
38 Mohammad Alakhrass LIEB FUNCTIONS AND PPT MATRICES
47 Babita Mehta and P.K. Parida Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold
49 Hidenori Ogata Method of fundamental solutions for doubly peridic potential problems
50 Parvathi Pradeep, Premjith B, Nimal Madhu M and Gopalakrishnan Ea A Transformer-based Stock Market Price Prediction by incorporating BERT Embedding
54 R Karthika and V Renukadevi Equivariant LS-category and topological complexity of product of sevaral manifolds
57 Sapan Kumar Nayak and Pradip Kumar Parida Real dynamics of a sixth-order family of derivative free iterative method without memory
63 R. Deb and A.K. Das On the solution set of semi-infiite tensor complementarity problem
66 Manikandan V and Monikandan S Reconstruction Number of Split Graphs
68 Rajeswari Devadoss and Kolin Paul Symmetry Decision Diagram: A Powerful Update for the BDD
79 Jaya Sudha, Hariprasath C and Senthil Kumaran R Design of Microstrip Rectangular Dual Band Antenna for MIMO 5G Applications
85 Phani Kumar Nyshadham, Levin Dabhi, Archie Mittal and Harsh Kedia Geometric Algorithm for Generalized Inverse of Rank Deficient Real Matrices
87 Ramkumar S B and Renukadevi V Stabilizer group of set ideals
100 Samar Idris and Rifat Colak Lambda – statistical derivative
104 Vishnu Pendyala, Samhita Konduri and Kriti Pendyala Analysis of Multi-language Regional Music Tracks using Representation Learning Techniques in Lower Dimensions
107 J Jenifa and J Christy Roja Overlapping Iterative Numerical Method for Solving Systems of Singularly Perturbed Convection Diffusion Problems with Mixed Type Boundary Conditions
112 Po-An Shih, Cheng-Che Wu, Chia-Hsin Huang and Arijit Karati Effective Data Transmission in NDN-Assisted Edge-Cloud Computing Model
121 Sk Hafizul Islam, Purnendu Vashistha, Aman P. Singh, Aman Kishore and Jitesh Pradhan ResNet-CPDS: Colonoscopy Polyp Detection and Segmentation Using Modified ResNet101V2
122 Bhagya Shree Meena A Numerical Study on DPL Bioheat Model in Tumor with Irregular Geometry during Magnetic Hyperthermia Treatment
127 Sheela Rani M and Dhanasekar S Fuzzy MCDM techniques for analysing the risk factors of COVID-19 and FLU
141 Ishwariya R Robust Numerical technique for a class of singularly perturbed nonlinear system of n-differential equations with Robin boundary conditions
144 Arockiaraj S and Gurusamy R SUPERIOR WIENER INDICES OF GRAPHS
151 Sakthidevi I, S J Subhashini, Jeyaraj Jane Rubel Angelina, Venkataraman Yegnanarayanan and Kundakarla Syam Kumar Leveraging Meta-Learning for Dynamic Anomaly Detection in Zero Trust Clouds
153 Helda Rajendran and Kalpana Mahalingam Properties of m-bonacci words
157 Amit Sardar and Dipanwita Roy Chowdhury Key Dependent Dynamic Sbox for Kasumi Block Cipher
164 Debranjan Pal, Mainak Chaudhury, Abhijit Das and Dipanwita Roy Chowdhury Deep Learning Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations
165 Sumathi Ganesan and Mahalakshmi G ANALYSIS OF BLOOD TRANSFUSION DATASET USING DATA MINING TECHNIQUES
167 Christopher Samuel Raj Balraj and Nagaraj P Prediction of mental health issues and challenges using hybrid learning techniques
176 Abhishek Manchukonda Advancing Time Series Forecasting: LSTM Networks with Multiple Attention Mechanisms
182 Narmada Devi R and Sowmiya S Solving of Assignment Problem by Pythagorean Octagonal Neutrosophic Fuzzy Number
185 Jayrama H R, Naveenkumar S. H and Chaithra C. N Uniqueness of Meromorphic Functions Concerning Non-linear Differential Polynomials Sharing Certain Value CM and IM
209 Ali Al-Sharadqah and Giuliano Piga Concentric Ellipse Fitting Problem: Theory and Numerical Implementations
212 Kokila R and Thangavelu P FFT based image registration using Stationary Wavelet Transform and edge features
218 Shuddhashil Ganguly, Himadri Mukherjee, Ankita Dhar, Matteo Marciano and Kaushik Roy ChiBa – A Chirrup and Bark detection system for Urban Environment
220 Soumen Sinha, Pranav Sunil, Neha Bharill and Om Prakash Patel HybridSeqNet: Integrating Convolutional and Long Short-Term Memory Networks for Protein Classification
223 Shanmugarajeshwari V Chronic Kidney Disease Detection in Healthcare Experts System using Squeeze Net Model with Cuckoo Search Optimization Algorithm
250 Joyanta Kumar Majhi and A. K. Das Pricing and retailer service strategy in a closed-loop supply chain as a response to showrooming effect
254 Amit Tripathi, Rachna Bhatia, Pratibha Joshi and Anand Kumar Tiwari A computational study of time dependent nonlinear Schrodinger equation with cubic nonlinearity
258 Rajalaxmi G, Vimal S E and Janani Selvaraj Water Body Segmentation for Satellite Images Using U-Net++
267 Sundareswaran N, Sasirekha S, Vijay M and Vivek Rabinson Rabinson Supporting Smart Meter Context Management using OWL Ontology and Hyperledger Fabric Blockchain
268 Janani Selvaraj and Prashanthi Devi Marimuthu Modeling Vegetation Dynamics: Insights from Distributed Lag Model and Spatial Interpolation of Satellite Derived Environmental Data
276 Anisha Mitra and Dipanwita Roy Chowdhury Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter Defibrillators

List of Accepted Papers Only For Presentation

Paper ID Authors Title
1 Karan Timmala and Kavitha D CERVICAL SPINE FRACTURE DETECTION USING DEEP LEARNING
2 Dr Sushil Shukla Totally Umbilical Lightlike Hypersurfaces of Kenmotsu Space Form
3 Shivanshu Singh, Faizan Karim and G. Parimala Classification and Interpretation of various stages for Diabetic Retinopathy using Deep Neural Network
4 P.Phani Krishna Raju, N.Sai Sreenivas and Dr. Viji Amutha Mary VISION BASED COMMUNICATION LANGUAGE FOR DIFFERENTLY ABLED PEOPLE USING MACHINE LEARNING ALGORITHM
5 Saheli Thakur, Santonu Naskar, Kankona Chowdhury, Aritra Banerjee and Souvik Majumdar Survey of Advancements in State-of-the-art (SOTA) Deep Neural Approaches for Machine Reading Comprehension
6 Niteesh Satya Sai Boddapu, Veera Venakata Sai Tirumalasetty, Nidita Pasapula, Krishna Reddy Thota Muddula and Ramesh Kumar Reddy Veeram Reddy A Deep Learning based Recognition of Human Activity
7 Rachit Sachdeva, Sarthak Katyal, Krishan Kant Choudhary and Rohit Kaushik Sensory Perception of Haptic Rendering in Surgical Simulation
8 Abinaya K, Ishwarya K and Saraswathi S Plant Leaf Classification Using a Compact Deep Learning Model Use of VGG-16
9 Susmitha A Thread Hunting 101: Hunting with YARA Rules
10 Kuldeep Yadav and Neetu Gupta UTILIZING QR CODES, CRYPTOGRAPHY, AND WEB SERVICE FOR PRODUCT AUTHENTICATION.
13 Pavan Kumar Boddapati, Nagarajan M.K and Venu Gopal Reddy Kamjula Smart Electricity Billing System
14 Uppada Triveni, D Swapna, Vadithya Vandana and Medisetti Rachana Analysis of Electronic Cryptogram
15 Riya Solanki and Payal Chaudhari Collusion – resistant Encryption scheme for VANET with Fine-grained Access Control System
17 Shreyash Gondane, Saharsh Wasnik, Sanjay Jengthe, Shubham Paunikar, Rutuja Pohare and Ritu Pawar Contract/Tendering System using Block-chain
19 Jayesh Patel and Kirit Modi Mathematics and Artificial Intelligence: Exploring Synergies for Advancements
20 Vidhi Patel, Dr. Jayesh Patel and Dipika Patel Study on Meningitis through Mathematical Model
21 P Jeyalakshmi and K Karuppasamy Nordhaus-Gaddum type results for domination number of a signed graph
23 Shakrajit Sahu and Christopher Clement J Model Selection for Gaussian Process Using Regression Algorithms
24 Shivran Priyanka Sureshkumar and Monika Saxena Garbage Classifier for Effective Waste Management Using Deep Learning : An Overview
25 Ahamed Nishath S and Murugeswari R A Review on On-line Fake News Detection Based on Advanced Deep Learning Models
26 S. Maragathasundari, C. Swedheetha and K. Karthikeyan Queuing study in smart car technology
28 Dr Bhagya P, Sangamkumar H and Dr Lalitha Y S An Efficient Multibiometric Crypto-key generation
30 Ashraf Alam Driving Effective Teaching-Learning Practices: Exploring the TF-IDF Model and Python for Educators
31 Ashraf Alam Empowering Educators by Transforming Classroom Teaching-Learning with TF-IDF Model and Python: A Practical Guide for Teachers
32 Ashraf Alam Empowering Educators through Data Analysis: A Practical Guide for Transforming Classroom Teaching-Learning with TF-IDF Model
34 C Gayathri, S Saravanakumar, Yegnanarayanan Venkataraman and K Karuppasamy On Some Packing Set Variations of Graphs
37 Priyanka G, Nivaashini M and Sivaranjani S Efficient Deep Learning based approaches for Early diagnosis of Diabetes Mellitus
39 Eka Ogbaji, E.S. Onah and T Aboiyar Stochastic matrix for stock markets model
40 Sivanandha Saraswathy and Lakshmi T Fuzzy Boundary Graphs and its Dynamics
41 Jackson J and Perumal R A public key exchange protocol using tropical determinant
42 Ponmaheshkumar A and Perumal R A lightweight key exchange protocol based on max-product semiring
43 Ramagiri Praveen Kumar, Kalyan Chatterjee and M Raju VORONOING LOCATION SPECIFIC DATA
44 Shalini K and Sridevi Polasi Different crop plans using Goal Programming and R programming
45 Nathan Chane De la Cruz, Rocky Bigcas and Jerico Bacani The search for solutions of the Diophantine equation a^x + b^y + c^z = w^2 with Pythagorean triple bases
46 Shahin Shaikh and Rupal Shroff ON THE LINE ZERO DIVISOR GRAPH OF SMALL FINITE COMMUTATIVE RINGS.
51 Nagarajan M, Karthik K and Chandrasekaran P Existence Solution for Sobolev Type Fuzzy Neutral Integrodifferential Evolution Equation in n – Dimensional Fuzzy Vector Space
52 Neha Kaliya, Dr. Digambar Pawar and Adesh Raut A Novel Lightweight Authentication and Privacy Preservation Model (NoLAPP) for Fog Based Smart Grids
53 Srividya M, Vidhya D and Saranya V ON SOME PROPERTIES OF FUZZY ROUGH ALGEBRAIC TM PRODUCT SYSTEM
55 Rajasekaran G and Uma L On local Antimagic Coloring of Some Graph Classes
56 Pradip Kumar Parida and Naveen Chandra Bhagat Convergence of Newton-Steffensen method under Lipschitz continuous second derivative
59 Ambika M, Selvarathi M and Dhanya V An Overview of Ϯξ – ₳ℱ – Subgroup over a Boolean Lattıce
60 D Vidhya, V Saranya and M Srividya A Continuous Functions on Fuzzy Automata Lindelöf Structure Spaces
62 Yogalakshmi Y, Mary U and Sreeja S A STUDY ON EXTENDED DISTANCE ENERGY OF SOME GRAPHS
64 Priyalatha S.P.R, Vanitha S and Witczak T New Form of Continuity in Nano Soft s (I) Space
65 Reny Jose and Ponmozhi K Spices classification using Computer vision and Deep learning algorithms with special reference to YOLO v8
67 S Karpagam, B Somasudaram, R Lokesh and Kavin Sagana Mary A An M^X/G/1 queueing system with Optional Service, Immediate Feedback and Bernoulli Vacation
69 D Brightlin and G Dominic Babu Fibonacci Heat Equation Generated by Two and Three Dimensional Difference Equation
71 Dhanya V, Selvarathi M and Ambika M A Systematic Approach to the Homomorphism on the Jp Neutrosophic Δϝ Subgroup
72 Abirami K, Mohanapriya N and Dafik D On Edge-Equitable Antimagic connection number of Ladder graph families
73 A. Anthony Raj, S. Prathap and D. Madhavakumar An Application of Pythagoras theorem from Heron’s formula to derive the foci of an Ellipse
74 Ashokkumar Kulandasamy and Dharshan Dharshan OPTIMIZED FRAMEWORK FOR HIGH-SPEED OBJECT DETECTION IN BADMINTON USING DEEP LEARNING
75 Chithrakumar Thangaraj, Dr.Thangamani M and M.Deepak M Leveraging Internet of Things and Artificial Intelligence for Climate Monitoring and Reporting
76 Chithrakumar Thangaraj, Arvindh C C, Ashwanth K A K A and Akshai P P AUTOMATIC NUMBER PLATE DETECTION SYSTEM
77 Krishnamugundh P, Karmel Arockiasamy, Kanimozhi G and Karthika P Analysis on Fertility of Soil Parameters using Machine Learning Algorithms
78 Aishworyann, Shrey Kansal, Vibhor Mishra and Dr. Krishnendu Rarhi IMAGE ENCRYPTION USING 4D CHAOTIC MAP, RANDOM PIXEL PERMUTATION, IMAGE AS A KEY AND DNA ENCODING ON MULTILAYERS OF CHAOTIC SEQUENCE
80 Jaya Sudha, Senthil Kumaran R, Balakumaran M and Athiyaman M Smart Portable Ventilator for Covid19 Patients
81 Merlin C D, Divya M, Divyajothi M and Durga Dharshini M Sensing an Activated Mobile Phone by using Transmitted Signals
82 Merlin C D, A Darwin, M. Gowtham and R. Danushkodi Design of an Home Automation System with Voice Controlled Application using Arduino
83 Dr. Premkumar M, Prasanna A and Juliet Jeyapackiam J On fundamental Computational Properties μ-Anti-Fuzzy Subgroups
84 Mahalakshmi Ayyavoo and Velmathi Guruviah Review on Medical Image Segmentation and Encryption using GAN
86 M Jayalakshmi, B Vighnesh and S Durga Sai Sriram A Machine Learning Approach to Driver Drowsiness Detection Using Eye Aspect Ratio
88 Veeralagan J and Manju Priya S Identification of Alzheimer’s Disease using K-Means for Pet Scan Datasets
89 Anitha Ponraj Real time 2D object detection in vehicles using YOLO
90 Suruthi K, Yuvaraj K, Navinkumar S, Arul Karthikeyan O and Kathiravan E Real-time Vehicle load Prediction and Indication system
91 Ms. Aruna Arumugam G and Dr. Mohamed Divan Masood M Detecting the causes of cancer by DNA sequence mutation (Mutant p53) using deep learning computational model
92 Soham Mitra, Navya Verma, Logeshwari V and Pattabiraman V Dental Cavity Classification using Convolutional Neural Network
93 Amutha S, Vamsi Pydipati, Kandi Manikanta Reddy, Chekka Mahesh, Pilli Vamsi Krishna Reddy and Konda Ashok Reddy Driver Drowsiness Detection System using OpenCV and Keras
94 Vijayalakshmi P, Karuppasamy K and Win Mathew John Towards Restrained Pitchfork Domination: An Efficient Congestion Control Mechanism In Ad-hoc Networks
95 Chitra Ganesan ODD-FIBONACCI PRIME EDGE ANTI-MAGIC LABELING OF SOME SPECIAL GRAPHS
96 Sangeetha H, Varshini V and Vibhushitha L Career Prediction System
97 Aanandaram Velavan and Deepalakshmi P BLOCKCHAIN-BASED DIGITAL IDENTITY FOR SECURE AUTHENTICATION OF IOT DEVICES IN 5G NETWORKS
98 A Ahila QUAKE OF EDGE SUNDER ON BLAST DOMINATION NUMBER
99 Karthick P, Muthukani Vairavel T, Thangapandi K and Sundaresan P Analysis on Spherical Fuzzy Graphs with Dombi Operator
101 Shuhan Zhang, Zhihang Xiao, Qiao Bi, Minjie Hu and Tao He What’s your next guess? Solution Word classification prediction model based on multi-dimensional feature Vector and MIMO-LSTM
102 Vimala Devi Pandian and Yegnanarayanan Venkataraman On Some Interesting Connection Between Graph Coloring and Associated Topological Structures
103 Kotte Sai Vamsi, Kothakota Mohamad Feroz, Kotha Ruthwik Saran, Kristipati Ravindra Reddy, Dandhuluri Varshith Varma and Dr Jayalakshmi Murugan Logo Detection By Using The Deep Learning Model
105 Haripriya K, Harshini V, Jolinemelina A, Dr.Shahulhammed S, Preethi C and Dr. Pavalarajan S Drunkand DriveDetection systemfor Two-wheelers usingIOT
106 Saravana Priya S, Suneela J and Prathyush Agarwal Python-based engine power estimate for bulk carrier using ship’s displacement
108 Sundaresan P, Joseph Kennedy A, Karthick P and Muthukani Vairavel T Generators of Class Partition Algebra and G-edge colored partition as a Centralizer algebra of wreath product of an alternating group and G
109 Heber Hernández, Elisabete Alberdi Celaya and Aitor Goti A comparative analysis of kriging and neural networks for mineral resource estimation
110 S Ravikumar and B. Reddappa The consequence of slip boundary conditions, Hall current and Soret-Dufour forces on the dynamics of a Jeffery fluid in a tapered conduit with vertical asymmetry
111 R. Sathish Srinivasan, R. Ezhilarasi, T.V. Sudharsan and G. Murugusundaramoorthy ON A NEW CLASS V ̃_q^* (k,γ,R,S) OF SYMMETRIC q- HARMONIC UNIVALENT FUNCTIONS RELATED TO SYMMETRIC CONVOLUTED OPERATOR
113 Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P and Aushika D Computational and microbial analysis of metagenome of commerically available cookies revealed the presence of numerous bacteria
114 Radhika Vs and Radhika Vs CONNECTED VERTEX-EDGE DOMINATING SETS AND CONNECTED VERTEX-EDGE DOMINATION POLYNOMIALS OF LOLLIPOP GRAPH L_(n,1)
115 Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. Computational analysis of the putative beta-galactosidases of Cellulomonas gilvus ATCC 13127
116 Sreenivasulu Reddy L, Devendra Jangiti and Kotte Amaranadha Reddy Counting of Various Type of Cycles in Topology based Graphs
117 Maheswari M and Brintha N.C Detection of Various Casting Defects in Manufacturing Sectors using Deep Learning
118 Kameswari M and Muthumari U On f-Topological Spaces
119 Muthukani Vairavel T, Joseline Manora J, Karthick P and Sundaresan P MAJORITY AND CONNECTED MAJORITY DOMINATION ON EDGE ADDITION GRAPHS
120 V Renuka Devi and Greeshma Mahesh Extension of ideals
123 Sapna S and Biju R Mohan A Neural Network Model for Implied Volatility Estimation of Options: A Use Case for Indian Option Market
124 Pavithra R, Indira Priyadharshini M and Dhivyashree M A COMPREHENSIVE SURVEY ON SMART AGRICULTURE USING IOT
125 Dhivyashree M, Vishnu Durai Rs and Pavithra R AN AI-DRIVEN MODEL FOR DECISION SUPPORT SYSTEMS
126 S Pooja, M Vigneshwaran and L Vidyarani On α*g#φ-closed sets in Topological Spaces
128 Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. Computational analysis of the putative endoglucanases in the genome of Cellulomonas flavigena ATCC 53703
129 Tharakeswari V, Kameswari M and Kavitha S WARI’S Algorithm for Ranking Triangular Fuzzy Numbers
130 Revathy G LAND RATE PREDICTION USING COMPUTATIONAL INTELLIGENCE
131 Revathy G COMPUTATIONAL INTELLIGENCE FOR LEAF DISEASES MONITORING USING UAV IMAGES
132 Revathy G Bee Topology Of Wireless Ad Hoc Networks BTWANET
133 Archana D WIRELESS SENSOR NETWORK-LOCATION METHODOLOGY AND ITS REAL TIME APPLICATION
134 Dr.M Sangeetha and T Mummoorthy Fractional Programming for Undetermining Multi-Objective Transportation Problem with Goals using Fermatean Fuzzy Number
135 Maheswari B and Chitra V Tangent Similarity Measure and Weighted tangent similarity measure of Infra Fuzzy Sets and its Application
136 Debapriya Biswas and Ipsita Rajwar Projective disk and Poincar\'{e} disk: Exploring $\text{SL}(3,\mathbb{R})$ action from an Erlangen perspective
137 G.Somasundara Ori and Abirami B MODELLING OF NEUTROSOPHIC THEORY BULK QUEUEING SYSTEM
138 Elakiya E, Tejus Paturu, Chaithanya Naik Keluth and Sai Tarun V Investigating Feature Extraction and Classification Algorithms for Effective Lung Disease Detection using Chest X-ray images
139 Arkady Wey, Chris Breward, Jon Chapman and Ian Griffiths Multiscale models for particle-laden flow through periodic networks
140 Sai Hanwith Bellamkonda, Aditya Vardhan Kadambari, Sai Kiran Rachakonda, Vamsi Krishna Panchadi and Gireesh Kumar Tanavarapu Grammar Error Correction using Monotonic Attention
142 Parivazhagan A and Jairus Ponrabi Smart Stick – A Device for Obstacle Detection and Location-Based Assistance for the Blind
143 Giri Hallur, Ashok P and Aslekar Avinash Virtual Threads of Connectivity: Telecom Software Insights
145 Saravanan S and Gunasekaran S FIXED POINT OF BIANCHINI TYPE CONTRACTION ON S-METRIC SPACE WITH AN EIGEN VALUE PROBLEM
146 Maheshprabha M and Kameswari M APPLICATIONS OF POSSIBILITY PYTHAGOREAN FUZZY SOFT EXPERT SET IN MEDICAL DIAGNOSIS
147 Rahim K H and M Thiagarajan M/ M(a,b) /2 CONTROLLED ARRIVAL RATES AND INTERDEPENDENT QUEUEING MODEL
148 Amala Richard and A Rajkumar MCDM using Modified TOPSIS Method based on the Bipolar Neutrosophic Set: Application in Selection of Cloud Service Provider based on QoS
149 S. Nivetha Therasal POISSON INPUT AND EXPONENTIAL SERVICE TIME INTERDEPENDENT QUEUEING MODEL WITH BREAKDOWN AND CONTROLLABLE ARRIVAL RATES
150 P Gurusamy and R Angel Joy Strong Weak Stress Domination in a Graph
152 Praphull Chhabra and Sonam Chhabra APPLICATION OF NEW FUZZY MEASURE IN MULTI-ATTRIBUTE DECISION-MAKING
154 Pranav Kb, Adithya Venkatraman, Subhashini N and Muthulakshmi S Image steganalysis using discrete cosine transform
155 T Vijay, Dr.S. Bala and Dr.K. Thirusangu EIGEN VALUES IN THE FRAMEWORK OF SOME DIGRAPH
156 V Suganya, Dr.S. Bala and Dr.K. Thirusangu CORDIAL LABELING IN THE CONTEXT OF A SPECIAL GRAPH
158 M Nandhini, S Bala and K Thirusangu PELL INDEX FOR SOME GRAPHS
159 Anjana Thampy S and Dr. Jeyaraj Jane Rubel Angelina Sentiment Analysis and Emotion Recognition from Speech using Paralinguistic and Spectral Feature Extraction using Deep Learning Techniques
160 Esakki Muthu S and Kartheeban K A Blockchain Technology–Trust as A Service
161 Ayan Pathak, Raina Paul and Sayani Mondal Classification of News Paper Headlines
162 Aheli Acharya, Raina Paul and Sayani Mondal A Study on Education System in India Pre- and Post-Digitisation
163 Shimja Majida COVID-19 DETECTION USING DEEP LEARNING METHODS
166 Moses Dian, Dhayalan D and Vimalsubramanian G Optimized On Demand Services with Incentive Mechanism in P2P Network
168 Shyamala K and Mercy Evangeline M Extractive Text Summarization Usıng Frequency Based Feature Extraction For Single Document In Tamil Language
169 Ramesh Ramasamy, Ramesh Ramasamy and Ramesh Ramasamy DECOMPOSITION OF $(\vartheta,\delta)$- CONTINUITY
170 Sujatha P, Peddsasanjanna Manasa and Nithya P CLIMATE SMART AGRICULTURE USING MACHINE LEARNING
171 Sundaranarayana D, Kamaleshwar T and Peter Soosai Anandaraj A A LEARNING BASED ROUTING SCHEME AIDED WITH STABILIZED CLUSTERING FOR LOAD BALANCING IN MOBILE ADHOC NETWORK TO IMPROVE ENERGY EFFICIENCY
172 Parthasarathy R, Peter Soosai Anandaraj A and Kiruthiga Devi M RECUPERATING OF AD-HOC ROUTING NODES IN THE CLUSTER SCENARIO (RARICS) TO ENHANCE THE NODE CHAIN CONNECTION AND THE SECURITY IN THE AD HOC NETWORK
173 Asif S and Kartheeban K Motion Picture Streaming Based On Vehicle Detection Using Yolov4 Algorithm
174 Peter Soosai Anandaraj A, Ramesh P and Amali Angel Punitha A TRAFFIC SIGN RECOGNITION USING CONVOLUTIONAL NEURAL NETWORK MODEL
175 Kiruthiga Devi M, Parthasarathy R and Peter Soosai Anandaraj A SAFETY WEARABLE DEVICES FOR CIVIL WORKERS
177 Diana A and Kartheeban K Cyber resilience against advanced persistent threat using multi agent AI in I-IoT
178 Abinaya K, Dhanasekaran S and Vasudevan V A Survey on Manipulating Virtualized Service Management in Mobile Edge Cloud Network
179 Vinodhini H and Dr.D.Amudhaguka Stock Price Prediction Using Machine Learning Techniques with Sentiment Analysis – A Review
180 Shimja M ENHANCED COVID-19 DETECTION USING CNN AND DARKNET: ADVANCING CT SCAN AND CHEST X-RAY ANALYSIS
181 Vanthana V and Kartheeban K A STUDY ON THE IMPACT OF SENTIMENT ANALYSIS ON THE RELIABILITY RECOMMENDATION SYSTEMS
183 T. Jones Daniel and Dr.R.Sundar Rajan Ml Based Bedridden Patient Risk Level Prediction Using Km-C,Dt-Id3 And Xg Boost Analysis
184 Rushikesh Shaharao, Gopal Sakarkar, Abhijeet Khandagale, Mahima Gaurihar, Ramsha Shaikh and Rupak Kadhare Semantic Similarity in Multi-Source Information Retrieval for Improving Learner Performance
186 Thamizhendhi G, Kanakambika K and Kameswari M SOME OPERATIONS ON CONGRUENCE LABELED GRAPHS
187 Priyadharshini S, Bharath Singh J, Selvalakshmi S, Sathya Narayanan Velmurugan, Vivekrabinson K and Shanmuga Raja B Enhancing Indoor Air Quality through an Automatic HVAC Duct Cleaning Bot
188 Vijay M, Nandhini N, Vivekrabinson Rabinson, Shanmugaraja B and Sundareswaran N Image denoising based on nature-inspired optimized deep neural network
189 Vijay M, Nandhini N, Vivekrabinson K, Shanmuga Raja B and Sundareswaran N System for detection and classification of anomalous behavior and fixing anomaly with firewall configuration
190 Rufai Iliyasu COMPARATIVE STUDY OF OUTLIER DETECTION PROCEDURE IN MULTIPLE LINEAR REGRESSION MODEL
191 Vivekrabinson K, Rajesh Kumar S, Vijayakumar D and Bharath Singh J Blockchain Enabled Real Estate Property Transactions using NFT: An Approach
192 George J On coloring certain prime distance graphs
193 Jannatul Ferdous Medha, Asraf Ahmed, Utsu Chowhan and Md Abrar Hamim Defect Fabric Detection using Deep Learning Approach
194 Md Abrar Hamim, F.M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam and Bijoy Ghosh Lung Cancer Detection using Machine Learning Approach
195 Mahalakshmi P and Thenmalar S Feature Based Training for Crime Detection using Deep Learning Techniques
196 Akshaya Rajendra Gupta, Sathya Narayanan Velmurugan, Bharath Singh Jeberaj, Gokul Senthil Kumar and Dushyanth Shanmugam HANDWRITTEN TEXT RECOGNITION USING DEEP LEARNING
197 Jithin Jacob Mental Health Assessment over Voice Analysis by Using Machine Learning Techniques
198 Abhijit Bhattacharya, Kamlesh Dubey and Bikromadittya Mondal Volumed of a n dimensional hyperbolic simplex
199 E Poongothai and E Padmavathi ON FUZZY NEUTROSOPHIC TOPOLOGICAL SPACES C-ALMOST P-SPACES AND OTHER SPACES
201 Shyam Shanckin, Gayathri Mahendran and Gokhulnath Thirumaran Gaussian Processes for Automating Model Selection
202 Gayathri Mahendran, Gokhulnath Thirumaran, Syed Imam Ali and Vishwas Raj Jadon NAS for Automated ML Deployment on Extreme Edge Devices
203 Harsh Zele Performance Evaluation and Comparative Analysis of Machine Learning Techniques for Classification and Regression: A Study on the Vinho Verde Dataset
204 R Revathi Identifying Influential Users on Twitter: Leveraging Big Data Analytics and Machine Learning
205 R Revathi A Journey through Multifaceted Data in Machine Learning Predictions on Financial Viability
206 Harsh Zele Fruit and Vegetable Segmentation with Decision Trees
207 Ganesh Meshram Effect of Solid-fluid Interaction Parameters on Fluid Flow through Microchannels Using Lattice Boltzmann Method
208 Selvamanju E and Akilandeswari Senthil Kumar Oppositional Squirrel Search Optimization (OSSO) Algorithm in 5G Cellular Networks
210 Adithya K, Sumathi R, Nanda Kishor Reddy K and Harsha Vardhan G AUTOMATED FOOD IMAGE CLASSIFICATION USING DEEP LEARNING
211 Ahmad Abubakar Umar and Hamisu Musa Convergence and Order of the Extended 2-point Super Class Block Backward Differentiation Formula with Off-step Points for Solving Stiff IVPs
213 Kannan Kanagaraj Unsharp Masking of Medical Images Using Rolling Guidance Filter
214 Muthumeena M and Balamurali S Optimal Designing of Chain Sampling Plan for Assuring Median Life Under New Compounded Bell Weibull Life Time Model
215 Binta Abubakar, Dahiru Umar, Umar Mohammed and Willaims Dunama Polynomial Collocation Method for the Solution of Integro-Differential Difference Equations
216 Lany Dullas A Structural Model of Mathematics Performance as Influenced by Students’ Engagement with Technology to Students’ Motivation
217 Nagaraj P, Kirthiga N, Sureshkumar S and Prathipa K Retinal Disease Classification for Color Fundus Images Using a Novel Deep Convolution Neural Network
221 Nagaraj P and Sureshbabu P A Framework to Create Recommendation Systems for Data Science Applications
222 Najeem Dheen Abdul Majeeth, Vinoth Kumar E S, Hemavathy P and Loyola Jasmine J BONE FRACTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORK
224 Raja M and Nagaraj P BLIND PEOPLE OBJECT RECOGNITION USING ESP32 CAM MODULE
225 Archa A T Privacy-Enhanced Distributed Machine Learning against Poisoning Attacks
226 Abirami K Implementing nutrition regulator for stabilizing anxiety among special kids using optimized RNN techniques in evolutionary Deep Learning concepts
227 Monisha Privthy Jeba J Predicting Gene Signatures for Alzheimer’s Disease: A Transformer Model Approach
228 Dr.Swapna B, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING
229 Pothula Sujatha, Muhammed Shijas K and Nithya P ENGLISH TO MALAYALAM TRANSLITERATION USING RULE-BASED APPROACH AND NAMED ENTITY RECOGNITION USING MACHINE LEARNING
230 Dr.B Swapna, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING
231 Ishvarya M and Brintha N.C PROGNOSTICATION OF LIGAMENT CANCER AND TEAR
232 R. Sasikumar and M. Sujatha Statistical Process Control in Healthcare: A Systematic Review of Control Chart Applications
233 Sdharson K, Anita C.S., Badi Alekhya, Swathi Essakki K, Jasmitha Reddy M and Lakshmi Akshitha Y EchoSight: Blending Deep Learning and Computer Vision for Unparalleled Navigational Support for the Visually Impaired
234 Jeya Sundari M Ovarian tumor diagnosis models using machine learning and deep learning
235 Mr Dhakshunhaamoorthiy, Dr. Jawahar A, Ms. Bharathi Shri C and Dr. Sudharson K Fuzzy-Based Data Drift Detector for Novel Concept Drift Detection in IoT Data Stream Mining
236 Sudharson K, Rajalakshmi D, Badi Alekhya and Varsha S BlockGov: Blockchain-Based Data Governance in the Internet of Things using Smart Contracts
237 Murugavalli K and Ramalakshmi R Evaluating and exploring the changes in EEG signal patterns following walking using machine learning algorithm
238 Anajli N and Dr. Rajkumar Kannan A Novel Contrast Enhancement Algorithm for Detecting Defects From Fruits and Vegetables
239 J.Nirmala Joseph and Dr.J.Srikiruthika Mam Fuzzy Soft r-precontinuity
240 Sudharson K and Sasıkumar R IoTChain: Leveraging Blockchain for Enhanced Device Authentication in IoT Security
241 Sathyamoorthi V, Chandrasekar T and Matheswaran M DOES QUALITY OF NURSES WORK LIFE MATTER FOR JOB SATISFACTION? EVIDENCE FROM TAMILNADU
242 S J Subhashini, Jeyaraj Jane Rubel Angelina, Sai Kiran M J, Vinay N, Tejeswar Reddy S and Madhu Kiran M FINDING MISSING PERSON USING AI
243 Sudharson K, Badi Alekhya and Mohan Raj K R HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange
244 Indumathi C.P, Devasena K and Asha K LSTM-Based Deep Learning Model for Handwritten Word Recognition
245 Malathi K, Himantha Rao Kolli, Hemavathy P and Najeem Dheen Abdul Majeeth An Extensive Research on Disease Prediction Algorithms and a comparative view in Machine Learning, Deep Learning,Artificial Intelligence
246 Mahesh Prabha M and Kameswari M Application of Generalized Pythagorean Fuzzy Soft Expert Sets in Decision Making
247 Balakiruthiga B, Deepalakshmi P, Rajesh Babu C and Angayarkanni S A A Survey on Artificial Intelligence-based Conflict Resolution Algorithms for Software Defined Data Center (SDDC)
248 Esakki Muthu S and Kartheeban K A Comprehensive Survey of Blockchain Technology–Trust as A Service
249 Richard Taclay, Karen Taclay and Sonny Solmerin Primitive Solutions of the Diophantine Equation px^2 + qy^2 = z^2
251 D Sudha and Dr. P Sujatha Predicting Complications of Pregnancy using AI & ML
252 Indumathi C P, Diviyalakshmi K R and Mahalakshmi R BIRD SOUND IDENTIFICATION SYSTEM USING DEEP LEARNING
253 Dr. Gautam Singh and Vijay Kumar Direct Discontinuous Galerkin Method for Two-Parameter Singularly Perturbed Parabolic Problems
255 A.Kaveena Rebecca and Dr. N C Brintha A Novel Deep Learning-Based Prediction of DME in Eye Diseases
256 Margaret Savitha Comparative study of the GPT and other Long Language Models (LLMs)
257 Deeksha Singh and Rajesh K. Pandey A fourth order accurate numerical method for non-linear time fractional reaction diffusion equation on a bounded domain
259 S Kavitha and V Renuka Devi Integral Boundary and Co-boundary maps of some Quotient spaces
260 R. Raja Subramanian, Pallapu Karthik, Nagasai Venkat Pavan Kumar Ungarala, Chiranjeevi Pathipati, Abhiram Galla and R. Raja Sudharsan SignNet: Design and Evaluation of a Deep Neural Network Model for Recognition of English Alphabetic Signs for SHIP People
261 Nagaraj P, Kirthiga N, Sureshkumar S and Wilson Prakash S Canny Edge Detection- Based Smart Traffic Control System Using Multitype Image Processing
262 Dr Hemavathy P and Dr Vinoth Kumar E S An Accurate Crop Identification using AI based Convolutional Neural Network
263 Benita J, Prasanth S and Vijaya Lalitha G Compute The BMI Level Of A Human Without Any Instruments Using Artificial Intelligence
264 Diptadip Maiti, Madhuchhanda Basak and Debashis Das Inter-generational Fingerprint Correlation Analysis: Unveiling Inherited Patterns and Identification Reliability
265 Narla Venkata Anand Sai Kumar, Saila Lakshmi Sai Malleswara Rao and Noora Harish Phishing Website Detection based on Improvised Mutual Information Feature Selection with Swarm intelligence Convolutional Neural Network
266 Sachchidananda Jana, Pabitra Pal and Asim Kumar Mahadani A Hybrid Watermarking Scheme using DWT and Haar Transform for Image Authentication
269 James Daniel Colorectal Cancer using Image Classification
270 Usha Bhakthavatsalam and Dr. Amuthaguka D Light Weight Attribute-Based Encryption for Resource-Constrained Devices: Challenges, Solutions and Future Directions
271 Jemimah K and Dr.Rajkumar Kannan Medical Text Intent Recognition using Multiclass Classifier-BERT and XLNET
272 Jemima Gracia and Rajkumar Kannan Early Detection of Fake News using Deep Learning LSTM Networks
273 Shyam Shanckin, Mayank, Rahul Patwadi and Anshuman Singh Unveiling Latent Spaces with Variational Autoencoders
274 Thangapandi Kalidas, Narayanamoorthy S, Kang Daekook, Karthick P and Sundaresan P A Fuzzy Approach Numerical Simulation for Computer Virus System of Fractional Order
275 Vasu Ve and Kalyanaraman R A Finite Capacity Single Server Queueing System with Additional Optional Service
277 Subhashini A DEGREE-BASED TOPOLOGICAL INDICES FOR GRAPH STRUCTURES AND GRAPHENE
278 Srinivasan S, Sampath Kumar K, Ganesh D, Nagaraj S and Jeya A Celin J Effective Cost Reduction Usage of Infrastructure in Small Scale Sectors using Cloud Storage and Internet of Things
279 Ayyappan G and Arulmozhi N Analysis and empirical investigation of queueing inventory system: Two classes of customer under non-preemptive priority, single vacation, and (s, S) replenishment policy
280 Ayyappan G and Meena S Phase type Inventory Queueing Model with Two commodity, Vacation and Breakdown and Repair
281 Kalyanaraman R and Vidya K M/G/1 Queue with Regular and Optional phase of services and with R+1 phases of vacation
282 Ayyappan G and Archana Gurulakshm G Analysis of MAP/PH/1 retrial queue with Optional service, Vacation, Unreliable server, Standby server and Discouragement
Kindly note that the manuscript should be made according to the Springer series: Lecture notes in Networks and Systems (LNNNS) format (LaTeX template, Word template).