Skip to main content


Emperor Journal of Applied Scientific Research [EJASR]

About the book

Description

CONTENTS

SI. No.

Title

Page No.

1.

The Rise of Artificial Intelligence Transforming the Future of Technology and Society  

Ayesha -A- Daneen, V.J. Asfiya Tabasum

1-4

2.

Traffic and Resource Congestion Control Mechanism for 6LoWPAN based IoT Infrastructure 

B. Revathi, Dr. K. Arulanandam

5-23

3.

Cloud Tech: Evolution, Architecture, and Intelligent Advancements in Cloud Computing

K.Vaidheeswari, S.Megana, S.Thirisha

24-31

4.

AI-Driven Anomaly Detection in Healthcare EHR Systems: A Comparative Study of Supervised, Unsupervised, and Hybrid Models

Dr. Sumathy Kingslin, R. Thasleem

32-41

5.

Comparison of LSTM, Stacked LSTM, and CNN-BiLSTM Models for Aircraft RUL Forecasting Using NASA’s CMAPSS  

M. Silambarasi, R. Angelin Salana Sweety

42-49

6.

A Critical Comparative Study of Fingerprint-Based Age Estimation Models Across Demographics and Modalities

Dr. Sumathy Kingslin, D. Dhivya

50-56

7.

Literature Review on Optimized Secure Routing Mechanisms Based on Trust in IoT

K. Sangeetha, Dr. K.Arulanandam

57-76

8.

Multi-Modal Deepfake Detection System Using Audio, Video and Image-Based Model Architecture

B. Shobika, K. Eswari, Y. Santhoshini

77-89

9.

Artificial Intelligence and Machine Learning in Cyber Security

L.K. Dharshini, A. Lathika

90-95

10.

Federated Learning for Collaborative Cyber Threat Detection Without Data Sharing

S. Deepika, V. Nadhiya, V.Sharmila

96-104

11.

AI-Powered Web Analytics for Detecting Accessibility Barriers for Differently-Abled Users

M. Kamila Firdose, A. Fouziya

105-111

12.

Graph Algorithms in Quantum Key Distribution: A Path Towards Secure Quantum Communication 

P. Joshva Premkumar, Dr.M. Maria Dominic 

112-122

13.

Big Data Analytics in Healthcare

P. Azka Azfireen, D. Deepika, S. Aamina Sadiya

123-130

14.

Cybersecurity in the Digital Age: Threats, Solutions, and the Way Forward

T.M. Rayeesa Siddiqa, M. Hurera Fathima

131-138

15.

Toward Secure IoT: Challenges, Threats, and Cryptographic Solutions  

A. Muneera Sadaf, S. Sandhiya, R. Sangeetha

139-148

16.

Quantum Computing for Drug Discovery

J. Jayadurga, R. Preetha

149-154

17.

Cybersecurity in Satiot (Space-Based Internet of Things)

H.M. Fathima Lubna, S. Shruthika, J. Pavithra

155-163

18.

Mining Patterns on Social Media: An Exploration

S. Frough Hurmath, P.Q. Mehak Mehazeen, A. Salma

164-174

19.

Digital Security Monitoring in Closed-Circuit Video System

P. Monisha

175-179

20.

Emerging and Trends: Multimodal and Cross modal LLM.

R. Mahalakshmi, G. Boomika, B. Keerthiga

180-186

21.

Multi-Modal Representation Learning for Audio-Visual Scene Understanding

A. Muzaina Fathima 

187-203

22.

Privacy-Preserving Big Data Analytics in Decentralized Environments: Leveraging Federated Learning and Differential Privacy

S. Fabiha Kiran, D. Iffath, G.Sharmila 

204-211

23.

IoT-AI Integration for Real-Time Data Acquisition and Humidity Prediction Using CNN

Dr. Sumathy Kingslin, K. Vaishnavi

212-222

24.

Predictive Analytics for Students Dropout in Online Platform (MOOC)

M. Malathi. J. Sandhiya.S. Santhana Lakshmi

223-230

25.

Face Mask Detection using Deep Learning

C. Ranjitha, J. Afeeya

231-244

26.

Quantum Computing

Aaiza Nihar, A.Rida Fathima 

245-249

27.

Advances in Robotic Process Automation (RPA)

M. Anu Priya, K. Ayesha Sultana

 

250-255

 

28.

Stacking Ensemble Approach for Leaf Disease Prediction Using CNN, SVM, and Random Forest: A Case Study on Lemon Leaf Dataset

M. Baskar, Dr. A. Naveen

 

     256-267

29.

Transfer Learning in Deep Learning

A. Ayisha Siddiqua, K. Saranya, R. Padmalatha

268-275

30.

Vehicle-To-Vehicle (V2v) Communication for Collision Avoidance in Autonomous Vehicles 

R. Sangeetha, R. Nandhini

276-284

31.

Privacy-Aware IoT Architectures: Securing Personal Data in Smart Environments with Limited Resources

T. Kowsalya. S. Krithika

285-291

32.

Design and Implementation of IoT-Based Smart Dustbin System for Efficient Waste Management 

D.A. Vasifa Taqdees

292-303

33.

The Dual-Edged Nature of AI in Cybersecurity: Enhancing Security and New Threats 

A.Afrin, G.Lakshmi

304-312

34.

Cost-Benefit Analysis for Automated V/S Manual Testing Process 

B.Junaid Ahmed

313-320

35.

IoT Cyber Attacks

P.A. Umeza Anam,

321-329

36.

Computational IntelligencePrinciplesTechniques, and Applications

R.C. Nandhitha Devi, A. Dua Afreen

 

330-334

37.

Storm Prediction and Mitigation Algorithm (SPMA) for Chennai’s Monsoon Climate

B. Divya, S. Jasmine Samraj

335-346

 

Details

ISBN

ISSN: 2581-964X

E-ISBN

ISSN: 2581-964X

Imprint

Mayas Publication

Language

English

Subject

Science

Published

2025

Copyright

Copyright © 2025 Mayas Publication

Publishing Limited. All rights reserved.

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Download

Author

Mrs.R. Swathi Assistant Professor & Head Department of Computer Applications Sree Abiraami Arts and Science College for Women Keelalathur, Gudiyattam-635803.

Recent Books

Emperor Journal of Applied…
2025
Modern Approach of Cloud Computing
2025
Operating System
2025
Bio Inspired Algorithms -A Primer
2025
The Gift of Difference…
2025