Home » Volume 35 Issue 6 2025

Volume 35 Issue 6 2025

  1. FRONESIS: DIGITAL FORENSICS BASED EARLY DETECTION OF ONGOING CYBER ATTACKS
    PEDHOORI RASHMITHA, MUNNANGI VENKATA SAI CHARITHA, UDDAGIRI SAI BALAJI, NAZNEEN BEGUM
    doi.org/10.5281/zenodo.15610615

  2. Analyzing URL Legitimacy via Random Forest Classification
    A N V K Swarupa, Kiran Kumar Pulamolu, I Usha, A Durga Bhavani
    doi.org/10.5281/zenodo.15612902

  3. Sustainable Energy Generation through Regenerative Braking and Piezoelectric Suspension
    Bijoy Kumar Deb
    doi.org/10.5281/zenodo.15623260

  4. Performance Comparison Between Micro-Inverter and String Inverter Photovoltaic Systems
    Bhoopesh N. Chaudhari, Siddharth Anand Thorat
    doi.org/10.5281/zenodo.15641068

  5. AI-Enabled Optimal Path Selection for QoS-Aware Routing in Software-Defined Networks
    Girish B G, Dr. Prasad A Y
    doi.org/10.5281/zenodo.15641099

  6. Design and Comparative Analysis of 8-bit Restoring and Non-Restoring Binary Divider Circuits using Verilog HDL
    Amit Singh, Sandeep Singh, Sanjiv Kumar Gupta, Yatindra Gaurav
    doi.org/10.5281/zenodo.15641123

  7. Design of a Dual Band Antenna with Concentric Ring Structure for Wireless Communication
    Dr. Yatindra Gaurav, Devesh Kumar Singh, Arjit Gupta, Dr. Ankita Kar
    doi.org/10.5281/zenodo.15641158

  8. An Autonomous Fire-Fighting Robotic System Based on Arduino RP2040
    Kumari Jyoti, Sarika Dubey, Anam Waheed, Dr.Yatindra Gaurav
    doi.org/10.5281/zenodo.15641191

  9. Design and Analysis of a Microstrip Array Patch Antenna Using Metamaterial concept
    Dr. Yatindra Gaurav, Saurabh Dwivedi, Navneet Dubey
    doi.org/10.5281/zenodo.15641220

  10. Implementation of Automotive Embedded System Modules using STM32F103 and FreeRTOS
    M N Aditya, Pratham B Devadiga, Vishnu Skhand Raaj N, Uwais Ahmed Khan, Dr. Kariyappa B S, Dr. Rajani Katiyar
    doi.org/10.5281/zenodo.15641302

  11. SECURE HEALTHCARE MONITORING WITH INTEGRATED IOT – A REVIEW
    Imran Sayyed,Dr. Ravindra Sangle
    doi.org/10.5281/zenodo.15641347

  12. Harnessing Blockchain to Empower Patients in Managing their Health Records
    P.KiranKumar, K.uma, T.Gopu, S.Oyyathevan, P.Saravanakumar
    doi.org/10.5281/zenodo.15657644

  13. Deep Learning Driven Food Recognition For Accurate Dietary Assessment
    G.Venkata Subbarao, E.Aswanikumar, Sasirekha, G.Vijayalakshmi
    doi.org/10.5281/zenodo.15657831

  14. Federated Multi-Agent Reinforcement Learning for QoS-Aware RU Scheduling in High Dense WLANs
    Pratibha Kantanavar, Hariprasad S A, Gopalakrishna K
    doi.org/10.5281/zenodo.15663348

  15. A Short Discussion on Delay Differential Equations
    Rajnee Tripathi
    doi.org/10.5281/zenodo.15667975

  16. A Discriminant analysis for Anomaly detection based on Security Camera using Entropy Weighted K-means
    Yasoda.khumbham, Musunuri Pavani, Jyothsna P, Satya Srinivas Maddipati, A N V K
    Swarupa
    doi.org/10.5281/zenodo.15675003

  17. Isolated LLC Resonant DC-DC converter used for MVDC Grids
    Mr. M V Kesava Kumar, N. Visali
    doi.org/10.5281/zenodo.15675021

  18. Design and Verification of APB-Configurable Encrypted Communication Module
    K R Parthasarathi Hebbar, Raghunandana S, Sujata Priyambada Mishra
    doi.org/10.5281/zenodo.15679760

  19. Image Enhancement Techniques: A Review of SVD, DWT, and Hybrid Methods
    PAYAL KHANDELWAL, PREETI SENGAR, SMITA VERMA
    doi.org/10.5281/zenodo.15690161

  20. A REVIEW ON DESIGN AND DEVELOPMENT OF NPK SENSOR
    Vijendra Hanumant Sakle, Dr. Ajij Dildar Sayyad
    doi.org/10.5281/zenodo.15690175
  21. Empty

  22. Prediction of Brain Haemorrhage Using Deep Learning Techniques: A Comprehensive Review
    Ms. Sharayu Phatangare, Dr. Rahul Chakre
    doi.org/10.5281/zenodo.15697939

  23. Synthetic Voltage Data Generation, Modeling and Characterization of Power Quality Issues in AC Line Supply
    Mr S Praveen, Dr. Ezhilarasan G, Dr. Mahendra B M, Goutham B Bhandari, Vishwas R B, Naveen Raju S
    doi.org/10.5281/zenodo.15711426

  24. Deadbeat Performance without Parameter Restriction via SCT in LTI Systems
    Soumen Paul, Apratim Mitra, Debabrata Mitra, Tamosa Chakraborty
    doi.org/10.5281/zenodo.15711439

  25. Design and Implementation of Burst FIFO
    Sathwika Katkam, Chandrasekhar E, Chandra Sekhar P, Neeraja B
    doi.org/10.5281/zenodo.15714279

  26. A Hybrid Approach to Image Forgery Detection Using OpenCV, MD5, SHA-256, Blowfish & SSIM
    G R Ramadevi, Archana Patil, Madhu Bandi, Anil Kumar Masimukku, Mohd Riyazuddin, M.V.Ramana Murthy
    doi.org/10.5281/zenodo.15714290

  27. A Legal Evaluation of Technological and Biological Interventions on the Human Body within the Scope of Transhumanism
    Dr. Ahmet Aydın
    doi.org/10.5281/zenodo.15718078