Vol. 10 No. 2 (2024): March-April

International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Published: 30-04-2024

Research Articles

  • Predictive Modeling of PHEV and BEV Demand : A Data Science Perspective

    Pooja Agrawal, Prof. Dhruvi Zala (Author)
    01-09
    DOI: https://doi.org/10.32628/CSEIT241021
  • Geographical Tweets Based Current Affairs Prediction Using Hybrid Features

    Prof. Dhruvi Zala (Author)
    10-16
    DOI: https://doi.org/10.32628/CSEIT241022
  • UHI based Healthcare Management System through Digital Transformation

    Sumit Patil, Rohit Khairnar, Keval Rane, Pavan Nimje, Prof. Dhruvi Zala (Author)
    17-23
    DOI: https://doi.org/10.32628/CSEIT241023
  • Contextual Sentence Similarity from News Articles

    Nikhil Chaturvedi, Jigyasu Dubey (Author)
    24-37
    DOI: https://doi.org/10.32628/CSEIT2390628
  • Evaluation of the Effectiveness of Feature Selection Methods Combined with Regression Algorithms to Predict Particulate Matter (PM10) in Gandhinagar, Gujarat, India

    Zalak L. Thakker, Dr. Sanjay H. Buch (Author)
    38-50
    DOI: https://doi.org/10.32628/CSEIT2390641
  • Walking and Survival AI Using Reinforcement Learning - Simulation

    Bharate Nandan Lahudeo, Makarand Vayadande, Rohit Malviya, Atharva Haldule (Author)
    51-54
    DOI: https://doi.org/10.32628/CSEIT2390629
  • Metropolitan Marvels : To Forge Seamless Possibilities for Urban Discoverability and Connectivity

    Divya Shree B, Disha R, Ms. Sreelatha, Shivangi Vishwakarma (Author)
    55-62
    DOI: https://doi.org/10.32628/CSEIT241028
  • Utilizing Deep Learning Techniques for the Classification of Spoken Languages in India

    Priyesha Patel, Ayushi Falke, Dipen Waghela, Shah Vishwa (Author)
    63-69
    DOI: https://doi.org/10.32628/CSEIT2390556
  • Optimizing Mental Health Detection in Indian Armed Forces Personnel through Feature Engineering Driven Dataset Reduction, Addressing Suicide, Depression, and Stress

    Sudipto Roy, Jigyasu Dubey (Author)
    70-81
    DOI: https://doi.org/10.32628/CSEIT241026
  • Multi User Authentication for Reliable Data Storage in Cloud Computing

    Richa Shah, Shatendra Kumar Dubey (Author)
    82-89
    DOI: https://doi.org/10.32628/CSEIT2410138
  • Cooked Food Supply Chain with ERP Model

    Harshini P, Sangeetha C. (Author)
    90-99
    DOI: https://doi.org/10.32628/CSEIT2390620
  • Diabetes Prediction with Machine Learning with Python

    Dr. S. Rakesh Kumar, Kruthi. G, V. Supraja (Author)
    100-106
    DOI: https://doi.org/10.32628/CSEIT2390651
  • A Review on Sentiment and Emotion Analysis for Computational Literary Studies

    Nasrullah Makhdom, H N Verma, Arun Kumar Yadav (Author)
    107-119
    DOI: https://doi.org/10.32628/CSEIT241029
  • SafePass : Reinventing Digital Access with Visual Cryptography, Steganography, and Multi-Factor Authentication

    Mansi Chauhan, Vraj Limbachiya, Naisargi Shah, Riya Shah, Yassir Farooqui (Author)
    120-128
    DOI: https://doi.org/10.32628/CSEIT2490214
  • Justice : A Predicting Criminal Acts According To IPC Section

    Gaurav Varshney, Modi Manankumar R, Rajesh Maheshwari, Tirth Chhabhaiya, Bikram Kumar (Author)
    129-139
    DOI: https://doi.org/10.32628/CSEIT2490215
  • A Survey on Relational Database Based Multi Relational Classification Algorithms

    Komal Shah, Dr. Kajal S. Patel (Author)
    140-147
    DOI: https://doi.org/10.32628/CSEIT2390656
  • Safety Measure Detection Using Deep Learning

    Tejas Bagthaliya, Vaidehi Shah, Shubham Shelke, Devang Shukla, Yatin Shukla (Author)
    148-155
    DOI: https://doi.org/10.32628/CSEIT2490216
  • Smart Traffic Management Using Transfer Learning Approach for Improve Urban Mobility

    Jenil Gohil, Yuvraj Chauhan, Dhaval Nimavat (Author)
    156-164
    DOI: https://doi.org/10.32628/CSEIT2490217
  • Enhancing Campus Connectivity: A Smart Intra-Transit Strategy for Efficient Vehicle Throughput

    Varad Sham Kulkarni, Bhairo Amankumar Jaibir, Patel Rudra Nayneshkumar, Vraj Pujara, Dr. R. Vinob Chander, Himadri Vegad (Author)
    165-170
    DOI: https://doi.org/10.32628/CSEIT2490218
  • YAATRIASSIST : Passenger Facilitation Using AI and ML

    Ankit Dilip Nihalchandani, Shivang Deepak Kulshrestha, Raj Kirit Lakhani, Deepak Pandagre, Dr. Rachit Adhvaryu (Author)
    171-179
    DOI: https://doi.org/10.32628/CSEIT2490219
  • Road Accident Severity Detection In Smart Cities

    Deeksha K, Kavya S, Nikita J, Evangeline R. C, Evangeline R. C (Author)
    180-187
    DOI: https://doi.org/10.32628/CSEIT241024
  • IoT Empowered Harvest: Advancing NFT Hydroponics with Smart Agricultural Automation

    Trupti Ghate, Dr. Kalpana Malpe (Author)
    188-192
    DOI: https://doi.org/10.32628/CSEIT241025
  • A High-Speed Floating Point Matrix Multiplier Implemented in Reconfigurable Architecture

    Atri Sanyal, Ashika Jain, Anwesha Dey, Prakash Kumar Gupta (Author)
    193-199
    DOI: https://doi.org/10.32628/CSEIT2390661
  • FaceScan: Unmasking Identity Beyond the Surface

    Atul A. Gupta, Khushbu Bhavsar, Dhrashti C. Tekwani, Deepak Jenna, Kanishka Soni, Prof. Rajdipsinh Vaghela (Author)
    200-207
    DOI: https://doi.org/10.32628/CSEIT2410215
  • Secure Messaging Using Post-Quantum Key Sharing Based on CSIDH and Fujisaki-Okamoto Transform

    Rakotondramanana Radiarisainana Sitraka, Ramafiarisona Hajasoa Malalatiana, Randrianandrasana Marie Emile, Henintsoa Stephana Onjaniaiana (Author)
    208-220
    DOI: https://doi.org/10.32628/CSEIT2410213
  • True Research on Super Artificial Intelligence Computer Based Satellite Deep Tech Artificial Telepathic, Neurotechnology or Mind Controller and Wireless Direct Energy Weapon, Psychotronic Cyber Crime Technologies

    Pradeep Harionm Arora (Author)
    221-231
    DOI: https://doi.org/10.32628/CSEIT2410210
  • Easy-Starter : An Online Crowdfunding Website Using Blockchain

    Rohan Gupta, Sandeep Gupta, Leher Gangwar, Avani Gupta, Vinayak Shinde (Author)
    232-241
    DOI: https://doi.org/10.32628/CSEIT2410214
  • Customer Satisfaction Analysis in Hotels Using Power BI

    Praba. R, Nisha. T, Yazhini. S, Keerthana M. S (Author)
    242-248
    DOI: https://doi.org/10.32628/CSEIT2410216
  • Multi-Class Recognition of Soybean Leaf Diseases using a Conv-LSTM Model

    Shivani Shelke, Dr. Sheshang Degadwala (Author)
    249-257
    DOI: https://doi.org/10.32628/CSEIT2410217
  • Impact of an Artificial Intelligence in Language Learning - A survey

    Dr. D. Antony Arul Raj, Dr. K. V. Rukmani, Kiruthika C, Praveen M, Anandhachitan A (Author)
    258-266
    DOI: https://doi.org/10.32628/CSEIT2410218
  • A Survey on Transforming Healthcare with IoMT : The Power of Connected Medical Devices

    Dr. D. Antony Arul Raj, Dr. K. V. Rukmani, Subiksha S, Vimal P, Deepak Kumar K (Author)
    267-277
    DOI: https://doi.org/10.32628/CSEIT2410219
  • Efficient Email Spam Classification with N-gram Features and Ensemble Learning

    Prachi Bhatnagar, Dr. Sheshang Degadwala (Author)
    278-284
    DOI: https://doi.org/10.32628/CSEIT2410220
  • Predicting COVID-19 Cough Sounds Using Spectrogram Analysis Across Multiple Classes

    Praveen Gupta, Dr. Sheshang Degadwala (Author)
    285-292
    DOI: https://doi.org/10.32628/CSEIT2410221
  • Developing Gujarati Article Summarization Utilizing Improved Page-Rank System

    Riddhi Kevat, Dr. Sheshang Degadwala (Author)
    293-299
    DOI: https://doi.org/10.32628/CSEIT2410222
  • Voting Model Strategies for Reliable Categorical IoT-DDoS Attack Prediction

    Shivani Sinha, Dr. Sheshang Degadwala (Author)
    300-307
    DOI: https://doi.org/10.32628/CSEIT2410223
  • Plant Health Detection System using Deep-Learning

    Er. Ankit, Rahul Sharma, Rahul Yadav, Vuribindi Sai Charan Reddy, Rakesh Kumar, Vishal Chaudhary, Anil Kumar (Author)
    308-316
    DOI: https://doi.org/10.32628/CSEIT2410224
  • Chronic Kidney Disease Prediction Using Deep Learning Classifiers

    Mrs. T. Rubhasri, Dr. P. C. Senthil Mahesh (Author)
    317-325
    DOI: https://doi.org/10.32628/CSEIT2410225
  • Solar based Smart Sanitizer Dispenser System with Internet of Things (IoT) Technology

    Dr. Venkateswaran Radhakrishnan, Ahood Aqil Alawi Al Murazza Ba Abood, Rogelio Gutierrez (Author)
    326-333
    DOI: https://doi.org/10.32628/CSEIT2410226
  • Leveraging IoT for Enhanced National Security : A Comprehensive Review

    Dr. K. V. Rukmani, Lt. Dr. D. Antony Arul Raj, Ms. Shobana N D, Ms. Sandhiya Sivanandan (Author)
    334-342
    DOI: https://doi.org/10.32628/CSEIT2410227
  • Phishing Detection Using Machine Learning Algorithm

    Vishesh Bharuka, Allan Almeida, Sharvari Patil (Author)
    343-349
    DOI: https://doi.org/10.32628/CSEIT2410228
  • Pixel Map Analysis Adversarial Attack Detection on Transfer Learning Model

    Soni Kumari, Dr. Sheshang Degadwala (Author)
    350-357
    DOI: https://doi.org/10.32628/CSEIT2410229
  • Deep SORT Related Studies

    Abdul Majid, Qinbo, Saba Brahmani (Author)
    358-363
    DOI: https://doi.org/10.32628/CSEIT2410230
  • Enhancing Fraud Detection in Financial Transactions through Cyber Security Measures

    Vishva Gandhi, Tirthesh Gajjar (Author)
    364-371
    DOI: https://doi.org/10.32628/CSEIT2410281
  • Enhancing Heat Exchangers with Graphene as Al2O3 Nanofluid Coatings

    Biswajit Choubey, H.S. Sahu (Author)
    372-377
    DOI: https://doi.org/10.32628/CSEIT2410231
  • VI-Assist Using AI for Visually Impaired Person

    Riyanshu Rai, Neha Singh, Ashish Pal, Adil Khan, Dr.Vinayak Shinde (Author)
    378-387
    DOI: https://doi.org/10.32628/CSEIT2410232
  • Advanced Machine Learning Techniques for Liver Tumor Classification in MRI Imaging

    Jalpaben Kandoriya, Dr. Sheshang Degadwala (Author)
    388-394
    DOI: https://doi.org/10.32628/CSEIT2410233
  • Fashion Finder : Ai-Powered Image Analysis and Online Shopping Integration App

    Dr. Govindaraju S, Prasannaa RT, Prasannaa RT (Author)
    395-402
    DOI: https://doi.org/10.32628/CSEIT2410234
  • The Evolving Threat Landscape: How Cyber Threat Intelligence Empowers Proactive Defenses against WannaCry Ransomware

    Jumoke Eluwa, Patrick Omorovan, Dipo Adewumi, Oluwafunmilayo Ogbeide (Author)
    403-411
    DOI: https://doi.org/10.32628/CSEIT243648
  • Dockerized Application with Web Interface

    Abhishek M Nair, Sivaiswarya CK, Sidharth S, Visakh KK, Jibin Joy (Author)
    412-419
    DOI: https://doi.org/10.32628/CSEIT243646
  • Deep Learning for Accurate Papaya Disease Identification Using Vision Transformers

    Monali Parmar, Dr. Sheshang Degadwala (Author)
    420-426
    DOI: https://doi.org/10.32628/CSEIT2410235
  • Survey on Concept of Object-Oriented Programming

    Mrs. Mansi Dhirajsinh Parmar, Ms. Sarthavi Parmar (Author)
    427-431
    DOI: https://doi.org/10.32628/CSEIT243647
  • A Review on The Spatial Mining

    Ghazala Shireen (Author)
    432-438
    DOI: https://doi.org/10.32628/CSEIT2410237
  • Emotion Based Crime Track

    Saiprasad V, Sreyas J, Megha S, Akshay A, Jibin Joy (Author)
    439-449
    DOI: https://doi.org/10.32628/CSEIT2410269
  • Prostate Cancer Gleason Score Classification Using Transfer Learning Models

    Mona Chavda, Dr. Sheshang Degadwala (Author)
    450-458
    DOI: https://doi.org/10.32628/CSEIT2410241
  • Sentiments of Public Opinion

    Aniket Sharadrao Gudankwar, Pratik Milind Mendhe, Lukesh Namdeo Oghare, Atharva Ramu Yemde (Author)
    459-461
    DOI: https://doi.org/10.32628/CSEIT2410239
  • The Emotion Analysis of Indian Political Tweets using Machine Learning

    Parth Pitram Sharma, Mansi Trambaklal Vegad (Author)
    462-468
    DOI: https://doi.org/10.32628/CSEIT2410255
  • SAKHII- Empowering Women with One-Tap Safety App

    Prof. Ms. Uma Goradiya, Naman Pandey, Mantasha Arif Khan, Satyam Tiwari, Mandar Bhagwan Pawar (Author)
    469-478
    DOI: https://doi.org/10.32628/CSEIT2410254
  • OneWorldGiving : Uniting NGO’s and Donors for a Better World

    Shreya Pandey, Afaq Shaikh, Siddhi Keni, Uma Garodiya, Ayush Yadav (Author)
    479-486
    DOI: https://doi.org/10.32628/CSEIT2410246
  • Translation System for Sign Language Learning

    Jibin Joy, N Meenakshi, Thejas Vinodh, , Abel Thomas, Shifil S (Author)
    487-493
    DOI: https://doi.org/10.32628/CSEIT2410257
  • Web of Things (IoT): Shrewd Living and Way of life

    Vedanti Patel, Mansi Vegad (Author)
    494-498
    DOI: https://doi.org/10.32628/CSEIT2410243
  • The Comparative study of Python Libraries for Natural Language Processing (NLP)

    Dr. Dhara Ashish Darji, Dr. Sachinkumar Anandpal Goswami (Author)
    499-512
    DOI: https://doi.org/10.32628/CSEIT2410242
  • Optimizing Cryptocurrency Portfolio Management through Innovative Tracker

    Akhil Kumar Singh, Shashi Balu, Arshdeep Kaur, Shivani Bansal, Aman (Author)
    513-519
    DOI: https://doi.org/10.32628/CSEIT2410267
  • Human Activities Recognition Using Machine Learning and Artificial Initialization

    Vishva Gandhi (Author)
    520-524
    DOI: https://doi.org/10.32628/CSEIT2410276
  • Worker Handyman Solutions

    Siddhant Rai, , Mohit Kalwar, Swatantra Yadav, Prof. Aabha Patil, Vipin Yadav (Author)
    525-534
    DOI: https://doi.org/10.32628/CSEIT2410252
  • RideConnect : The Future of Auto Driver Efficiency

    Gajanan Bhusare, Dinesh Bendre, Girish Bhosale, Avdhoot Walunjkar (Author)
    535-540
    DOI: https://doi.org/10.32628/CSEIT2410262
  • SuperCert - An Anti-Fraud Identity Intelligence Blockchain Solution for Educational Certificates

    Akanksha Gairola, Amira Shaikh, Shriya Salian, Shankar Malve, Mr. Pravin Jangid (Author)
    541-550
    DOI: https://doi.org/10.32628/CSEIT2410266
  • Encryption, Privacy, and Usability : A Comparative Evaluation of Leading Secure Messaging Platforms

    Kumar Ashish, Yaswanth Bolisetty, Deepanshu Singh, Amarinder Kaur (Author)
    551-555
    DOI: https://doi.org/10.32628/CSEIT2410272
  • Machine Learning-Based Fake Profile Detection on Social Networking Websites

    V. Mahesh, K. Tharun, P. Rushikesh, D. Saidulu (Author)
    556-564
    DOI: https://doi.org/10.32628/CSEIT2410236
  • Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication

    Prashant, Md Sohail Haque, Amrinder Kaur, Pankaj Yadav (Author)
    565-574
    DOI: https://doi.org/10.32628/CSEIT2410263
  • Breast Cancer Classification Using Machine Learning

    Ankit, Harsh Bansal, Dhruva Arora, Kanak Soni, Rishita Chugh, Swarna Jaya Vardhan (Author)
    575-588
    DOI: https://doi.org/10.32628/CSEIT2410274
  • AI and RFID Based Multipurpose Authentication and Surveillance System

    S. I. Ranjitha, E. Deepankumar (Author)
    589-601
    DOI: https://doi.org/10.32628/CSEIT2410273
  • Resume Screening using Machine Learning

    Dr. Sandeep Tayal, Taniya Sharma, Shivansh Singhal, Anurag Thakur (Author)
    602-606
    DOI: https://doi.org/10.32628/CSEIT2410275
  • Home Automation System Base on IoT  and ML

    Chandani Thakkar, Karan Pandya (Author)
    607-612
    DOI: https://doi.org/10.32628/CSEIT2410278
  • Artificial Intelligence Computer Weapon Based True Research on Corona Virus [Covid-19]

    Pradeep Hariom Arora (Author)
    613-632
    DOI: https://doi.org/10.32628/CSEIT2410277
  • A Portal to Browse Top Universities According to Your Preferences : Result

    Shravani Meshram, Prathmesh Tambakhe, Prof. N. G. Gupta (Author)
    633-635
    DOI: https://doi.org/10.32628/CSEIT2410284
  • Customer Feedback Analysis Using Text Mining

    Kinnari Mishra, Mansi Vegad (Author)
    636-641
    DOI: https://doi.org/10.32628/CSEIT2410238
  • Fire Detection Systems Using Feature Entropy Guided Neural Network

    S K. Ahmed Mohiddin, I T V V S N S Pravallica, K. Pujitha, D. Nandini, S. Preetham (Author)
    642-651
    DOI: https://doi.org/10.32628/CSEIT2410287
  • Emerging Threats in Cybersecurity : A Deep Analysis of Modern Attack

    Ashish Dewakar Pandey, Shakil Saiyad (Author)
    693-697
    DOI: https://doi.org/10.32628/CSEIT2410297
  • Brain Tumour Detection and Classification using Deep Convolutional Neural Network (DCNN)

    M. Naresh Babu, Akula Balakrishna, Galla Yasasri, Chalamalasetty Sri Siva, Pamarthi Vamsi (Author)
    652-660
    DOI: https://doi.org/10.32628/CSEIT2410288
  • Developing the Framework Using Deep Neural Network for Detection of Spam and Fake Spam Messages in Twitter

    N. Anil Kumar , Thatha Anusha , Nagamalla Durga Prasad , Maddala Bala Manikanta, Boddu Swathi (Author)
    661-668
    DOI: https://doi.org/10.32628/CSEIT2410289
  • Malaria Parasite Detection in Microscopic Blood Smear Images using Deep Learning Approach

    Dr. M. Praneesh, Sai Krishna P K, Febina. N, Ashwanth.V (Author)
    669-676
    DOI: https://doi.org/10.32628/CSEIT2410286
  • Performance Analysis and Evaluation of Clustering Algorithms using WEKA

    Shital Patel, Pooja Pancholi, Arpita Chaudhury (Author)
    677-684
    DOI: https://doi.org/10.32628/CSEIT2410251
  • Research on Various Cryptography Techniques

    Bharati A. Patil, Prajakta R. Toke, Sharyu S. Naiknavare (Author)
    685-692
    DOI: https://doi.org/10.32628/CSEIT2410290
  • Fingerprint Recognition and Verification using Fourier Domain Filtering and Histogram Equalization Techniques

    G. Nancharaiah, G. Sai Teja Kumari, K. Lakshmi, J. Harika, B. Srinu (Author)
    698-704
    DOI: https://doi.org/10.32628/CSEIT24102100
  • Improved Data Poison Detection using Multiple Training Models

    Ch. Swathi, Rakshitha Tirumalasetty, Karicharla Kavitha, Bejawada Gana Maruthi, Nandeti Teja Sai Singh (Author)
    705-712
    DOI: https://doi.org/10.32628/CSEIT24102101
  • Improving Amazon EC2 Spot Instances Price Prediction using Machine Learning Algorithm

    M. Prasanthi, G.Chishma, P. Padmavathi, K. Reethika, A. Chandra Sekhar (Author)
    713-720
    DOI: https://doi.org/10.32628/CSEIT24102102
  • Pen Stroke Digit Recognition Using CNN

    Dr. G. Syam Prasad, Nalluri Chandana, Janyavula. Sai Durga, Pitchuka Pooja Naga Symala Soma Sri, Gopu Dhana Surya Raja (Author)
    721-728
    DOI: https://doi.org/10.32628/CSEIT24102103
  • Anomaly Detection Industrial Items

    Muhammad Owais Khan, Dr. Liu Peishun, Abdul Basit, Dil Nawaz Hakro, Abdul Majid Memon (Author)
    729-734
    DOI: https://doi.org/10.32628/CSEIT2410268
  • Fatigue Driver Alert System

    Dr. Mallikarjun M Kodabagi, Afrah Ayub, Mahima BK, Shruthi Siva, Apurva Korni (Author)
    735-740
    DOI: https://doi.org/10.32628/CSEIT24102112
  • Crisis Communication with Cognitive Radio Networks

    Pravalika Gorremuchu, Jagadishwari V, Kesavamoorthy R, Priyanka, Mounica (Author)
    741-746
    DOI: https://doi.org/10.32628/CSEIT24102105
  • Blockchain Enabled Social Network for Detecting Fake Accounts

    B. Deepika, S. Sneka, S. Susila, P. Suvetha, S. Swetha (Author)
    747-756
    DOI: https://doi.org/10.32628/CSEIT24102107
  • Stock Market Prediction Using Machine Learning Techniques

    Lalasa Mukku, Vikas Burri (Author)
    757-760
    DOI: https://doi.org/10.32628/CSEIT24102117
  • Navigating the Web: A Study on Network Topology and Information Flow

    Shailesh Parmar, Anand Daram (Author)
    761-766
    DOI: https://doi.org/10.32628/CSEIT24102119
  • Unleashing the Power of DevOps : Revolutionizing Software Development Practices

    Ashish Dewakar Pandey, Kavita Narendrabhai Parmar (Author)
    767-772
    DOI: https://doi.org/10.32628/CSEIT24102121
  • Mind Matters

    Ms. Savita Sharma, Shubham Ranga, Tushar Gupta, Yash (Author)
    773-779
    DOI: https://doi.org/10.32628/CSEIT24102120
  • Sec-Health : A Block Chain-Based Protocol for Securing Health Records

    R. Harini, P. Priyanka, Palakurla Vasantha, Madde Kumar (Author)
    780-785
    DOI: https://doi.org/10.32628/CSEIT24102116
  • Facial Expression Recognition Using Convolutional Neural Network

    Vaibhav Govindwar, Aman Akbani, Aachal Nandeshwar, Aishwarya Wanjari, Prachi Agashe, Charan Pote (Author)
    786-794
    DOI: https://doi.org/10.32628/CSEIT24102122
  • Global Id Generation with Verification Based Medical Record Access

    K. G. Arunkumar, Deepika B (Author)
    795-805
    DOI: https://doi.org/10.32628/CSEIT24102113
  • An Efficient Search on Cloud Images with Blockchain Technology

    Prof. Dr. P. C. Senthilmahesh, Ms. S. Annapoorani (Author)
    806-815
    DOI: https://doi.org/10.32628/CSEIT124102119
  • Soldier Health and Position Tracking System

    Dr. Basavaraj G Kudamble, G Naveena, G Naveena, L Vidya, K Vijay, C Manoj, T Venkata Prasad (Author)
    816-820
    DOI: https://doi.org/10.32628/CSEIT24102114
  • Big Data Analytics and Business Pattern Recognition

    Ajit Kumar Singh, Prof (Dr) G. P. Gadkar (Author)
    821-825
    DOI: https://doi.org/10.32628/CSEIT24102115