LOGO

Current Issue


Volume 14 Issue 3 July-September 2024

S.No Title of The Paper Page No Download
1 An Enhanced Authentication Protocol for Cloud Storage- Based Remote Data Access and Sharing in Cyber-Physical- Social Systems Employing CHACHA Method
Author(s): Ms. Sanjeevini , A. Varsha, B. Harika, S. Vyshnavi
DOI : https://ijcnwc.2024.v14.i03.pp01-8
1-8
2 Moving Virtual Machines to Optimize Profit in Federated Clouds
Author(s): Dr.T.Srikanth , Dobbala Abhinaya, Appagari Bavitha, Chiluveri Srivalli
DOI : https://ijcnwc.2024.v14.i03.pp01-10
1-10
3 Application for Quantum Secure Email Client
Author(s): Mr. V. Arun Kumar, M. Praisy , P. Anusha, S. Dhanandhuka
DOI : https://ijcnwc.2024.v14.i03.pp01-8
1-8
4 Defenses Against Adversarial Attacks on Neural Networks for Graph Data via Encryption and Disturbing
Author(s): Ms.Chikka Harshini, Billa Pavani, Dasari Sindhuja , Bandi Divya
DOI : https://ijcnwc.2024.v14.i03.pp01-10
1-10
5 Predicting the Electrical and Thermal Performance of Batteries with Direct Oil Cooling via the Use of Artificial Neural Network Modelling
Author(s): Mr.P Rajkumar, M.Sumadhura, T.Harika, M.Naveena
DOI : https://ijcnwc.2024.v14.i03.pp01-11
1-11
6 Solar Cell Surface Defect Detection Based on Optimized YOLOv6
Author(s): Mrs. N Mamatha, Ch.L.N.Harika, P.Likitha, V.Sandhya
DOI : https://ijcnwc.2024.v14.i03.pp01-9
1-9
7 Xception Net and DenseNet121 for Deep Learning-Based Melanoma Detection Classification
Author(s): Mrs. S Spandana, K. Sowmya Sri, Ch. Rushmitha, B. Akanksha
DOI : https://ijcnwc.2024.v14.i03.pp01-9
1-9
8 KNN-Based Machine Learning Techniques for Smart Grid Attack Detection
Author(s): Ms. Sanjeevini , R. Srinitha , K. Priyanka , K. Nikhitha
DOI : https://ijcnwc.2024.v14.i03.pp01-10
1-10
9 SQL Injection Attack Prediction in Web Applications Using SVM, KNN, and Naïve Bayes
Author(s): Dr. Vishnu Kumar Misra , G. Sushmitha , J. Sharon David , K. Harani
DOI : https://ijcnwc.2024.v14.i03.pp01-9
1-9
10 Fusion of Visual Information and Millimetre-Wave Radar Using yolov6 for Nighttime Pedestrian Detection
Author(s): Mr. K. Kumaraswamy, CHELMEDA HARSHITHA, Bodgam Maheshwari, Bathini Vaishnavi
DOI : https://ijcnwc.2024.v14.i03.pp01-8
1-8
11 Using CNN, GRU, and Bidirectional Multiscale Convolutional Neural Networks for Human Behavior Recognition
Author(s): Mr. MV. Satyanarayana , K. Sai Bhavani , K. Keerthi , J. Sreeja
DOI : https://ijcnwc.2024.v14.i03.pp01-12
1-12
12 Autonomous Road Damage Detection using Unmanned Aerial Vehicle Images and YOLO V8 Methods
Author(s): Mrs. Boddeda .Haritha Lakshmi , Chiliveri Neethika ,B.Chaitanya Mallika, Buddannagari Divya
DOI : https://ijcnwc.2024.v14.i03.pp01-10
1-10
13 CNN2D Algorithm for Detection of Ransomware Attacks Using Processor and Disk Usage Data
Author(s): Mrs. B. Vasantha , Embadi Manvitha ,Ch.Lipi Vithal, Caris Harshitha Payarda
DOI : https://ijcnwc.2024.v14.i03.pp01-11
1-11
14 Opening Up Autonomy: Federated Learning for Low-Light Object Detection in Autonomous Vehicles with yolov5
Author(s): Mrs.S Sindhuja, K.Likitha, P.Akshitha, P.Hema
DOI : https://ijcnwc.2024.v14.i03.pp01-8
1-8
15 Enhancing Freight Rail Arrival Time Predictions with Light GBM and XG Boost: A Comparative Analysis of Algorithms and Feature Importance Using Data Driven Models
Author(s): Ms.Valapala Prabhavathi , Aare Samatha , Boorgula Manusha , D Laxmi
DOI : https://ijcnwc.2024.v14.i03.pp01-12
1-12
16 Solar Cell Surface Defect Detection Based on Optimized YOLOv6
Author(s): Dr. N. Vinayakumari , G. Thapasvi , H. Hanishka , K. Jahnavi
DOI : https://ijcnwc.2024.v14.i03.pp01-9
1-9

We are working in partnership with