C Lokeshwari
Mohan Babu University
Detection and analysis of brain tumours from Magnetic Resonance Imaging (MRI) scans are essential for the early detection and treatment of brain cancers. Manual analysis of the MRI images is a time-consuming process for radiologists, as there are possibilities of human errors, especially while handling large volumes of medical images....
Kodeboina Suresh
Potti Sriramulu Chalavadi Mallikarjuna Rao College of Engineering and Technology (PSCMRCET)
Gridlock in metropolitan areas is the severe problem regarded within the gift lifestyles. The motors are extended at a excessive rate prompts gridlock at both pinnacle and non-pinnacle hours. This reasons much less powerful site visitors signal administration of streets. Traffic sign control frameworks depend upon a decent time span...
Ramya T
Vellore Institute of Technology (VIT University - Vellore)
Schizophrenia (SZ) is a severe neuropsychiatric illness that interferes with cognitive and emotional functioning, making early diagnosis essential. Traditional clinical assessments are often subjective, while EEG signals offer valuable insights but are challenged by high dimensionality, noise, and non-linear patterns. To address these issues, a Novel Heterogeneous Dual-Channel Edge-Enhanced Temporal...
Dr D Aruna Kumari
Vidya Jyothi Institute Of Technology
Nowadays, many people have pets, but because of busy daily schedules, they are not always able to feed their pets on time. Irregular feeding can create health problems for pets such as obesity, poor nutrition, and shortage of water. To solve this problem, we developed an IoT-based automatic pet feeding...
MOLLI SRINIVASA RAO
Raghu Engineering College(Autonomous)
P J V G PRAKASA RAO
Lendi Institute of Engineering and Technology
One of the most common cancers in the world, thyroid cancer is becoming more common. Improving patient outcomes requires precise thyroid cancer prediction and early identification. The creation of prediction models based on a variety of patient data is now possible thanks to machine learning techniques, which have become highly...
Gudla Sateesh
ANIL NEERUKONDA INSTITUTE OF TECHNOLOGY AND SCIENCES
One of the In our technology, we successfully decode gene sequences and transplant seeds from various sources to produce greater productivity within crop yields in a shorter period of time. In a non-progressive way, its technology can have an impact on health issues and also go a long way towards...
T Murali Mohan
Swarnandhra College of Engineering and Technology
In the state of affairs of industrialization, requirements of the international strength crisis, including environmental pollution and smart grid connectivity for power networks continue enhancement to deeply built-in to shape network the Power Internet using Artificial Intelligence. Hence, it is wished aimed at power systems, proceedings technology, AI, and science...
YEGIREDDI RAMESH
Aditya Institute of Technology and Management
Academic institutions have become prominent targets for evolving cyber threats, including ransom ware, credential theft, data manipulation attacks, and intellectual-property exploitation. Traditional centralized security infrastructures used in universities are increasingly inadequate due to distributed learning environments, large user populations, and heterogeneous digital ecosystems. This paper proposes a block chain-enabled cyber...
Ramakrishna Kolikipogu
Chaitanya Bharathi Institute of Technology (CBIT)
We propose a unified multimodal framework, Universal Multi-Modal Generation Enabling Any-to-Any Transformation, that enables seamless transformation between text, audio, and image inputs and outputs. The system integrates three core capabilities: speech understanding using Whisper, visual understanding through LLaVA, and speech synthesis via PyTorch-based text-to-speech models. All modules are deployed on-premise...
P. Srinivasa Rao
MVGR College of Engineering (Autonomous)
To improve the efficiency of outsourced storage systems, secure deduplication mechanisms have been introduced. Among these, AES-based encryption is widely used, where packet-level messages are encrypted using a key derived from the message itself. This enables the detection of duplicate data, since identical plaintexts generate identical ciphertexts under the same...