SI. No. | Title | Page No. |
1. | The Rise of Artificial Intelligence Transforming the Future of Technology and Society Ayesha -A- Daneen, V.J. Asfiya Tabasum | 1-4 |
2. | Traffic and Resource Congestion Control Mechanism for 6LoWPAN based IoT Infrastructure B. Revathi, Dr. K. Arulanandam | 5-23 |
3. | Cloud Tech: Evolution, Architecture, and Intelligent Advancements in Cloud Computing K.Vaidheeswari, S.Megana, S.Thirisha | 24-31 |
4. | AI-Driven Anomaly Detection in Healthcare EHR Systems: A Comparative Study of Supervised, Unsupervised, and Hybrid Models Dr. Sumathy Kingslin, R. Thasleem | 32-41 |
5. | Comparison of LSTM, Stacked LSTM, and CNN-BiLSTM Models for Aircraft RUL Forecasting Using NASA’s CMAPSS M. Silambarasi, R. Angelin Salana Sweety | 42-49 |
6. | A Critical Comparative Study of Fingerprint-Based Age Estimation Models Across Demographics and Modalities Dr. Sumathy Kingslin, D. Dhivya | 50-56 |
7. | Literature Review on Optimized Secure Routing Mechanisms Based on Trust in IoT K. Sangeetha, Dr. K.Arulanandam | 57-76 |
8. | Multi-Modal Deepfake Detection System Using Audio, Video and Image-Based Model Architecture B. Shobika, K. Eswari, Y. Santhoshini | 77-89 |
9. | Artificial Intelligence and Machine Learning in Cyber Security L.K. Dharshini, A. Lathika | 90-95 |
10. | Federated Learning for Collaborative Cyber Threat Detection Without Data Sharing S. Deepika, V. Nadhiya, V.Sharmila | 96-104 |
11. | AI-Powered Web Analytics for Detecting Accessibility Barriers for Differently-Abled Users M. Kamila Firdose, A. Fouziya | 105-111 |
12. | Graph Algorithms in Quantum Key Distribution: A Path Towards Secure Quantum Communication P. Joshva Premkumar, Dr.M. Maria Dominic | 112-122 |
13. | Big Data Analytics in Healthcare P. Azka Azfireen, D. Deepika, S. Aamina Sadiya | 123-130 |
14. | Cybersecurity in the Digital Age: Threats, Solutions, and the Way Forward T.M. Rayeesa Siddiqa, M. Hurera Fathima | 131-138 |
15. | Toward Secure IoT: Challenges, Threats, and Cryptographic Solutions A. Muneera Sadaf, S. Sandhiya, R. Sangeetha | 139-148 |
16. | Quantum Computing for Drug Discovery J. Jayadurga, R. Preetha | 149-154 |
17. | Cybersecurity in Satiot (Space-Based Internet of Things) H.M. Fathima Lubna, S. Shruthika, J. Pavithra | 155-163 |
18. | Mining Patterns on Social Media: An Exploration S. Frough Hurmath, P.Q. Mehak Mehazeen, A. Salma | 164-174 |
19. | Digital Security Monitoring in Closed-Circuit Video System P. Monisha | 175-179 |
20. | Emerging and Trends: Multimodal and Cross modal LLM. R. Mahalakshmi, G. Boomika, B. Keerthiga | 180-186 |
21. | Multi-Modal Representation Learning for Audio-Visual Scene Understanding A. Muzaina Fathima | 187-203 |
22. | Privacy-Preserving Big Data Analytics in Decentralized Environments: Leveraging Federated Learning and Differential Privacy S. Fabiha Kiran, D. Iffath, G.Sharmila | 204-211 |
23. | IoT-AI Integration for Real-Time Data Acquisition and Humidity Prediction Using CNN Dr. Sumathy Kingslin, K. Vaishnavi | 212-222 |
24. | Predictive Analytics for Students Dropout in Online Platform (MOOC) M. Malathi. J. Sandhiya.S. Santhana Lakshmi | 223-230 |
25. | Face Mask Detection using Deep Learning C. Ranjitha, J. Afeeya | 231-244 |
26. | Quantum Computing Aaiza Nihar, A.Rida Fathima | 245-249 |
27. | Advances in Robotic Process Automation (RPA) M. Anu Priya, K. Ayesha Sultana | 250-255 |
28. | Stacking Ensemble Approach for Leaf Disease Prediction Using CNN, SVM, and Random Forest: A Case Study on Lemon Leaf Dataset M. Baskar, Dr. A. Naveen | 256-267 |
29. | Transfer Learning in Deep Learning A. Ayisha Siddiqua, K. Saranya, R. Padmalatha | 268-275 |
30. | Vehicle-To-Vehicle (V2v) Communication for Collision Avoidance in Autonomous Vehicles R. Sangeetha, R. Nandhini | 276-284 |
31. | Privacy-Aware IoT Architectures: Securing Personal Data in Smart Environments with Limited Resources T. Kowsalya. S. Krithika | 285-291 |
32. | Design and Implementation of IoT-Based Smart Dustbin System for Efficient Waste Management D.A. Vasifa Taqdees | 292-303 |
33. | The Dual-Edged Nature of AI in Cybersecurity: Enhancing Security and New Threats A.Afrin, G.Lakshmi | 304-312 |
34. | Cost-Benefit Analysis for Automated V/S Manual Testing Process B.Junaid Ahmed | 313-320 |
35. | IoT Cyber Attacks P.A. Umeza Anam, | 321-329 |
36. | Computational Intelligence: Principles, Techniques, and Applications R.C. Nandhitha Devi, A. Dua Afreen | 330-334 |
37. | Storm Prediction and Mitigation Algorithm (SPMA) for Chennai’s Monsoon Climate B. Divya, S. Jasmine Samraj | 335-346 |