PARTICULAR
|
Page No.
|
HANDWRITTEN TEXT RECOGNITION USING PYTESSERACT
Dr. K Soumya,Dharavathu Bhavana,Pasupulati Priyanka,Puppala Roshini,Saripalli Sri Lakshmi Manasa
Abstract:
Imagine being able to convert handwritten documents into digital text effortlessly. Handwritten Text Recognition (HTR) technology not only makes this possible but also opens up new avenues for data analysis, archiving, and accessibility.
Download full Length Paper......
|
1-7
|
Balancing Innovation and Transparency: A Comparative Analysis of Recent Advancements in Deep Learning Architectures and Interpretability Techniques
Vijay Panwar
Abstract:
This paper presents a comprehensive comparative analysis of the latest advancements in deep learning architectures and interpretability techniques, highlighting the dynamic interplay between technological innovation and the necessity for transparency in artificial intelligence (AI).
Download full Length Paper......
|
8-17
|
Most Significant Ethical Challenges Associated With AI Governance Kiran Sharma Panchangam Nivarthi
Abstract:
AI is radically transforming our economy and society in unprecedented ways and on an unprecedented scale. It may have an impact on humanity that's
comparable to the industrial revolution and the internet Download full Length Paper......
|
18-30
|
Leveraging Progressive Web Apps (PWAs) for Enhanced User Experience and Performance: A Comprehensive Analysis Vijay Panwar
Abstract:
In the rapidly evolving digital landscape, Progressive Web Apps (PWAs) emerge as a pivotal innovation, bridging the gap between
web and mobile applications by leveraging the latest web technologies to offer a seamless, high-performance user experience.
Download full Lenght Paper......
|
31-43
|
Data Privacy and Data Governance in AI Solutions: Frameworks, Strategies, and Tools Shaila Amelia Lobo
Abstract:
In the contemporary era of data reliance, ensuring the privacy and governance of data within artificial intelligence solutions is crucial.
Download full Length Paper......
|
44-52
|
ZERO TRUST-BASED SECURE CREDENTIAL PHISHING DETECTION FRAMEWORK USING Ellsigm-GRU Rajender Reddy Pell Reddy
Abstract:
The practice of stealing one’s personal information via a known person or entity in email and any other communication channels is named Credential Phishing (CP).
Download full Length Paper......
|
53-64
|
A GREY WOLF OPTIMIZATION-BASED FEED-FORWARD NEURAL NETWORK FOR DETECTING INTRUSIONS IN INDUSTRIAL IOT Ajay Chandra MK
Abstract:
The rapid development of the Internet of Things (IoT) system can be attributed to the industrial sector's utilization of cloud-based technology and the Internet. Download full Length Paper......
|
65-91
|
DEVELOPMENT OF AUDIT CONTROL OF EXPENSES IN PENSION FUNDS OF UZBEKISTAN TAKEN INTO ACCOUNT OF THE EXPERIENCE OF ADVANCED COUNTRIES OF THE WORLD
Nurmanov Din-Ahmed Tileubaevich
|
92-103
|
Impacts of Cloud Computing in India on E-Commerce Business
Dr. Raj Sinha,Harsh Chandrikapure
|
104-114
|
SKY COMPUTING : A NEW PARADIGM IN CLOUD COMPUTING
Dr. Raj Sinha, Ravinder Singh Rawat
Abstract:
A specific development in computer science and technology has been gaining ground quickly: Sky Computing. I set out on a quest to understand the complexities of this cutting-
edge paradigm as a B Tech CSE student.
Download full Length Paper......
|
115-131
|
A framework for Labor Market Analysis using Machine Learning
Kumar Shanu
Dr. Raj Sinha
|
132-146
|
AI-Driven Global Product Launch Optimization Platform with Data-Driven Insights and Streamlined Project Management
Royana Anand
Abstract:
The complexity of launching products on a global scale requires advanced strategies to ensure market success and operational efficiency.
Download full Length Paper......
|
147-165
|