Current Issue
Volume 13 Issue 2 April-June 2023
S.No | Title of The Paper | Page No | Download |
---|---|---|---|
1 | The Use of a Smart Phone's Speaker-independent Recognition Engine as an Electronic Wheelchair Controller: a Case Study Author(s): P.SASITHA ,P.SWATHI ,K.S.BHANU REKHA DOI : https://ijcnwc.2023.v13.i02.pp01-05 |
1-05 | ![]() |
2 | Brushless DC motor speed regulation with a fuzzy PID controller Author(s): M.GIRIBABU ,Y.DAVIDU DOI : https://ijcnwc.2023.v13.i02.pp06-17 |
6-13 | ![]() |
3 | Analyzing Breast Cancer Images Histopathologically using Deep Learning Author(s): Mrs. N THEJASWY , Dr S VENKATESAN, Mr. V KRISHNAKANTH, DOI : https://ijcnwc.2023.v13.i02.pp18-23 |
1-6 | ![]() |
4 | The low-power aluminized copper oxide (Alu) design is based on clock gating and a carry select adder. Author(s): Mrs. T REDDI RANI, Mrs. G MANJULA, Mrs K APSANA, DOI : https://ijcnwc.2023.v13.i02.pp24-27 |
24-27 | ![]() |
5 | Smart Zone Based Vehicle Speed Control Using RF and Obstacle Detection and Accident Prevention Author(s): Mr M Raveendra , Dr Venkata Subbaiah , Mrs. T REDDI RANI, DOI : https://ijcnwc.2023.v13.i02.pp28-31 |
28-31 | ![]() |
6 | Performance analysis of two IPv6 dynamic routing protocols: OSPF and EIGRP Author(s): Mr. J. Kiran Chandrasekhar, Mr. B. Sudhir , Mr. N. Chandra sekhar DOI : https://ijcnwc.2023.v13.i02.pp1-5 |
1-5 | ![]() |
7 | FRAUD DETECTION IN ONLINE PRODUCT REVIEW SYSTEMS USING HETEROGENEOUS GRAPH TRANSFORMER Author(s): Mr.K.Sagar Sanjeev, G.Anuhya DOI : https://ijcnwc.2023.v13.i02.pp32-42 |
32-42 | ![]() |
8 | Machine Learning-Based Approach for Accurate Earthquake Early Warning and Source Location Estimation Author(s): Mr.Konda Janardhan, Capilai Lahari DOI : https://ijcnwc.2023.v13.i02.pp43-47 |
43-47 | ![]() |
9 | Machine Learning-Based Approach to Identifying Bird Species Through Vocalization Author(s): Mrs.T.Sashirekha, Aakaram Harika Jogi DOI : https://ijcnwc.2023.v13.i02.pp48-55 |
48-55 | ![]() |
10 | MORPHOLOGICAL IMAGE ENHANCEMENT BASED BRAIN TUMOR SEGMENTATION USING MRI IMAGES Author(s): P. Mohan, Dr. Vishal Bhatnagar DOI : https://ijcnwc.2023.v13.i02.pp56-66 |
56-66 | ![]() |
11 | Testim.io: The Future of Salesforce Automation Author(s): SRIKANTH PERLA DOI : https://ijcnwc.2023.v13.i02.pp67-74 |
67-74 | ![]() |
12 | Cloud Disaster Recovery and Backup Security: Enhancing Data Protection with Zero-Trust Architecture and Blockchain-Based Integrity Verification Author(s): Soledad Silva GuerĂn DOI : https://ijcnwc.2023.v13.i02.pp75-87 |
75-87 | ![]() |
13 | Analog Circuit Fault Diagnosis Using Multi-Input Convolution Techniques Author(s): Mrs.C.Nirmala, G. Volga shivani DOI : https://ijcnwc.2023.v13.i02.pp88-90 |
88-90 | ![]() |
14 | Design and Analysis of FPGA Architecture for High-Speed Network Feature Extraction Author(s): Mrs.C.Nirmala, K.Deekshitha DOI : https://ijcnwc.2023.v13.i02.pp91-97 |
91-97 | ![]() |
15 | Application of Gaussian Hermite Moments in 3D Face Recognition Author(s): Mrs.Vishwashree Shastri, K.Sai Saraswathi DOI : https://ijcnwc.2023.v13.i02.pp98-104 |
98-104 | ![]() |
16 | Highly Efficient, Multipaction-Free P-Band GaN High-Power Amplifiers for Space Applications Author(s): Mrs.Vishwashree Shastri, A.Pravallika DOI : https://ijcnwc.2023.v13.i02.pp105-115 |
105-115 | ![]() |
17 | Design of a Distributed Real-Time Database Indexing Algorithm Based on B+ Tree and Consistent Hashing Author(s): Mr. V. Narender DOI : https://ijcnwc.2023.v13.i02.pp116-119 |
116-119 | ![]() |
18 | Design of a Context-Aware Message Sharing System Based on Task and Role Dynamics in Mobile Platforms Author(s): Mr. K.Appa Rao DOI : https://ijcnwc.2023.v13.i02.pp120-123 |
120-123 | ![]() |
19 | An Algorithm for Transforming Guidelines from BPMN to Structured Data Analysis (SDA) Author(s): Mrs.T.V.Lavanya, J.Akhila DOI : https://ijcnwc.2023.v13.i02.pp124-128 |
124-128 | ![]() |
20 | Strategic Codebook Design and Selection for Long-Range Sub-1 GHz Wireless LANs Author(s): Mrs.T.V.Lavanya, Priyanka Pandey DOI : https://ijcnwc.2023.v13.i02.pp129-134 |
129-134 | ![]() |
21 | A Security Architecture with Intrinsic Layered Protection for the Application Layer Author(s): Mr. Gangisetty Naveen Kumar DOI : https://ijcnwc.2023.v13.i02.pp135-138 |
135-138 | ![]() |
22 | Analysis and Evaluation of the Contention Access Period in Slotted CSMA/CA for IEEE 802.15.4 Networks Author(s): Mrs.Yarram Neelima DOI : https://ijcnwc.2023.v13.i02.pp139-144 |
139-144 | ![]() |
23 | Exploring Emerging Collaborative Networks in Enterprise 2.0: Insights from the Taolin Platform Author(s): Mr.Adlakadi Anand DOI : https://ijcnwc.2023.v13.i02.pp145-149 |
145-149 | ![]() |
24 | Annotating Biomedical Scholarly Publications Using Data Models: A Case Study of CORD-19 Author(s): Mrs.V R R Lakshmi Kumari DOI : https://ijcnwc.2023.v13.i02.pp150-157 |
150-157 | ![]() |