Volume-11,Issue-5 ( May, 2024 )
Total Viewer 582
Part 1
1 - Penetration Testing and Metasploit
E. Geethika Srivalli, V.L.S.S. Ganesh, Leelavathi Arepalli
1,2Student,Department of CSE,Sri Vasavi Engineering College,pedatadepalli,534101
3Asst. Prof, Department of CSE,Sri Vasavi Engineering College,pedatadepalli,534101
|
|
2 - Sentiment Analysis of Social Media Posts: Uncovering Public Opinion Through Comments
Ayush V Jain, Ayush Singh, S Prayla Shyry
1Student, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, SH 49A, Chennai, Tamil Nadu 600119
2Student, Sathyabama Institue of Science and Technology, Jeppiaar Nagar, SH 49A, Chennai, Tamil Nadu 600119
3Professor, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, SH 49A, Chennai, Tamil Nadu 600119
|
|
3 - Securing Pictorial Data Transfer through a Novel Digital Image Encryption Method
Qaim Mehdi Rizvi, Sarika Singh, Atul Kumar
1,2Shri Ramswaroop Memorial College of Engineering & Management, Lucknow
3Maharana Pratap Engineering College, Kanpur
|
|
4 - Utilising Transfer Learning and GAN for Stock Market Data Analysis
Shailendra Narayan Singh, Avanish Patnaik
1Professor, Department of Computer Science and Engineering ASET, Amity University Noida, India
2Student, Department of Computer Science and Engineering ASET, Amity University Noida, India
|
|
5 - Iot and Machine Learning Based Fastest Route Suggestions During Accident Detection & Alerting System
Aachal Wani, Prachi Meshram, Vaibhavi Nimje, Bishal Rajbhar, Amanganjare
Department of Computer Science & Engineering,JD College of Engineering and Management,Nagpur,India
|
|
6 - Face Recognition Based Attendance Management System
Jaspreet Kaur, Parakh Agarwal, Piyush Yadav, Pratyush Shukl
Department of Computer Science and Engineering, JSS Academy of Technical Education, Noida
|
|
7 - Detecting Windows Malware Using Image Analyzing for Extracted Behavior Features
Noor Aldeen Alhamedi, Kang Dongshik
1,2University of the Ryukyu (Okinawa, Japan)
|
|
8 - Embedding System-Level Persistent Bind/Reverse Shell in Modern Android Architecture
Sreeram Kl, Sameer Al Mohmood, T.Sudalaimuthu
1,2,3 Dept of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai, India
|
|
9 - Applying Gaussian Mixture Model and Pearson Correlation Distance Metric to Enhance The Performance of Smote Algorithm
Mustafa Yavaş, Aysun Güran, Mitat Uysal
1,2,3 Computer Engineering Department Doğuş University, İstanbul, Turkey
|
|
10 - Harnessing Ml Techniques in Online Food Delivery Platforms Using Sentiment Based Recommendations
H Santhi, Rb Aadesh, Rs Harshanbarath, Attaluru Thrinath
School of Computer Science, Vellore Institute of Technology, Vellore, Tamil Nadu, India
|
|
11 - Real-Time Environmental Monitoring using Low-Cost Sensors in Smart Cities with IOT
Md Nadil Khan, Zahidur Rahman, Sufi Sudruddin Chowdhury, Tanvirahmedshuvo, Md Risalat Hossain Ontor, Md Didear Hossen, Nahid Khan, Hamdadur Rahman
1Department of Information Technology, Washington University of Science and Technology (wust), Los Angeles,
California, USA
2,3,4,5,6International American University, Los Angeles, California,USA
7East West University, Dhaka, Bangladesh
|
|
12 - Real-Time Health Monitoring with IOT
Md Nadil Khan, Zahidur Rahman, Sufi Sudruddin Chowdhury,Tanvira Hmedshuvo, Md Risalat Hossain Ontor, Md Didear Hossen, Nahid Khan, Hamdadur Rahman
1Department of Information Technology, Washington University of Science and Technology (wust),
Los Angeles, California,USA
2,3,4,5,6,8 International American University, Los Angeles, California,USA
7East West University, Dhaka, Bangladesh
|
|
13 - Enhancing Business Sustainability Through the Internet of Things
Md Nadil Khan, Zahidur Rahman, Sufi Sudruddin Chowdhury, Tanvirahmedshuvo, Md Risalat Hossain Ontor, Md Didear Hossen, Nahid Khan, Hamdadur Rahman
1Department of Information Technology, Washington University of Science and Technology (wust),
Los Angeles, California,USA
2,3,4,5,6,8 International American University, Los Angeles, California,USA
7East West University, Dhaka, Bangladesh
|
|
14 - Language of Toxicity: Analyzing Linguistic Features in Toxic Comments
Aditya Mittal, Rituraj Saha, L Priya
Department of Computer Science & Engineering Hindustan Institute of Technology and Science, Chennai, India
|
|
15 - Web Application to Detect and Recognize Sign Language Alphabets Using YOLOv8
Harshit, P.Vasugi
Department of computer science and engineering, Hindustan Institute of Technology and Science,
Chennai, Tamil Nadu
|
|
16 - IBLINK: Eye Blink Detection and Communication Using Morse Code
Vrindha K, Sujishna V P, Sreechandhana K H, Mithu Varghese, Uthara Sunil Kumar
1,2,3,5 Computer Science and Engineering, Vidya Academy Of Science and Technology, Thrissur, India
4Associate Professor,Computer Science and Engineering, Vidya Academy Of Science and Technology, Thrissur, India
|
|
17 - Analyzing the Impact of Key Factors on Green Growth Index in India: An ARDL Approach
Ananya Billawaria, Ashaq Hussain Ganie, Pramila Rm
1,2,3 Department of Data Science, Christ (Deemed to be) University, Pune, Lavasa Campus, India
|
|
18 - Performance Evaluation and Detection of Malware-Strategic Survey
Aayush Kumr, Abhishek Saxena, Anjila Choudhary, Azharuddin Alam, Ashwini Kumar Verma
1,2,3,4 Computer Science and Engineering, Greater Noida Institute of Technology, Greater Noida, India
5Assistant Professor, Computer Science and Engineering, Greater Noida Institute of Technology, Greater Noida, India
|
|
19 - Genetic Algorithm Based Approach for Code Clone Detection
Ketan Chaudhary, Yojna Arora
1Department of Computer science & Engineering Sharda University Greater Noida, U.P., India
2Associate Professor Sharda University Greater Noida, U.P., India
|
|
20 - Z+ATLAS: Safest Routing Algorithm
Divesh Mehta, Priyankush Kashyap, Kanmani S
1,2,3School of Computing SRM Institute of Science and Technology Chennai, India
|
|