UI/UX Design for Online Learning Approach by Predictive Student Experience
KR Chaganti, US Ramula… - 2023 7th …, 2023 - ieeexplore.ieee.org
This study examines how an User Interface (UI) and User Experience (UX) design for online
learning/educational platforms can be designed in a way that can be fully effective for …
learning/educational platforms can be designed in a way that can be fully effective for …
[HTML][HTML] Nutritional Monitoring of Rhodena Lettuce via Neural Networks and Point Cloud Analysis
In traditional farming, fertilizers are often used without precision, resulting in unnecessary
expenses and potential damage to the environment. This study introduces a new method for …
expenses and potential damage to the environment. This study introduces a new method for …
Comparative Study of Machine Learning Algorithms for Fake Review Detection with Emphasis on SVM
P Naresh, SVN Pavan, AR Mohammed… - … and Smart Systems …, 2023 - ieeexplore.ieee.org
Online reviews have become an essential factor in consumer decision-making, with the
credibility and authenticity of such reviews being a major concern. Fake reviews, including …
credibility and authenticity of such reviews being a major concern. Fake reviews, including …
Vitamin Deficiency Detection Using Neural Networks
TK Chaithanya, J Gupta… - … Conference on Wireless …, 2024 - ieeexplore.ieee.org
Vitamin deficiency is a pervasive health issue affecting millions globally, often leading to
severe health complications if undiagnosed. Various vitamin deficiencies can be identified …
severe health complications if undiagnosed. Various vitamin deficiencies can be identified …
Deep Learning based Object Tracking and Detection for Autonomous Drones using YOLOv3
GN Leela, U Varun, M Uma, P Srinath… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Object detection plays a vital role in enabling drones to perceive and interact intelligently
with their surroundings. The process involves data collection, selecting appropriate deep …
with their surroundings. The process involves data collection, selecting appropriate deep …
Enhancing E-Government through Sentiment Analysis: A Dual Approach Using Text and Facial Expression Recognition
C Nagesh, B Divyasree, K Madhu… - 2024 International …, 2024 - ieeexplore.ieee.org
In the era of digital governance, understanding public sentiment towards governmental
initiatives is crucial for policy success and citizen engagement. This paper presents a novel …
initiatives is crucial for policy success and citizen engagement. This paper presents a novel …
COMPARATIVE ANALYSIS OF VIRTUAL MACHINE MIGRATION SYSTEMS IN CLOUD COMPUTING
RK Sanga, V Chaitanya, T Ramesh… - …, 2022 - search.proquest.com
Within large-scale cloud data centers (CDC), virtualization strategies are able to effectively
handle the ever-increasing demand for compute, storage, and communication resources. It …
handle the ever-increasing demand for compute, storage, and communication resources. It …
A Novel Machine Learning Approach for Person Identification and Validation using Digital Forensics Methods
UIDAI (Unique Identification Authority of India) fostered an Iris acknowledgment framework
to check both the uniqueness of the human iris and furthermore its presentation as a …
to check both the uniqueness of the human iris and furthermore its presentation as a …
[PDF][PDF] Deep Learning Based NLP and LSTM Models for Sentiment Classification of Consumer Tweets
KR Chaganti, S Chaganti - jespublication.mlsoft.in
The expanded use of virtual entertainment and online business sites is continually creating
a monstrous volume of information about picture/video, sound, text, and so on. The text …
a monstrous volume of information about picture/video, sound, text, and so on. The text …
[PDF][PDF] Novel Machine Learning Based Classification and Prediction Method for DDoS Attacks
R Sharanya, DLN Reddy, V NARAHARI - jnao-nu.com
Distributed network attacks, commonly known as Distributed Denial of Service (DDoS)
attacks, exploit specific vulnerabilities inherent in any networked asset, such as the …
attacks, exploit specific vulnerabilities inherent in any networked asset, such as the …