Title | Area of Research | Auther Name | Action |
ARTIFICIAL INTELLIGENCE CRIME:AN OVERVIEW OF MALICIOUS USE AND ABUSE OF AI | INFORMATION TECHNOLOGY | M RAM KUMAR |
Download
|
SECURING SOCIAL INTERACTIONS: A COMPREHENSIVE MODEL FOR CYBERBULLYING DETECTION IN REAL-TIME CHAT | INFORMATION TECHNOLOGY | B Raja Kumar |
Download
|
Yoga Pose Detection and Guidance Through an AI-Enhanced Chatbot | Information Science and Engineering | Pooja Paraddi |
Download
|
Unveiling Moblie Money Phishing Scam Employing Reinforcement Learning Strategies | computer science | T Sundararajulu |
Download
|
ENHANCING EARTHQUAKE EARLY WARNING: ACCELERATING AND IMPROVING SOURCE-LOCATION ESTIMATION WITH MACHINE LEARNING | INFORMATION TECHNOLOGY | D Viswasahithya |
Download
|
A Blockchain Based Authentication System for Digital Documents | Computer Engineering | Hariprasad |
Download
|
EXAMINING THE IMPACT OF IOT ON WOMEN'S SAFETY: A COMPREHENSIVE REVIEW OF LITERATURE | INFORMATION TECHNOLOGY | M Ram Kumar |
Download
|
Cancer prediction in early stages using supervised learning | Computer science and Information Technology | MANDALA POOJITHA |
Download
|
securing the cloud storage against malicious data publishers | Information Technology | Ch.Sivasankar |
Download
|
Aniemia detection using machine learning | Information science and engineering | Chaithanya K S |
Download
|
ML Based Spam Comments Detection on Youtube | Information Science & Engineering | Darshini C |
Download
|
EXPOSING DEEP FAKE VIDEOS THROUGH LONG RANGE ATTENTION | INFORMATION TECHNOLOGY | Sivasankar Chittoor |
Download
|
Unveiling Misinformation: Detecting Fake News By Classification Methods | Information Technology | T Sundararajulu |
Download
|
Unmasking Deceptive Profile: A Supervised Approach To Spotting Fake Identities On Social Networks | INFORMATION TECHNOLOGY | B RAJA KUMAR |
Download
|
ROAD: AUTONOMOUS DRIVING DATASETS FOR ROAD EVENT AWARENESS | Information Technology | Chittoor Sivasankar |
Download
|
|