ISSN ( ONLINE ) : 2319 - 7595
6 issues per year (February, April, June, August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article - 1 | Title | Comparative Study on Text Detection and Recognition from Lecture Videos | 1-6 |
Authors | Ashima Godha and Rahul Sharma |
Article - 2 | Title | AUTOMATED IRRIGATION SYSTEM BASED ON MACHINE LEARNING CONCEPT | 7-10 |
Authors | EBIN P.M, KAVITHA NAIR R and JIMSHA K MATHEW |
Article - 3 | Title | Intelligent Analysis methods on BigData: A Comparison | 10-12 |
Authors | Sharon Susan Jacob and Dr. R.Vijayakumar |
Article - 4 | Title | U-REPORT:Helping Hand In Defendless Situation | 13-17 |
Authors | Aishwarya Babu, Aksa Susan Kurian, Ammu Priya P M, Elsa Susan Cherian and Sheeba Babu |
Article - 5 | Title | HARITHAM: A PLANT DISEASE IDENTIFICATION SYSTEM | 18-21 |
Authors | Joseph Jose, Hima Jayachandran, Anna Saji George,Jiya.S and Dr.Anju Pratap |
Article - 6 | Title | Fake News Detection System Using Neural Network | 22-24 |
Authors | Ammu Kuriakose, Dinnu Sebastian, Esther Mahima Mathew, Hannu Mathew and Er.Gokulnath G |
Article - 7 | Title | A Study on Weed Detection Techniques | 25-29 |
Authors | Nandhini P S and Ravishankar S |
Article - 8 | Title | Mathematical Morphology Based Hippocampus Segmentation for the Detection of Alzheimer’s Disease (AD) | 30-34 |
Authors | Sabitha Rani B.S and Malu G |
Article - 9 | Title | Criminal Assault Analysis and Security Using Image Processing and Machine Learning | 35-39 |
Authors | Sulthana Abdussamed kormath, Nafsila, Fathima Sherin, Minhaj and Shanid Malayil |
Article - 10 | Title | An Overview on Integrating Machine Learning with Blockchain | 40-44 |
Authors | Kevin Shaju Varghese, Kezia Ann Mathew, Riya Rachel Samuel, Srijith Sasikumar and Fabeela Ali Rawther |
Article - 11 | Title | Efficient Parallel Mining Of Frequent Itemset Using MapReduce | 45-50 |
Authors | Anaswaravs and Dr. Mohamed Mubarak |
Article - 12 | Title | XRAY AI: Lung Disease Prediction Using Machine Learning | 51-54 |
Authors | Justin Monsi, Justine Saji, Keerthy Vinod, Liya Joy and Jis Joe Mathew |
Article - 13 | Title | Machine Learning Approach For Diabetes Prediction | 55-58 |
Authors | Jensia Thomas, Anumol Joseph, Irene Johnson and Jeena Thomas |
Article - 14 | Title | Decentralized Land Lending System using Blockchain | 59-62 |
Authors | Aleesha Shaji, Amala Rony, Amritha Kuriakose and Fabeela Ali Rawther |
Article - 15 | Title | Evaluation of Supply Chain Management based on Block Chain Technology and Homomorphism Encryption | 63-66 |
Authors | Keerthy Prasannan, Bibin Varghese and Smita C Thomas |
Article - 16 | Title | MindCam: An Approach for Sketch Based Image Retrieval | 67-71 |
Authors | Sini Thankachan and Smita C Thomas |
Article - 17 | Title | Visual Cryptography: An Encryption Method To Encrypt Multiple Images Using Shares | 72-76 |
Authors | Sheeba Ann Thomas, Rincy Roy Oommen and Smita C Thomas |
Article - 18 | Title | Decentralized Isolated Educational Content Aggregation System | 77-80 |
Authors | Roshan Shibu, Preveen Raj, Yakoob Youseph Cyrus and, Dr. Vargheese S. Chooralil |
Article - 19 | Title | Gray-Hole Attack Minimization for Ad-Hoc Networks Using Contradiction | 81-83 |
Authors | AthiraHarikrishnan, JasmineJoseph, Fathima Manzoor and Tinu Thomas |
Article - 20 | Title | Determination of Soil pH using Digital Image Processing | 84-88 |
Authors | Maneesha G Nair, Neethu Prathapan, Sethulakshmi R and Syamamol T |
Article - 21 | Title | ADVANCED SURVEILLANCE AND STRATEGIC WARNING SYSTEM FOR THE SAFETY OF MINEWORKERS | 89-92 |
Authors | Karthika Rajeev, Kripa Sara Thomas and Sheba Jiju George |
Article - 22 | Title | IMAGE RESOLUTION ENHANCEMENT SYSTEM USING DEEP CONVOLUTIONAL NEURAL NETWORK FOR IMAGE VISION APPLICATIONS | 93-96 |
Authors | ALAN ABRAHAM, BONY BABY, AMAL MANOHAR N and SREENIMOL K.R |
Article - 23 | Title | ALIS- ADVANCE LOGICAL INTELLIGENCE SYSTEM | 97-103 |
Authors | Joel S Joy, Rroan M, Midhun Manohar, Rahul Thomas and Sheba Jiju George |
Article - 24 | Title | Phishing Espial Using Machine Learning with Wrapper Integrant Selection and Google Classification | 104-107 |
Authors | Bessy P Babu, Devika Raju, Karthika S, Keerthana Chandran and Jissy Liz Jose |
Article - 25 | Title | 2D-to-3D Scene Generation and Rendering using CNN and Spatial Knowledge Representation | 108-111 |
Authors | Gokula Nath G, Praveen Sankar and Vishnu Vijayakumar |
Article - 26 | Title | ATTRIBUTE BASED PRIVACY PROTECTION ON CLOUD COMPUTING WITH AUDITING SCHEME | 112-115 |
Authors | Aswathy TD , Amrutha CP, Aparna Dinesh, Mariamma Thomas and Simy Mary Kurian |
Article - 27 | Title | SHARED OWNERSHIP IN THE CLOUD FOR BUSINESS COLLABORATION | 116-119 |
Authors | Parvathy Radhakrishnan, Ranjima P.S, Renju Renjith, Shifamol P.H and Sruthy Emmanuel |
Article - 28 | Title | Cloud Computing With Big Data Clustering Using Privacy Preserving High-Order Possibilistic C-mean Algorithm | 120-123 |
Authors | Sreelakshmy D Unni and Nimmymol Manuel |
Article - 29 | Title | Attribute And Time Factors Combined CP-ABE and RSA based Access Control Scheme for Public Cloud | 124-127 |
Authors | Parvathy Radhakrishnan, Nayana N Panicker, Sheedhal Susan John , Nivyamol P Varghese and Divya S B |
Article - 30 | Title | An Intelligent System to predict Students academic performance using Data Mining | 128-131 |
Authors | Liya Treesa Kunjumon ,Sharon Shaji , Saffi Treesa Saji , Thasneem Naushad and Neena Joseph |
Article - 31 | Title | CHURN PREDICTION IN TELECOM SECTOR USING MACHINE LEARNING | 132-134 |
Authors | RoshinReji Andrews, Rohit Zacharias, Sebin Antony and Merlin Mary James |
Article - 32 | Title | SECURE CONFIDENTIALITY OF BIG DATA STREAMS USING SELECTIVE ENCRYPTION METHOD AND REGRESSION ALGORITHM | 135-138 |
Authors | Soniya Joy and Neena Joseph |
Article - 33 | Title | ELECTRICITY BILL PRICE FORECASTING WITH ARIMA MODEL USING THE CONCEPT OF MACHINE LEARNING | 139-142 |
Authors | Anjali Krishnan and Jinu P Sainudeen |
Article - 34 | Title | Hyper Spectral Prevalent News Customization System With Sentimental Analysis | 143-146 |
Authors | Geethu Rajeev and George Sebastian |
Article - 35 | Title | Sentiment Analysis in Product Reviews using Natural Language Processing and Machine Learning | 147-151 |
Authors | Kuncherichen K Thomas, Sarath P Anil, Ebin Kuriakose and Neema George |
Article - 36 | Title | An Effective Method for Detection and Localization of Tampering | 152-154 |
Authors | Gifty Saju and Sreenimol K R |