Volume 9 Issue 3 July-September 2019
S.No | Title of The Paper | Page No | Download |
---|---|---|---|
1 | The Impact of Gender Discrimination on Women’s Identity, and the Nature of Gender-based and Psychological Violence Author(s): Gitima Deka, Prof. Pradip Jyoti Mahanta DOI : https://ijbar.org.2025.v15.i02.pp1792-1810 |
1792-1810 | ![]() |
2 | Leveraging AI for Smarter Pharmacovigilance Strategies Author(s): SRINIVAS MADDELA DOI : https://ijbar.org.2021.v11.i03.pp11-20 |
11-20 | ![]() |
3 | Artificial Intelligence: The New Frontier of Healthcare Analytics Author(s): SRINIVAS MADDELA DOI : https://ijbar.org.2022.v12.i04.pp101-108 |
101-108 | ![]() |
4 | ENHANCING PRIVACY IN PERMISSIONED BLOCKCHAINS THROUGH IDENTITY-BASED ENCRYPTION Author(s): DR.G.Rajesh, N. Neha, S. Udaya Sri, Y. Deeksha DOI : https://ijbar.org.2025.v15.i02.pp1811-1815 |
1811-1815 | ![]() |
5 | ENHANCED IOT-BASED SYSTEM FOR REAL-TIME WATER QUALITY MONITORING Author(s): Ms. Samreen Begum, Jella Vaidehi, Ganji Varsha, Kankanala Rohini DOI : https://ijbar.org.2025.v15.i02.pp1816-1819 |
1816-1819 | ![]() |
6 | Detection of Live Events for Safety of People Through NLP and Deep Learning Author(s): Mrs. P Rupa, K Pallavi Sen, D Pranitha Goud, D Shrehitha DOI : https://ijbar.org.2025.v15.i02.pp1820-1824 |
1820-1824 | ![]() |
7 | Evaluating Cyber Threats and Vulnerabilities in Cyber Physical Systems: A Risk Based Approach Author(s): Mr. P. Rajendra Prasad, P Nikhitha, P Bhagya Sri, C Sneha DOI : https://ijbar.org.2025.v15.i02.pp1825-1830 |
1825-1830 | ![]() |
8 | Automatic Number Plate Detection Using Deep Learning Techniques Author(s): Amulya Rachna, Boreddy Supriya Reddy, Ande Harshini, Sk.Fouziya, DOI : https://ijbar.org.2025.v15.i02.pp1831-1836 |
1831-1836 | ![]() |
9 | AI FOR MEDICAL RECORD SUMMARIZATION USING FINE-TUNED FLAN-T5 Author(s): Dr. C. Srinivasa Kumar, U.Srivan, K.Nirmala, S.Nithyasri DOI : https://ijbar.org.2025.v15.i02.pp1837-1842 |
1837-1842 | ![]() |
10 | Enhanced Detection of Polycystic Ovary Syndrome Using Deep Learning Model Author(s): Anitha Gurram, Meenakshi Thota, A. Shruthika, Ajitha Thuniki DOI : https://ijbar.org.2025.v15.i02.pp1843-1849 |
1843-1849 | ![]() |
11 | Detecting the movement of objects with webcam Author(s): Mrs.B.mamatha, U.Hasya Charvy, P.Varshika, T.Nirmala DOI : https://ijbar.org.2025.v15.i02.pp1850-1855 |
1850-1855 | ![]() |
12 | SECURING CLOUD COMPUTING WITH DNA CRYPTOGRAPHY Author(s): Mrs. B. Himabindu, P. Neha Reddy, M. Rithika, M. Siddartha Reddy, M. Sathvik Reddy DOI : https://ijbar.org.2025.v15.i02.pp1856-1864 |
1856-1864 | ![]() |
13 | MANAGING FRAUD INFORMATION PROPOGATION IN MOBILE SOCIAL NETWORKS Author(s): Mr. A. Sandeep, T. Sri Vardhini, S. Sneha, T. Nikhil, V. Narendar Reddy DOI : https://ijbar.org.2025.v15.i02.pp1865-1871 |
1865-1871 | ![]() |
14 | ENHANCED AUTHORIZATION RECOGNITION FOR MACHINE LEARNING-DRIVEN DETECTION OF MALICIOUS ANDRIOD APPLICATIONS Author(s): Mr. A. Sudheer, Sathuri Pranavi, Raskas Swetha, S Sujith Reddy, Sayyad Khwaja DOI : https://ijbar.org.2025.v15.i02.pp1872-1880 |
1872-1880 | ![]() |
15 | HYDROHUB-OUR SOURCE FOR WATER INFORMATION Author(s): Dr. A. Laxmikanth, S.Sai Deepthi, S.Deepika, P.Pranitha, S.Jashwanth DOI : https://ijbar.org.2025.v15.i02.pp1881-1886 |
1881-1886 | ![]() |
16 | SAFEGUARDING THE DIGITAL WORLD DATA SHARING WITH PROXY RE-ENCRYPTION USING BLOCKCHAIN Author(s): Dr. S. Vijayarangam, U. Mani Kanta, T. Swetha, S. Nishitha, Shaik Sohail DOI : https://ijbar.org.2025.v15.i02.pp1887-1895 |
1887-1895 | ![]() |
17 | ITEM RECOMMENDATION FOR WORD-OF-MOUTH SCENARIO IN SOCIAL E-COMMERCE Author(s): Dr. T. Charan Singh, T.Akshitha DOI : https://ijbar.org.2025.v15.i02.pp1896-1899 |
1896-1899 | ![]() |
18 | SECURE SEMANTIC SEARCH IN PUBLIC CLOUDS: OPTIMAL MATCHING OVER ENCRYPTED DATA Author(s): Dr.CH.G.V.N.Prasad, V.Aasrith, Y.Shankar, V.Deepthi, R.Sandhya, V.Girish Kumar DOI : https://ijbar.org.2025.v15.i02.pp1900-1907 |
1900-1907 | ![]() |
19 | SUBSTANTIAL AUTHORIZATION RECOGNITION IN MACHINE LEARNING-DRIVEN DETECTION OF MALICIOUS ANDROID APPLICATIONS Author(s): Dr..Ch.G.V.N.Prasad, P.Krupavaram, M.Lalith Kumar, N.Bharath Reddy, N.Prem Sai DOI : https://ijbar.org.2025.v15.i02.pp1908-1917 |
1908-1917 | ![]() |
20 | FORECASTING AND ESTIMATION OF HUMAN MOVEMENT PATTERNS Author(s): Mrs.S. Ramya, M. Prakash, Mohd Khaja Sohail, K.Madhan Kumar, P.Siddharth Reddy, N.Sushanth Kumar DOI : https://ijbar.org.2025.v15.i02.pp1918-1923 |
1918-1923 | ![]() |
21 | EVALUATION OF DDOS INVASIONS Author(s): Mrs. V. MOUNIKA, K. SRAVYA, K. SURYA, K. PAVAN, G. SIRISHA DOI : https://ijbar.org.2025.v15.i02.pp1924-1930 |
1924-1930 | ![]() |
22 | TRACKING HEALTH TRENDS ON SOCIAL MEDIA OVER TIME Author(s): Mrs. K.Vijayalakshmi, V.Tharuni, R.Gayathri, B.Ashok Kumar, V.Mani Kumar, Shaik Shoaib Ahmed DOI : https://ijbar.org.2025.v15.i02.pp1931-1935 |
1931-1935 | ![]() |
23 | SAFE HEALTH DATA SHARING: A METHOD FOR PROTECTING YOUR MEDICAL RECORDS Author(s): Mrs. D. Keerthi Reddy, T. Pooja, Y. Suma, R. Vinay Reddy, Sk. Kalesha DOI : https://ijbar.org.2025.v15.i02.pp1936-1941 |
1936-1941 | ![]() |
24 | NAVIGATING PRIVACY RELATED CONFLICTS ON SOCIAL MEDIA – A MULTI-PARTY APPROACH Author(s): Mrs. E.Pavithra, T.Nikhitha, T.Nehasree, S.Sandhya, T.Naveen DOI : https://ijbar.org.2025.v15.i02.pp1942-1948 |
1942-1948 | ![]() |
25 | PREDICTION OF RUMOUR SPREAD IN ONLINE COMMUNITIES USING EQUITABLE ACCOUNTABILITY GAME FRAMEWORK Author(s): Mrs. M.Sampoorna, S.Supriya, K.Srishanth, T.Rohith, S.Shruthi DOI : https://ijbar.org.2025.v15.i02.pp1949-1954 |
1949-1954 | ![]() |
26 | CLOUD INFORMATION ENTRY RIGHTS AND CONFIDENTIALITY THOROUGH INCOGNITO ATTRIBUTE ORIENTED CRYPTOGRAPHY Author(s): Mr. Snvasrk Prasad, Y. Nikhitha, V. Rakshitha, S. Bhanu Prakash, V. Vn Rajeev Chandra DOI : https://ijbar.org.2025.v15.i02.pp1955-1961 |
1955-1961 | ![]() |
27 | SEMANTIC IMAGE SEARCH ENHANCEMENT Author(s): Mrs. P.Pravallika Chandar, U.Anish Reddy, S.Yuvaraj, R.Nihal, Syed Asrar Ahmed DOI : https://ijbar.org.2025.v15.i02.pp1962-1968 |
1962-1968 | ![]() |
28 | DCCR DEEP COLLABORATIVE CONJUNCTIVE RECOMMENDER FOR RATING PREDICTION Author(s): Mrs. B.Rajasri, S. Ramya, T. Bhargavi, P. Abhiram, S. Suresh DOI : https://ijbar.org.2025.v15.i02.pp1969-1976 |
1969-1976 | ![]() |
29 | STREAMLINED AND SECURE DATA DEDUPLICATION METHOD FOR HEALTH RECORDS Author(s): Mrs. G. Manasa, V.Ganesh, R.Akhila, R.Santhosh Reddy, R.Sravani DOI : https://ijbar.org.2025.v15.i02.pp1977-1983 |
1977-1983 | ![]() |
30 | SOCIAL CONTEXT IMAGE RECOMMENDATION WITH HIERARCHICAL ATTENTION Author(s): Mrs. T.Sai Santhoshi, Swamy, Shaik Safreen, T.Goutham, S.Uday DOI : https://ijbar.org.2025.v15.i02.pp1984-1992 |
1984-1992 | ![]() |
31 | EXPLORING PRODUCT UTILIZATION DERIVED FROM SOCIALMEDIA USER DEMOGRAPHICS Author(s): Mrs. A. Rangamma, T.Sairam, S.Akash, Y.Sumanthreddy, T.Naveen, J.Srikanth DOI : https://ijbar.org.2025.v15.i02.pp1993-2001 |
1993-2001 | ![]() |
32 | ENHANCING CLOUD STORAGE SECURITY: IDENTITY-BASED AUDITING, CONCEALED DATA PROTECTION, AND SECURE DATA SHARING Author(s): Dr. S. Vijayarangam, M. Saketh Prudhvi, P. Vaishnavi Goud, M. N. Kevin, M. Vivek Vardhan, Sampath Reddy DOI : https://ijbar.org.2025.v15.i02.pp2002-2005 |
2002-2005 | ![]() |
33 | PROXIMITY BASED KEYWORD SUGGESTIONS WITH LOCATION AWARENESS Author(s): Mr.R.Vinod Kumar, P.Karuna, P.Aradhana, M.Kalyan, M.Haritha, P.Shiva Kumar DOI : https://ijbar.org.2025.v15.i02.pp2006-2012 |
2006-2012 | ![]() |
34 | SECURE ACCESS WITH HIDDEN PASSWORD ENCRYPTION Author(s): Mr. K. Krishna, P.Divya, M.Srujana, K.Swetha, N.Om Prakash DOI : https://ijbar.org.2025.v15.i02.pp2013-2018 |
2013-2018 | ![]() |
35 | EMAIL SECURITY AND AUTHENTICATION Author(s): Mrs. E. Pavithra, Prakash Reddy. M, Kiran. M, Sai Kiran. M, Siddarth Reddy. P DOI : https://ijbar.org.2025.v15.i02.pp2019-2024 |
2019-2024 | ![]() |
36 | FAKE OR REAL PHOTO DETECTION WITH DEEP LEARNING WITHOUT USING BINARY PATTERNS Author(s): Y.SUPRAJA, Dr. M. VEERA KUMARI DOI : https://ijbar.org.2025.v15.i02.pp2025-2035 |
2025-2035 | ![]() |
37 | INTELLIGENT EMERGENCY TRANSIT AND ADAPTIVE AI HUMAN INTERFACE FRAMEWORK Author(s): V.NANDINI, G. RANGANADHA RAO DOI : https://ijbar.org.2025.v15.i02.pp2036-2045 |
2036-2045 | ![]() |
38 | INTELEGENT ORIGIN DESTINATION FLOW PREDICTION USING TUNABLE FEATURE AGGREGATION NETWORKS Author(s): O.ARUNA, G.KUSUMA HARINATH DOI : https://ijbar.org.2025.v15.i02.pp2046-2058 |
2046-2058 | ![]() |
39 | A NOVEL FRAME DETECTING MALARIA PARASITE IN THICK BLOOD SMEARS USING CNN Author(s): B.ASWINI, Dr. M. VEERA KUMARI DOI : https://ijbar.org.2025.v15.i02.pp2059-2067 |
2059-2067 | ![]() |
40 | AI-DRIVEN FIRE DETECTION MODEL FROM IMAGES FOR PREVENTING THE LOSS OF ECOLOGICAL DISASTERS Author(s): CH ISWARYA, G. KUSUMA HARINATH DOI : https://ijbar.org.2025.v15.i02.pp2068-2075 |
2068-2075 | ![]() |
41 | Evaluation of Network Security Grade Protection for Intrusion Detection Author(s): I.Tavya Sri, T.Laxmi, D.Sri Ragni, Y.Shanthi DOI : https://ijbar.org.2025.v15.i02.pp2076-2083 |
2076-2083 | ![]() |
42 | Phishing Detection System Through Hybrid Machine Learning Grounded on URL Author(s): R. Krishna Nayak, Mandem Sree Durga, Bomma Swetha Priya, Are Chaya Siri DOI : https://ijbar.org.2025.v15.i02.pp2084-2089 |
2084-2089 | ![]() |
43 | DETECTING BLOOD GROUP THROUGH FINGERPRINT ANALYSIS Author(s): Mr. S. Chandra Sheker, Y. Shirisha, D. Sravani, J. Gouthami DOI : https://ijbar.org.2025.v15.i02.pp2090-2094 |
2090-2094 | ![]() |
44 | AI-Powered Question Generation and Learning Support Author(s): B. Ramya Sri, B. Bilwani, D. Pavani Reddy, S. Nandini DOI : https://ijbar.org.2025.v15.i02.pp2095-2099 |
2095-2099 | ![]() |
45 | GENERATING TEXT TO REALISTIC IMAGES USING KNOWLEDGE GRAPH GENERATIVE ADVERSARIAL NETWORK Author(s): Mr.P.Masoom Basha, Y.Deepika Reddy, P.Bhumika, V.Sai Varsha Sri DOI : https://ijbar.org.2025.v15.i02.pp2100-2103 |
2100-2103 | ![]() |
46 | PREDECTIVE ANALYSIS OF HEART DISEASE USING DEEP CNN MODEL Author(s): V. ARUNA KUMARI, P. ANUSHA, S. NUSRAT YASMEEN, RAMACHANDRA EDIGA, U. NAGA AKSHAYA DOI : https://ijbar.org.2025.v15.i02.pp2104-2113 |
2104-2113 | ![]() |
47 | Detoxifying Text with the Use of Massive Pre-trained Neural Networks Author(s): Sankham Surendra, J.A.Paulson, DOI : https://ijbar.org.2025.v15.i02.pp2114-2124 |
2114-2124 | ![]() |
48 | An ALU architectural solution that is efficient for low power Internet of Things applications Author(s): Shaik Sharmila, J. Ravisankar DOI : https://ijbar.org.2025.v15.i02.pp2125-2129 |
2125-2129 | ![]() |
49 | The Use of Voice Signals and Machine Learning for the Classification of Speech Disorders Author(s): Persusomula Ashoka, M. Prasanna Kumar DOI : https://ijbar.org.2025.v15.i02.pp2130-2136 |
2130-2136 | ![]() |
50 | Recent Developments and Emerging Trends in ETS: An In-Depth Overview Author(s): Harika Lakshmi Bachineni, Dr. S. Ramarao DOI : https://ijbar.org.2025.v15.i02.pp2137-2155 |
2137-2155 | ![]() |
51 | Design, Development and Applications of Spoof Surface Plasmon Transmission Line-Based Sensors at Microwave Frequencies Author(s): Mr. Jaydeep Prajapati, Dr. Krishna Chandra Roy, Dr. S.Sreenath Kashyap, Dr. Vedvyas Dwivedi DOI : https://ijbar.org.2025.v15.i02.pp2156-2166 |
2156-2166 | ![]() |
52 | AI Framework for Identifying Anomalous Network Traffic in Mirai And Bashlite IOT Botnet Attack Author(s): Dr. M. Shalima Sulthana, B. Bhavani, T. Mamatha, V. Chandana DOI : https://ijbar.org.2025.v15.i02.pp2167-2172 |
2167-2172 | ![]() |
53 | Fraud Shield: Detecting Online Payment Fraud Using Machine Learning Author(s): Dr.C.Srinivas Kumar, M.Sriharsha, B.Ravali, P.Usha DOI : https://ijbar.org.2025.v15.i02.pp2173-2177 |
2173-2177 | ![]() |
54 | Malicious URL Detection Using Machine Learning Author(s): Mrs.J.Santoshi, Neelam Manasa, Papakanti Tulasi, Afroz fatima DOI : https://ijbar.org.2025.v15.i02.pp2178-2185 |
2178-2185 | ![]() |
55 | FRAUDULENT JOBS DETECTION USING MACHINE LEARNING TECHNIQUES Author(s): Mrs. P Uma Maheshwari, Mrunank Ausekar, G. Sai Rama Krishna, M. Jaswant Prasad DOI : https://ijbar.org.2025.v15.i02.pp2186-2194 |
2186-2194 | ![]() |
56 | Modern ICT Technology Transforming the Education Sector based on Teaching and Learning Support Systems and Solutions for Higher Education Practices Author(s): Mr. A.V. MURALI KRISHNA, K. E. Abhishek, P. Vamsi Krishna Sai, B. Nishanth DOI : https://ijbar.org.2025.v15.i02.pp2195-2204 |
2195-2204 | ![]() |
57 | Development of Audit Scripts for Windows and Linux Operating Systems Author(s): Mrs.P. Sushma, P. Shashank, M. Sai Hima Snehith, Uday Kiran DOI : https://ijbar.org.2025.v15.i02.pp2205-2210 |
2205-2210 | ![]() |
58 | GRAFT: Gradient-based Real-time Autoencoder Fused Trajectory Optimizer for safe Motion Planning Author(s): Mrs. B. Meenakshi, Shabitha, S. Poojitha, Mohd Wajahath Ullah DOI : https://ijbar.org.2025.v15.i02.pp2211-2218 |
2211-2218 | ![]() |
59 | DIGITAL IMAGE WATERMARKING USING ADVANCED DWT-HD-SVD TECHNIQUE Author(s): Mr .A.V. Murali krishna, K. Harshini, G. Sai Pranav, M. Sindhu Sri DOI : https://ijbar.org.2025.v15.i02.pp2219-2225 |
2219-2225 | ![]() |
60 | Farming Equipment And Machinery Rental System Author(s): Dr.C.Srinivasa Kumar, B.Sri Varshini Yadav, Hemanjali Ponnada , Mansha Rani DOI : https://ijbar.org.2025.v15.i02.pp2226-2235 |
2226-2235 | ![]() |
61 | Runway Sentinel: Forecasting Adverse Landings Using Flight Data Analytics Author(s): Dr. C. Srinivas Kumar, Harshitha Rati, B Sri Saugandhika, Shravani Thakur DOI : https://ijbar.org.2025.v15.i02.pp2236-2245 |
2236-2245 | ![]() |
62 | CARGOPULSE: SHIPMENT MANAGEMENT PLATFORM Author(s): D. Vaishnavi, S. Poojitha, G. Ruchitha, T. Greeshma DOI : https://ijbar.org.2025.v15.i02.pp2246-2253 |
2246-2253 | ![]() |
63 | Crop Suggestion System Author(s): Mrs. G Anitha, V Navya Reddy, Y N K Annapurna, K Reethika DOI : https://ijbar.org.2025.v15.i02.pp2254-2258 |
2254-2258 | ![]() |
64 | MEDICAL PRESCRIPTION RECOGNITION USING MACHINE LEARNING Author(s): Mrs. Santoshi, Sri Harsha, Sai Varun, Abhinay DOI : https://ijbar.org.2025.v15.i02.pp2259-2270 |
2259-2270 | ![]() |
65 | Diversity and Distribution of Ozonates (Insect: Odonata) as Bioindicators in Freshwater Habitats of Chintamani Taluk, Karnataka Author(s): Dr. Muniraju DOI : https://ijbar.org.2015.v5.i01.pp13-19 |
13-19 | ![]() |
66 | Seasonal Variation in Plankton Diversity and Water Quality Parameters in Freshwater Tanks of Chintamani, Karnataka Author(s): Dr. Muniraju DOI : https://ijbar.org.2016.v6.i01.pp22-26 |
22-26 | ![]() |
67 | Impact of Agrochemical Runoff on Amphibian Diversity in Semi-Arid Karnataka Author(s): Dr. Muniraju DOI : https://ijbar.org.2017.v7.i02.pp42-46 |
42-46 | ![]() |
68 | A Distributed Real-time Database Index Algorithm Based on B+ Tree and Consistent Hashing Author(s): Chevula Rekha, Arekatla Madhava Reddy, Vanapamula Veerabrahmachari, Dr. Inaganti Shylaja DOI : https://ijbar.org.2023.v13.i03.pp40-43 |
40-43 | ![]() |
69 | A Novel Time-Aware Food Recommender-System Based on Deep Learning and Graph Clustering Author(s): Shaik Guntur Mahabub Subhani, Lankala Mounika, Mr. Merugu Anand Kumar, Dr. Padigala Suresh DOI : https://ijbar.org.2023.v13.i03.pp44-48 |
44-48 | ![]() |
70 | An Algorithm for Guideline Transformation: from BPMN to SDA Author(s): Butukuru Rojalakshmi, Vanapamula Veerabrahmachari, Chevula Rekha, Dr. Godagala Madhava Rao DOI : https://ijbar.org.2023.v13.i03.pp49-53 |
49-53 | ![]() |
71 | Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities Author(s): Lankala Mounika, Chevula Rekha, Nagam Aanjaneyulu,Dr. Godagala Madhava Rao DOI : https://ijbar.org.2023.v13.i03.pp54-58 |
54-58 | ![]() |
72 | Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks Author(s): Vanapamula Veerabrahmachari, Shaik Guntur Mahabub Subhani, Arekatla Madhava Reddy, Dr. Padigala Suresh DOI : https://ijbar.org.2023.v13.i03.pp59-76 |
59-76 | ![]() |
73 | Assessment of Physico-chemical parameters of selected reservoir of Wanaparthy District, Telangana Author(s): Bolisetti John babu, M. Rajashekhar DOI : https://ijbar.org.2025.v15.i02.pp2271-2274 |
2271-2274 | ![]() |