Volume 9 Issue 3 July-September 2019

S.No Title of The Paper Page No Download
1 The Impact of Gender Discrimination on Women’s Identity, and the Nature of Gender-based and Psychological Violence
Author(s): Gitima Deka, Prof. Pradip Jyoti Mahanta
DOI : https://ijbar.org.2025.v15.i02.pp1792-1810
1792-1810
2 Leveraging AI for Smarter Pharmacovigilance Strategies
Author(s): SRINIVAS MADDELA
DOI : https://ijbar.org.2021.v11.i03.pp11-20
11-20
3 Artificial Intelligence: The New Frontier of Healthcare Analytics
Author(s): SRINIVAS MADDELA
DOI : https://ijbar.org.2022.v12.i04.pp101-108
101-108
4 ENHANCING PRIVACY IN PERMISSIONED BLOCKCHAINS THROUGH IDENTITY-BASED ENCRYPTION
Author(s): DR.G.Rajesh, N. Neha, S. Udaya Sri, Y. Deeksha
DOI : https://ijbar.org.2025.v15.i02.pp1811-1815
1811-1815
5 ENHANCED IOT-BASED SYSTEM FOR REAL-TIME WATER QUALITY MONITORING
Author(s): Ms. Samreen Begum, Jella Vaidehi, Ganji Varsha, Kankanala Rohini
DOI : https://ijbar.org.2025.v15.i02.pp1816-1819
1816-1819
6 Detection of Live Events for Safety of People Through NLP and Deep Learning
Author(s): Mrs. P Rupa, K Pallavi Sen, D Pranitha Goud, D Shrehitha
DOI : https://ijbar.org.2025.v15.i02.pp1820-1824
1820-1824
7 Evaluating Cyber Threats and Vulnerabilities in Cyber Physical Systems: A Risk Based Approach
Author(s): Mr. P. Rajendra Prasad, P Nikhitha, P Bhagya Sri, C Sneha
DOI : https://ijbar.org.2025.v15.i02.pp1825-1830
1825-1830
8 Automatic Number Plate Detection Using Deep Learning Techniques
Author(s): Amulya Rachna, Boreddy Supriya Reddy, Ande Harshini, Sk.Fouziya,
DOI : https://ijbar.org.2025.v15.i02.pp1831-1836
1831-1836
9 AI FOR MEDICAL RECORD SUMMARIZATION USING FINE-TUNED FLAN-T5
Author(s): Dr. C. Srinivasa Kumar, U.Srivan, K.Nirmala, S.Nithyasri
DOI : https://ijbar.org.2025.v15.i02.pp1837-1842
1837-1842
10 Enhanced Detection of Polycystic Ovary Syndrome Using Deep Learning Model
Author(s): Anitha Gurram, Meenakshi Thota, A. Shruthika, Ajitha Thuniki
DOI : https://ijbar.org.2025.v15.i02.pp1843-1849
1843-1849
11 Detecting the movement of objects with webcam
Author(s): Mrs.B.mamatha, U.Hasya Charvy, P.Varshika, T.Nirmala
DOI : https://ijbar.org.2025.v15.i02.pp1850-1855
1850-1855
12 SECURING CLOUD COMPUTING WITH DNA CRYPTOGRAPHY
Author(s): Mrs. B. Himabindu, P. Neha Reddy, M. Rithika, M. Siddartha Reddy, M. Sathvik Reddy
DOI : https://ijbar.org.2025.v15.i02.pp1856-1864
1856-1864
13 MANAGING FRAUD INFORMATION PROPOGATION IN MOBILE SOCIAL NETWORKS
Author(s): Mr. A. Sandeep, T. Sri Vardhini, S. Sneha, T. Nikhil, V. Narendar Reddy
DOI : https://ijbar.org.2025.v15.i02.pp1865-1871
1865-1871
14 ENHANCED AUTHORIZATION RECOGNITION FOR MACHINE LEARNING-DRIVEN DETECTION OF MALICIOUS ANDRIOD APPLICATIONS
Author(s): Mr. A. Sudheer, Sathuri Pranavi, Raskas Swetha, S Sujith Reddy, Sayyad Khwaja
DOI : https://ijbar.org.2025.v15.i02.pp1872-1880
1872-1880
15 HYDROHUB-OUR SOURCE FOR WATER INFORMATION
Author(s): Dr. A. Laxmikanth, S.Sai Deepthi, S.Deepika, P.Pranitha, S.Jashwanth
DOI : https://ijbar.org.2025.v15.i02.pp1881-1886
1881-1886
16 SAFEGUARDING THE DIGITAL WORLD DATA SHARING WITH PROXY RE-ENCRYPTION USING BLOCKCHAIN
Author(s): Dr. S. Vijayarangam, U. Mani Kanta, T. Swetha, S. Nishitha, Shaik Sohail
DOI : https://ijbar.org.2025.v15.i02.pp1887-1895
1887-1895
17 ITEM RECOMMENDATION FOR WORD-OF-MOUTH SCENARIO IN SOCIAL E-COMMERCE
Author(s): Dr. T. Charan Singh, T.Akshitha
DOI : https://ijbar.org.2025.v15.i02.pp1896-1899
1896-1899
18 SECURE SEMANTIC SEARCH IN PUBLIC CLOUDS: OPTIMAL MATCHING OVER ENCRYPTED DATA
Author(s): Dr.CH.G.V.N.Prasad, V.Aasrith, Y.Shankar, V.Deepthi, R.Sandhya, V.Girish Kumar
DOI : https://ijbar.org.2025.v15.i02.pp1900-1907
1900-1907
19 SUBSTANTIAL AUTHORIZATION RECOGNITION IN MACHINE LEARNING-DRIVEN DETECTION OF MALICIOUS ANDROID APPLICATIONS
Author(s): Dr..Ch.G.V.N.Prasad, P.Krupavaram, M.Lalith Kumar, N.Bharath Reddy, N.Prem Sai
DOI : https://ijbar.org.2025.v15.i02.pp1908-1917
1908-1917
20 FORECASTING AND ESTIMATION OF HUMAN MOVEMENT PATTERNS
Author(s): Mrs.S. Ramya, M. Prakash, Mohd Khaja Sohail, K.Madhan Kumar, P.Siddharth Reddy, N.Sushanth Kumar
DOI : https://ijbar.org.2025.v15.i02.pp1918-1923
1918-1923
21 EVALUATION OF DDOS INVASIONS
Author(s): Mrs. V. MOUNIKA, K. SRAVYA, K. SURYA, K. PAVAN, G. SIRISHA
DOI : https://ijbar.org.2025.v15.i02.pp1924-1930
1924-1930
22 TRACKING HEALTH TRENDS ON SOCIAL MEDIA OVER TIME
Author(s): Mrs. K.Vijayalakshmi, V.Tharuni, R.Gayathri, B.Ashok Kumar, V.Mani Kumar, Shaik Shoaib Ahmed
DOI : https://ijbar.org.2025.v15.i02.pp1931-1935
1931-1935
23 SAFE HEALTH DATA SHARING: A METHOD FOR PROTECTING YOUR MEDICAL RECORDS
Author(s): Mrs. D. Keerthi Reddy, T. Pooja, Y. Suma, R. Vinay Reddy, Sk. Kalesha
DOI : https://ijbar.org.2025.v15.i02.pp1936-1941
1936-1941
24 NAVIGATING PRIVACY RELATED CONFLICTS ON SOCIAL MEDIA – A MULTI-PARTY APPROACH
Author(s): Mrs. E.Pavithra, T.Nikhitha, T.Nehasree, S.Sandhya, T.Naveen
DOI : https://ijbar.org.2025.v15.i02.pp1942-1948
1942-1948
25 PREDICTION OF RUMOUR SPREAD IN ONLINE COMMUNITIES USING EQUITABLE ACCOUNTABILITY GAME FRAMEWORK
Author(s): Mrs. M.Sampoorna, S.Supriya, K.Srishanth, T.Rohith, S.Shruthi
DOI : https://ijbar.org.2025.v15.i02.pp1949-1954
1949-1954
26 CLOUD INFORMATION ENTRY RIGHTS AND CONFIDENTIALITY THOROUGH INCOGNITO ATTRIBUTE ORIENTED CRYPTOGRAPHY
Author(s): Mr. Snvasrk Prasad, Y. Nikhitha, V. Rakshitha, S. Bhanu Prakash, V. Vn Rajeev Chandra
DOI : https://ijbar.org.2025.v15.i02.pp1955-1961
1955-1961
27 SEMANTIC IMAGE SEARCH ENHANCEMENT
Author(s): Mrs. P.Pravallika Chandar, U.Anish Reddy, S.Yuvaraj, R.Nihal, Syed Asrar Ahmed
DOI : https://ijbar.org.2025.v15.i02.pp1962-1968
1962-1968
28 DCCR DEEP COLLABORATIVE CONJUNCTIVE RECOMMENDER FOR RATING PREDICTION
Author(s): Mrs. B.Rajasri, S. Ramya, T. Bhargavi, P. Abhiram, S. Suresh
DOI : https://ijbar.org.2025.v15.i02.pp1969-1976
1969-1976
29 STREAMLINED AND SECURE DATA DEDUPLICATION METHOD FOR HEALTH RECORDS
Author(s): Mrs. G. Manasa, V.Ganesh, R.Akhila, R.Santhosh Reddy, R.Sravani
DOI : https://ijbar.org.2025.v15.i02.pp1977-1983
1977-1983
30 SOCIAL CONTEXT IMAGE RECOMMENDATION WITH HIERARCHICAL ATTENTION
Author(s): Mrs. T.Sai Santhoshi, Swamy, Shaik Safreen, T.Goutham, S.Uday
DOI : https://ijbar.org.2025.v15.i02.pp1984-1992
1984-1992
31 EXPLORING PRODUCT UTILIZATION DERIVED FROM SOCIALMEDIA USER DEMOGRAPHICS
Author(s): Mrs. A. Rangamma, T.Sairam, S.Akash, Y.Sumanthreddy, T.Naveen, J.Srikanth
DOI : https://ijbar.org.2025.v15.i02.pp1993-2001
1993-2001
32 ENHANCING CLOUD STORAGE SECURITY: IDENTITY-BASED AUDITING, CONCEALED DATA PROTECTION, AND SECURE DATA SHARING
Author(s): Dr. S. Vijayarangam, M. Saketh Prudhvi, P. Vaishnavi Goud, M. N. Kevin, M. Vivek Vardhan, Sampath Reddy
DOI : https://ijbar.org.2025.v15.i02.pp2002-2005
2002-2005
33 PROXIMITY BASED KEYWORD SUGGESTIONS WITH LOCATION AWARENESS
Author(s): Mr.R.Vinod Kumar, P.Karuna, P.Aradhana, M.Kalyan, M.Haritha, P.Shiva Kumar
DOI : https://ijbar.org.2025.v15.i02.pp2006-2012
2006-2012
34 SECURE ACCESS WITH HIDDEN PASSWORD ENCRYPTION
Author(s): Mr. K. Krishna, P.Divya, M.Srujana, K.Swetha, N.Om Prakash
DOI : https://ijbar.org.2025.v15.i02.pp2013-2018
2013-2018
35 EMAIL SECURITY AND AUTHENTICATION
Author(s): Mrs. E. Pavithra, Prakash Reddy. M, Kiran. M, Sai Kiran. M, Siddarth Reddy. P
DOI : https://ijbar.org.2025.v15.i02.pp2019-2024
2019-2024
36 FAKE OR REAL PHOTO DETECTION WITH DEEP LEARNING WITHOUT USING BINARY PATTERNS
Author(s): Y.SUPRAJA, Dr. M. VEERA KUMARI
DOI : https://ijbar.org.2025.v15.i02.pp2025-2035
2025-2035
37 INTELLIGENT EMERGENCY TRANSIT AND ADAPTIVE AI HUMAN INTERFACE FRAMEWORK
Author(s): V.NANDINI, G. RANGANADHA RAO
DOI : https://ijbar.org.2025.v15.i02.pp2036-2045
2036-2045
38 INTELEGENT ORIGIN DESTINATION FLOW PREDICTION USING TUNABLE FEATURE AGGREGATION NETWORKS
Author(s): O.ARUNA, G.KUSUMA HARINATH
DOI : https://ijbar.org.2025.v15.i02.pp2046-2058
2046-2058
39 A NOVEL FRAME DETECTING MALARIA PARASITE IN THICK BLOOD SMEARS USING CNN
Author(s): B.ASWINI, Dr. M. VEERA KUMARI
DOI : https://ijbar.org.2025.v15.i02.pp2059-2067
2059-2067
40 AI-DRIVEN FIRE DETECTION MODEL FROM IMAGES FOR PREVENTING THE LOSS OF ECOLOGICAL DISASTERS
Author(s): CH ISWARYA, G. KUSUMA HARINATH
DOI : https://ijbar.org.2025.v15.i02.pp2068-2075
2068-2075
41 Evaluation of Network Security Grade Protection for Intrusion Detection
Author(s): I.Tavya Sri, T.Laxmi, D.Sri Ragni, Y.Shanthi
DOI : https://ijbar.org.2025.v15.i02.pp2076-2083
2076-2083
42 Phishing Detection System Through Hybrid Machine Learning Grounded on URL
Author(s): R. Krishna Nayak, Mandem Sree Durga, Bomma Swetha Priya, Are Chaya Siri
DOI : https://ijbar.org.2025.v15.i02.pp2084-2089
2084-2089
43 DETECTING BLOOD GROUP THROUGH FINGERPRINT ANALYSIS
Author(s): Mr. S. Chandra Sheker, Y. Shirisha, D. Sravani, J. Gouthami
DOI : https://ijbar.org.2025.v15.i02.pp2090-2094
2090-2094
44 AI-Powered Question Generation and Learning Support
Author(s): B. Ramya Sri, B. Bilwani, D. Pavani Reddy, S. Nandini
DOI : https://ijbar.org.2025.v15.i02.pp2095-2099
2095-2099
45 GENERATING TEXT TO REALISTIC IMAGES USING KNOWLEDGE GRAPH GENERATIVE ADVERSARIAL NETWORK
Author(s): Mr.P.Masoom Basha, Y.Deepika Reddy, P.Bhumika, V.Sai Varsha Sri
DOI : https://ijbar.org.2025.v15.i02.pp2100-2103
2100-2103
46 PREDECTIVE ANALYSIS OF HEART DISEASE USING DEEP CNN MODEL
Author(s): V. ARUNA KUMARI, P. ANUSHA, S. NUSRAT YASMEEN, RAMACHANDRA EDIGA, U. NAGA AKSHAYA
DOI : https://ijbar.org.2025.v15.i02.pp2104-2113
2104-2113
47 Detoxifying Text with the Use of Massive Pre-trained Neural Networks
Author(s): Sankham Surendra, J.A.Paulson,
DOI : https://ijbar.org.2025.v15.i02.pp2114-2124
2114-2124
48 An ALU architectural solution that is efficient for low power Internet of Things applications
Author(s): Shaik Sharmila, J. Ravisankar
DOI : https://ijbar.org.2025.v15.i02.pp2125-2129
2125-2129
49 The Use of Voice Signals and Machine Learning for the Classification of Speech Disorders
Author(s): Persusomula Ashoka, M. Prasanna Kumar
DOI : https://ijbar.org.2025.v15.i02.pp2130-2136
2130-2136
50 Recent Developments and Emerging Trends in ETS: An In-Depth Overview
Author(s): Harika Lakshmi Bachineni, Dr. S. Ramarao
DOI : https://ijbar.org.2025.v15.i02.pp2137-2155
2137-2155
51 Design, Development and Applications of Spoof Surface Plasmon Transmission Line-Based Sensors at Microwave Frequencies
Author(s): Mr. Jaydeep Prajapati, Dr. Krishna Chandra Roy, Dr. S.Sreenath Kashyap, Dr. Vedvyas Dwivedi
DOI : https://ijbar.org.2025.v15.i02.pp2156-2166
2156-2166
52 AI Framework for Identifying Anomalous Network Traffic in Mirai And Bashlite IOT Botnet Attack
Author(s): Dr. M. Shalima Sulthana, B. Bhavani, T. Mamatha, V. Chandana
DOI : https://ijbar.org.2025.v15.i02.pp2167-2172
2167-2172
53 Fraud Shield: Detecting Online Payment Fraud Using Machine Learning
Author(s): Dr.C.Srinivas Kumar, M.Sriharsha, B.Ravali, P.Usha
DOI : https://ijbar.org.2025.v15.i02.pp2173-2177
2173-2177
54 Malicious URL Detection Using Machine Learning
Author(s): Mrs.J.Santoshi, Neelam Manasa, Papakanti Tulasi, Afroz fatima
DOI : https://ijbar.org.2025.v15.i02.pp2178-2185
2178-2185
55 FRAUDULENT JOBS DETECTION USING MACHINE LEARNING TECHNIQUES
Author(s): Mrs. P Uma Maheshwari, Mrunank Ausekar, G. Sai Rama Krishna, M. Jaswant Prasad
DOI : https://ijbar.org.2025.v15.i02.pp2186-2194
2186-2194
56 Modern ICT Technology Transforming the Education Sector based on Teaching and Learning Support Systems and Solutions for Higher Education Practices
Author(s): Mr. A.V. MURALI KRISHNA, K. E. Abhishek, P. Vamsi Krishna Sai, B. Nishanth
DOI : https://ijbar.org.2025.v15.i02.pp2195-2204
2195-2204
57 Development of Audit Scripts for Windows and Linux Operating Systems
Author(s): Mrs.P. Sushma, P. Shashank, M. Sai Hima Snehith, Uday Kiran
DOI : https://ijbar.org.2025.v15.i02.pp2205-2210
2205-2210
58 GRAFT: Gradient-based Real-time Autoencoder Fused Trajectory Optimizer for safe Motion Planning
Author(s): Mrs. B. Meenakshi, Shabitha, S. Poojitha, Mohd Wajahath Ullah
DOI : https://ijbar.org.2025.v15.i02.pp2211-2218
2211-2218
59 DIGITAL IMAGE WATERMARKING USING ADVANCED DWT-HD-SVD TECHNIQUE
Author(s): Mr .A.V. Murali krishna, K. Harshini, G. Sai Pranav, M. Sindhu Sri
DOI : https://ijbar.org.2025.v15.i02.pp2219-2225
2219-2225
60 Farming Equipment And Machinery Rental System
Author(s): Dr.C.Srinivasa Kumar, B.Sri Varshini Yadav, Hemanjali Ponnada , Mansha Rani
DOI : https://ijbar.org.2025.v15.i02.pp2226-2235
2226-2235
61 Runway Sentinel: Forecasting Adverse Landings Using Flight Data Analytics
Author(s): Dr. C. Srinivas Kumar, Harshitha Rati, B Sri Saugandhika, Shravani Thakur
DOI : https://ijbar.org.2025.v15.i02.pp2236-2245
2236-2245
62 CARGOPULSE: SHIPMENT MANAGEMENT PLATFORM
Author(s): D. Vaishnavi, S. Poojitha, G. Ruchitha, T. Greeshma
DOI : https://ijbar.org.2025.v15.i02.pp2246-2253
2246-2253
63 Crop Suggestion System
Author(s): Mrs. G Anitha, V Navya Reddy, Y N K Annapurna, K Reethika
DOI : https://ijbar.org.2025.v15.i02.pp2254-2258
2254-2258
64 MEDICAL PRESCRIPTION RECOGNITION USING MACHINE LEARNING
Author(s): Mrs. Santoshi, Sri Harsha, Sai Varun, Abhinay
DOI : https://ijbar.org.2025.v15.i02.pp2259-2270
2259-2270
65 Diversity and Distribution of Ozonates (Insect: Odonata) as Bioindicators in Freshwater Habitats of Chintamani Taluk, Karnataka
Author(s): Dr. Muniraju
DOI : https://ijbar.org.2015.v5.i01.pp13-19
13-19
66 Seasonal Variation in Plankton Diversity and Water Quality Parameters in Freshwater Tanks of Chintamani, Karnataka
Author(s): Dr. Muniraju
DOI : https://ijbar.org.2016.v6.i01.pp22-26
22-26
67 Impact of Agrochemical Runoff on Amphibian Diversity in Semi-Arid Karnataka
Author(s): Dr. Muniraju
DOI : https://ijbar.org.2017.v7.i02.pp42-46
42-46
68 A Distributed Real-time Database Index Algorithm Based on B+ Tree and Consistent Hashing
Author(s): Chevula Rekha, Arekatla Madhava Reddy, Vanapamula Veerabrahmachari, Dr. Inaganti Shylaja
DOI : https://ijbar.org.2023.v13.i03.pp40-43
40-43
69 A Novel Time-Aware Food Recommender-System Based on Deep Learning and Graph Clustering
Author(s): Shaik Guntur Mahabub Subhani, Lankala Mounika, Mr. Merugu Anand Kumar, Dr. Padigala Suresh
DOI : https://ijbar.org.2023.v13.i03.pp44-48
44-48
70 An Algorithm for Guideline Transformation: from BPMN to SDA
Author(s): Butukuru Rojalakshmi, Vanapamula Veerabrahmachari, Chevula Rekha, Dr. Godagala Madhava Rao
DOI : https://ijbar.org.2023.v13.i03.pp49-53
49-53
71 Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities
Author(s): Lankala Mounika, Chevula Rekha, Nagam Aanjaneyulu,Dr. Godagala Madhava Rao
DOI : https://ijbar.org.2023.v13.i03.pp54-58
54-58
72 Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks
Author(s): Vanapamula Veerabrahmachari, Shaik Guntur Mahabub Subhani, Arekatla Madhava Reddy, Dr. Padigala Suresh
DOI : https://ijbar.org.2023.v13.i03.pp59-76
59-76
73 Assessment of Physico-chemical parameters of selected reservoir of Wanaparthy District, Telangana
Author(s): Bolisetti John babu, M. Rajashekhar
DOI : https://ijbar.org.2025.v15.i02.pp2271-2274
2271-2274

Top