Data Analytics and Artificial Intelligence, 978-81-948459-4-2
Content
1. A Novel Method for Identification and Classification of Indian Vegetables Using Random Forest Algorithm
Page No: 1-6
Author: Arun K Talawar; N K Honnagoudar; Prabhu Y Avaradi
DOI: https://doi.org/10.46632/daai/3/2/1
2. A Study on Emotion Analysis for Online Learning Based on Students' Feedback via Social Networks
Page No: 7-11
Author: R. Pushpavalli; C. Immaculate Mary
DOI: https://doi.org/10.46632/daai/3/2/2
3. An Empirical study on designing a security framework for legacy system evolution towards SOA
Page No: 12-15
Author: T. Lavanya
DOI: https://doi.org/10.46632/daai/3/2/3
4. Certain Investigation on Perpetualistic Fuzzy Outlier Data for Efficiency Evaluation of Centroid Stability with Cluster Boundary Fitness
Page No: 16-20
Author: S. Rajalakshmi; P. Madhubala
DOI: https://doi.org/10.46632/daai/3/2/4
5. Medical Data Security in IOT Using DNA Cryptography and Insertion Method
Page No: 21-25
Author: E. Vidhya; R. Kiruba Kumari
DOI: https://doi.org/10.46632/daai/3/2/5
6. A Study On Decentralized Web Hosting Using Peer-To-Peer Architecture
Page No: 26-29
Author: D. Santhi Jeslet; M. Shanmugam
DOI: https://doi.org/10.46632/daai/3/2/6
7. Software Defect Prediction Using Machine Learning Techniques
Page No: 30-33
Author: G.Cauvery; Dhina Suresh
DOI: https://doi.org/10.46632/daai/3/2/7
8. A Quick Review of Data Security, Privacy in Cloud Computing
Page No: 34-43
Author: J. Sathya
DOI: https://doi.org/10.46632/daai/3/2/8
9. Pattern Based Image Retrieval System by Using Clustering Techniques
Page No: 44-49
Author: T. Dharani; R. Kiruba Kumari; B.Sindhupiriyaa; R.Mahalakshmi
DOI: https://doi.org/10.46632/daai/3/2/9
10. Software Development Techniques In Current Scenario
Page No: 50-53
Author: S. Nagalakshmi
DOI: https://doi.org/10.46632/daai/3/2/10
11. Machine Learning Techniques for 5g And Beyon
Page No: 54-58
Author: T. Angalaeswari; M. Logeswari
DOI: https://doi.org/10.46632/daai/3/2/11
12. Heart Disease Detection -A Machine Learning Approach
Page No: 59-63
Author: Josephine Reenamary .S; Rev. Sr. ArockiaValan Rani
DOI: https://doi.org/10.46632/daai/3/2/12
13. Covid-19 Patient Health Prediction Using Boosted Random Forest Algorithm
Page No: 64-68
Author: S. Saranya; S. Bobby
DOI: https://doi.org/10.46632/daai/3/2/13
14. Brain Controlled Car for Disabled Using Artificial Intelligence
Page No: 69-73
Author: N. Bindhu; N. Mageswari
DOI: https://doi.org/10.46632/daai/3/2/14
15. Overview of Cryptography
Page No: 74-80
Author: Archana B U; V Niranjana
DOI: https://doi.org/10.46632/daai/3/2/15
16. Block Chain for IOT Security Using Consensus Algorithms
Page No: 81-84
Author: P. Kalpana; I. Anusha Prem
DOI: https://doi.org/10.46632/daai/3/2/16
17. Shilling Attack Detection in User Based Recommendation System
Page No: 85-94
Author: S. Poornima; M. Geethanjali
DOI: https://doi.org/10.46632/daai/3/2/17
18. Data security in cloud computing using RSA Algorithm
Page No: 95-98
Author: L. Hanupriya; S.I. Anto Ramya
DOI: https://doi.org/10.46632/daai/3/2/18
19. Malware detection in IOMT (MDI) using RNN-LSTM
Page No: 99-106
Author: M. Uma Maheshwari; M. Suguna
DOI: https://doi.org/10.46632/daai/3/2/19
20. Mobile Robotic Arm for Opening Doors Using Proximal Policy Optimization
Page No: 107-112
Author: M. Kokila; G. Amalredge
DOI: https://doi.org/10.46632/daai/3/2/20
21. Artificial Intelligence on Medical Fields
Page No: 113-115
Author: S. Keerthi Rani
DOI: https://doi.org/10.46632/daai/3/2/21
22. Gendroid- A Conceptual Bio-Info Android App and Its Challenges
Page No: 116-120
Author: Manjunath R M; Kumudavalli; Yathindra Sai Ganesh; G. Marzan
DOI: https://doi.org/10.46632/daai/3/2/22
23. Deep Neural Certificate less Hessian Heap Sign cryption for Secure Data Transmission in Wireless Network
Page No: 121-131
Author: N. Shoba; V. Sathya
DOI: https://doi.org/10.46632/daai/3/2/23
24. A Review on Intrusion Detection System and its Techniques
Page No: 132-137
Author: A. Kalaivani; R.Pugazendi
DOI: https://doi.org/10.46632/daai/3/2/24
25. Python Programming to Solve Linear Equations by Gaussian methods
Page No: 138-143
Author: Shobana priya. M; Thanga Murugeshwari. V; Rezvana Parveen. S
DOI: https://doi.org/10.46632/daai/3/2/25
26. A Survey on “Medicines at Your Fingertips”
Page No: 144-149
Author: Rushikesh Pachpute; Abhishek Jadhav; Aditya Shinde; Kaustubh Naik; S. V. Gawai
DOI: https://doi.org/10.46632/daai/3/2/26
27. Object Recognition in Earth Surface Satellite Images Using Digital Image Processing and Machine Learning Techniques with Big Data Technologies
Page No: 150-157
Author: k. Misba Khan
DOI: https://doi.org/10.46632/daai/3/2/27
28. Predicting Chronic Kidney Disease using RF Algorithm for Big Data
Page No: 158-162
Author: K. Jeya gowri
DOI: https://doi.org/10.46632/daai/3/2/28
29. Thyroid Detection using Machine learning
Page No: 163-165
Author: SavitaAdhav; AmitGoge; VipulJadhao; AbhishekMarkad; SurajJadhav
DOI: https://doi.org/10.46632/daai/3/2/29
30. Energy Consumption Analysis in Post Quantum Cryptography Using Multivariate Signature Algorithms
Page No: 166-175
Author: Priyavani; N.Kowsalya
DOI: https://doi.org/10.46632/daai/3/2/30
31. Skin Disease Prediction Machine Learning Model Using Ensemble Classifier with PCA
Page No: 176-184
Author: K.Shunmuga Priya; V. Selvi
DOI: https://doi.org/10.46632/daai/3/2/31
32. A Study on Mixed Inverse Center-Smooth Set of Some Graphs and its application
Page No: 185-189
Author: A. Antokinsley; J. Joanprinciya; N. Deepa
DOI: https://doi.org/10.46632/daai/3/2/32
33. A Multi Cluster Secure System for Out Sourced Encrypted Data Bases
Page No: 190-192
Author: Kalaiselvi. K; Aswini. G; Jayanthi. P
DOI: https://doi.org/10.46632/daai/3/2/33
34. A Performance Analysis of Wireless Sensor Networks in Recent Years
Page No: 193-195
Author: M. Sudha; M.Savitha Devi
DOI: https://doi.org/10.46632/daai/3/2/34
35. A Novel Framework for Prevention of Black hole in Wireless Sensor Networks using Deep Belief Network
Page No: 196-200
Author: M.Malathi; A.Senthil Kumar
DOI: https://doi.org/10.46632/daai/3/2/35
36. Internet of Things (IOT) Based on towards Motorized Interactive Irrigation System
Page No: 201-205
Author: A.V. Sathya
DOI: https://doi.org/10.46632/daai/3/2/36
37. Certain Iterative Methods to Solve System of Equations by Python Programming
Page No: 206-214
Author: ThangaMurugeshwari.V; Shobanapriya.M; Abhinaya. B
DOI: https://doi.org/10.46632/daai/3/2/37
38. Performance of Artificial Neural Network and Modified Gravitational Search Algorithm Models to Predict Vibration Response of Geocell Reinforced Based Weak Sand
Page No: 215-225
Author: S. Jeyanthi; R.Venkatakrishnaiah; K.V.B. Raju
DOI: https://doi.org/10.46632/daai/3/2/38
39. Investigation of Stress Distribution in a Railway Embankment Reinforced By Geogrid Based Weak Soil Formation Using Hybrid Rnn-Eho
Page No: 226-234
Author: M.A.Balasubramani; R.Venkatakrishnaiah; K.V.B.Raju
DOI: https://doi.org/10.46632/daai/3/2/39
40. Navigating Digital Privacy and Security Effects on Student Financial Behavior, Academic Performance, and Well-Being
Page No: 235-246
Author: Praveen Kumar Kumbum, Vijay Kumar Adari, Vinay Chunduru, Srinivas Gonepally, Kishor Kumar Amuda
DOI: https://doi.org/10.46632/daai/3/2/40