{"id":1427,"date":"2023-01-10T03:39:24","date_gmt":"2023-01-10T03:39:24","guid":{"rendered":"http:\/\/icmc2024.kalasalingam.ac.in\/?page_id=1427"},"modified":"2023-11-10T06:13:38","modified_gmt":"2023-11-10T06:13:38","slug":"accepted-papers","status":"publish","type":"page","link":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/accepted-papers\/","title":{"rendered":"ACCEPTED PAPERS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1427\" class=\"elementor elementor-1427\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff17dd9 e-con-boxed e-con\" data-id=\"ff17dd9\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4475231 elementor-widget elementor-widget-heading\" data-id=\"4475231\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.2 - 21-12-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">List of  Accepted Papers For Both Proceedings and Presentation<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23482e3 elementor-widget elementor-widget-text-editor\" data-id=\"23482e3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.2 - 21-12-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<table>\n<thead>\n<tr>\n<th>Paper ID<\/th>\n<th>Authors<\/th>\n<th>Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>11<\/td>\n<td>Pankaj Rawat<\/td>\n<td>Blockchain based Federated Deep Learning Framework for Malware Attacks Detection in IoT Edge Devices<\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td>Ekrem Savas<\/td>\n<td>On Some Sequence Spaces of Fuzzy numbers Defined by Sequence of Infinite Matrices<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>Kalaiselvi T and Yegnanarayanan Venkataraman<\/td>\n<td>Computation of Various Domination Numbers of a Family of 3-regular Graphs<\/td>\n<\/tr>\n<tr>\n<td>22<\/td>\n<td>Aadi Gupta, Priya Gulati and Siddhartha Chakrabarty<\/td>\n<td>Classification based credit risk analysis: The case of Lending Club<\/td>\n<\/tr>\n<tr>\n<td>27<\/td>\n<td>Anshuman Tyagi, Pawan Singh and Harsh Dev<\/td>\n<td>Self-Improved Namib beetle optimization Trained Hybrid Model for Human Activity Recognition<\/td>\n<\/tr>\n<tr>\n<td>29<\/td>\n<td>Biman Sarkar, Priya Sharma and Soumen De<\/td>\n<td>Analysis of oblique wave scattering by a thick bottom-standing barrier placed in between a pair of thin partially immersed barriers<\/td>\n<\/tr>\n<tr>\n<td>35<\/td>\n<td>Rachna Sachdeva and Ashok Agarwal<\/td>\n<td>Modified lattice paths and Gordon-McIntosh eighth order mock theta functions<\/td>\n<\/tr>\n<tr>\n<td>36<\/td>\n<td>Redwan Walid, Lavanya Elluri and Karuna Joshi<\/td>\n<td>Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations<\/td>\n<\/tr>\n<tr>\n<td>38<\/td>\n<td>Mohammad Alakhrass<\/td>\n<td>LIEB FUNCTIONS AND PPT MATRICES<\/td>\n<\/tr>\n<tr>\n<td>47<\/td>\n<td>Babita Mehta and P.K. Parida<\/td>\n<td>Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold<\/td>\n<\/tr>\n<tr>\n<td>49<\/td>\n<td>Hidenori Ogata<\/td>\n<td>Method of fundamental solutions for doubly peridic potential problems<\/td>\n<\/tr>\n<tr>\n<td>50<\/td>\n<td>Parvathi Pradeep, Premjith B, Nimal Madhu M and Gopalakrishnan Ea<\/td>\n<td>A Transformer-based Stock Market Price Prediction by incorporating BERT Embedding<\/td>\n<\/tr>\n<tr>\n<td>54<\/td>\n<td>R Karthika and V Renukadevi<\/td>\n<td>Equivariant LS-category and topological complexity of product of sevaral manifolds<\/td>\n<\/tr>\n<tr>\n<td>57<\/td>\n<td>Sapan Kumar Nayak and Pradip Kumar Parida<\/td>\n<td>Real dynamics of a sixth-order family of derivative free iterative method without memory<\/td>\n<\/tr>\n<tr>\n<td>63<\/td>\n<td>R. Deb and A.K. Das<\/td>\n<td>On the solution set of semi-infiite tensor complementarity problem<\/td>\n<\/tr>\n<tr>\n<td>66<\/td>\n<td>Manikandan V and Monikandan S<\/td>\n<td>Reconstruction Number of Split Graphs<\/td>\n<\/tr>\n<tr>\n<td>68<\/td>\n<td>Rajeswari Devadoss and Kolin Paul<\/td>\n<td>Symmetry Decision Diagram: A Powerful Update for the BDD<\/td>\n<\/tr>\n<tr>\n<td>79<\/td>\n<td>Jaya Sudha, Hariprasath C and Senthil Kumaran R<\/td>\n<td>Design of Microstrip Rectangular Dual Band Antenna for MIMO 5G Applications<\/td>\n<\/tr>\n<tr>\n<td>85<\/td>\n<td>Phani Kumar Nyshadham, Levin Dabhi, Archie Mittal and Harsh Kedia<\/td>\n<td>Geometric Algorithm for Generalized Inverse of Rank Deficient Real Matrices<\/td>\n<\/tr>\n<tr>\n<td>87<\/td>\n<td>Ramkumar S B and Renukadevi V<\/td>\n<td>Stabilizer group of set ideals<\/td>\n<\/tr>\n<tr>\n<td>100<\/td>\n<td>Samar Idris and Rifat Colak<\/td>\n<td>Lambda &#8211; statistical derivative<\/td>\n<\/tr>\n<tr>\n<td>104<\/td>\n<td>Vishnu Pendyala, Samhita Konduri and Kriti Pendyala<\/td>\n<td>Analysis of Multi-language Regional Music Tracks using Representation Learning Techniques in Lower Dimensions<\/td>\n<\/tr>\n<tr>\n<td>107<\/td>\n<td>J Jenifa and J Christy Roja<\/td>\n<td>Overlapping Iterative Numerical Method for Solving Systems of Singularly Perturbed Convection Diffusion Problems with Mixed Type Boundary Conditions<\/td>\n<\/tr>\n<tr>\n<td>112<\/td>\n<td>Po-An Shih, Cheng-Che Wu, Chia-Hsin Huang and Arijit Karati<\/td>\n<td>Effective Data Transmission in NDN-Assisted Edge-Cloud Computing Model<\/td>\n<\/tr>\n<tr>\n<td>121<\/td>\n<td>Sk Hafizul Islam, Purnendu Vashistha, Aman P. Singh, Aman Kishore and Jitesh Pradhan<\/td>\n<td>ResNet-CPDS: Colonoscopy Polyp Detection and Segmentation Using Modified ResNet101V2<\/td>\n<\/tr>\n<tr>\n<td>122<\/td>\n<td>Bhagya Shree Meena<\/td>\n<td>A Numerical Study on DPL Bioheat Model in Tumor with Irregular Geometry during Magnetic Hyperthermia Treatment<\/td>\n<\/tr>\n<tr>\n<td>127<\/td>\n<td>Sheela Rani M and Dhanasekar S<\/td>\n<td>Fuzzy MCDM techniques for analysing the risk factors of COVID-19 and FLU<\/td>\n<\/tr>\n<tr>\n<td>141<\/td>\n<td>Ishwariya R<\/td>\n<td>Robust Numerical technique for a class of singularly perturbed nonlinear system of n-differential equations with Robin boundary conditions<\/td>\n<\/tr>\n<tr>\n<td>144<\/td>\n<td>Arockiaraj S and Gurusamy R<\/td>\n<td>SUPERIOR WIENER INDICES OF GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>151<\/td>\n<td>Sakthidevi I, S J Subhashini, Jeyaraj Jane Rubel Angelina, Venkataraman Yegnanarayanan and Kundakarla Syam Kumar<\/td>\n<td>Leveraging Meta-Learning for Dynamic Anomaly Detection in Zero\u00a0Trust\u00a0Clouds<\/td>\n<\/tr>\n<tr>\n<td>153<\/td>\n<td>Helda Rajendran and Kalpana Mahalingam<\/td>\n<td>Properties of m-bonacci words<\/td>\n<\/tr>\n<tr>\n<td>157<\/td>\n<td>Amit Sardar and Dipanwita Roy Chowdhury<\/td>\n<td>Key Dependent Dynamic Sbox for Kasumi Block Cipher<\/td>\n<\/tr>\n<tr>\n<td>164<\/td>\n<td>Debranjan Pal, Mainak Chaudhury, Abhijit Das and Dipanwita Roy Chowdhury<\/td>\n<td>Deep Learning Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations<\/td>\n<\/tr>\n<tr>\n<td>165<\/td>\n<td>Sumathi Ganesan and Mahalakshmi G<\/td>\n<td>ANALYSIS OF BLOOD TRANSFUSION DATASET USING DATA MINING TECHNIQUES<\/td>\n<\/tr>\n<tr>\n<td>167<\/td>\n<td>Christopher Samuel Raj Balraj and Nagaraj P<\/td>\n<td>Prediction of mental health issues and challenges using hybrid learning techniques<\/td>\n<\/tr>\n<tr>\n<td>176<\/td>\n<td>Abhishek Manchukonda<\/td>\n<td>Advancing Time Series Forecasting: LSTM Networks with Multiple Attention Mechanisms<\/td>\n<\/tr>\n<tr>\n<td>182<\/td>\n<td>Narmada Devi R and Sowmiya S<\/td>\n<td>Solving of Assignment Problem by Pythagorean Octagonal Neutrosophic Fuzzy Number<\/td>\n<\/tr>\n<tr>\n<td>185<\/td>\n<td>Jayrama H R, Naveenkumar S. H and Chaithra C. N<\/td>\n<td>Uniqueness of Meromorphic Functions Concerning Non-linear Differential Polynomials Sharing Certain Value CM and IM<\/td>\n<\/tr>\n<tr>\n<td>209<\/td>\n<td>Ali Al-Sharadqah and Giuliano Piga<\/td>\n<td>Concentric Ellipse Fitting Problem: Theory and Numerical Implementations<\/td>\n<\/tr>\n<tr>\n<td>212<\/td>\n<td>Kokila R and Thangavelu P<\/td>\n<td>FFT based image registration using Stationary Wavelet Transform and edge features<\/td>\n<\/tr>\n<tr>\n<td>218<\/td>\n<td>Shuddhashil Ganguly, Himadri Mukherjee, Ankita Dhar, Matteo Marciano and Kaushik Roy<\/td>\n<td>ChiBa &#8211; A Chirrup and Bark detection system for Urban Environment<\/td>\n<\/tr>\n<tr>\n<td>220<\/td>\n<td>Soumen Sinha, Pranav Sunil, Neha Bharill and Om Prakash Patel<\/td>\n<td>HybridSeqNet: Integrating Convolutional and Long Short-Term Memory Networks for Protein Classification<\/td>\n<\/tr>\n<tr>\n<td>223<\/td>\n<td>Shanmugarajeshwari V<\/td>\n<td>Chronic Kidney Disease Detection in Healthcare Experts System using Squeeze Net Model with Cuckoo Search Optimization Algorithm<\/td>\n<\/tr>\n<tr>\n<td>250<\/td>\n<td>Joyanta Kumar Majhi and A. K. Das<\/td>\n<td>Pricing and retailer service strategy in a closed-loop supply chain as a response to showrooming effect<\/td>\n<\/tr>\n<tr>\n<td>254<\/td>\n<td>Amit Tripathi, Rachna Bhatia, Pratibha Joshi and Anand Kumar Tiwari<\/td>\n<td>A computational study of time dependent nonlinear Schrodinger equation with cubic nonlinearity<\/td>\n<\/tr>\n<tr>\n<td>258<\/td>\n<td>Rajalaxmi G, Vimal S E and Janani Selvaraj<\/td>\n<td>Water Body Segmentation for Satellite Images Using U-Net++<\/td>\n<\/tr>\n<tr>\n<td>267<\/td>\n<td>Sundareswaran N, Sasirekha S, Vijay M and Vivek Rabinson Rabinson<\/td>\n<td>Supporting Smart Meter Context Management using OWL Ontology and Hyperledger Fabric Blockchain<\/td>\n<\/tr>\n<tr>\n<td>268<\/td>\n<td>Janani Selvaraj and Prashanthi Devi Marimuthu<\/td>\n<td>Modeling Vegetation Dynamics: Insights from Distributed Lag Model and Spatial Interpolation of Satellite Derived Environmental Data<\/td>\n<\/tr>\n<tr>\n<td>276<\/td>\n<td>Anisha Mitra and Dipanwita Roy Chowdhury<\/td>\n<td>Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter Defibrillators<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8984bd elementor-widget elementor-widget-heading\" data-id=\"c8984bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">List of Accepted Papers Only For Presentation<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-441aaf2 elementor-widget elementor-widget-text-editor\" data-id=\"441aaf2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<table>\n<thead>\n<tr>\n<th>Paper ID<\/th>\n<th>Authors<\/th>\n<th>Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n\n<tr>\n<td>1<\/td>\n<td>Karan Timmala and Kavitha D<\/td>\n<td>CERVICAL SPINE FRACTURE DETECTION USING DEEP LEARNING<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Dr Sushil Shukla<\/td>\n<td>Totally Umbilical Lightlike Hypersurfaces of Kenmotsu Space Form<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Shivanshu Singh, Faizan Karim and G. Parimala<\/td>\n<td>Classification and Interpretation of various stages for Diabetic Retinopathy using Deep Neural Network<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>P.Phani Krishna Raju, N.Sai Sreenivas and Dr. Viji Amutha Mary<\/td>\n<td>VISION BASED COMMUNICATION LANGUAGE FOR DIFFERENTLY ABLED PEOPLE USING MACHINE LEARNING ALGORITHM<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Saheli Thakur, Santonu Naskar, Kankona Chowdhury, Aritra Banerjee and Souvik Majumdar<\/td>\n<td>Survey of Advancements in State-of-the-art (SOTA) Deep Neural Approaches for Machine Reading Comprehension<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Niteesh Satya Sai Boddapu, Veera Venakata Sai Tirumalasetty, Nidita Pasapula, Krishna Reddy Thota Muddula and Ramesh Kumar Reddy Veeram Reddy<\/td>\n<td>A Deep Learning based Recognition of Human Activity<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Rachit Sachdeva, Sarthak Katyal, Krishan Kant Choudhary and Rohit Kaushik<\/td>\n<td>Sensory Perception of Haptic Rendering in Surgical Simulation<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>Abinaya K, Ishwarya K and Saraswathi S<\/td>\n<td>Plant Leaf Classification Using a Compact Deep Learning Model Use of VGG-16<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>Susmitha A<\/td>\n<td>Thread Hunting 101: Hunting with YARA Rules<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td>Kuldeep Yadav and Neetu Gupta<\/td>\n<td>UTILIZING QR CODES, CRYPTOGRAPHY, AND WEB SERVICE FOR PRODUCT AUTHENTICATION.<\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td>Pavan Kumar Boddapati, Nagarajan M.K and Venu Gopal Reddy Kamjula<\/td>\n<td>Smart Electricity Billing System<\/td>\n<\/tr>\n<tr>\n<td>14<\/td>\n<td>Uppada Triveni, D Swapna, Vadithya Vandana and Medisetti Rachana<\/td>\n<td>Analysis of Electronic Cryptogram<\/td>\n<\/tr>\n<tr>\n<td>15<\/td>\n<td>Riya Solanki and Payal Chaudhari<\/td>\n<td>Collusion &ndash; resistant Encryption scheme for VANET with Fine-grained Access Control System<\/td>\n<\/tr>\n<tr>\n<td>17<\/td>\n<td>Shreyash Gondane, Saharsh Wasnik, Sanjay Jengthe, Shubham Paunikar, Rutuja Pohare and Ritu Pawar<\/td>\n<td>Contract\/Tendering System using Block-chain<\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td>Jayesh Patel and Kirit Modi<\/td>\n<td>Mathematics and Artificial Intelligence: Exploring Synergies for Advancements<\/td>\n<\/tr>\n<tr>\n<td>20<\/td>\n<td>Vidhi Patel, Dr. Jayesh Patel and Dipika Patel<\/td>\n<td>Study on Meningitis through Mathematical Model<\/td>\n<\/tr>\n<tr>\n<td>21<\/td>\n<td>P Jeyalakshmi and K Karuppasamy<\/td>\n<td>Nordhaus-Gaddum type results for domination number of a signed graph<\/td>\n<\/tr>\n<tr>\n<td>23<\/td>\n<td>Shakrajit Sahu and Christopher Clement J<\/td>\n<td>Model Selection for Gaussian Process Using Regression Algorithms<\/td>\n<\/tr>\n<tr>\n<td>24<\/td>\n<td>Shivran Priyanka Sureshkumar and Monika Saxena<\/td>\n<td>Garbage Classifier for Effective Waste Management Using Deep Learning : An Overview<\/td>\n<\/tr>\n<tr>\n<td>25<\/td>\n<td>Ahamed Nishath S and Murugeswari R<\/td>\n<td>A Review on On-line Fake News Detection Based on Advanced Deep Learning Models<\/td>\n<\/tr>\n<tr>\n<td>26<\/td>\n<td>S. Maragathasundari, C. Swedheetha and K. Karthikeyan<\/td>\n<td>Queuing study in smart car technology<\/td>\n<\/tr>\n<tr>\n<td>28<\/td>\n<td>Dr Bhagya P, Sangamkumar H and Dr Lalitha Y S<\/td>\n<td>An Efficient Multibiometric Crypto-key generation<\/td>\n<\/tr>\n<tr>\n<td>30<\/td>\n<td>Ashraf Alam<\/td>\n<td>Driving Effective Teaching-Learning Practices: Exploring the TF-IDF Model and Python for Educators<\/td>\n<\/tr>\n<tr>\n<td>31<\/td>\n<td>Ashraf Alam<\/td>\n<td>Empowering Educators by Transforming Classroom Teaching-Learning with TF-IDF Model and Python: A Practical Guide for Teachers<\/td>\n<\/tr>\n<tr>\n<td>32<\/td>\n<td>Ashraf Alam<\/td>\n<td>Empowering Educators through Data Analysis: A Practical Guide for Transforming Classroom Teaching-Learning with TF-IDF Model<\/td>\n<\/tr>\n<tr>\n<td>34<\/td>\n<td>C Gayathri, S Saravanakumar, Yegnanarayanan Venkataraman and K Karuppasamy<\/td>\n<td>On Some Packing Set Variations of Graphs<\/td>\n<\/tr>\n<tr>\n<td>37<\/td>\n<td>Priyanka G, Nivaashini M and Sivaranjani S<\/td>\n<td>Efficient Deep Learning based approaches for Early diagnosis of Diabetes Mellitus<\/td>\n<\/tr>\n<tr>\n<td>39<\/td>\n<td>Eka Ogbaji, E.S. Onah and T Aboiyar<\/td>\n<td>Stochastic matrix for stock markets model<\/td>\n<\/tr>\n<tr>\n<td>40<\/td>\n<td>Sivanandha Saraswathy and Lakshmi T<\/td>\n<td>Fuzzy Boundary Graphs and its Dynamics<\/td>\n<\/tr>\n<tr>\n<td>41<\/td>\n<td>Jackson J and Perumal R<\/td>\n<td>A public key exchange protocol using tropical determinant<\/td>\n<\/tr>\n<tr>\n<td>42<\/td>\n<td>Ponmaheshkumar A and Perumal R<\/td>\n<td>A lightweight key exchange protocol based on max-product semiring<\/td>\n<\/tr>\n<tr>\n<td>43<\/td>\n<td>Ramagiri Praveen Kumar, Kalyan Chatterjee and M Raju<\/td>\n<td>VORONOING LOCATION SPECIFIC DATA<\/td>\n<\/tr>\n<tr>\n<td>44<\/td>\n<td>Shalini K and Sridevi Polasi<\/td>\n<td>Different crop plans using Goal Programming and R programming<\/td>\n<\/tr>\n<tr>\n<td>45<\/td>\n<td>Nathan Chane De la Cruz, Rocky Bigcas and Jerico Bacani<\/td>\n<td>The search for solutions of the Diophantine equation a^x + b^y + c^z = w^2 with Pythagorean triple bases<\/td>\n<\/tr>\n<tr>\n<td>46<\/td>\n<td>Shahin Shaikh and Rupal Shroff<\/td>\n<td>ON THE LINE ZERO DIVISOR GRAPH OF SMALL FINITE COMMUTATIVE RINGS.<\/td>\n<\/tr>\n<tr>\n<td>51<\/td>\n<td>Nagarajan M, Karthik K and Chandrasekaran P<\/td>\n<td>Existence Solution for Sobolev Type Fuzzy Neutral Integrodifferential Evolution Equation in n &#8211; Dimensional Fuzzy Vector Space<\/td>\n<\/tr>\n<tr>\n<td>52<\/td>\n<td>Neha Kaliya, Dr. Digambar Pawar and Adesh Raut<\/td>\n<td>A Novel Lightweight Authentication and Privacy Preservation Model (NoLAPP) for Fog Based Smart Grids<\/td>\n<\/tr>\n<tr>\n<td>53<\/td>\n<td>Srividya M, Vidhya D and Saranya V<\/td>\n<td>ON SOME PROPERTIES OF FUZZY ROUGH ALGEBRAIC TM PRODUCT SYSTEM<\/td>\n<\/tr>\n<tr>\n<td>55<\/td>\n<td>Rajasekaran G and Uma L<\/td>\n<td>On local Antimagic Coloring of Some Graph Classes<\/td>\n<\/tr>\n<tr>\n<td>56<\/td>\n<td>Pradip Kumar Parida and Naveen Chandra Bhagat<\/td>\n<td>Convergence of Newton-Steffensen method under Lipschitz continuous second derivative<\/td>\n<\/tr>\n<tr>\n<td>59<\/td>\n<td>Ambika M, Selvarathi M and Dhanya V<\/td>\n<td>An Overview of \u03ee&xi; &ndash; \u20b3\u2131 &#8211; Subgroup over a Boolean Latt\u0131ce<\/td>\n<\/tr>\n<tr>\n<td>60<\/td>\n<td>D Vidhya, V Saranya and M Srividya<\/td>\n<td>A Continuous Functions on Fuzzy Automata Lindel&ouml;f Structure Spaces<\/td>\n<\/tr>\n<tr>\n<td>62<\/td>\n<td>Yogalakshmi Y, Mary U and Sreeja S<\/td>\n<td>A STUDY ON EXTENDED DISTANCE ENERGY OF SOME GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>64<\/td>\n<td>Priyalatha S.P.R, Vanitha S and Witczak T<\/td>\n<td>New Form of Continuity in Nano Soft s (I) Space<\/td>\n<\/tr>\n<tr>\n<td>65<\/td>\n<td>Reny Jose and Ponmozhi K<\/td>\n<td>Spices classification using Computer vision and Deep learning algorithms with special reference to YOLO v8<\/td>\n<\/tr>\n<tr>\n<td>67<\/td>\n<td>S Karpagam, B Somasudaram, R Lokesh and Kavin Sagana Mary A<\/td>\n<td>An M^X\/G\/1 queueing system with Optional Service, Immediate Feedback and Bernoulli Vacation<\/td>\n<\/tr>\n<tr>\n<td>69<\/td>\n<td>D Brightlin and G Dominic Babu<\/td>\n<td>Fibonacci Heat Equation Generated by Two and Three Dimensional Difference Equation<\/td>\n<\/tr>\n<tr>\n<td>71<\/td>\n<td>Dhanya V, Selvarathi M and Ambika M<\/td>\n<td>A Systematic Approach to the Homomorphism on the Jp Neutrosophic &Delta;\u03dd Subgroup<\/td>\n<\/tr>\n<tr>\n<td>72<\/td>\n<td>Abirami K, Mohanapriya N and Dafik D<\/td>\n<td>On Edge-Equitable Antimagic connection number of Ladder graph families<\/td>\n<\/tr>\n<tr>\n<td>73<\/td>\n<td>A. Anthony Raj, S. Prathap and D. Madhavakumar<\/td>\n<td>An Application of Pythagoras theorem from Heron&rsquo;s formula to derive the foci of an Ellipse<\/td>\n<\/tr>\n<tr>\n<td>74<\/td>\n<td>Ashokkumar Kulandasamy and Dharshan Dharshan<\/td>\n<td>OPTIMIZED FRAMEWORK FOR HIGH-SPEED OBJECT DETECTION IN BADMINTON USING DEEP LEARNING<\/td>\n<\/tr>\n<tr>\n<td>75<\/td>\n<td>Chithrakumar Thangaraj, Dr.Thangamani M and M.Deepak M<\/td>\n<td>Leveraging Internet of Things and Artificial Intelligence for Climate Monitoring and Reporting<\/td>\n<\/tr>\n<tr>\n<td>76<\/td>\n<td>Chithrakumar Thangaraj, Arvindh C C, Ashwanth K A K A and Akshai P P<\/td>\n<td>AUTOMATIC NUMBER PLATE DETECTION SYSTEM<\/td>\n<\/tr>\n<tr>\n<td>77<\/td>\n<td>Krishnamugundh P, Karmel Arockiasamy, Kanimozhi G and Karthika P<\/td>\n<td>Analysis on Fertility of Soil Parameters using Machine Learning Algorithms<\/td>\n<\/tr>\n<tr>\n<td>78<\/td>\n<td>Aishworyann, Shrey Kansal, Vibhor Mishra and Dr. Krishnendu Rarhi<\/td>\n<td>IMAGE ENCRYPTION USING 4D CHAOTIC MAP, RANDOM PIXEL PERMUTATION, IMAGE AS A KEY AND DNA ENCODING ON MULTILAYERS OF CHAOTIC SEQUENCE<\/td>\n<\/tr>\n<tr>\n<td>80<\/td>\n<td>Jaya Sudha, Senthil Kumaran R, Balakumaran M and Athiyaman M<\/td>\n<td>Smart Portable Ventilator for Covid19 Patients<\/td>\n<\/tr>\n<tr>\n<td>81<\/td>\n<td>Merlin C D, Divya M, Divyajothi M and Durga Dharshini M<\/td>\n<td>Sensing an Activated Mobile Phone by using Transmitted Signals<\/td>\n<\/tr>\n<tr>\n<td>82<\/td>\n<td>Merlin C D, A Darwin, M. Gowtham and R. Danushkodi<\/td>\n<td>Design of an Home Automation System with Voice Controlled Application using Arduino<\/td>\n<\/tr>\n<tr>\n<td>83<\/td>\n<td>Dr. Premkumar M, Prasanna A and Juliet Jeyapackiam J<\/td>\n<td>On fundamental Computational Properties &mu;-Anti-Fuzzy Subgroups<\/td>\n<\/tr>\n<tr>\n<td>84<\/td>\n<td>Mahalakshmi Ayyavoo and Velmathi Guruviah<\/td>\n<td>Review on Medical Image Segmentation and Encryption using GAN<\/td>\n<\/tr>\n<tr>\n<td>86<\/td>\n<td>M Jayalakshmi, B Vighnesh and S Durga Sai Sriram<\/td>\n<td>A Machine Learning Approach to Driver Drowsiness Detection Using Eye Aspect Ratio<\/td>\n<\/tr>\n<tr>\n<td>88<\/td>\n<td>Veeralagan J and Manju Priya S<\/td>\n<td>Identification of Alzheimer&#8217;s Disease using K-Means for Pet Scan Datasets<\/td>\n<\/tr>\n<tr>\n<td>89<\/td>\n<td>Anitha Ponraj<\/td>\n<td>Real time 2D object detection in vehicles using YOLO<\/td>\n<\/tr>\n<tr>\n<td>90<\/td>\n<td>Suruthi K, Yuvaraj K, Navinkumar S, Arul Karthikeyan O and Kathiravan E<\/td>\n<td>Real-time Vehicle load Prediction and Indication system<\/td>\n<\/tr>\n<tr>\n<td>91<\/td>\n<td>Ms. Aruna Arumugam G and Dr. Mohamed Divan Masood M<\/td>\n<td>Detecting the causes of cancer by DNA sequence mutation (Mutant p53) using deep learning computational model<\/td>\n<\/tr>\n<tr>\n<td>92<\/td>\n<td>Soham Mitra, Navya Verma, Logeshwari V and Pattabiraman V<\/td>\n<td>Dental Cavity Classification using Convolutional Neural Network<\/td>\n<\/tr>\n<tr>\n<td>93<\/td>\n<td>Amutha S, Vamsi Pydipati, Kandi Manikanta Reddy, Chekka Mahesh, Pilli Vamsi Krishna Reddy and Konda Ashok Reddy<\/td>\n<td>Driver Drowsiness Detection System using OpenCV and Keras<\/td>\n<\/tr>\n<tr>\n<td>94<\/td>\n<td>Vijayalakshmi P, Karuppasamy K and Win Mathew John<\/td>\n<td>Towards Restrained Pitchfork Domination: An Efficient Congestion Control Mechanism In Ad-hoc Networks<\/td>\n<\/tr>\n<tr>\n<td>95<\/td>\n<td>Chitra Ganesan<\/td>\n<td>ODD-FIBONACCI PRIME EDGE ANTI-MAGIC LABELING OF SOME SPECIAL GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>96<\/td>\n<td>Sangeetha H, Varshini V and Vibhushitha L<\/td>\n<td>Career Prediction System<\/td>\n<\/tr>\n<tr>\n<td>97<\/td>\n<td>Aanandaram Velavan and Deepalakshmi P<\/td>\n<td>BLOCKCHAIN-BASED DIGITAL IDENTITY FOR SECURE AUTHENTICATION OF IOT DEVICES IN 5G NETWORKS<\/td>\n<\/tr>\n<tr>\n<td>98<\/td>\n<td>A Ahila<\/td>\n<td>QUAKE OF EDGE SUNDER ON BLAST DOMINATION NUMBER<\/td>\n<\/tr>\n<tr>\n<td>99<\/td>\n<td>Karthick P, Muthukani Vairavel T, Thangapandi K and Sundaresan P<\/td>\n<td>Analysis on Spherical Fuzzy Graphs with Dombi Operator<\/td>\n<\/tr>\n<tr>\n<td>101<\/td>\n<td>Shuhan Zhang, Zhihang Xiao, Qiao Bi, Minjie Hu and Tao He<\/td>\n<td>What&#8217;s your next guess? Solution Word classification prediction model based on multi-dimensional feature Vector and MIMO-LSTM<\/td>\n<\/tr>\n<tr>\n<td>102<\/td>\n<td>Vimala Devi Pandian and Yegnanarayanan Venkataraman<\/td>\n<td>On Some Interesting Connection Between Graph Coloring and Associated Topological Structures<\/td>\n<\/tr>\n<tr>\n<td>103<\/td>\n<td>Kotte Sai Vamsi, Kothakota Mohamad Feroz, Kotha Ruthwik Saran, Kristipati Ravindra Reddy, Dandhuluri Varshith Varma and Dr Jayalakshmi Murugan<\/td>\n<td>Logo Detection By Using The Deep Learning Model<\/td>\n<\/tr>\n<tr>\n<td>105<\/td>\n<td>Haripriya K, Harshini V, Jolinemelina A, Dr.Shahulhammed S, Preethi C and Dr. Pavalarajan S<\/td>\n<td>Drunkand DriveDetection systemfor Two-wheelers usingIOT<\/td>\n<\/tr>\n<tr>\n<td>106<\/td>\n<td>Saravana Priya S, Suneela J and Prathyush Agarwal<\/td>\n<td>Python-based engine power estimate for bulk carrier using ship&rsquo;s displacement<\/td>\n<\/tr>\n<tr>\n<td>108<\/td>\n<td>Sundaresan P, Joseph Kennedy A, Karthick P and Muthukani Vairavel T<\/td>\n<td>Generators of Class Partition Algebra and G-edge colored partition as a Centralizer algebra of wreath product of an alternating group and G<\/td>\n<\/tr>\n<tr>\n<td>109<\/td>\n<td>Heber Hern&aacute;ndez, Elisabete Alberdi Celaya and Aitor Goti<\/td>\n<td>A comparative analysis of kriging and neural networks for mineral resource estimation<\/td>\n<\/tr>\n<tr>\n<td>110<\/td>\n<td>S Ravikumar and B. Reddappa<\/td>\n<td>The consequence of slip boundary conditions, Hall current and Soret-Dufour forces on the dynamics of a Jeffery fluid in a tapered conduit with vertical asymmetry<\/td>\n<\/tr>\n<tr>\n<td>111<\/td>\n<td>R. Sathish Srinivasan, R. Ezhilarasi, T.V. Sudharsan and G. Murugusundaramoorthy<\/td>\n<td>ON A NEW CLASS V \u0303_q^* (k,&gamma;,R,S) OF SYMMETRIC q- HARMONIC UNIVALENT FUNCTIONS RELATED TO SYMMETRIC CONVOLUTED OPERATOR<\/td>\n<\/tr>\n<tr>\n<td>113<\/td>\n<td>Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P and Aushika D<\/td>\n<td>Computational and microbial analysis of metagenome of commerically available cookies revealed the presence of numerous bacteria<\/td>\n<\/tr>\n<tr>\n<td>114<\/td>\n<td>Radhika Vs and Radhika Vs<\/td>\n<td>CONNECTED VERTEX-EDGE DOMINATING SETS AND CONNECTED VERTEX-EDGE DOMINATION POLYNOMIALS OF LOLLIPOP GRAPH L_(n,1)<\/td>\n<\/tr>\n<tr>\n<td>115<\/td>\n<td>Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N.<\/td>\n<td>Computational analysis of the putative beta-galactosidases of Cellulomonas gilvus ATCC 13127<\/td>\n<\/tr>\n<tr>\n<td>116<\/td>\n<td>Sreenivasulu Reddy L, Devendra Jangiti and Kotte Amaranadha Reddy<\/td>\n<td>Counting of Various Type of Cycles in Topology based Graphs<\/td>\n<\/tr>\n<tr>\n<td>117<\/td>\n<td>Maheswari M and Brintha N.C<\/td>\n<td>Detection of Various Casting Defects in Manufacturing Sectors using Deep Learning<\/td>\n<\/tr>\n<tr>\n<td>118<\/td>\n<td>Kameswari M and Muthumari U<\/td>\n<td>On f-Topological Spaces<\/td>\n<\/tr>\n<tr>\n<td>119<\/td>\n<td>Muthukani Vairavel T, Joseline Manora J, Karthick P and Sundaresan P<\/td>\n<td>MAJORITY AND CONNECTED MAJORITY DOMINATION ON EDGE ADDITION GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>120<\/td>\n<td>V Renuka Devi and Greeshma Mahesh<\/td>\n<td>Extension of ideals<\/td>\n<\/tr>\n<tr>\n<td>123<\/td>\n<td>Sapna S and Biju R Mohan<\/td>\n<td>A Neural Network Model for Implied Volatility Estimation of Options: A Use Case for Indian Option Market<\/td>\n<\/tr>\n<tr>\n<td>124<\/td>\n<td>Pavithra R, Indira Priyadharshini M and Dhivyashree M<\/td>\n<td>A COMPREHENSIVE SURVEY ON SMART AGRICULTURE USING IOT<\/td>\n<\/tr>\n<tr>\n<td>125<\/td>\n<td>Dhivyashree M, Vishnu Durai Rs and Pavithra R<\/td>\n<td>AN AI-DRIVEN MODEL FOR DECISION SUPPORT SYSTEMS<\/td>\n<\/tr>\n<tr>\n<td>126<\/td>\n<td>S Pooja, M Vigneshwaran and L Vidyarani<\/td>\n<td>On &alpha;*g#&phi;-closed sets in Topological Spaces<\/td>\n<\/tr>\n<tr>\n<td>128<\/td>\n<td>Sheik Asraf S, Ajay C, Jayaprakash S, Jegannathan P, Swetha P, Aushika D and Rajnish K.N.<\/td>\n<td>Computational analysis of the putative endoglucanases in the genome of Cellulomonas flavigena ATCC 53703<\/td>\n<\/tr>\n<tr>\n<td>129<\/td>\n<td>Tharakeswari V, Kameswari M and Kavitha S<\/td>\n<td>WARI&#8217;S Algorithm for Ranking Triangular Fuzzy Numbers<\/td>\n<\/tr>\n<tr>\n<td>130<\/td>\n<td>Revathy G<\/td>\n<td>LAND RATE PREDICTION USING COMPUTATIONAL INTELLIGENCE<\/td>\n<\/tr>\n<tr>\n<td>131<\/td>\n<td>Revathy G<\/td>\n<td>COMPUTATIONAL INTELLIGENCE FOR LEAF DISEASES MONITORING USING UAV IMAGES<\/td>\n<\/tr>\n<tr>\n<td>132<\/td>\n<td>Revathy G<\/td>\n<td>Bee Topology Of Wireless Ad Hoc Networks BTWANET<\/td>\n<\/tr>\n<tr>\n<td>133<\/td>\n<td>Archana D<\/td>\n<td>WIRELESS SENSOR NETWORK-LOCATION METHODOLOGY AND ITS REAL TIME APPLICATION<\/td>\n<\/tr>\n<tr>\n<td>134<\/td>\n<td>Dr.M Sangeetha and T Mummoorthy<\/td>\n<td>Fractional Programming for Undetermining Multi-Objective Transportation Problem with Goals using Fermatean Fuzzy Number<\/td>\n<\/tr>\n<tr>\n<td>135<\/td>\n<td>Maheswari B and Chitra V<\/td>\n<td>Tangent Similarity Measure and Weighted tangent similarity measure of Infra Fuzzy Sets and its Application<\/td>\n<\/tr>\n<tr>\n<td>136<\/td>\n<td>Debapriya Biswas and Ipsita Rajwar<\/td>\n<td>Projective disk and Poincar\\'{e} disk: Exploring $\\text{SL}(3,\\mathbb{R})$ action from an Erlangen perspective<\/td>\n<\/tr>\n<tr>\n<td>137<\/td>\n<td>G.Somasundara Ori and Abirami B<\/td>\n<td>MODELLING OF NEUTROSOPHIC THEORY BULK QUEUEING SYSTEM<\/td>\n<\/tr>\n<tr>\n<td>138<\/td>\n<td>Elakiya E, Tejus Paturu, Chaithanya Naik Keluth and Sai Tarun V<\/td>\n<td>Investigating Feature Extraction and Classification Algorithms for Effective Lung Disease Detection using Chest X-ray images<\/td>\n<\/tr>\n<tr>\n<td>139<\/td>\n<td>Arkady Wey, Chris Breward, Jon Chapman and Ian Griffiths<\/td>\n<td>Multiscale models for particle-laden flow through periodic networks<\/td>\n<\/tr>\n<tr>\n<td>140<\/td>\n<td>Sai Hanwith Bellamkonda, Aditya Vardhan Kadambari, Sai Kiran Rachakonda, Vamsi Krishna Panchadi and Gireesh Kumar Tanavarapu<\/td>\n<td>Grammar Error Correction using Monotonic Attention<\/td>\n<\/tr>\n<tr>\n<td>142<\/td>\n<td>Parivazhagan A and Jairus Ponrabi<\/td>\n<td>Smart Stick &#8211; A Device for Obstacle Detection and Location-Based Assistance for the Blind<\/td>\n<\/tr>\n<tr>\n<td>143<\/td>\n<td>Giri Hallur, Ashok P and Aslekar Avinash<\/td>\n<td>Virtual Threads of Connectivity: Telecom Software Insights<\/td>\n<\/tr>\n<tr>\n<td>145<\/td>\n<td>Saravanan S and Gunasekaran S<\/td>\n<td>FIXED POINT OF BIANCHINI TYPE CONTRACTION ON S-METRIC SPACE WITH AN EIGEN VALUE PROBLEM<\/td>\n<\/tr>\n<tr>\n<td>146<\/td>\n<td>Maheshprabha M and Kameswari M<\/td>\n<td>APPLICATIONS OF POSSIBILITY PYTHAGOREAN FUZZY SOFT EXPERT SET IN MEDICAL DIAGNOSIS<\/td>\n<\/tr>\n<tr>\n<td>147<\/td>\n<td>Rahim K H and M Thiagarajan<\/td>\n<td>M\/ M(a,b) \/2 CONTROLLED ARRIVAL RATES AND INTERDEPENDENT QUEUEING MODEL<\/td>\n<\/tr>\n<tr>\n<td>148<\/td>\n<td>Amala Richard and A Rajkumar<\/td>\n<td>MCDM using Modified TOPSIS Method based on the Bipolar Neutrosophic Set: Application in Selection of Cloud Service Provider based on QoS<\/td>\n<\/tr>\n<tr>\n<td>149<\/td>\n<td>S. Nivetha Therasal<\/td>\n<td>POISSON INPUT AND EXPONENTIAL SERVICE TIME INTERDEPENDENT QUEUEING MODEL WITH BREAKDOWN AND CONTROLLABLE ARRIVAL RATES<\/td>\n<\/tr>\n<tr>\n<td>150<\/td>\n<td>P Gurusamy and R Angel Joy<\/td>\n<td>Strong Weak Stress Domination in a Graph<\/td>\n<\/tr>\n<tr>\n<td>152<\/td>\n<td>Praphull Chhabra and Sonam Chhabra<\/td>\n<td>APPLICATION OF NEW FUZZY MEASURE IN MULTI-ATTRIBUTE DECISION-MAKING<\/td>\n<\/tr>\n<tr>\n<td>154<\/td>\n<td>Pranav Kb, Adithya Venkatraman, Subhashini N and Muthulakshmi S<\/td>\n<td>Image steganalysis using discrete cosine transform<\/td>\n<\/tr>\n<tr>\n<td>155<\/td>\n<td>T Vijay, Dr.S. Bala and Dr.K. Thirusangu<\/td>\n<td>EIGEN VALUES IN THE FRAMEWORK OF SOME DIGRAPH<\/td>\n<\/tr>\n<tr>\n<td>156<\/td>\n<td>V Suganya, Dr.S. Bala and Dr.K. Thirusangu<\/td>\n<td>CORDIAL LABELING IN THE CONTEXT OF A SPECIAL GRAPH<\/td>\n<\/tr>\n<tr>\n<td>158<\/td>\n<td>M Nandhini, S Bala and K Thirusangu<\/td>\n<td>PELL INDEX FOR SOME GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>159<\/td>\n<td>Anjana Thampy S and Dr. Jeyaraj Jane Rubel Angelina<\/td>\n<td>Sentiment Analysis and Emotion Recognition from Speech using Paralinguistic and Spectral Feature Extraction using Deep Learning Techniques<\/td>\n<\/tr>\n<tr>\n<td>160<\/td>\n<td>Esakki Muthu S and Kartheeban K<\/td>\n<td>A Blockchain Technology&ndash;Trust as A Service<\/td>\n<\/tr>\n<tr>\n<td>161<\/td>\n<td>Ayan Pathak, Raina Paul and Sayani Mondal<\/td>\n<td>Classification of News Paper Headlines<\/td>\n<\/tr>\n<tr>\n<td>162<\/td>\n<td>Aheli Acharya, Raina Paul and Sayani Mondal<\/td>\n<td>A Study on Education System in India Pre- and Post-Digitisation<\/td>\n<\/tr>\n<tr>\n<td>163<\/td>\n<td>Shimja Majida<\/td>\n<td>COVID-19 DETECTION USING DEEP LEARNING METHODS<\/td>\n<\/tr>\n<tr>\n<td>166<\/td>\n<td>Moses Dian, Dhayalan D and Vimalsubramanian G<\/td>\n<td>Optimized On Demand Services with Incentive Mechanism in P2P Network<\/td>\n<\/tr>\n<tr>\n<td>168<\/td>\n<td>Shyamala K and Mercy Evangeline M<\/td>\n<td>Extractive Text Summarization Us\u0131ng Frequency Based Feature Extraction For Single Document In Tamil Language<\/td>\n<\/tr>\n<tr>\n<td>169<\/td>\n<td>Ramesh Ramasamy, Ramesh Ramasamy and Ramesh Ramasamy<\/td>\n<td>DECOMPOSITION OF $(\\vartheta,\\delta)$- CONTINUITY<\/td>\n<\/tr>\n<tr>\n<td>170<\/td>\n<td>Sujatha P, Peddsasanjanna Manasa and Nithya P<\/td>\n<td>CLIMATE SMART AGRICULTURE USING MACHINE LEARNING<\/td>\n<\/tr>\n<tr>\n<td>171<\/td>\n<td>Sundaranarayana D, Kamaleshwar T and Peter Soosai Anandaraj A<\/td>\n<td>A LEARNING BASED ROUTING SCHEME AIDED WITH STABILIZED CLUSTERING FOR LOAD BALANCING IN MOBILE ADHOC NETWORK TO IMPROVE ENERGY EFFICIENCY<\/td>\n<\/tr>\n<tr>\n<td>172<\/td>\n<td>Parthasarathy R, Peter Soosai Anandaraj A and Kiruthiga Devi M<\/td>\n<td>RECUPERATING OF AD-HOC ROUTING NODES IN THE CLUSTER SCENARIO (RARICS) TO ENHANCE THE NODE CHAIN CONNECTION AND THE SECURITY IN THE AD HOC NETWORK<\/td>\n<\/tr>\n<tr>\n<td>173<\/td>\n<td>Asif S and Kartheeban K<\/td>\n<td>Motion Picture Streaming Based On Vehicle Detection Using Yolov4 Algorithm<\/td>\n<\/tr>\n<tr>\n<td>174<\/td>\n<td>Peter Soosai Anandaraj A, Ramesh P and Amali Angel Punitha A<\/td>\n<td>TRAFFIC SIGN RECOGNITION USING CONVOLUTIONAL NEURAL NETWORK MODEL<\/td>\n<\/tr>\n<tr>\n<td>175<\/td>\n<td>Kiruthiga Devi M, Parthasarathy R and Peter Soosai Anandaraj A<\/td>\n<td>SAFETY WEARABLE DEVICES FOR CIVIL WORKERS<\/td>\n<\/tr>\n<tr>\n<td>177<\/td>\n<td>Diana A and Kartheeban K<\/td>\n<td>Cyber resilience against advanced persistent threat using multi agent AI in I-IoT<\/td>\n<\/tr>\n<tr>\n<td>178<\/td>\n<td>Abinaya K, Dhanasekaran S and Vasudevan V<\/td>\n<td>A Survey on Manipulating Virtualized Service Management in Mobile Edge Cloud Network<\/td>\n<\/tr>\n<tr>\n<td>179<\/td>\n<td>Vinodhini H and Dr.D.Amudhaguka<\/td>\n<td>Stock Price Prediction Using Machine Learning Techniques with Sentiment Analysis &#8211; A Review<\/td>\n<\/tr>\n<tr>\n<td>180<\/td>\n<td>Shimja M<\/td>\n<td>ENHANCED COVID-19 DETECTION USING CNN AND DARKNET: ADVANCING CT SCAN AND CHEST X-RAY ANALYSIS<\/td>\n<\/tr>\n<tr>\n<td>181<\/td>\n<td>Vanthana V and Kartheeban K<\/td>\n<td>A STUDY ON THE IMPACT OF SENTIMENT ANALYSIS ON THE RELIABILITY RECOMMENDATION SYSTEMS<\/td>\n<\/tr>\n<tr>\n<td>183<\/td>\n<td>T. Jones Daniel and Dr.R.Sundar Rajan<\/td>\n<td>Ml Based Bedridden Patient Risk Level Prediction Using Km-C,Dt-Id3 And Xg Boost Analysis<\/td>\n<\/tr>\n<tr>\n<td>184<\/td>\n<td>Rushikesh Shaharao, Gopal Sakarkar, Abhijeet Khandagale, Mahima Gaurihar, Ramsha Shaikh and Rupak Kadhare<\/td>\n<td>Semantic Similarity in Multi-Source Information Retrieval for Improving Learner Performance<\/td>\n<\/tr>\n<tr>\n<td>186<\/td>\n<td>Thamizhendhi G, Kanakambika K and Kameswari M<\/td>\n<td>SOME OPERATIONS ON CONGRUENCE LABELED GRAPHS<\/td>\n<\/tr>\n<tr>\n<td>187<\/td>\n<td>Priyadharshini S, Bharath Singh J, Selvalakshmi S, Sathya Narayanan Velmurugan, Vivekrabinson K and Shanmuga Raja B<\/td>\n<td>Enhancing Indoor Air Quality through an Automatic HVAC Duct Cleaning Bot<\/td>\n<\/tr>\n<tr>\n<td>188<\/td>\n<td>Vijay M, Nandhini N, Vivekrabinson Rabinson, Shanmugaraja B and Sundareswaran N<\/td>\n<td>Image denoising based on nature-inspired optimized deep neural network<\/td>\n<\/tr>\n<tr>\n<td>189<\/td>\n<td>Vijay M, Nandhini N, Vivekrabinson K, Shanmuga Raja B and Sundareswaran N<\/td>\n<td>System for detection and classification of anomalous behavior and fixing anomaly with firewall configuration<\/td>\n<\/tr>\n<tr>\n<td>190<\/td>\n<td>Rufai Iliyasu<\/td>\n<td>COMPARATIVE STUDY OF OUTLIER DETECTION PROCEDURE IN MULTIPLE LINEAR REGRESSION MODEL<\/td>\n<\/tr>\n<tr>\n<td>191<\/td>\n<td>Vivekrabinson K, Rajesh Kumar S, Vijayakumar D and Bharath Singh J<\/td>\n<td>Blockchain Enabled Real Estate Property Transactions using NFT: An Approach<\/td>\n<\/tr>\n<tr>\n<td>192<\/td>\n<td>George J<\/td>\n<td>On coloring certain prime distance graphs<\/td>\n<\/tr>\n<tr>\n<td>193<\/td>\n<td>Jannatul Ferdous Medha, Asraf Ahmed, Utsu Chowhan and Md Abrar Hamim<\/td>\n<td>Defect Fabric Detection using Deep Learning Approach<\/td>\n<\/tr>\n<tr>\n<td>194<\/td>\n<td>Md Abrar Hamim, F.M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam and Bijoy Ghosh<\/td>\n<td>Lung Cancer Detection using Machine Learning Approach<\/td>\n<\/tr>\n<tr>\n<td>195<\/td>\n<td>Mahalakshmi P and Thenmalar S<\/td>\n<td>Feature Based Training for Crime Detection using Deep Learning Techniques<\/td>\n<\/tr>\n<tr>\n<td>196<\/td>\n<td>Akshaya Rajendra Gupta, Sathya Narayanan Velmurugan, Bharath Singh Jeberaj, Gokul Senthil Kumar and Dushyanth Shanmugam<\/td>\n<td>HANDWRITTEN TEXT RECOGNITION USING DEEP LEARNING<\/td>\n<\/tr>\n<tr>\n<td>197<\/td>\n<td>Jithin Jacob<\/td>\n<td>Mental Health Assessment over Voice Analysis by Using Machine Learning Techniques<\/td>\n<\/tr>\n<tr>\n<td>198<\/td>\n<td>Abhijit Bhattacharya, Kamlesh Dubey and Bikromadittya Mondal<\/td>\n<td>Volumed of a n dimensional hyperbolic simplex<\/td>\n<\/tr>\n<tr>\n<td>199<\/td>\n<td>E Poongothai and E Padmavathi<\/td>\n<td>ON FUZZY NEUTROSOPHIC TOPOLOGICAL SPACES C-ALMOST P-SPACES AND OTHER SPACES<\/td>\n<\/tr>\n<tr>\n<td>201<\/td>\n<td>Shyam Shanckin, Gayathri Mahendran and Gokhulnath Thirumaran<\/td>\n<td>Gaussian Processes for Automating Model Selection<\/td>\n<\/tr>\n<tr>\n<td>202<\/td>\n<td>Gayathri Mahendran, Gokhulnath Thirumaran, Syed Imam Ali and Vishwas Raj Jadon<\/td>\n<td>NAS for Automated ML Deployment on Extreme Edge Devices<\/td>\n<\/tr>\n<tr>\n<td>203<\/td>\n<td>Harsh Zele<\/td>\n<td>Performance Evaluation and Comparative Analysis of Machine Learning Techniques for Classification and Regression: A Study on the Vinho Verde Dataset<\/td>\n<\/tr>\n<tr>\n<td>204<\/td>\n<td>R Revathi<\/td>\n<td>Identifying Influential Users on Twitter: Leveraging Big Data Analytics and Machine Learning<\/td>\n<\/tr>\n<tr>\n<td>205<\/td>\n<td>R Revathi<\/td>\n<td>A Journey through Multifaceted Data in Machine Learning Predictions on Financial Viability<\/td>\n<\/tr>\n<tr>\n<td>206<\/td>\n<td>Harsh Zele<\/td>\n<td>Fruit and Vegetable Segmentation with Decision Trees<\/td>\n<\/tr>\n<tr>\n<td>207<\/td>\n<td>Ganesh Meshram<\/td>\n<td>Effect of Solid-fluid Interaction Parameters on Fluid Flow through Microchannels Using Lattice Boltzmann Method<\/td>\n<\/tr>\n<tr>\n<td>208<\/td>\n<td>Selvamanju E and Akilandeswari Senthil Kumar<\/td>\n<td>Oppositional Squirrel Search Optimization (OSSO) Algorithm in 5G Cellular Networks<\/td>\n<\/tr>\n<tr>\n<td>210<\/td>\n<td>Adithya K, Sumathi R, Nanda Kishor Reddy K and Harsha Vardhan G<\/td>\n<td>AUTOMATED FOOD IMAGE CLASSIFICATION USING DEEP LEARNING<\/td>\n<\/tr>\n<tr>\n<td>211<\/td>\n<td>Ahmad Abubakar Umar and Hamisu Musa<\/td>\n<td>Convergence and Order of the Extended 2-point Super Class Block Backward Differentiation Formula with Off-step Points for Solving Stiff IVPs<\/td>\n<\/tr>\n<tr>\n<td>213<\/td>\n<td>Kannan Kanagaraj<\/td>\n<td>Unsharp Masking of Medical Images Using Rolling Guidance Filter<\/td>\n<\/tr>\n<tr>\n<td>214<\/td>\n<td>Muthumeena M and Balamurali S<\/td>\n<td>Optimal Designing of Chain Sampling Plan for Assuring Median Life Under New Compounded Bell Weibull Life Time Model<\/td>\n<\/tr>\n<tr>\n<td>215<\/td>\n<td>Binta Abubakar, Dahiru Umar, Umar Mohammed and Willaims Dunama<\/td>\n<td>Polynomial Collocation Method for the Solution of Integro-Differential Difference Equations<\/td>\n<\/tr>\n<tr>\n<td>216<\/td>\n<td>Lany Dullas<\/td>\n<td>A Structural Model of Mathematics Performance as Influenced by Students&#8217; Engagement with Technology to Students&#8217; Motivation<\/td>\n<\/tr>\n<tr>\n<td>217<\/td>\n<td>Nagaraj P, Kirthiga N, Sureshkumar S and Prathipa K<\/td>\n<td>Retinal Disease Classification for Color Fundus Images Using a Novel Deep Convolution Neural Network<\/td>\n<\/tr>\n<tr>\n<td>221<\/td>\n<td>Nagaraj P and Sureshbabu P<\/td>\n<td>A Framework to Create Recommendation Systems for Data Science Applications<\/td>\n<\/tr>\n<tr>\n<td>222<\/td>\n<td>Najeem Dheen Abdul Majeeth, Vinoth Kumar E S, Hemavathy P and Loyola Jasmine J<\/td>\n<td>BONE FRACTURE DETECTION USING CONVOLUTIONAL NEURAL NETWORK<\/td>\n<\/tr>\n<tr>\n<td>224<\/td>\n<td>Raja M and Nagaraj P<\/td>\n<td>BLIND PEOPLE OBJECT RECOGNITION USING ESP32 CAM MODULE<\/td>\n<\/tr>\n<tr>\n<td>225<\/td>\n<td>Archa A T<\/td>\n<td>Privacy-Enhanced Distributed Machine Learning against Poisoning Attacks<\/td>\n<\/tr>\n<tr>\n<td>226<\/td>\n<td>Abirami K<\/td>\n<td>Implementing nutrition regulator for stabilizing anxiety among special kids using optimized RNN techniques in evolutionary Deep Learning concepts<\/td>\n<\/tr>\n<tr>\n<td>227<\/td>\n<td>Monisha Privthy Jeba J<\/td>\n<td>Predicting Gene Signatures for Alzheimer&#8217;s Disease: A Transformer Model Approach<\/td>\n<\/tr>\n<tr>\n<td>228<\/td>\n<td>Dr.Swapna B, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar<\/td>\n<td>DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING<\/td>\n<\/tr>\n<tr>\n<td>229<\/td>\n<td>Pothula Sujatha, Muhammed Shijas K and Nithya P<\/td>\n<td>ENGLISH TO MALAYALAM TRANSLITERATION USING RULE-BASED APPROACH AND NAMED ENTITY RECOGNITION USING MACHINE LEARNING<\/td>\n<\/tr>\n<tr>\n<td>230<\/td>\n<td>Dr.B Swapna, D Surendiran Muthukumar, Y Sunil Kumar Reddy, U Vijayabharathi, Y Saieswar Reddy and M Saravana Kumar<\/td>\n<td>DESIGN AND DEVELOPMENT OF WRITING ROBOT USING SPEECH PROCESSING<\/td>\n<\/tr>\n<tr>\n<td>231<\/td>\n<td>Ishvarya M and Brintha N.C<\/td>\n<td>PROGNOSTICATION OF LIGAMENT CANCER AND TEAR<\/td>\n<\/tr>\n<tr>\n<td>232<\/td>\n<td>R. Sasikumar and M. Sujatha<\/td>\n<td>Statistical Process Control in Healthcare: A Systematic Review of Control Chart Applications<\/td>\n<\/tr>\n<tr>\n<td>233<\/td>\n<td>Sdharson K, Anita C.S., Badi Alekhya, Swathi Essakki K, Jasmitha Reddy M and Lakshmi Akshitha Y<\/td>\n<td>EchoSight: Blending Deep Learning and Computer Vision for Unparalleled Navigational Support for the Visually Impaired<\/td>\n<\/tr>\n<tr>\n<td>234<\/td>\n<td>Jeya Sundari M<\/td>\n<td>Ovarian tumor diagnosis models using machine learning and deep learning<\/td>\n<\/tr>\n<tr>\n<td>235<\/td>\n<td>Mr Dhakshunhaamoorthiy, Dr. Jawahar A, Ms. Bharathi Shri C and Dr. Sudharson K<\/td>\n<td>Fuzzy-Based Data Drift Detector for Novel Concept Drift Detection in IoT Data Stream Mining<\/td>\n<\/tr>\n<tr>\n<td>236<\/td>\n<td>Sudharson K, Rajalakshmi D, Badi Alekhya and Varsha S<\/td>\n<td>BlockGov: Blockchain-Based Data Governance in the Internet of Things using Smart Contracts<\/td>\n<\/tr>\n<tr>\n<td>237<\/td>\n<td>Murugavalli K and Ramalakshmi R<\/td>\n<td>Evaluating and exploring the changes in EEG signal patterns following walking using machine learning algorithm<\/td>\n<\/tr>\n<tr>\n<td>238<\/td>\n<td>Anajli N and Dr. Rajkumar Kannan<\/td>\n<td>A Novel Contrast Enhancement Algorithm for Detecting Defects From Fruits and Vegetables<\/td>\n<\/tr>\n<tr>\n<td>239<\/td>\n<td>J.Nirmala Joseph and Dr.J.Srikiruthika Mam<\/td>\n<td>Fuzzy Soft r-precontinuity<\/td>\n<\/tr>\n<tr>\n<td>240<\/td>\n<td>Sudharson K and Sas\u0131kumar R<\/td>\n<td>IoTChain: Leveraging Blockchain for Enhanced Device Authentication in IoT Security<\/td>\n<\/tr>\n<tr>\n<td>241<\/td>\n<td>Sathyamoorthi V, Chandrasekar T and Matheswaran M<\/td>\n<td>DOES QUALITY OF NURSES WORK LIFE MATTER FOR JOB SATISFACTION? EVIDENCE FROM TAMILNADU<\/td>\n<\/tr>\n<tr>\n<td>242<\/td>\n<td>S J Subhashini, Jeyaraj Jane Rubel Angelina, Sai Kiran M J, Vinay N, Tejeswar Reddy S and Madhu Kiran M<\/td>\n<td>FINDING MISSING PERSON USING AI<\/td>\n<\/tr>\n<tr>\n<td>243<\/td>\n<td>Sudharson K, Badi Alekhya and Mohan Raj K R<\/td>\n<td>HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange<\/td>\n<\/tr>\n<tr>\n<td>244<\/td>\n<td>Indumathi C.P, Devasena K and Asha K<\/td>\n<td>LSTM-Based Deep Learning Model for Handwritten Word Recognition<\/td>\n<\/tr>\n<tr>\n<td>245<\/td>\n<td>Malathi K, Himantha Rao Kolli, Hemavathy P and Najeem Dheen Abdul Majeeth<\/td>\n<td>An Extensive Research on Disease Prediction Algorithms and a comparative view in Machine Learning, Deep Learning,Artificial Intelligence<\/td>\n<\/tr>\n<tr>\n<td>246<\/td>\n<td>Mahesh Prabha M and Kameswari M<\/td>\n<td>Application of Generalized Pythagorean Fuzzy Soft Expert Sets in Decision Making<\/td>\n<\/tr>\n<tr>\n<td>247<\/td>\n<td>Balakiruthiga B, Deepalakshmi P, Rajesh Babu C and Angayarkanni S A<\/td>\n<td>A Survey on Artificial Intelligence-based Conflict Resolution Algorithms for Software Defined Data Center (SDDC)<\/td>\n<\/tr>\n<tr>\n<td>248<\/td>\n<td>Esakki Muthu S and Kartheeban K<\/td>\n<td>A Comprehensive Survey of Blockchain Technology&ndash;Trust as A Service<\/td>\n<\/tr>\n<tr>\n<td>249<\/td>\n<td>Richard Taclay, Karen Taclay and Sonny Solmerin<\/td>\n<td>Primitive Solutions of the Diophantine Equation px^2 + qy^2 = z^2<\/td>\n<\/tr>\n<tr>\n<td>251<\/td>\n<td>D Sudha and Dr. P Sujatha<\/td>\n<td>Predicting Complications of Pregnancy using AI &amp; ML<\/td>\n<\/tr>\n<tr>\n<td>252<\/td>\n<td>Indumathi C P, Diviyalakshmi K R and Mahalakshmi R<\/td>\n<td>BIRD SOUND IDENTIFICATION SYSTEM USING DEEP LEARNING<\/td>\n<\/tr>\n<tr>\n<td>253<\/td>\n<td>Dr. Gautam Singh and Vijay Kumar<\/td>\n<td>Direct Discontinuous Galerkin Method for Two-Parameter Singularly Perturbed Parabolic Problems<\/td>\n<\/tr>\n<tr>\n<td>255<\/td>\n<td>A.Kaveena Rebecca and Dr. N C Brintha<\/td>\n<td>A Novel Deep Learning-Based Prediction of DME in Eye Diseases<\/td>\n<\/tr>\n<tr>\n<td>256<\/td>\n<td>Margaret Savitha<\/td>\n<td>Comparative study of the GPT and other Long Language Models (LLMs)<\/td>\n<\/tr>\n<tr>\n<td>257<\/td>\n<td>Deeksha Singh and Rajesh K. Pandey<\/td>\n<td>A fourth order accurate numerical method for non-linear time fractional reaction diffusion equation on a bounded domain<\/td>\n<\/tr>\n<tr>\n<td>259<\/td>\n<td>S Kavitha and V Renuka Devi<\/td>\n<td>Integral Boundary and Co-boundary maps of some Quotient spaces<\/td>\n<\/tr>\n<tr>\n<td>260<\/td>\n<td>R. Raja Subramanian, Pallapu Karthik, Nagasai Venkat Pavan Kumar Ungarala, Chiranjeevi Pathipati, Abhiram Galla and R. Raja Sudharsan<\/td>\n<td>SignNet: Design and Evaluation of a Deep Neural Network Model for Recognition of English Alphabetic Signs for SHIP People<\/td>\n<\/tr>\n<tr>\n<td>261<\/td>\n<td>Nagaraj P, Kirthiga N, Sureshkumar S and Wilson Prakash S<\/td>\n<td>Canny Edge Detection- Based Smart Traffic Control System Using Multitype Image Processing<\/td>\n<\/tr>\n<tr>\n<td>262<\/td>\n<td>Dr Hemavathy P and Dr Vinoth Kumar E S<\/td>\n<td>An Accurate Crop Identification using AI based Convolutional Neural Network<\/td>\n<\/tr>\n<tr>\n<td>263<\/td>\n<td>Benita J, Prasanth S and Vijaya Lalitha G<\/td>\n<td>Compute The BMI Level Of A Human Without Any Instruments Using Artificial Intelligence<\/td>\n<\/tr>\n<tr>\n<td>264<\/td>\n<td>Diptadip Maiti, Madhuchhanda Basak and Debashis Das<\/td>\n<td>Inter-generational Fingerprint Correlation Analysis: Unveiling Inherited Patterns and Identification Reliability<\/td>\n<\/tr>\n<tr>\n<td>265<\/td>\n<td>Narla Venkata Anand Sai Kumar, Saila Lakshmi Sai Malleswara Rao and Noora Harish<\/td>\n<td>Phishing Website Detection based on Improvised Mutual Information Feature Selection with Swarm intelligence Convolutional Neural Network<\/td>\n<\/tr>\n<tr>\n<td>266<\/td>\n<td>Sachchidananda Jana, Pabitra Pal and Asim Kumar Mahadani<\/td>\n<td>A Hybrid Watermarking Scheme using DWT and Haar Transform for Image Authentication<\/td>\n<\/tr>\n<tr>\n<td>269<\/td>\n<td>James Daniel<\/td>\n<td>Colorectal Cancer using Image Classification<\/td>\n<\/tr>\n<tr>\n<td>270<\/td>\n<td>Usha Bhakthavatsalam and Dr. Amuthaguka D<\/td>\n<td>Light Weight Attribute-Based Encryption for Resource-Constrained Devices: Challenges, Solutions and Future Directions<\/td>\n<\/tr>\n<tr>\n<td>271<\/td>\n<td>Jemimah K and Dr.Rajkumar Kannan<\/td>\n<td>Medical Text Intent Recognition using Multiclass Classifier-BERT and XLNET<\/td>\n<\/tr>\n<tr>\n<td>272<\/td>\n<td>Jemima Gracia and Rajkumar Kannan<\/td>\n<td>Early Detection of Fake News using Deep Learning LSTM Networks<\/td>\n<\/tr>\n<tr>\n<td>273<\/td>\n<td>Shyam Shanckin, Mayank, Rahul Patwadi and Anshuman Singh<\/td>\n<td>Unveiling Latent Spaces with Variational Autoencoders<\/td>\n<\/tr>\n<tr>\n<td>274<\/td>\n<td>Thangapandi Kalidas, Narayanamoorthy S, Kang Daekook, Karthick P and Sundaresan P<\/td>\n<td>A Fuzzy Approach Numerical Simulation for Computer Virus System of Fractional Order<\/td>\n<\/tr>\n<tr>\n<td>275<\/td>\n<td>Vasu Ve and Kalyanaraman R<\/td>\n<td>A Finite Capacity Single Server Queueing System with Additional Optional Service<\/td>\n<\/tr>\n<tr>\n<td>277<\/td>\n<td>Subhashini A<\/td>\n<td>DEGREE-BASED TOPOLOGICAL INDICES FOR GRAPH STRUCTURES AND GRAPHENE<\/td>\n<\/tr>\n<tr>\n<td>278<\/td>\n<td>Srinivasan S, Sampath Kumar K, Ganesh D, Nagaraj S and Jeya A Celin J<\/td>\n<td>Effective Cost Reduction Usage of Infrastructure in Small Scale Sectors using Cloud Storage and Internet of Things<\/td>\n<\/tr>\n<tr>\n<td>279<\/td>\n<td>Ayyappan G and Arulmozhi N<\/td>\n<td>Analysis and empirical investigation of queueing inventory system: Two classes of customer under non-preemptive priority, single vacation, and (s, S) replenishment policy<\/td>\n<\/tr>\n<tr>\n<td>280<\/td>\n<td>Ayyappan G and Meena S<\/td>\n<td>Phase type Inventory Queueing Model with Two commodity, Vacation and Breakdown and Repair<\/td>\n<\/tr>\n<tr>\n<td>281<\/td>\n<td>Kalyanaraman R and Vidya K<\/td>\n<td>M\/G\/1 Queue with Regular and Optional phase of services and with R+1 phases of vacation<\/td>\n<\/tr>\n<tr>\n<td>282<\/td>\n<td>Ayyappan G and Archana Gurulakshm G<\/td>\n<td>Analysis of MAP\/PH\/1 retrial queue with Optional service, Vacation, Unreliable server, Standby server and Discouragement<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/tbody>\n<\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-549c4f7 e-con-boxed e-con\" data-id=\"549c4f7\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c29e9f7 elementor-widget elementor-widget-heading\" data-id=\"c29e9f7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Kindly note that the manuscript should be made according to the Springer series: Lecture notes in Networks and Systems (LNNNS) format (LaTeX template, Word template).<\/span>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>List of Accepted Papers For Both Proceedings and Presentation Paper ID Authors Title 11 Pankaj Rawat Blockchain based Federated Deep Learning Framework for Malware Attacks Detection in IoT Edge Devices 12 Ekrem Savas On Some Sequence Spaces of Fuzzy numbers Defined by Sequence of Infinite Matrices 16 Kalaiselvi T and Yegnanarayanan Venkataraman Computation of Various &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/accepted-papers\/\"> <span class=\"screen-reader-text\">ACCEPTED PAPERS<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-1427","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/1427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=1427"}],"version-history":[{"count":52,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/1427\/revisions"}],"predecessor-version":[{"id":3336,"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/1427\/revisions\/3336"}],"wp:attachment":[{"href":"http:\/\/icmc2024.kalasalingam.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=1427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}