Published: 2024-01-25

DOI: https://doi.org/10.52783/jes.620
DOI: https://doi.org/10.52783/jes.621
DOI: https://doi.org/10.52783/jes.622
DOI: https://doi.org/10.52783/jes.623
DOI: https://doi.org/10.52783/jes.624
DOI: https://doi.org/10.52783/jes.625
DOI: https://doi.org/10.52783/jes.626
DOI: https://doi.org/10.52783/jes.627
DOI: https://doi.org/10.52783/jes.628
DOI: https://doi.org/10.52783/jes.629
DOI: https://doi.org/10.52783/jes.630
DOI: https://doi.org/10.52783/jes.631
DOI: https://doi.org/10.52783/jes.632
DOI: https://doi.org/10.52783/jes.634

Design Of Intelligent Countermeasure System for Power System Network Security Defense

Feilu Hang, Linjiang Xie, Zhenhong Zhang, Jian Hu (Author)

227-240

DOI: https://doi.org/10.52783/jes.635

Off-Road Terrain Identification And Analysis

Nagula Sai Sathvik, Pudi Manikanta, Kotha Sai Varshith, Pendli Bestha Sai Praneeth, Mohit Lalit, Mohit Angurala (Author)

241-253

DOI: https://doi.org/10.52783/jes.636

Blockchain-Backed Verification Systems for Enhanced Interoperability and Trust in Managing Legal Documents across Multi-Cloud Environments

Akula .V.S. Siva Rama Rao, Tulasi Kavarakuntla, Sunitha Kanipakam, Thejovathi Murari, Kalangi Praveen Kumar, Bakkala Santha Kumar (Author)

254-269

DOI: https://doi.org/10.52783/jes.637

Breast Cancer Classification and Predicting Class Labels Using ResNet50

T Sunil Kumar, Gujjeti Sridhar, D Manju, P Subhash, Gujjeti Nagaraju (Author)

270-278

DOI: https://doi.org/10.52783/jes.638

Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security

M Sri Lakshmi, G. Rajavikram, V Dattatreya, B. Swarna Jyothi, Shruti Patil, M Bhavsingh (Author)

279-297

DOI: https://doi.org/10.52783/jes.639

Automated Glaucoma Detection in Retinal Fundus Images Using Machine Learning Models

Nagaratna P Hegde, V.Sireesha, S.Vinay Kumar, Sathwika Madarapu, Sai Varshini Thupakula (Author)

298-314

DOI: https://doi.org/10.52783/jes.640

SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices

Srikanth Reddy Vutukuru, Srinivasa Chakravarthi Lade (Author)

315-335

DOI: https://doi.org/10.52783/jes.641

A Graph Neural Network-based Traffic Flow Prediction System with Enhanced Accuracy and Urban Efficiency

E.V.N.Jyothi, Goda Srinivasa Rao, D Sharada Mani, Ch Anusha, Macherla Harshini, M Bhavsingh, Addepalli Lavanya (Author)

336-349

DOI: https://doi.org/10.52783/jes.642

Enhancing Cloud Data Privacy with a Scalable Hybrid Approach: HE-DP-SMC

Jaibir Singh, A.MallaReddy, Vasavi Bande, A.Lakshmanarao, Goda Srinivasa Rao, K.Samunnisa (Author)

350-375

DOI: https://doi.org/10.52783/jes.643
DOI: https://doi.org/10.52783/jes.644
DOI: https://doi.org/10.52783/jes.645