INTERNATIONAL JOURNAL OF

 MANAGEMENT RESEARCH AND

 REVIEW
Published By:- Society of Scientific Research and Education(SSRE)
Home Contacts mail Facebook Twitter You tube

ISSN 2249-7196

INTERNATIONAL JOURNAL OF MANAGEMENT RESEARCH AND REVIEW      A MONTHLY ISSUE    ONLINE JOURNAL

JOURNAL MENU

HOME
ABOUT US
AUTHOR GUIDELINES
SUBMIT ARTICLE ONLINE
ARCHIVE
EDITORIAL BOARD
CURRENT ISSUE
ABSTRACT/INDEX
REVIEWER REPORT PORT

View Conference Issue

IJESR

Sales and Services vices

ADVERTISING
FEEDBACK
CONTACT US
TOTAL VISITOR 647940

Motherhood University conference

Archieves


Issues

Volume 15 Issue 2s April-June 2025

S.No Title of The Paper Page No Download
1 Parkinsons Disease Prediction
Author(s): Bommidi Chandu, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp1-5
1-5
2 Pre-Owned Merchandise
Author(s): Buddaraju Tejaswini, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp6-11
6-11
3 SOIL MOISTURE
Author(s): Buttu Tagore, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp12-17
12-17
4 Online Farming Route System
Author(s): Chintha Ram Prasad, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp18-24
18-24
5 Captcha Recognition Using CNN
Author(s): Gajula Sai Lakshmi, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp25-28
25-28
6 AI Enabled Water Well Predictor
Author(s): Hosakuppalu Venkatesh Deekshith, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp29-34
29-34
7 Online intelligent tutoring system using AI
Author(s): Bokka Harish, K.Rambabu
DOI : https://ijmrr.com.2025.v15 i2s pp35-41
35-41
8 Predicting Bank Loan Defaults
Author(s): Kadali Anusha, A.Durga Devi
DOI : https://ijmrr.com.2025.v15.i2s.pp42-50
42-50
9 Facial Emoji Avatars generation based on face emotion
Author(s): Kammila Bala Naga Vamsi Krishna, A.Durga Devi
DOI : https://ijmrr.com.2025.v15.i2s.pp51-58
51-58
10 FAKE ACCOUNT DETECTION USING MACHINE LEARNING AND DATA SCIENCE
Author(s): Kruttiventi Bhagavan, K.Venkatesh
DOI : https://ijmrr.com.2025.v15.i2s.pp59-63
59-63
11 Zero Shot Text Classification Via Knowledge Graph Embedding For Social Media Data
Author(s): Maddala Vidya Sagar, K.Venkatesh
DOI : https://ijmrr.com.2025.v15.i2s.pp64-76
64-76
12 Courier Management System
Author(s): Manthi Bindu Madhavi, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp77-82
77-82
13 Video based classroom monitoring
Author(s): Muddam Sri Lakshmi Devi, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp83-86
83-86
14 EARLY PEST DETECTION
Author(s): Chimmili Anusha, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp87-91
87-91
15 SECURING DATA WITH BLOCKCHAIN AND AI
Author(s): Gadi Jaya Sai, Sri Venkata Manikanta, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp92-96
92-96
16 Malicious Url Detection Using Ml
Author(s): Golagabattula Ajay Kanth, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp97-103
97-103
17 CYBER SECURITY AND AI FOR CLOUD BASED INTERNET OF TRANSPORTATION OF SYSTEM
Author(s): Jaggavarapu Naveen Reddy, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp104-108
104-108
18 TEXT and IMAGE Plagiarism Detection
Author(s): Kolli Nagesh, K.VENKATESH
DOI : https://ijmrr.com.2025.v15.i2s.pp113-119
113-119
19 Commodity Price Forecasting System Using SARIMAX Model with Interactive GUI
Author(s): Kunada Jahnavi, K.Venkatesh
DOI : https://ijmrr.com.2025.v15.i2s.pp120-128
120-128
20 Driver Drowsiness Detection
Author(s): Manne Durga Bhavani, K.Venkatesh
DOI : https://ijmrr.com.2025.v15.i2s.pp129-133
129-133
21 Air Quality Strategies, Exploratory Data Analysis using Machine Learning
Author(s): Meka Naga Ramyasri, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp134-142
134-142
22 Language Identification for Multilingual Machine Translation
Author(s): Mudunuri Ajay Varma, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp143-148
143-148
23 UPI FRAUD DETECTION USING MACHINE LEARNING
Author(s): Mudunuri Sri Uma Satya Naga Valli, A.Durga Devi
DOI : https://ijmrr.com.2025.v15.i05.pp149-154
149-154
24 Vulnerability Prediction in Javascript Functions by Combining Machine Learning Algorithms
Author(s): Pasupuleti Adarsh Sri, K.Suparna
DOI : https://ijmrr.com.2025.v15.i2s.pp155-163
155-163
25 Classification of Darknet Traffic Using Machine Learning
Author(s): Petchetti Naga Venkata Sai Kumar, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp164-175
164-175
26 E-Voting System Using Ethereum Blockchain
Author(s): Puli Kusuma Kumari, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp176-181
176-181
27 Optimizing Agriculture Using Machine Learning Techniques
Author(s): Javvadi Veera Venkata Hyndhavi, A.Durga Devi
DOI : https://ijmrr.com.2025.v15.i2s.pp182-187
182-187
28 Stress Detection
Author(s): Sanaboina Yuva Santhi, CH.JEEVAN BABU
DOI : https://ijmrr.com.2025.v15.i2s.pp188-194
188-194
29 Chatbot Development Using LSTM and TensorFlow
Author(s): Sanivarapu Divya Pushpa, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp195-199
195-199
30 Cyberspace News Prediction of Text and Image with Report Generation
Author(s): Tallapudi Jyothsna, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp200-208
200-208
31 Encrypted Network Traffic Classification Using Deep and Parallel Network-In-Network Models
Author(s): Thota Devaki Sai Priya, K.Sridevi
DOI : https://ijmrr.com.2025.v15 i2s.pp209-213
209-213
32 Heart Disease Prediction With Machine Learning
Author(s): Varanasi Harshini, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp214-218
214-218
33 World Population Analysis Using Machine Learning
Author(s): Simhadri Veera Venkata Sravya, CH.JEEVAN BABU
DOI : https://ijmrr.com.2025.v15.i2s.pp219-223
219-223
34 Predictive Maintenance for Factory Equipment
Author(s): Kadali Nagamani, A.DURGA DEVI
DOI : https://ijmrr.com.2025.v15.i2s.pp224-231
224-231
35 Forest Fire Detection using CNN-RF and CNN-XGBOOST Machine Learning Algorithms
Author(s): Kambala Jagadish, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp232-236
232-236
36 Machine Learning Framework for Prediction of Admission in Engineering College
Author(s): Naidu Devi Prasanna, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp237-242
237-242
37 Crime Data Analysis Using Juypter
Author(s): PATNALA PRAVALLIKA, K.SUPARNA
DOI : https://ijmrr.com.2025.v15.i2s.pp243-246
243-246
38 Human Action Recognition STIP Using NB, KNN and LSTM, CNN
Author(s): PILLI VIJAY BABU, CH.JEEVAN BABU
DOI : https://ijmrr.com.2025.v15.i2s.pp247-250
247-252
39 Turtle Back Zoo Management Application
Author(s): Rudraraju Lakshmi Aishwarya, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp253-260
253-260
40 Flight Price Prediction Using Machine Learning
Author(s): Sanaboina Renuka Tejaswini, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp261-263
261-263
41 Semantic segmentation-based traffic sign detection and recognition using deep learning techniques
Author(s): Sanapati Syam, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp264-269
264-269
42 Image Classification using Transfer Learning
Author(s): Vasa Pavan Naga Sai Yesu, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp270-274
270-274
43 Turtle Back Zoo Management Application
Author(s): Rudraraju Lakshmi Aishwarya, Ch.Jeevan Babu
DOI : https://ijmrr.com.2025.v15.i2s.pp275-283
275-283
44 Discovery and Prediction of Stock Index Pattern via Three-Stage Architecture of TICC, TPA-LSTM and Multivariate LSTM-FCNs
Author(s): Vendra Devendra Kumar, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp284-288
284-288
45 Skin Diseases Diagnosis Using Convolutional Neural Network
Author(s): Vatsavai Siva Lavanya, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp289-293
289-293
46 Alumni Management System
Author(s): Yantrapragada Chandu, K.Sridevi
DOI : https://ijmrr.com.2025.v15.i2s.pp294-306
294-306
47 TEXT and IMAGE Plagiarism Detection
Author(s): Kolli Nagesh, K.VENKATESH
DOI : https://ijmrr.com.2025.v15.i2s.pp307-312
307-312
48 Face Recognition and Crime Detection
Author(s): Althi Ashajyothi, K.Rambabu
DOI : https://ijmrr.com.2025.v15.i05.pp313-315
313-315
49 Diabetes Prediction Using Machine Learning
Author(s): Avurthula Mallika, K.Rambabu
DOI : https://ijmrr.com.2025.v15.i2s.pp316-319
316-319
50 Skin care Product Recommendation using Skin Images
Author(s): Komatigunta Posamma, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp320-326
320-326
51 Recognition Of Cloth Pattern Using SVM And Neural Network
Author(s): Challa Lakshmi Kranthi Lavanya, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp327-329
327-329
52 Online Event Management System
Author(s): Chittebathula Shara, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp330-332
330-332
53 Depression Detection from Text, Image & Speech using Deep Learning Algorithm
Author(s): Chokkapu Dalini Satya Sireesha, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp333-337
333-337
54 RESUME BUILDER SYSTEM
Author(s): Dhulipala Madhuri, V.Sarala
DOI : https://ijmrr.com.2025.v15.i2s.pp338-346
338-346
55 Online Blood Bank System
Author(s): Eedarapalli Krishna Chaitanya, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp347-349
347-349
56 Optimizing Agriculture Using Machine Learning Techniques
Author(s): Javvadi Veera Venkata Hyndhavi, A.Durga Devi
DOI : https://ijmrr.com.2025.v15.i2s.pp350-357
350-357
57 Data Analytics Approach To Cybercrime
Author(s): Mudapaka Naga Venkata Sandeep Kumar, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp358-362
358-362
58 Detection of Ransomware Attacks Using Processor and Disk Usage Data
Author(s): Mudundi Narendra Varma, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp363-370
363-370
59 Secure E-Health Records on Cloud using Cryptography & Blockchain Smart Contracts
Author(s): Mudunuri Lakshmi Rupa Devi, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp371-376
371-376
60 Spammer Detection and Fake User Identification on Social Networks
Author(s): Muthyala Bhuvana Chandrika, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp377-386
377-386
61 Prediction Of COVID-19 Severity by Applying Machine and Deep Learning Techniques
Author(s): Naraharisetti Keerthi, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp387-392
387-392
62 Distributed Denial of Service: Attack techniques and mitigation
Author(s): Nukarapu Devendra Ashok, K.Suparna
DOI : https://ijmrr.com.2025.v15.i2s.pp393-398
393-398
63 Faculty Management System
Author(s): Pala Prameela, K.Suparna
DOI : https://ijmrr.com.2025.v15.i2s.pp399-405
399-405
64 Predicting Customer Churn using Neural Networks
Author(s): Palakodeti Mounika Venkata Supraja,, K.Suparna
DOI : https://ijmrr.com.2025.v15.i2s.pp406-409
406-409
65 Detection of Fraudulent Transactions from Highly Imbalanced Dataset using Different ML Classifiers
Author(s): Kapaka Hareesh, A.DURGA DEVI
DOI : https://ijmrr.com.2025.v15.i2s.pp410-418
410-418
66 Blockchain-Quality of Assurance and Food authenticity using blockchain
Author(s): Guntuboina Guru Sankara Venkatesh, B.S.MURTHY
DOI : https://ijmrr.com.2025.v15.i2s.pp419-424
419-424
67 Smart Control of Traffic Light Using Artificial Intelligence
Author(s): Dunna Nandi Vardhan, B.S.Murthy
DOI : https://ijmrr.com.2025.v15.i2s.pp425-431
425-431
68 Deep Learning Detection of Electricity Theft Cyber-attacks in Renewable Distributed Generation
Author(s): Danam Vivek Kumar, V.SARALA
DOI : https://ijmrr.com.2025.v15.i2s.pp432-436
432-436
69 Data Management System for Morris Health Services
Author(s): Bhati Kushal Singh, K.Rambabu
DOI : https://ijmrr.com.2025.v15.i2s.pp437-439
437-439
70 Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks
Author(s): Palavalasa Lavanya, K.Suparna
DOI : https://ijmrr.com.2025.v15.i2s.pp440-444
440-444
71 Predictive Models for River Water Quality using Machine Learning
Author(s): Mulki Khandeswari, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp445-452
445-452
72 Bit coin-Price-Prediction-Using-RNN-LSTM
Author(s): Mudde Mohan Naga Sai Kumar, A.Naga Raju
DOI : https://ijmrr.com.2025.v15.i2s.pp453-460
453-460
73 Resourceful And Employable Click Fraud Identification For Handheld Applications
Author(s): Mohammed Raif , Syed Wajee Uddin, Syed Numan Malik, Ms. B Nagalakshmi
DOI : https://ijmrr.com.2025.v15.i2s.pp461-466
461-466
74 Information Exchange Framework To Enhance Cloud Storage Safety In The Period Of Massive Data
Author(s): Hussain Munawwar Majid, Md Sameer Ali, Shaik Shahid Pasha, Ms. B Nagalakshmi
DOI : https://ijmrr.com.2025.v15.i2s.pp467-477
467-477
75 Tracking Health Trends On Social Media Over Time
Author(s): Shaik Saif Ali, Mirza Mubashir Baig, Syed Naser, Ms. Saleha Butool
DOI : https://ijmrr.com.2025.v15.i2s.pp478-485
478-485
76 Safety Enhancement In Vehicles: Drowsiness Detection Using Convolutional Neural Networks
Author(s): Mohammed Abdul Bari, Ahmed Sayeed Bahattab , Madiha Khulood, Summayya Begum
DOI : https://ijmrr.com.2025.v15.i2s.pp486-494
486-494
77 Liver Disease Prediction Using Ga Feature Selection, Social Spider Optimization, And Cnn Classification
Author(s): Syed Saad Ullah, Mohammad Adil Khan, Ma Rasheed, Mr. Mohammed Mateen
DOI : https://ijmrr.com.2025.v15.i2s.pp495-502
495-502
78 Leveraging SAP Plant Maintenance And Production Planning To Optimize Manufacturing Processes
Author(s): Shaikh Mohmmad Shoeb Shaikh Gulab1, Vishal Vijay Chahare2, Kedarnath Kolhapure3
DOI : https://ijmrr.com.2025.v15.i2.pp190-200
190-200
79 PROTECTING CLOUD DATA WITH DYNAMIC SECURITY VIA NETWORK CODING
Author(s): Mohammed Mubashir1, Narender Kumar2, Sameer Khan3, Ms. Hajira Sabuhi4
DOI : https://ijmrr.com.2025.v15.i02s.pp503-509
503-509
80 MOVIE RECOMMENDER SYSTEM USING SENTIMENT ANALYSIS
Author(s): Syed Ibrahim1, Mohammed Irfan Ahmed2, Mohammed Faizur Rahman3, Dr. K.Nagi Reddy4
DOI : https://ijmrr.com.2025.v15.i2s.pp510-518
510-518
81 Propounding First Artificial Intelligence Approach For Predicting Robbery Behavior Potential In An Indoor Security Camera
Author(s): Mohammad Owais Khan1, Mohammed Sarfaraz2, Abdul Muqtadir Noman3,Ms ShaguftaIqbal4
DOI : https://ijmrr.com.2025.v15.i2s.pp519-527
519-527
82 Ensuring Secure Sharing Of Identity Information Of Kyc Compliance And Verification
Author(s): Mohammed Adil1,Syed Sameer2,Anas Yousuf 3,Mrs.M.Shilpa4
DOI : https://ijmrr.com.2025.v15.i2s.pp528-537
528-537
83 Unvilling In Twitter Inference Attack On Browsing History Of Twittwe Users Using Public Click Analytics And Twitter Metadata
Author(s): Mohd hassan1, Mohd SaadUddin2, Mohammed Asim Sameer3, Mr. Suraj Prakash Yadav4
DOI : https://ijmrr.com.2025.v15.i2s.pp537-550
537-550