Volume 8 No.2 (2019)

Article - 1

Title

Comparative Study on Text Detection and Recognition from Lecture Videos

1-6

Authors

Ashima Godha and Rahul Sharma

PDF

Article - 2

Title

AUTOMATED IRRIGATION SYSTEM BASED ON MACHINE LEARNING CONCEPT

7-10

Authors

EBIN P.M, KAVITHA NAIR R and JIMSHA K MATHEW

PDF

Article - 3

Title

Intelligent Analysis methods on BigData: A Comparison

10-12

Authors

Sharon Susan Jacob and Dr. R.Vijayakumar

PDF

Article - 4

Title

U-REPORT:Helping Hand In Defendless Situation

13-17

Authors

Aishwarya Babu, Aksa Susan Kurian, Ammu Priya P M, Elsa Susan Cherian and Sheeba Babu

PDF

Article - 5

Title

HARITHAM: A PLANT DISEASE IDENTIFICATION SYSTEM

18-21

Authors

Joseph Jose, Hima Jayachandran, Anna Saji George,Jiya.S and Dr.Anju Pratap

PDF

Article - 6

Title

Fake News Detection System Using Neural Network

22-24

Authors

Ammu Kuriakose, Dinnu Sebastian, Esther Mahima Mathew, Hannu Mathew and Er.Gokulnath G

PDF

Article - 7

Title

A Study on Weed Detection Techniques

25-29

Authors

Nandhini P S and Ravishankar S

PDF

Article - 8

Title

Mathematical Morphology Based Hippocampus Segmentation for the Detection of Alzheimer’s Disease (AD)

30-34

Authors

Sabitha Rani B.S and Malu G

PDF

Article - 9

Title

Criminal Assault Analysis and Security Using Image Processing and Machine Learning

35-39

Authors

Sulthana Abdussamed kormath, Nafsila, Fathima Sherin, Minhaj and Shanid Malayil

PDF

Article - 10

Title

An Overview on Integrating Machine Learning with Blockchain

40-44

Authors

Kevin Shaju Varghese, Kezia Ann Mathew, Riya Rachel Samuel, Srijith Sasikumar and Fabeela Ali Rawther

PDF

Article - 11

Title

Efficient Parallel Mining Of Frequent Itemset Using MapReduce

45-50

Authors

Anaswaravs and Dr. Mohamed Mubarak

PDF

Article - 12

Title

XRAY AI: Lung Disease Prediction Using Machine Learning

51-54

Authors

Justin Monsi, Justine Saji, Keerthy Vinod, Liya Joy and Jis Joe Mathew

PDF

Article - 13

Title

Machine Learning Approach For Diabetes Prediction

55-58

Authors

Jensia Thomas, Anumol Joseph, Irene Johnson and Jeena Thomas

PDF

Article - 14

Title

Decentralized Land Lending System using Blockchain

59-62

Authors

Aleesha Shaji, Amala Rony, Amritha Kuriakose and Fabeela Ali Rawther

PDF

Article - 15

Title

Evaluation of Supply Chain Management based on Block Chain Technology and Homomorphism Encryption

63-66

Authors

Keerthy Prasannan, Bibin Varghese and Smita C Thomas

PDF

Article - 16

Title

MindCam: An Approach for Sketch Based Image Retrieval

67-71

Authors

Sini Thankachan and Smita C Thomas

PDF

Article - 17

Title

Visual Cryptography: An Encryption Method To Encrypt Multiple Images Using Shares

72-76

Authors

Sheeba Ann Thomas, Rincy Roy Oommen and Smita C Thomas

PDF

Article - 18

Title

Decentralized Isolated Educational Content Aggregation System

77-80

Authors

Roshan Shibu, Preveen Raj, Yakoob Youseph Cyrus and, Dr. Vargheese S. Chooralil

PDF

Article - 19

Title

Gray-Hole Attack Minimization for Ad-Hoc Networks Using Contradiction

81-83

Authors

AthiraHarikrishnan, JasmineJoseph, Fathima Manzoor and Tinu Thomas

PDF

Article - 20

Title

Determination of Soil pH using Digital Image Processing

84-88

Authors

Maneesha G Nair, Neethu Prathapan, Sethulakshmi R and Syamamol T

PDF

Article - 21

Title

ADVANCED SURVEILLANCE AND STRATEGIC WARNING SYSTEM FOR THE SAFETY OF MINEWORKERS

89-92

Authors

Karthika Rajeev, Kripa Sara Thomas and Sheba Jiju George

PDF

Article - 22

Title

IMAGE RESOLUTION ENHANCEMENT SYSTEM USING DEEP CONVOLUTIONAL NEURAL NETWORK FOR IMAGE VISION APPLICATIONS

93-96

Authors

ALAN ABRAHAM, BONY BABY, AMAL MANOHAR N and SREENIMOL K.R

PDF

Article - 23

Title

ALIS- ADVANCE LOGICAL INTELLIGENCE SYSTEM

97-103

Authors

Joel S Joy, Rroan M, Midhun Manohar, Rahul Thomas and Sheba Jiju George

PDF

Article - 24

Title

Phishing Espial Using Machine Learning with Wrapper Integrant Selection and Google Classification

104-107

Authors

Bessy P Babu, Devika Raju, Karthika S, Keerthana Chandran and Jissy Liz Jose

PDF

Article - 25

Title

2D-to-3D Scene Generation and Rendering using CNN and Spatial Knowledge Representation

108-111

Authors

Gokula Nath G, Praveen Sankar and Vishnu Vijayakumar

PDF

Article - 26

Title

ATTRIBUTE BASED PRIVACY PROTECTION ON CLOUD COMPUTING WITH AUDITING SCHEME

112-115

Authors

Aswathy TD , Amrutha CP, Aparna Dinesh, Mariamma Thomas and Simy Mary Kurian

PDF

Article - 27

Title

SHARED OWNERSHIP IN THE CLOUD FOR BUSINESS COLLABORATION

116-119

Authors

Parvathy Radhakrishnan, Ranjima P.S, Renju Renjith, Shifamol P.H and Sruthy Emmanuel

PDF

Article - 28

Title

Cloud Computing With Big Data Clustering Using Privacy Preserving High-Order Possibilistic C-mean Algorithm

120-123

Authors

Sreelakshmy D Unni and Nimmymol Manuel

PDF

Article - 29

Title

Attribute And Time Factors Combined CP-ABE and RSA based Access Control Scheme for Public Cloud

124-127

Authors

Parvathy Radhakrishnan, Nayana N Panicker, Sheedhal Susan John , Nivyamol P Varghese and Divya S B

PDF

Article - 30

Title

An Intelligent System to predict Students academic performance using Data Mining

128-131

Authors

Liya Treesa Kunjumon ,Sharon Shaji , Saffi Treesa Saji , Thasneem Naushad and Neena Joseph

PDF

Article - 31

Title

CHURN PREDICTION IN TELECOM SECTOR USING MACHINE LEARNING

132-134

Authors

RoshinReji Andrews, Rohit Zacharias, Sebin Antony and Merlin Mary James

PDF

Article - 32

Title

SECURE CONFIDENTIALITY OF BIG DATA STREAMS USING SELECTIVE ENCRYPTION METHOD AND REGRESSION ALGORITHM

135-138

Authors

Soniya Joy and Neena Joseph

PDF

Article - 33

Title

ELECTRICITY BILL PRICE FORECASTING WITH ARIMA MODEL USING THE CONCEPT OF MACHINE LEARNING

139-142

Authors

Anjali Krishnan and Jinu P Sainudeen

PDF

Article - 34

Title

Hyper Spectral Prevalent News Customization System With Sentimental Analysis

143-146

Authors

Geethu Rajeev and George Sebastian

PDF

Article - 35

Title

Sentiment Analysis in Product Reviews using Natural Language Processing and Machine Learning

147-151

Authors

Kuncherichen K Thomas, Sarath P Anil, Ebin Kuriakose and Neema George

PDF

Article - 36

Title

An Effective Method for Detection and Localization of Tampering

152-154

Authors

Gifty Saju and Sreenimol K R

PDF