Search Results - "Dodda, Ratnam"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control by Kumar, P. Kiran, Raghavendra, C., Dodda, Ratnam, Shahebaaz, Ahmed

    Published in E3S web of conferences (01-01-2024)
    “…In this paper we introduce a recent and evolved two-factor authentication (2FA) access govern system specially designed for webbased cloud computing services…”
    Get full text
    Journal Article
  2. 2

    Notes Application using Android Studio and Cloud-based Data Management by Dodda, Ratnam, Yanala, Maneesh Reddy, Pavishetti, Srija

    “…In today's rapidly advancing technological land-scape, the widespread adoption of mobile applications has become a defining feature of our digital age. This…”
    Get full text
    Conference Proceeding
  3. 3

    Transformative Advancements: Sign Language Conversion to Text and Speech by Reddy, S Balakrishna, Shahebaaz, Ahmed, Dodda, Ratnam, Raghavendra, C.

    “…The integration of sign language conversion to text and speech represents a transformative technological advancement that serves as a bridge between the deaf…”
    Get full text
    Conference Proceeding
  4. 4

    NLP-Driven Strategies for Effective Email Spam Detection: A Performance Evaluation by Dodda, Ratnam, Maddhi, Sunitha, Thuraab, Mohammed Salman, Reddy, Adapala Nishikanth, Chandra, Avadanula Sai Mohan

    “…In the digital age, spam emails have emerged as a persistent and pervasive nuisance, inundating our inboxes and bringing with them an array of potential…”
    Get full text
    Conference Proceeding
  5. 5

    Performance Analysis of Various Machine Learning Techniques for Classifying Topic Categories from Text News Articles by Dodda, Ratnam, Shahebaaz, Ahmed, Ali, Mohd Miskeen, Mohammed, Zeeshan Ahmed

    “…Text classification has gained significant importance in recent years, especially for document classification based on content. Documents typically contain…”
    Get full text
    Conference Proceeding
  6. 6

    Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts by Maddhi, Sunitha, Dodda, Ratnam, Layaraj, T., Raghavendra, C.

    “…Log data is a critical asset for security professionals, yet it is vulnerable to misuse and unauthorized access. Attackers often seek to erase or alter…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    Automated Plant Disease Detection and Prevention Using Raspberry Pi and CNN Algorithm by Dodda, Ratnam, Maddhi, Sunitha, Ambika, K., G, Sravan Kumar, Neelima, Kotoju, Rani, Marri Sandya

    “…This paper presents a framework leveraging Raspberry Pi for the detection and prevention of plant diseases, employing a Convolutional Neural Network (CNN)…”
    Get full text
    Conference Proceeding