Table of Contents
Articles
A Client-Side AI Tool for Real-Time Phishing URL Detection |
PDF [Full Text]
|
RUPA SUSMITHA, SRI VARSHA K, VARSHI SRI SADA M, DAVID S, VIJAY KUMAR K |
102-105 |
Smart Detection of Deceptive Reviews Using Hybrid Machine Learning Techniques |
PDF [Full Text]
|
MONVITHA SAI, RELANGI NAGA LOHITHA, NAMALA PRANAV, BOKKA SRIVALLI, SUBRAMANIAN K.V. |
117-121 |
YOLOv5-Based System for American Sign Language Interpretation |
PDF [Full Text]
|
Rajni P, Jahnavi P, V.Krishnamraju Ch.S., Uma Mahesh S, Arun Kumar B. |
122-126 |
Enhancing Electric Bus Operations Through Predictive Machine Learning Models |
PDF [Full Text]
|
Divya Vani Naga Durga, Veera Lakshmi Surya Mani Jyothika K, Meghana Priyanka K, Sai Satvika N, SaiPriya V |
132-135 |
Autonomous Object Identification from Dynamic Visual Streams Using YOLOv8 |
PDF [Full Text]
|
CHAKRAVARTHI G, MANIKANTA VARMA BH.N., VENKATESH D, MANOHAR JOSHI J, Arun kumar B |
136-139 |
A SMART FARMING: INTELLIGENT CROP MANAGEMENT THROUGH MACHINE LEARNING |
PDF [Full Text]
|
POORNA NARASIMHA RAJESH CHINTALAPUDI, Rajasekharam G, SURYA NARAYANA GORLE |
140-144 |
Model-Based Cloud Surveillance for Enhanced Data Protection |
PDF [Full Text]
|
Sabitha Grace, Uha Ratna Sri, Jhansi Mary, Sai Ganesh Ch. P. N., Rama Krishna Raju M |
092-096 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â