Skip to content
Volume 24 Issue 5 2024
- Applying Machine Learning Techniques to Detect of Cyber Attacks
B. Neelima, A.Mohan Kumar Sai, G.Venu Babu, P.Sai Krishna, S.V.V Sai Kumar, SK.Abdulla
doi.org/20.14148/kkj/v24.4451
- SMART SHOES FOR BLIND PERSON
Kinnari Tavde, Prof. Vishakha Khambhati
doi.org/20.14148/kkj/v24.4452
- Utilizing Ledger and Block chain Technologies to fight digital fraud and fake Reality
A Vennela, A Jyoshna, B Radhika, M Deepika, R Mounika
doi.org/20.14148/kkj/v24.4453
- Android Malware Detection
K Santhi Rani, G Sai Kumari, G Sireesha, N. Naga Vyshnavi, T Meghana
doi.org/20.14148/kkj/v24.4454
- Imporving Security For The Data Stored In Decentralized Cloud Environment Using Cloud Computing
B.NEELIMA, D.YASWANTH SAI, G.SAI BHARATH, K.SURENDRA REDDY, N.SREEKANTH, P.MAHESH BABU
doi.org/20.14148/kkj/v24.4455
- Effect of wind and earthquake on buildings height
Khalid Masood, Md. Tasleem
doi.org/20.14148/kkj/v24.4456
- Effective Utilization of Road Space on the Selected Road Links of Ahmedabad City
Utsav Prajapati, Vijay J. Chitaria
doi.org/20.14148/kkj/v24.4457
- Analyzing And Minimizing The Influence Of Misinformation In Online Social Networks
E. Sai Kumar, M. Sai Srinivas, Sk. Subhani, Sk. Nazeer, T. Sundar, P. Ramana Babu
doi.org/20.14148/kkj/v24.4458
- BIPOLAR INTERVAL VALUED INTUITIONISTIC FUZZY NECESSITY OPERATOR
M.Suganya, A.Manonmani
doi.org/20.14148/kkj/v24.4459
- Generalized Skew Reverse Derivations in Semi Prime Rings
S.Lalitha, Dr.S.Sreenivasulu, Prof.A.Mallikarjuna Reddy
doi.org/20.14148/kkj/v24.4460