| 1 |
Evolutionary Algorithm-Based Multicast Routing
Author(s): K.Rasagna
|
01-07 |
 |
| 2 |
A Visual Method for Confidentially Sharing Images for Rapid and Secure Transmission
Author(s): Latha J
|
08-15 |
 |
| 3 |
Regulating Blood Clot Time Parameter for Diabetes Manipulation
Author(s): Swapna N
|
16-20 |
 |
| 4 |
Harnessing Quantum Computing in Cloud-Based Drug Discovery: Accelerating Innovation in Medical Research
Author(s): Rama Krishna Mani Kanta Yalla, Thirusubramanian Ganesan, Mohanarangan Veerapperumal Devarajan, Akhil Raj Gaius Yallamelli, Vijaykumar Mamidala, Aiswarya RS
|
21-43 |
 |
| 5 |
Cuckoo search based optimal mask generation for noise suppression and enhancement of speech signal
Author(s): Nagam Aanjaneyulu, Arekatla Madhava Reddy, Chevula Rekha, Dr. G. Samba Siva Rao
|
44-48 |
 |
| 6 |
Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns
Author(s): Arekatla Madhava Reddy, Lankala Mounika, Shaik Guntur Mahabub Subhani, Arekatla Jaganmohan Reddy
|
49-56 |
 |
| 7 |
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform
Author(s): Lankala Mounika, Vanapamula Veerabrahmachari , Butukuru Rojalakshmi, Aremandla Sai Pujitha
|
57-63 |
 |
| 8 |
AI-Augmented SIEM Systems: Improving Threat Correlation and Alert Prioritization
Author(s): Priya Rajan
|
64-70 |
 |