| Issue | Title | |
| Vol 2, No 1 (2025) | Modeling the Height Profile in Drop-on-Demand Printing of UV Curable Ink: Optimization and Precision Control | Abstract |
| Adeoye Ibrahim | ||
| Vol 2, No 2 (2025) | Online Fraud Detection: A Decision Tree Approach | Abstract |
| S. Shaankari, M. Aishwarya, B. Vaishnavi, Syeda Hifsa Naaz | ||
| Vol 3, No 1 (2026) | PromoGen: Advertisement Generation Website using LLM | Abstract |
| Rushikesh Bagul, Bhavin Waghela, Ashwin Mahawar, Biswajit Panda, Pravin Shinde Shinde | ||
| Vol 3, No 2 (2026) | Real-Time Phishing URL Detection Using Hybrid Machine Learning and Heuristic Analysis | Abstract |
| Ande Amshutha, Gajanan M Naik | ||
| Vol 3, No 1 (2026) | Remedy for Account Hacking, Login Credentials of all sectors after not using Accounts and Person’s Death | Abstract |
| Mr. Jitendra Sunte | ||
| Vol 1, No 2 (2024) | Review on Chatbot to Predict Heart Disease using Machine Learning Algorithms | Abstract |
| Prof. Tahir Naquash H B, Pheba Jorson, Ruqsana Khanum, Ruth Hepzibah, S Niveditha | ||
| Vol 3, No 1 (2026) | Road Guard: AI-Powered Road Damage Detection and Reporting System | Abstract |
| Fathima Faraiya, Rizwana Riyas, Fathima Raniya Shameer, Ayisha Naja P, Nikhil Dharman M K | ||
| Vol 2, No 3 (2025) | Secure Coding Analysis Tool | Abstract |
| Priyanka K, Narendran A V, Shanjaiy S B, Sivanesh M, Vasanthbalan A, Yokesh G | ||
| Vol 3, No 2 (2026) | Security Evolution and Threat Mitigation in LTE and Fifth-Generation Mobile Networks | Abstract |
| Sinchana G, Sneha G K | ||
| Vol 1, No 2 (2024) | Smart Healthcare: The Role of AI in Medical Systems Integration | Abstract |
| I.V. Dwaraka Srihith | ||
| Vol 2, No 2 (2025) | Smartphone Usage to Addiction-A Predictive Approach Using ML | Abstract |
| Khadeeja Khadeer, Kounain Sanaliya Khan, Muzra Fatima | ||
| Vol 1, No 3 (2024) | Surveillance Based Accident Detection and Alert Generation System | Abstract |
| Sidhu S. Kumar, Jyothish A, Harinarayanana S, Naveen Shah Huzain, Vivitha Vijay | ||
| Vol 1, No 2 (2024) | The Female Investor's Mind: Understanding Psychological Influences in Stock Market Participation | Abstract |
| T. Aditya Sai Srinivas, M. Bharathi, K. Teja Sri | ||
| Vol 1, No 3 (2024) | The Voice of Feeling: Exploring Emotions via Machine Learning | Abstract |
| I.V. Dwaraka Srihith, S. Ashok | ||
| Vol 2, No 2 (2025) | "Toward Secure IoT Infrastructure: Integrating Zero Trust, Federated Learning, and Dynamic Trust Management Models" | Abstract |
| Vamsi Krishna Kokku | ||
| Vol 1, No 2 (2024) | Trailblazing in Academia: The ORCID Effect on Research Integrity | Abstract |
| M. Bhuvaneswari, Syeda Hifsa Naaz | ||
| Vol 2, No 2 (2025) | URLs Threat Identification Dashboard | Abstract |
| S. Yaswanthraj, M. Adhithyan, T. Kowshik, N. Logha Surya, M. Mihaash Dharan | ||
| Vol 2, No 1 (2025) | VIOLENCE DETECTION IN REAL TIME FOR SURVEILLANCE | Abstract |
| Dayes Joseph, Ajay Chandran M, Akshay K, Aswathy K, Vijina P | ||
| Vol 2, No 3 (2025) | Website Phishing Detector | Abstract |
| Mrs Varshini J, Nidhiswar B, Ravikrishna L, Rohith S, Yashwanth Babu S | ||
| Vol 1, No 1 (2024) | Whaling Guard : Phishing Detection Using Machine Learning | Abstract |
| Adithyan M S, Harikrishnan K B, Aswani N K, Amal Soman, Krishnapriya V J | ||
| 26 - 45 of 45 Items | << < 1 2 | |