1 |
Parkinsons Disease Prediction
Author(s): Bommidi Chandu, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp1-5 |
1-5 |
 |
2 |
Pre-Owned Merchandise
Author(s): Buddaraju Tejaswini, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp6-11 |
6-11 |
 |
3 |
SOIL MOISTURE
Author(s): Buttu Tagore, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp12-17 |
12-17 |
 |
4 |
Online Farming Route System
Author(s): Chintha Ram Prasad, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp18-24 |
18-24 |
 |
5 |
Captcha Recognition Using CNN
Author(s): Gajula Sai Lakshmi, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp25-28 |
25-28 |
 |
6 |
AI Enabled Water Well Predictor
Author(s): Hosakuppalu Venkatesh Deekshith, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp29-34 |
29-34 |
 |
7 |
Online intelligent tutoring system using AI
Author(s): Bokka Harish, K.Rambabu DOI : https://ijmrr.com.2025.v15 i2s pp35-41 |
35-41 |
 |
8 |
Predicting Bank Loan Defaults
Author(s): Kadali Anusha, A.Durga Devi DOI : https://ijmrr.com.2025.v15.i2s.pp42-50 |
42-50 |
 |
9 |
Facial Emoji Avatars generation based on face emotion
Author(s): Kammila Bala Naga Vamsi Krishna, A.Durga Devi DOI : https://ijmrr.com.2025.v15.i2s.pp51-58 |
51-58 |
 |
10 |
FAKE ACCOUNT DETECTION USING MACHINE LEARNING AND DATA SCIENCE
Author(s): Kruttiventi Bhagavan, K.Venkatesh DOI : https://ijmrr.com.2025.v15.i2s.pp59-63 |
59-63 |
 |
11 |
Zero Shot Text Classification Via Knowledge Graph Embedding For Social Media Data
Author(s): Maddala Vidya Sagar, K.Venkatesh DOI : https://ijmrr.com.2025.v15.i2s.pp64-76 |
64-76 |
 |
12 |
Courier Management System
Author(s): Manthi Bindu Madhavi, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp77-82 |
77-82 |
 |
13 |
Video based classroom monitoring
Author(s): Muddam Sri Lakshmi Devi, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp83-86 |
83-86 |
 |
14 |
EARLY PEST DETECTION
Author(s): Chimmili Anusha, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp87-91 |
87-91 |
 |
15 |
SECURING DATA WITH BLOCKCHAIN AND AI
Author(s): Gadi Jaya Sai, Sri Venkata Manikanta, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp92-96 |
92-96 |
 |
16 |
Malicious Url Detection Using Ml
Author(s): Golagabattula Ajay Kanth, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp97-103 |
97-103 |
 |
17 |
CYBER SECURITY AND AI FOR CLOUD BASED INTERNET OF TRANSPORTATION OF SYSTEM
Author(s): Jaggavarapu Naveen Reddy, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp104-108 |
104-108 |
 |
18 |
TEXT and IMAGE Plagiarism Detection
Author(s): Kolli Nagesh, K.VENKATESH DOI : https://ijmrr.com.2025.v15.i2s.pp113-119 |
113-119 |
 |
19 |
Commodity Price Forecasting System Using SARIMAX Model with Interactive GUI
Author(s): Kunada Jahnavi, K.Venkatesh DOI : https://ijmrr.com.2025.v15.i2s.pp120-128 |
120-128 |
 |
20 |
Driver Drowsiness Detection
Author(s): Manne Durga Bhavani, K.Venkatesh DOI : https://ijmrr.com.2025.v15.i2s.pp129-133 |
129-133 |
 |
21 |
Air Quality Strategies, Exploratory Data Analysis using Machine Learning
Author(s): Meka Naga Ramyasri, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp134-142 |
134-142 |
 |
22 |
Language Identification for Multilingual Machine Translation
Author(s): Mudunuri Ajay Varma, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp143-148 |
143-148 |
 |
23 |
UPI FRAUD DETECTION USING MACHINE LEARNING
Author(s): Mudunuri Sri Uma Satya Naga Valli, A.Durga Devi DOI : https://ijmrr.com.2025.v15.i05.pp149-154 |
149-154 |
 |
24 |
Vulnerability Prediction in Javascript Functions by Combining Machine Learning Algorithms
Author(s): Pasupuleti Adarsh Sri, K.Suparna DOI : https://ijmrr.com.2025.v15.i2s.pp155-163 |
155-163 |
 |
25 |
Classification of Darknet Traffic Using Machine Learning
Author(s): Petchetti Naga Venkata Sai Kumar, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp164-175 |
164-175 |
 |
26 |
E-Voting System Using Ethereum Blockchain
Author(s): Puli Kusuma Kumari, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp176-181 |
176-181 |
 |
27 |
Optimizing Agriculture Using Machine Learning Techniques
Author(s): Javvadi Veera Venkata Hyndhavi, A.Durga Devi DOI : https://ijmrr.com.2025.v15.i2s.pp182-187 |
182-187 |
 |
28 |
Stress Detection
Author(s): Sanaboina Yuva Santhi, CH.JEEVAN BABU DOI : https://ijmrr.com.2025.v15.i2s.pp188-194 |
188-194 |
 |
29 |
Chatbot Development Using LSTM and TensorFlow
Author(s): Sanivarapu Divya Pushpa, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp195-199 |
195-199 |
 |
30 |
Cyberspace News Prediction of Text and Image with Report Generation
Author(s): Tallapudi Jyothsna, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp200-208 |
200-208 |
 |
31 |
Encrypted Network Traffic Classification Using Deep and Parallel Network-In-Network Models
Author(s): Thota Devaki Sai Priya, K.Sridevi DOI : https://ijmrr.com.2025.v15 i2s.pp209-213 |
209-213 |
 |
32 |
Heart Disease Prediction With Machine Learning
Author(s): Varanasi Harshini, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp214-218 |
214-218 |
 |
33 |
World Population Analysis Using Machine Learning
Author(s): Simhadri Veera Venkata Sravya, CH.JEEVAN BABU DOI : https://ijmrr.com.2025.v15.i2s.pp219-223 |
219-223 |
 |
34 |
Predictive Maintenance for Factory Equipment
Author(s): Kadali Nagamani, A.DURGA DEVI DOI : https://ijmrr.com.2025.v15.i2s.pp224-231 |
224-231 |
 |
35 |
Forest Fire Detection using CNN-RF and CNN-XGBOOST Machine Learning Algorithms
Author(s): Kambala Jagadish, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp232-236 |
232-236 |
 |
36 |
Machine Learning Framework for Prediction of Admission in Engineering College
Author(s): Naidu Devi Prasanna, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp237-242 |
237-242 |
 |
37 |
Crime Data Analysis Using Juypter
Author(s): PATNALA PRAVALLIKA, K.SUPARNA DOI : https://ijmrr.com.2025.v15.i2s.pp243-246 |
243-246 |
 |
38 |
Human Action Recognition STIP Using NB, KNN and LSTM, CNN
Author(s): PILLI VIJAY BABU, CH.JEEVAN BABU DOI : https://ijmrr.com.2025.v15.i2s.pp247-250 |
247-252 |
 |
39 |
Turtle Back Zoo Management Application
Author(s): Rudraraju Lakshmi Aishwarya, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp253-260 |
253-260 |
 |
40 |
Flight Price Prediction Using Machine Learning
Author(s): Sanaboina Renuka Tejaswini, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp261-263 |
261-263 |
 |
41 |
Semantic segmentation-based traffic sign detection and recognition using deep learning techniques
Author(s): Sanapati Syam, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp264-269 |
264-269 |
 |
42 |
Image Classification using Transfer Learning
Author(s): Vasa Pavan Naga Sai Yesu, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp270-274 |
270-274 |
 |
43 |
Turtle Back Zoo Management Application
Author(s): Rudraraju Lakshmi Aishwarya, Ch.Jeevan Babu DOI : https://ijmrr.com.2025.v15.i2s.pp275-283 |
275-283 |
 |
44 |
Discovery and Prediction of Stock Index Pattern via Three-Stage Architecture of TICC, TPA-LSTM and Multivariate LSTM-FCNs
Author(s): Vendra Devendra Kumar, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp284-288 |
284-288 |
 |
45 |
Skin Diseases Diagnosis Using Convolutional Neural Network
Author(s): Vatsavai Siva Lavanya, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp289-293 |
289-293 |
 |
46 |
Alumni Management System
Author(s): Yantrapragada Chandu, K.Sridevi DOI : https://ijmrr.com.2025.v15.i2s.pp294-306 |
294-306 |
 |
47 |
TEXT and IMAGE Plagiarism Detection
Author(s): Kolli Nagesh, K.VENKATESH DOI : https://ijmrr.com.2025.v15.i2s.pp307-312 |
307-312 |
 |
48 |
Face Recognition and Crime Detection
Author(s): Althi Ashajyothi, K.Rambabu DOI : https://ijmrr.com.2025.v15.i05.pp313-315 |
313-315 |
 |
49 |
Diabetes Prediction Using Machine Learning
Author(s): Avurthula Mallika, K.Rambabu DOI : https://ijmrr.com.2025.v15.i2s.pp316-319 |
316-319 |
 |
50 |
Skin care Product Recommendation using Skin Images
Author(s): Komatigunta Posamma, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp320-326 |
320-326 |
 |
51 |
Recognition Of Cloth Pattern Using SVM And Neural Network
Author(s): Challa Lakshmi Kranthi Lavanya, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp327-329 |
327-329 |
 |
52 |
Online Event Management System
Author(s): Chittebathula Shara, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp330-332 |
330-332 |
 |
53 |
Depression Detection from Text, Image & Speech using Deep Learning Algorithm
Author(s): Chokkapu Dalini Satya Sireesha, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp333-337 |
333-337 |
 |
54 |
RESUME BUILDER SYSTEM
Author(s): Dhulipala Madhuri, V.Sarala DOI : https://ijmrr.com.2025.v15.i2s.pp338-346 |
338-346 |
 |
55 |
Online Blood Bank System
Author(s): Eedarapalli Krishna Chaitanya, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp347-349 |
347-349 |
 |
56 |
Optimizing Agriculture Using Machine Learning Techniques
Author(s): Javvadi Veera Venkata Hyndhavi, A.Durga Devi DOI : https://ijmrr.com.2025.v15.i2s.pp350-357 |
350-357 |
 |
57 |
Data Analytics Approach To Cybercrime
Author(s): Mudapaka Naga Venkata Sandeep Kumar, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp358-362 |
358-362 |
 |
58 |
Detection of Ransomware Attacks Using Processor and Disk Usage Data
Author(s): Mudundi Narendra Varma, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp363-370 |
363-370 |
 |
59 |
Secure E-Health Records on Cloud using Cryptography & Blockchain Smart Contracts
Author(s): Mudunuri Lakshmi Rupa Devi, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp371-376 |
371-376 |
 |
60 |
Spammer Detection and Fake User Identification on Social Networks
Author(s): Muthyala Bhuvana Chandrika, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp377-386 |
377-386 |
 |
61 |
Prediction Of COVID-19 Severity by Applying Machine and Deep Learning Techniques
Author(s): Naraharisetti Keerthi, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp387-392 |
387-392 |
 |
62 |
Distributed Denial of Service: Attack techniques and mitigation
Author(s): Nukarapu Devendra Ashok, K.Suparna DOI : https://ijmrr.com.2025.v15.i2s.pp393-398 |
393-398 |
 |
63 |
Faculty Management System
Author(s): Pala Prameela, K.Suparna DOI : https://ijmrr.com.2025.v15.i2s.pp399-405 |
399-405 |
 |
64 |
Predicting Customer Churn using Neural Networks
Author(s): Palakodeti Mounika Venkata Supraja,, K.Suparna DOI : https://ijmrr.com.2025.v15.i2s.pp406-409 |
406-409 |
 |
65 |
Detection of Fraudulent Transactions from Highly Imbalanced Dataset using Different ML Classifiers
Author(s): Kapaka Hareesh, A.DURGA DEVI DOI : https://ijmrr.com.2025.v15.i2s.pp410-418 |
410-418 |
 |
66 |
Blockchain-Quality of Assurance and Food authenticity using blockchain
Author(s): Guntuboina Guru Sankara Venkatesh, B.S.MURTHY DOI : https://ijmrr.com.2025.v15.i2s.pp419-424 |
419-424 |
 |
67 |
Smart Control of Traffic Light Using Artificial Intelligence
Author(s): Dunna Nandi Vardhan, B.S.Murthy DOI : https://ijmrr.com.2025.v15.i2s.pp425-431 |
425-431 |
 |
68 |
Deep Learning Detection of Electricity Theft Cyber-attacks in Renewable Distributed Generation
Author(s): Danam Vivek Kumar, V.SARALA DOI : https://ijmrr.com.2025.v15.i2s.pp432-436 |
432-436 |
 |
69 |
Data Management System for Morris Health Services
Author(s): Bhati Kushal Singh, K.Rambabu DOI : https://ijmrr.com.2025.v15.i2s.pp437-439 |
437-439 |
 |
70 |
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks
Author(s): Palavalasa Lavanya, K.Suparna DOI : https://ijmrr.com.2025.v15.i2s.pp440-444 |
440-444 |
 |
71 |
Predictive Models for River Water Quality using Machine Learning
Author(s): Mulki Khandeswari, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp445-452 |
445-452 |
 |
72 |
Bit coin-Price-Prediction-Using-RNN-LSTM
Author(s): Mudde Mohan Naga Sai Kumar, A.Naga Raju DOI : https://ijmrr.com.2025.v15.i2s.pp453-460 |
453-460 |
 |
73 |
Resourceful And Employable Click Fraud Identification For Handheld Applications
Author(s): Mohammed Raif , Syed Wajee Uddin, Syed Numan Malik, Ms. B Nagalakshmi DOI : https://ijmrr.com.2025.v15.i2s.pp461-466 |
461-466 |
 |
74 |
Information Exchange Framework To Enhance Cloud Storage Safety In The Period Of Massive Data
Author(s): Hussain Munawwar Majid, Md Sameer Ali, Shaik Shahid Pasha, Ms. B Nagalakshmi DOI : https://ijmrr.com.2025.v15.i2s.pp467-477 |
467-477 |
 |
75 |
Tracking Health Trends On Social Media Over Time
Author(s): Shaik Saif Ali, Mirza Mubashir Baig, Syed Naser, Ms. Saleha Butool DOI : https://ijmrr.com.2025.v15.i2s.pp478-485 |
478-485 |
 |
76 |
Safety Enhancement In Vehicles: Drowsiness Detection Using Convolutional Neural Networks
Author(s): Mohammed Abdul Bari, Ahmed Sayeed Bahattab , Madiha Khulood, Summayya Begum DOI : https://ijmrr.com.2025.v15.i2s.pp486-494 |
486-494 |
 |
77 |
Liver Disease Prediction Using Ga Feature Selection, Social Spider Optimization, And Cnn Classification
Author(s): Syed Saad Ullah, Mohammad Adil Khan, Ma Rasheed, Mr. Mohammed Mateen DOI : https://ijmrr.com.2025.v15.i2s.pp495-502 |
495-502 |
 |
78 |
Leveraging SAP Plant Maintenance And Production Planning To Optimize Manufacturing Processes
Author(s): Shaikh Mohmmad Shoeb Shaikh Gulab1, Vishal Vijay Chahare2, Kedarnath Kolhapure3 DOI : https://ijmrr.com.2025.v15.i2.pp190-200 |
190-200 |
 |
79 |
PROTECTING CLOUD DATA WITH DYNAMIC SECURITY VIA NETWORK CODING
Author(s): Mohammed Mubashir1, Narender Kumar2, Sameer Khan3, Ms. Hajira Sabuhi4 DOI : https://ijmrr.com.2025.v15.i02s.pp503-509 |
503-509 |
 |
80 |
MOVIE RECOMMENDER SYSTEM USING SENTIMENT ANALYSIS
Author(s): Syed Ibrahim1, Mohammed Irfan Ahmed2, Mohammed Faizur Rahman3, Dr. K.Nagi Reddy4 DOI : https://ijmrr.com.2025.v15.i2s.pp510-518 |
510-518 |
 |
81 |
Propounding First Artificial Intelligence Approach For Predicting Robbery Behavior Potential In An Indoor Security Camera
Author(s): Mohammad Owais Khan1, Mohammed Sarfaraz2, Abdul Muqtadir Noman3,Ms ShaguftaIqbal4 DOI : https://ijmrr.com.2025.v15.i2s.pp519-527 |
519-527 |
 |
82 |
Ensuring Secure Sharing Of Identity Information Of Kyc Compliance And Verification
Author(s): Mohammed Adil1,Syed Sameer2,Anas Yousuf 3,Mrs.M.Shilpa4 DOI : https://ijmrr.com.2025.v15.i2s.pp528-537 |
528-537 |
 |
83 |
Unvilling In Twitter Inference Attack On Browsing History Of Twittwe Users Using Public Click Analytics And Twitter Metadata
Author(s): Mohd hassan1, Mohd SaadUddin2, Mohammed Asim Sameer3, Mr. Suraj Prakash Yadav4 DOI : https://ijmrr.com.2025.v15.i2s.pp537-550 |
537-550 |
 |