## List of Accepted Papers For Both Proceedings and Presentation

Paper ID | Authors | Title |
---|---|---|

11 | Pankaj Rawat | Blockchain based Federated Deep Learning Framework for Malware Attacks Detection in IoT Edge Devices |

12 | Ekrem Savas | On Some Sequence Spaces of Fuzzy numbers Defined by Sequence of Infinite Matrices |

16 | Kalaiselvi T and Yegnanarayanan Venkataraman | Computation of Various Domination Numbers of a Family of 3-regular Graphs |

22 | Aadi Gupta, Priya Gulati and Siddhartha Chakrabarty | Classification based credit risk analysis: The case of Lending Club |

27 | Anshuman Tyagi, Pawan Singh and Harsh Dev | Self-Improved Namib beetle optimization Trained Hybrid Model for Human Activity Recognition |

29 | Biman Sarkar, Priya Sharma and Soumen De | Analysis of oblique wave scattering by a thick bottom-standing barrier placed in between a pair of thin partially immersed barriers |

35 | Rachna Sachdeva and Ashok Agarwal | Modified lattice paths and Gordon-McIntosh eighth order mock theta functions |

36 | Redwan Walid, Lavanya Elluri and Karuna Joshi | Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations |

38 | Mohammad Alakhrass | LIEB FUNCTIONS AND PPT MATRICES |

47 | Babita Mehta and P.K. Parida | Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold |

49 | Hidenori Ogata | Method of fundamental solutions for doubly peridic potential problems |

50 | Parvathi Pradeep, Premjith B, Nimal Madhu M and Gopalakrishnan Ea | A Transformer-based Stock Market Price Prediction by incorporating BERT Embedding |

54 | R Karthika and V Renukadevi | Equivariant LS-category and topological complexity of product of sevaral manifolds |

57 | Sapan Kumar Nayak and Pradip Kumar Parida | Real dynamics of a sixth-order family of derivative free iterative method without memory |

63 | R. Deb and A.K. Das | On the solution set of semi-infiite tensor complementarity problem |

66 | Manikandan V and Monikandan S | Reconstruction Number of Split Graphs |

68 | Rajeswari Devadoss and Kolin Paul | Symmetry Decision Diagram: A Powerful Update for the BDD |

79 | Jaya Sudha, Hariprasath C and Senthil Kumaran R | Design of Microstrip Rectangular Dual Band Antenna for MIMO 5G Applications |

85 | Phani Kumar Nyshadham, Levin Dabhi, Archie Mittal and Harsh Kedia | Geometric Algorithm for Generalized Inverse of Rank Deficient Real Matrices |

87 | Ramkumar S B and Renukadevi V | Stabilizer group of set ideals |

100 | Samar Idris and Rifat Colak | Lambda – statistical derivative |

104 | Vishnu Pendyala, Samhita Konduri and Kriti Pendyala | Analysis of Multi-language Regional Music Tracks using Representation Learning Techniques in Lower Dimensions |

107 | J Jenifa and J Christy Roja | Overlapping Iterative Numerical Method for Solving Systems of Singularly Perturbed Convection Diffusion Problems with Mixed Type Boundary Conditions |

112 | Po-An Shih, Cheng-Che Wu, Chia-Hsin Huang and Arijit Karati | Effective Data Transmission in NDN-Assisted Edge-Cloud Computing Model |

121 | Sk Hafizul Islam, Purnendu Vashistha, Aman P. Singh, Aman Kishore and Jitesh Pradhan | ResNet-CPDS: Colonoscopy Polyp Detection and Segmentation Using Modified ResNet101V2 |

122 | Bhagya Shree Meena | A Numerical Study on DPL Bioheat Model in Tumor with Irregular Geometry during Magnetic Hyperthermia Treatment |

127 | Sheela Rani M and Dhanasekar S | Fuzzy MCDM techniques for analysing the risk factors of COVID-19 and FLU |

141 | Ishwariya R | Robust Numerical technique for a class of singularly perturbed nonlinear system of n-differential equations with Robin boundary conditions |

144 | Arockiaraj S and Gurusamy R | SUPERIOR WIENER INDICES OF GRAPHS |

151 | Sakthidevi I, S J Subhashini, Jeyaraj Jane Rubel Angelina, Venkataraman Yegnanarayanan and Kundakarla Syam Kumar | Leveraging Meta-Learning for Dynamic Anomaly Detection in Zero Trust Clouds |

153 | Helda Rajendran and Kalpana Mahalingam | Properties of m-bonacci words |

157 | Amit Sardar and Dipanwita Roy Chowdhury | Key Dependent Dynamic Sbox for Kasumi Block Cipher |

164 | Debranjan Pal, Mainak Chaudhury, Abhijit Das and Dipanwita Roy Chowdhury | Deep Learning Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations |

165 | Sumathi Ganesan and Mahalakshmi G | ANALYSIS OF BLOOD TRANSFUSION DATASET USING DATA MINING TECHNIQUES |

167 | Christopher Samuel Raj Balraj and Nagaraj P | Prediction of mental health issues and challenges using hybrid learning techniques |

176 | Abhishek Manchukonda | Advancing Time Series Forecasting: LSTM Networks with Multiple Attention Mechanisms |

182 | Narmada Devi R and Sowmiya S | Solving of Assignment Problem by Pythagorean Octagonal Neutrosophic Fuzzy Number |

185 | Jayrama H R, Naveenkumar S. H and Chaithra C. N | Uniqueness of Meromorphic Functions Concerning Non-linear Differential Polynomials Sharing Certain Value CM and IM |

209 | Ali Al-Sharadqah and Giuliano Piga | Concentric Ellipse Fitting Problem: Theory and Numerical Implementations |

212 | Kokila R and Thangavelu P | FFT based image registration using Stationary Wavelet Transform and edge features |

218 | Shuddhashil Ganguly, Himadri Mukherjee, Ankita Dhar, Matteo Marciano and Kaushik Roy | ChiBa – A Chirrup and Bark detection system for Urban Environment |

220 | Soumen Sinha, Pranav Sunil, Neha Bharill and Om Prakash Patel | HybridSeqNet: Integrating Convolutional and Long Short-Term Memory Networks for Protein Classification |

223 | Shanmugarajeshwari V | Chronic Kidney Disease Detection in Healthcare Experts System using Squeeze Net Model with Cuckoo Search Optimization Algorithm |

250 | Joyanta Kumar Majhi and A. K. Das | Pricing and retailer service strategy in a closed-loop supply chain as a response to showrooming effect |

254 | Amit Tripathi, Rachna Bhatia, Pratibha Joshi and Anand Kumar Tiwari | A computational study of time dependent nonlinear Schrodinger equation with cubic nonlinearity |

258 | Rajalaxmi G, Vimal S E and Janani Selvaraj | Water Body Segmentation for Satellite Images Using U-Net++ |

267 | Sundareswaran N, Sasirekha S, Vijay M and Vivek Rabinson Rabinson | Supporting Smart Meter Context Management using OWL Ontology and Hyperledger Fabric Blockchain |

268 | Janani Selvaraj and Prashanthi Devi Marimuthu | Modeling Vegetation Dynamics: Insights from Distributed Lag Model and Spatial Interpolation of Satellite Derived Environmental Data |

276 | Anisha Mitra and Dipanwita Roy Chowdhury | Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter Defibrillators |

## List of Accepted Papers Only For Presentation

Paper ID | Authors | Title |
---|---|---|

1 | Karan Timmala and Kavitha D | CERVICAL SPINE FRACTURE DETECTION USING DEEP LEARNING |

2 | Dr Sushil Shukla | Totally Umbilical Lightlike Hypersurfaces of Kenmotsu Space Form |

3 | Shivanshu Singh, Faizan Karim and G. Parimala | Classification and Interpretation of various stages for Diabetic Retinopathy using Deep Neural Network |

4 | P.Phani Krishna Raju, N.Sai Sreenivas and Dr. Viji Amutha Mary | VISION BASED COMMUNICATION LANGUAGE FOR DIFFERENTLY ABLED PEOPLE USING MACHINE LEARNING ALGORITHM |

5 | Saheli Thakur, Santonu Naskar, Kankona Chowdhury, Aritra Banerjee and Souvik Majumdar | Survey of Advancements in State-of-the-art (SOTA) Deep Neural Approaches for Machine Reading Comprehension |

6 | Niteesh Satya Sai Boddapu, Veera Venakata Sai Tirumalasetty, Nidita Pasapula, Krishna Reddy Thota Muddula and Ramesh Kumar Reddy Veeram Reddy | A Deep Learning based Recognition of Human Activity |

7 | Rachit Sachdeva, Sarthak Katyal, Krishan Kant Choudhary and Rohit Kaushik | Sensory Perception of Haptic Rendering in Surgical Simulation |

8 | Abinaya K, Ishwarya K and Saraswathi S | Plant Leaf Classification Using a Compact Deep Learning Model Use of VGG-16 |

9 | Susmitha A | Thread Hunting 101: Hunting with YARA Rules |

10 | Kuldeep Yadav and Neetu Gupta | UTILIZING QR CODES, CRYPTOGRAPHY, AND WEB SERVICE FOR PRODUCT AUTHENTICATION. |

13 | Pavan Kumar Boddapati, Nagarajan M.K and Venu Gopal Reddy Kamjula | Smart Electricity Billing System |

14 | Uppada Triveni, D Swapna, Vadithya Vandana and Medisetti Rachana | Analysis of Electronic Cryptogram |

15 | Riya Solanki and Payal Chaudhari | Collusion – resistant Encryption scheme for VANET with Fine-grained Access Control System |

17 | Shreyash Gondane, Saharsh Wasnik, Sanjay Jengthe, Shubham Paunikar, Rutuja Pohare and Ritu Pawar | Contract/Tendering System using Block-chain |

19 | Jayesh Patel and Kirit Modi | Mathematics and Artificial Intelligence: Exploring Synergies for Advancements |

20 | Vidhi Patel, Dr. Jayesh Patel and Dipika Patel | Study on Meningitis through Mathematical Model |

21 | P Jeyalakshmi and K Karuppasamy | Nordhaus-Gaddum type results for domination number of a signed graph |

23 | Shakrajit Sahu and Christopher Clement J | Model Selection for Gaussian Process Using Regression Algorithms |

24 | Shivran Priyanka Sureshkumar and Monika Saxena | Garbage Classifier for Effective Waste Management Using Deep Learning : An Overview |

25 | Ahamed Nishath S and Murugeswari R | A Review on On-line Fake News Detection Based on Advanced Deep Learning Models |

26 | S. Maragathasundari, C. Swedheetha and K. Karthikeyan | Queuing study in smart car technology |

28 | Dr Bhagya P, Sangamkumar H and Dr Lalitha Y S | An Efficient Multibiometric Crypto-key generation |

30 | Ashraf Alam | Driving Effective Teaching-Learning Practices: Exploring the TF-IDF Model and Python for Educators |

31 | Ashraf Alam | Empowering Educators by Transforming Classroom Teaching-Learning with TF-IDF Model and Python: A Practical Guide for Teachers |

32 | Ashraf Alam | Empowering Educators through Data Analysis: A Practical Guide for Transforming Classroom Teaching-Learning with TF-IDF Model |

34 | C Gayathri, S Saravanakumar, Yegnanarayanan Venkataraman and K Karuppasamy | On Some Packing Set Variations of Graphs |

37 | Priyanka G, Nivaashini M and Sivaranjani S | Efficient Deep Learning based approaches for Early diagnosis of Diabetes Mellitus |

39 | Eka Ogbaji, E.S. Onah and T Aboiyar | Stochastic matrix for stock markets model |

40 | Sivanandha Saraswathy and Lakshmi T | Fuzzy Boundary Graphs and its Dynamics |

41 | Jackson J and Perumal R | A public key exchange protocol using tropical determinant |

42 | Ponmaheshkumar A and Perumal R | A lightweight key exchange protocol based on max-product semiring |

43 | Ramagiri Praveen Kumar, Kalyan Chatterjee and M Raju | VORONOING LOCATION SPECIFIC DATA |

44 | Shalini K and Sridevi Polasi | Different crop plans using Goal Programming and R programming |

45 | Nathan Chane De la Cruz, Rocky Bigcas and Jerico Bacani | The search for solutions of the Diophantine equation a^x + b^y + c^z = w^2 with Pythagorean triple bases |

46 | Shahin Shaikh and Rupal Shroff | ON THE LINE ZERO DIVISOR GRAPH OF SMALL FINITE COMMUTATIVE RINGS. |

51 | Nagarajan M, Karthik K and Chandrasekaran P | Existence Solution for Sobolev Type Fuzzy Neutral Integrodifferential Evolution Equation in n – Dimensional Fuzzy Vector Space |

52 | Neha Kaliya, Dr. Digambar Pawar and Adesh Raut | A Novel Lightweight Authentication and Privacy Preservation Model (NoLAPP) for Fog Based Smart Grids |

53 | Srividya M, Vidhya D and Saranya V | ON SOME PROPERTIES OF FUZZY ROUGH ALGEBRAIC TM PRODUCT SYSTEM |

55 | Rajasekaran G and Uma L | On local Antimagic Coloring of Some Graph Classes |

56 | Pradip Kumar Parida and Naveen Chandra Bhagat | Convergence of Newton-Steffensen method under Lipschitz continuous second derivative |

59 | Ambika M, Selvarathi M and Dhanya V | An Overview of Ϯξ – ₳ℱ – Subgroup over a Boolean Lattıce |

60 | D Vidhya, V Saranya and M Srividya | A Continuous Functions on Fuzzy Automata Lindelöf Structure Spaces |

62 | Yogalakshmi Y, Mary U and Sreeja S | A STUDY ON EXTENDED DISTANCE ENERGY OF SOME GRAPHS |

64 | Priyalatha S.P.R, Vanitha S and Witczak T | New Form of Continuity in Nano Soft s (I) Space |

65 | Reny Jose and Ponmozhi K | Spices classification using Computer vision and Deep learning algorithms with special reference to YOLO v8 |

67 | S Karpagam, B Somasudaram, R Lokesh and Kavin Sagana Mary A | An M^X/G/1 queueing system with Optional Service, Immediate Feedback and Bernoulli Vacation |

69 | D Brightlin and G Dominic Babu | Fibonacci Heat Equation Generated by Two and Three Dimensional Difference Equation |

71 | Dhanya V, Selvarathi M and Ambika M | A Systematic Approach to the Homomorphism on the Jp Neutrosophic Δϝ Subgroup |

72 | Abirami K, Mohanapriya N and Dafik D | On Edge-Equitable Antimagic connection number of Ladder graph families |

73 | A. Anthony Raj, S. Prathap and D. Madhavakumar | An Application of Pythagoras theorem from Heron’s formula to derive the foci of an Ellipse |

74 | Ashokkumar Kulandasamy and Dharshan Dharshan | OPTIMIZED FRAMEWORK FOR HIGH-SPEED OBJECT DETECTION IN BADMINTON USING DEEP LEARNING |

75 | Chithrakumar Thangaraj, Dr.Thangamani M and M.Deepak M | Leveraging Internet of Things and Artificial Intelligence for Climate Monitoring and Reporting |

76 | Chithrakumar Thangaraj, Arvindh C C, Ashwanth K A K A and Akshai P P | AUTOMATIC NUMBER PLATE DETECTION SYSTEM |

77 | Krishnamugundh P, Karmel Arockiasamy, Kanimozhi G and Karthika P | Analysis on Fertility of Soil Parameters using Machine Learning Algorithms |

78 | Aishworyann, Shrey Kansal, Vibhor Mishra and Dr. Krishnendu Rarhi | IMAGE ENCRYPTION USING 4D CHAOTIC MAP, RANDOM PIXEL PERMUTATION, IMAGE AS A KEY AND DNA ENCODING ON MULTILAYERS OF CHAOTIC SEQUENCE |

80 | Jaya Sudha, Senthil Kumaran R, Balakumaran M and Athiyaman M | Smart Portable Ventilator for Covid19 Patients |

81 | Merlin C D, Divya M, Divyajothi M and Durga Dharshini M | Sensing an Activated Mobile Phone by using Transmitted Signals |

82 | Merlin C D, A Darwin, M. Gowtham and R. Danushkodi | Design of an Home Automation System with Voice Controlled Application using Arduino |

83 | Dr. Premkumar M, Prasanna A and Juliet Jeyapackiam J | On fundamental Computational Properties μ-Anti-Fuzzy Subgroups |

84 | Mahalakshmi Ayyavoo and Velmathi Guruviah | Review on Medical Image Segmentation and Encryption using GAN |

86 | M Jayalakshmi, B Vighnesh and S Durga Sai Sriram | A Machine Learning Approach to Driver Drowsiness Detection Using Eye Aspect Ratio |

88 | Veeralagan J and Manju Priya S | Identification of Alzheimer’s Disease using K-Means for Pet Scan Datasets |

89 | Anitha Ponraj | Real time 2D object detection in vehicles using YOLO |

90 | Suruthi K, Yuvaraj K, Navinkumar S, Arul Karthikeyan O and Kathiravan E | Real-time Vehicle load Prediction and Indication system |

91 | Ms. Aruna Arumugam G and Dr. Mohamed Divan Masood M | Detecting the causes of cancer by DNA sequence mutation (Mutant p53) using deep learning computational model |

92 | Soham Mitra, Navya Verma, Logeshwari V and Pattabiraman V | Dental Cavity Classification using Convolutional Neural Network |

93 | Amutha S, Vamsi Pydipati, Kandi Manikanta Reddy, Chekka Mahesh, Pilli Vamsi Krishna Reddy and Konda Ashok Reddy | Driver Drowsiness Detection System using OpenCV and Keras |

94 | Vijayalakshmi P, Karuppasamy K and Win Mathew John | Towards Restrained Pitchfork Domination: An Efficient Congestion Control Mechanism In Ad-hoc Networks |

95 | Chitra Ganesan | ODD-FIBONACCI PRIME EDGE ANTI-MAGIC LABELING OF SOME SPECIAL GRAPHS |

96 | Sangeetha H, Varshini V and Vibhushitha L | Career Prediction System |

97 | Aanandaram Velavan and Deepalakshmi P | BLOCKCHAIN-BASED DIGITAL IDENTITY FOR SECURE AUTHENTICATION OF IOT DEVICES IN 5G NETWORKS |

98 | A Ahila | QUAKE OF EDGE SUNDER ON BLAST DOMINATION NUMBER |

99 | Karthick P, Muthukani Vairavel T, Thangapandi K and Sundaresan P | Analysis on Spherical Fuzzy Graphs with Dombi Operator |

101 | Shuhan Zhang, Zhihang Xiao, Qiao Bi, Minjie Hu and Tao He | What’s your next guess? Solution Word classification prediction model based on multi-dimensional feature Vector and MIMO-LSTM |

102 | Vimala Devi Pandian and Yegnanarayanan Venkataraman | On Some Interesting Connection Between Graph Coloring and Associated Topological Structures |

103 | Kotte Sai Vamsi, Kothakota Mohamad Feroz, Kotha Ruthwik Saran, Kristipati Ravindra Reddy, Dandhuluri Varshith Varma and Dr Jayalakshmi Murugan | Logo Detection By Using The Deep Learning Model |

105 | Haripriya K, Harshini V, Jolinemelina A, Dr.Shahulhammed S, Preethi C and Dr. Pavalarajan S | Drunkand DriveDetection systemfor Two-wheelers usingIOT |

106 | Saravana Priya S, Suneela J and Prathyush Agarwal | Python-based engine power estimate for bulk carrier using ship’s displacement |

108 | Sundaresan P, Joseph Kennedy A, Karthick P and Muthukani Vairavel T | Generators of Class Partition Algebra and G-edge colored partition as a Centralizer algebra of wreath product of an alternating group and G |

109 | Heber Hernández, Elisabete Alberdi Celaya and Aitor Goti | A comparative analysis of kriging and neural networks for mineral resource estimation |

110 | S Ravikumar and B. Reddappa | The consequence of slip boundary conditions, Hall current and Soret-Dufour forces on the dynamics of a Jeffery fluid in a tapered conduit with vertical asymmetry |

111 | R. Sathish Srinivasan, R. Ezhilarasi, T.V. Sudharsan and G. Murugusundaramoorthy | ON A NEW CLASS V ̃_q^* (k,γ,R,S) OF SYMMETRIC q- HARMONIC UNIVALENT FUNCTIONS RELATED TO SYMMETRIC CONVOLUTED OPERATOR |

113 | Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P and Aushika D | Computational and microbial analysis of metagenome of commerically available cookies revealed the presence of numerous bacteria |

114 | Radhika Vs and Radhika Vs | CONNECTED VERTEX-EDGE DOMINATING SETS AND CONNECTED VERTEX-EDGE DOMINATION POLYNOMIALS OF LOLLIPOP GRAPH L_(n,1) |

115 | Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. | Computational analysis of the putative beta-galactosidases of Cellulomonas gilvus ATCC 13127 |

116 | Sreenivasulu Reddy L, Devendra Jangiti and Kotte Amaranadha Reddy | Counting of Various Type of Cycles in Topology based Graphs |

117 | Maheswari M and Brintha N.C | Detection of Various Casting Defects in Manufacturing Sectors using Deep Learning |

118 | Kameswari M and Muthumari U | On f-Topological Spaces |

119 | Muthukani Vairavel T, Joseline Manora J, Karthick P and Sundaresan P | MAJORITY AND CONNECTED MAJORITY DOMINATION ON EDGE ADDITION GRAPHS |

120 | V Renuka Devi and Greeshma Mahesh | Extension of ideals |

123 | Sapna S and Biju R Mohan | A Neural Network Model for Implied Volatility Estimation of Options: A Use Case for Indian Option Market |

124 | Pavithra R, Indira Priyadharshini M and Dhivyashree M | A COMPREHENSIVE SURVEY ON SMART AGRICULTURE USING IOT |

125 | Dhivyashree M, Vishnu Durai Rs and Pavithra R | AN AI-DRIVEN MODEL FOR DECISION SUPPORT SYSTEMS |

126 | S Pooja, M Vigneshwaran and L Vidyarani | On α*g#φ-closed sets in Topological Spaces |

128 | Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N. | Computational analysis of the putative endoglucanases in the genome of Cellulomonas flavigena ATCC 53703 |

129 | Tharakeswari V, Kameswari M and Kavitha S | WARI’S Algorithm for Ranking Triangular Fuzzy Numbers |

130 | Revathy G | LAND RATE PREDICTION USING COMPUTATIONAL INTELLIGENCE |

131 | Revathy G | COMPUTATIONAL INTELLIGENCE FOR LEAF DISEASES MONITORING USING UAV IMAGES |

132 | Revathy G | Bee Topology Of Wireless Ad Hoc Networks BTWANET |

133 | Archana D | WIRELESS SENSOR NETWORK-LOCATION METHODOLOGY AND ITS REAL TIME APPLICATION |

134 | Dr.M Sangeetha and T Mummoorthy | Fractional Programming for Undetermining Multi-Objective Transportation Problem with Goals using Fermatean Fuzzy Number |

135 | Maheswari B and Chitra V | Tangent Similarity Measure and Weighted tangent similarity measure of Infra Fuzzy Sets and its Application |

136 | Debapriya Biswas and Ipsita Rajwar | Projective disk and Poincar\'{e} disk: Exploring $\text{SL}(3,\mathbb{R})$ action from an Erlangen perspective |

137 | G.Somasundara Ori and Abirami B | MODELLING OF NEUTROSOPHIC THEORY BULK QUEUEING SYSTEM |

138 | Elakiya E, Tejus Paturu, Chaithanya Naik Keluth and Sai Tarun V | Investigating Feature Extraction and Classification Algorithms for Effective Lung Disease Detection using Chest X-ray images |

139 | Arkady Wey, Chris Breward, Jon Chapman and Ian Griffiths | Multiscale models for particle-laden flow through periodic networks |

140 | Sai Hanwith Bellamkonda, Aditya Vardhan Kadambari, Sai Kiran Rachakonda, Vamsi Krishna Panchadi and Gireesh Kumar Tanavarapu | Grammar Error Correction using Monotonic Attention |

142 | Parivazhagan A and Jairus Ponrabi | Smart Stick – A Device for Obstacle Detection and Location-Based Assistance for the Blind |

143 | Giri Hallur, Ashok P and Aslekar Avinash | Virtual Threads of Connectivity: Telecom Software Insights |

145 | Saravanan S and Gunasekaran S | FIXED POINT OF BIANCHINI TYPE CONTRACTION ON S-METRIC SPACE WITH AN EIGEN VALUE PROBLEM |

146 | Maheshprabha M and Kameswari M | APPLICATIONS OF POSSIBILITY PYTHAGOREAN FUZZY SOFT EXPERT SET IN MEDICAL DIAGNOSIS |

147 | Rahim K H and M Thiagarajan | M/ M(a,b) /2 CONTROLLED ARRIVAL RATES AND INTERDEPENDENT QUEUEING MODEL |

148 | Amala Richard and A Rajkumar | MCDM using Modified TOPSIS Method based on the Bipolar Neutrosophic Set: Application in Selection of Cloud Service Provider based on QoS |

149 | S. Nivetha Therasal | POISSON INPUT AND EXPONENTIAL SERVICE TIME INTERDEPENDENT QUEUEING MODEL WITH BREAKDOWN AND CONTROLLABLE ARRIVAL RATES |

150 | P Gurusamy and R Angel Joy | Strong Weak Stress Domination in a Graph |

152 | Praphull Chhabra and Sonam Chhabra | APPLICATION OF NEW FUZZY MEASURE IN MULTI-ATTRIBUTE DECISION-MAKING |

154 | Pranav Kb, Adithya Venkatraman, Subhashini N and Muthulakshmi S | Image steganalysis using discrete cosine transform |

155 | T Vijay, Dr.S. Bala and Dr.K. Thirusangu | EIGEN VALUES IN THE FRAMEWORK OF SOME DIGRAPH |

156 | V Suganya, Dr.S. Bala and Dr.K. Thirusangu | CORDIAL LABELING IN THE CONTEXT OF A SPECIAL GRAPH |

158 | M Nandhini, S Bala and K Thirusangu | PELL INDEX FOR SOME GRAPHS |

159 | Anjana Thampy S and Dr. Jeyaraj Jane Rubel Angelina | Sentiment Analysis and Emotion Recognition from Speech using Paralinguistic and Spectral Feature Extraction using Deep Learning Techniques |

160 | Esakki Muthu S and Kartheeban K | A Blockchain Technology–Trust as A Service |

161 | Ayan Pathak, Raina Paul and Sayani Mondal | Classification of News Paper Headlines |

162 | Aheli Acharya, Raina Paul and Sayani Mondal | A Study on Education System in India Pre- and Post-Digitisation |

163 | Shimja Majida | COVID-19 DETECTION USING DEEP LEARNING METHODS |

166 | Moses Dian, Dhayalan D and Vimalsubramanian G | Optimized On Demand Services with Incentive Mechanism in P2P Network |

168 | Shyamala K and Mercy Evangeline M | Extractive Text Summarization Usıng Frequency Based Feature Extraction For Single Document In Tamil Language |

169 | Ramesh Ramasamy, Ramesh Ramasamy and Ramesh Ramasamy | DECOMPOSITION OF $(\vartheta,\delta)$- CONTINUITY |

170 | Sujatha P, Peddsasanjanna Manasa and Nithya P | CLIMATE SMART AGRICULTURE USING MACHINE LEARNING |

171 | Sundaranarayana D, Kamaleshwar T and Peter Soosai Anandaraj A | A LEARNING BASED ROUTING SCHEME AIDED WITH STABILIZED CLUSTERING FOR LOAD BALANCING IN MOBILE ADHOC NETWORK TO IMPROVE ENERGY EFFICIENCY |

172 | Parthasarathy R, Peter Soosai Anandaraj A and Kiruthiga Devi M | RECUPERATING OF AD-HOC ROUTING NODES IN THE CLUSTER SCENARIO (RARICS) TO ENHANCE THE NODE CHAIN CONNECTION AND THE SECURITY IN THE AD HOC NETWORK |

173 | Asif S and Kartheeban K | Motion Picture Streaming Based On Vehicle Detection Using Yolov4 Algorithm |

174 | Peter Soosai Anandaraj A, Ramesh P and Amali Angel Punitha A | TRAFFIC SIGN RECOGNITION USING CONVOLUTIONAL NEURAL NETWORK MODEL |

175 | Kiruthiga Devi M, Parthasarathy R and Peter Soosai Anandaraj A | SAFETY WEARABLE DEVICES FOR CIVIL WORKERS |

177 | Diana A and Kartheeban K | Cyber resilience against advanced persistent threat using multi agent AI in I-IoT |

178 | Abinaya K, Dhanasekaran S and Vasudevan V | A Survey on Manipulating Virtualized Service Management in Mobile Edge Cloud Network |

179 | Vinodhini H and Dr.D.Amudhaguka | Stock Price Prediction Using Machine Learning Techniques with Sentiment Analysis – A Review |

180 | Shimja M | ENHANCED COVID-19 DETECTION USING CNN AND DARKNET: ADVANCING CT SCAN AND CHEST X-RAY ANALYSIS |

181 | Vanthana V and Kartheeban K | A STUDY ON THE IMPACT OF SENTIMENT ANALYSIS ON THE RELIABILITY RECOMMENDATION SYSTEMS |

183 | T. Jones Daniel and Dr.R.Sundar Rajan | Ml Based Bedridden Patient Risk Level Prediction Using Km-C,Dt-Id3 And Xg Boost Analysis |

184 | Rushikesh Shaharao, Gopal Sakarkar, Abhijeet Khandagale, Mahima Gaurihar, Ramsha Shaikh and Rupak Kadhare | Semantic Similarity in Multi-Source Information Retrieval for Improving Learner Performance |

186 | Thamizhendhi G, Kanakambika K and Kameswari M | SOME OPERATIONS ON CONGRUENCE LABELED GRAPHS |

187 | Priyadharshini S, Bharath Singh J, Selvalakshmi S, Sathya Narayanan Velmurugan, Vivekrabinson K and Shanmuga Raja B | Enhancing Indoor Air Quality through an Automatic HVAC Duct Cleaning Bot |

188 | Vijay M, Nandhini N, Vivekrabinson Rabinson, Shanmugaraja B and Sundareswaran N | Image denoising based on nature-inspired optimized deep neural network |

189 | Vijay M, Nandhini N, Vivekrabinson K, Shanmuga Raja B and Sundareswaran N | System for detection and classification of anomalous behavior and fixing anomaly with firewall configuration |

190 | Rufai Iliyasu | COMPARATIVE STUDY OF OUTLIER DETECTION PROCEDURE IN MULTIPLE LINEAR REGRESSION MODEL |

191 | Vivekrabinson K, Rajesh Kumar S, Vijayakumar D and Bharath Singh J | Blockchain Enabled Real Estate Property Transactions using NFT: An Approach |

192 | George J | On coloring certain prime distance graphs |

193 | Jannatul Ferdous Medha, Asraf Ahmed, Utsu Chowhan and Md Abrar Hamim | Defect Fabric Detection using Deep Learning Approach |

194 | Md Abrar Hamim, F.M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam and Bijoy Ghosh | Lung Cancer Detection using Machine Learning Approach |

195 | Mahalakshmi P and Thenmalar S | Feature Based Training for Crime Detection using Deep Learning Techniques |

196 | Akshaya Rajendra Gupta, Sathya Narayanan Velmurugan, Bharath Singh Jeberaj, Gokul Senthil Kumar and Dushyanth Shanmugam | HANDWRITTEN TEXT RECOGNITION USING DEEP LEARNING |

197 | Jithin Jacob | Mental Health Assessment over Voice Analysis by Using Machine Learning Techniques |

198 | Abhijit Bhattacharya, Kamlesh Dubey and Bikromadittya Mondal | Volumed of a n dimensional hyperbolic simplex |

199 | E Poongothai and E Padmavathi | ON FUZZY NEUTROSOPHIC TOPOLOGICAL SPACES C-ALMOST P-SPACES AND OTHER SPACES |

201 | Shyam Shanckin, Gayathri Mahendran and Gokhulnath Thirumaran | Gaussian Processes for Automating Model Selection |

202 | Gayathri Mahendran, Gokhulnath Thirumaran, Syed Imam Ali and Vishwas Raj Jadon | NAS for Automated ML Deployment on Extreme Edge Devices |

203 | Harsh Zele | Performance Evaluation and Comparative Analysis of Machine Learning Techniques for Classification and Regression: A Study on the Vinho Verde Dataset |

204 | R Revathi | Identifying Influential Users on Twitter: Leveraging Big Data Analytics and Machine Learning |

205 | R Revathi | A Journey through Multifaceted Data in Machine Learning Predictions on Financial Viability |

206 | Harsh Zele | Fruit and Vegetable Segmentation with Decision Trees |

207 | Ganesh Meshram | Effect of Solid-fluid Interaction Parameters on Fluid Flow through Microchannels Using Lattice Boltzmann Method |

208 | Selvamanju E and Akilandeswari Senthil Kumar | Oppositional Squirrel Search Optimization (OSSO) Algorithm in 5G Cellular Networks |

210 | Adithya K, Sumathi R, Nanda Kishor Reddy K and Harsha Vardhan G | AUTOMATED FOOD IMAGE CLASSIFICATION USING DEEP LEARNING |

211 | Ahmad Abubakar Umar and Hamisu Musa | Convergence and Order of the Extended 2-point Super Class Block Backward Differentiation Formula with Off-step Points for Solving Stiff IVPs |

213 | Kannan Kanagaraj | Unsharp Masking of Medical Images Using Rolling Guidance Filter |

214 | Muthumeena M and Balamurali S | Optimal Designing of Chain Sampling Plan for Assuring Median Life Under New Compounded Bell Weibull Life Time Model |

215 | Binta Abubakar, Dahiru Umar, Umar Mohammed and Willaims Dunama | Polynomial Collocation Method for the Solution of Integro-Differential Difference Equations |

216 | Lany Dullas | A Structural Model of Mathematics Performance as Influenced by Students’ Engagement with Technology to Students’ Motivation |

217 | Nagaraj P, Kirthiga N, Sureshkumar S and Prathipa K | Retinal Disease Classification for Color Fundus Images Using a Novel Deep Convolution Neural Network |

221 | Nagaraj P and Sureshbabu P | A Framework to Create Recommendation Systems for Data Science Applications |

222 | Najeem Dheen Abdul Majeeth, Vinoth Kumar E S, Hemavathy P and Loyola Jasmine J | BONE FRACTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORK |

224 | Raja M and Nagaraj P | BLIND PEOPLE OBJECT RECOGNITION USING ESP32 CAM MODULE |

225 | Archa A T | Privacy-Enhanced Distributed Machine Learning against Poisoning Attacks |

226 | Abirami K | Implementing nutrition regulator for stabilizing anxiety among special kids using optimized RNN techniques in evolutionary Deep Learning concepts |

227 | Monisha Privthy Jeba J | Predicting Gene Signatures for Alzheimer’s Disease: A Transformer Model Approach |

228 | Dr.Swapna B, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar | DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING |

229 | Pothula Sujatha, Muhammed Shijas K and Nithya P | ENGLISH TO MALAYALAM TRANSLITERATION USING RULE-BASED APPROACH AND NAMED ENTITY RECOGNITION USING MACHINE LEARNING |

230 | Dr.B Swapna, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar | DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING |

231 | Ishvarya M and Brintha N.C | PROGNOSTICATION OF LIGAMENT CANCER AND TEAR |

232 | R. Sasikumar and M. Sujatha | Statistical Process Control in Healthcare: A Systematic Review of Control Chart Applications |

233 | Sdharson K, Anita C.S., Badi Alekhya, Swathi Essakki K, Jasmitha Reddy M and Lakshmi Akshitha Y | EchoSight: Blending Deep Learning and Computer Vision for Unparalleled Navigational Support for the Visually Impaired |

234 | Jeya Sundari M | Ovarian tumor diagnosis models using machine learning and deep learning |

235 | Mr Dhakshunhaamoorthiy, Dr. Jawahar A, Ms. Bharathi Shri C and Dr. Sudharson K | Fuzzy-Based Data Drift Detector for Novel Concept Drift Detection in IoT Data Stream Mining |

236 | Sudharson K, Rajalakshmi D, Badi Alekhya and Varsha S | BlockGov: Blockchain-Based Data Governance in the Internet of Things using Smart Contracts |

237 | Murugavalli K and Ramalakshmi R | Evaluating and exploring the changes in EEG signal patterns following walking using machine learning algorithm |

238 | Anajli N and Dr. Rajkumar Kannan | A Novel Contrast Enhancement Algorithm for Detecting Defects From Fruits and Vegetables |

239 | J.Nirmala Joseph and Dr.J.Srikiruthika Mam | Fuzzy Soft r-precontinuity |

240 | Sudharson K and Sasıkumar R | IoTChain: Leveraging Blockchain for Enhanced Device Authentication in IoT Security |

241 | Sathyamoorthi V, Chandrasekar T and Matheswaran M | DOES QUALITY OF NURSES WORK LIFE MATTER FOR JOB SATISFACTION? EVIDENCE FROM TAMILNADU |

242 | S J Subhashini, Jeyaraj Jane Rubel Angelina, Sai Kiran M J, Vinay N, Tejeswar Reddy S and Madhu Kiran M | FINDING MISSING PERSON USING AI |

243 | Sudharson K, Badi Alekhya and Mohan Raj K R | HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange |

244 | Indumathi C.P, Devasena K and Asha K | LSTM-Based Deep Learning Model for Handwritten Word Recognition |

245 | Malathi K, Himantha Rao Kolli, Hemavathy P and Najeem Dheen Abdul Majeeth | An Extensive Research on Disease Prediction Algorithms and a comparative view in Machine Learning, Deep Learning,Artificial Intelligence |

246 | Mahesh Prabha M and Kameswari M | Application of Generalized Pythagorean Fuzzy Soft Expert Sets in Decision Making |

247 | Balakiruthiga B, Deepalakshmi P, Rajesh Babu C and Angayarkanni S A | A Survey on Artificial Intelligence-based Conflict Resolution Algorithms for Software Defined Data Center (SDDC) |

248 | Esakki Muthu S and Kartheeban K | A Comprehensive Survey of Blockchain Technology–Trust as A Service |

249 | Richard Taclay, Karen Taclay and Sonny Solmerin | Primitive Solutions of the Diophantine Equation px^2 + qy^2 = z^2 |

251 | D Sudha and Dr. P Sujatha | Predicting Complications of Pregnancy using AI & ML |

252 | Indumathi C P, Diviyalakshmi K R and Mahalakshmi R | BIRD SOUND IDENTIFICATION SYSTEM USING DEEP LEARNING |

253 | Dr. Gautam Singh and Vijay Kumar | Direct Discontinuous Galerkin Method for Two-Parameter Singularly Perturbed Parabolic Problems |

255 | A.Kaveena Rebecca and Dr. N C Brintha | A Novel Deep Learning-Based Prediction of DME in Eye Diseases |

256 | Margaret Savitha | Comparative study of the GPT and other Long Language Models (LLMs) |

257 | Deeksha Singh and Rajesh K. Pandey | A fourth order accurate numerical method for non-linear time fractional reaction diffusion equation on a bounded domain |

259 | S Kavitha and V Renuka Devi | Integral Boundary and Co-boundary maps of some Quotient spaces |

260 | R. Raja Subramanian, Pallapu Karthik, Nagasai Venkat Pavan Kumar Ungarala, Chiranjeevi Pathipati, Abhiram Galla and R. Raja Sudharsan | SignNet: Design and Evaluation of a Deep Neural Network Model for Recognition of English Alphabetic Signs for SHIP People |

261 | Nagaraj P, Kirthiga N, Sureshkumar S and Wilson Prakash S | Canny Edge Detection- Based Smart Traffic Control System Using Multitype Image Processing |

262 | Dr Hemavathy P and Dr Vinoth Kumar E S | An Accurate Crop Identification using AI based Convolutional Neural Network |

263 | Benita J, Prasanth S and Vijaya Lalitha G | Compute The BMI Level Of A Human Without Any Instruments Using Artificial Intelligence |

264 | Diptadip Maiti, Madhuchhanda Basak and Debashis Das | Inter-generational Fingerprint Correlation Analysis: Unveiling Inherited Patterns and Identification Reliability |

265 | Narla Venkata Anand Sai Kumar, Saila Lakshmi Sai Malleswara Rao and Noora Harish | Phishing Website Detection based on Improvised Mutual Information Feature Selection with Swarm intelligence Convolutional Neural Network |

266 | Sachchidananda Jana, Pabitra Pal and Asim Kumar Mahadani | A Hybrid Watermarking Scheme using DWT and Haar Transform for Image Authentication |

269 | James Daniel | Colorectal Cancer using Image Classification |

270 | Usha Bhakthavatsalam and Dr. Amuthaguka D | Light Weight Attribute-Based Encryption for Resource-Constrained Devices: Challenges, Solutions and Future Directions |

271 | Jemimah K and Dr.Rajkumar Kannan | Medical Text Intent Recognition using Multiclass Classifier-BERT and XLNET |

272 | Jemima Gracia and Rajkumar Kannan | Early Detection of Fake News using Deep Learning LSTM Networks |

273 | Shyam Shanckin, Mayank, Rahul Patwadi and Anshuman Singh | Unveiling Latent Spaces with Variational Autoencoders |

274 | Thangapandi Kalidas, Narayanamoorthy S, Kang Daekook, Karthick P and Sundaresan P | A Fuzzy Approach Numerical Simulation for Computer Virus System of Fractional Order |

275 | Vasu Ve and Kalyanaraman R | A Finite Capacity Single Server Queueing System with Additional Optional Service |

277 | Subhashini A | DEGREE-BASED TOPOLOGICAL INDICES FOR GRAPH STRUCTURES AND GRAPHENE |

278 | Srinivasan S, Sampath Kumar K, Ganesh D, Nagaraj S and Jeya A Celin J | Effective Cost Reduction Usage of Infrastructure in Small Scale Sectors using Cloud Storage and Internet of Things |

279 | Ayyappan G and Arulmozhi N | Analysis and empirical investigation of queueing inventory system: Two classes of customer under non-preemptive priority, single vacation, and (s, S) replenishment policy |

280 | Ayyappan G and Meena S | Phase type Inventory Queueing Model with Two commodity, Vacation and Breakdown and Repair |

281 | Kalyanaraman R and Vidya K | M/G/1 Queue with Regular and Optional phase of services and with R+1 phases of vacation |

282 | Ayyappan G and Archana Gurulakshm G | Analysis of MAP/PH/1 retrial queue with Optional service, Vacation, Unreliable server, Standby server and Discouragement |