IJAET - Journal Papers

Forest Fire Detection Using Deep Learning Techniques

Authors :  VIGNESH.B, VIYASH ANAND.B, KIRUBAKARAN.C , MURUGESAN.R | Pages : 157 - 161

Secure Password-protected Encryption Key For Deduplicated Cloud Storage Systems

Authors :  MADHAVARAJ SS, ARUN KUMAR NS, SRINIVASAN K | Pages : 149 - 156

Discrete Wavelet Transform Audio Steganography

Authors :  NIKESH B, RAMESH KUMAR A, SANTHOSH S , SARANYA R | Pages : 145 - 148

Diagnosis The Brain Tumor Using Deep Learning

Authors :  P.RAMYA, P.SASHMA, B.SHALINI, M.SNEHA, G.SNEKA | Pages : 139 - 144

Anomaly Detection In Banking Using A Video Surveillance System

Authors :  ELANGOVAN.T ,KARTHIK RAJA .B,SANJAYKUMAR.M,PRAKASH.P | Pages : 129 - 138

Iot Based Ranking Secuirty System Design Using Sha3 256 Alogrithm

Authors :  PRABHU S, JEROM LIVINGSTONE, MANOJ S, MANIKANDAN S | Pages : 122 - 128

Road Accident Prediction Using Data Mining Techniques

Authors :  SATHISH KUMAR.G, NITHEESH.R, PRAKASH. M, DIVYA.K | Pages : 117 - 121

Social Forum Framework For Alumini And Student For Career Recommendation

Authors :  MANIKANDAN.S, MANOJKUMAR.M, DHAMOTHARAN.V, NATHIYA.N | Pages : 111 - 116

A Machine Learning Approach On Detecting Fake News In Social Media

Authors :  KAVIYA R, KOUSALYA P, NISHANTHI K , FARITHA BEGUM M | Pages : 99 - 110

Improved Data Security With Multiple Secret Sharing Using Xor Visual Cryptography

Authors :   BHUVANESH.L, DINESH KUMAR.R, RAMU.Y, NATHIYA.N | Pages : 93 - 98

Intrusion Detection System

Authors :  SURYARAJ R, SURENDAR U, SIVAKUMAR S, R MURUGESAN | Pages : 87 - 92

Adoption Of Anti-email Spoofing Using Geo-fence Frame Work

Authors :  PRAVEEN KUMAR S, SANTHOSH S, TAMIL THENDRAL S, FARITHA BEGUM M | Pages : 86 - 86

Block Chain Enabled Healthcare Secure Data Storage System

Authors :  MOHAMMED ASIF M, KRISHNA PRASATH C, LOKESH B, MURUGESAN R | Pages : 76 - 81

Traffic Sign Detection Using Yolov3

Authors :  VASANTH KUMAR C, UMA SHANKAR S V 68, PRAKASH P | Pages : 68 - 75

A Machine Learning Based Method For Detecting And Prohibiting Of Cyberbullying On Social Media Platforms

Authors :  BRINDA B.M , FARITHA BEGUM N, SWARNA N, SWATHI S | Pages : 62 - 67

A Deep Learning Approach For Robust Detection Of Bots In Twitter Using Transformers

Authors :  ELANCHELIYAN.R, ARAVINDHAN.R, RAHUL.G, BRINDA.B.M | Pages : 54 - 61

Cryptanalysis And Improvement Of The Image Encryption

Authors :  DINESH.S, DHEENADHAYALAN.R, NAGARAJ.R, AARTHY.C | Pages : 48 - 53

Disease Prognostication With Concealing Conservancy For Dispensation Structured Concerning Health

Authors :  PRABHU.S, ABIRAMI.G, DHARANI.K, GAYATHRI.M, KEERTHANA.R.S | Pages : 38 - 47

Anti-fraud Model For Internet Loan Prediction

Authors :  MOHAN KUMAR.M, PAVAN KUMAR.K, KALAIYARASAN.M, BRINDA.B.M | Pages : 32 - 37

Ai And Blockchain Using Secured

Authors :  Mr.S.Gopi B, Mr.Deepak.M, Mr.Praveen.R,Mr.Sanjaykumar.S,Mr.Sasikumar.R | Pages : 22-31

Efficient Consumption Of Renewable

Authors :  Mrs.P.S.Meenambikai., Mr.R.Prem Kumar,Dr.R.Anand, | Pages : 16-21

Smart Voice Alert System

Authors :  Sneka G, Dhanuja A, Aruna jasmine A, Bhuvaneswaran R, Dr. C. K. Vijayalakshmi | Pages : 14-16

Emulation Of Underwater Acoustic

Authors :  Jayakumar. M, Mrs.Thenmozhi. T | Pages : 3-13

Multi Purpose Drone For Medical Emergency

Authors :  P. Hemavarshini, J. Kavipriya, B. Kiruthika, M. Lavanya, Ms. K. Niji | Pages : 1-2