A HOLISTIC STRATEGY FOR PREDICTING AND ELEVATING
GOOGLE PLAY APP RATINGS TO OPTIMAL LEVELS
Authors: NAGA SIVA JYOTHI KOMPALLI ,P.SHANTHI ,TANDLE RAMANI ,RAVVA NAGASAI SANTOSH ,TUNIKI SAITEJA
DOI: 10.48047/IJIEMR/V13/ISSUE 05/01
|
1-8 |
Download |
FORECASTING BITCOIN PRICE CHANGES WITH MACHINE
LEARNING
Authors: Naga Siva Jyothi Kompalli,kondala anusha ,Medipally Vinay ,Komma Shivani
DOI: 10.48047/IJIEMR/V13/ISSUE 05/02
|
9-17 |
Download |
IMPLEMENTATION OF BLOCKCHAIN POWERED CHARITY
APPLICATION USING SOLIDITY
Authors: Naga Siva Jyothi Kompalli , Punna Mahesh Kumar, Thirumani Vijithendra,Kudala Saketh ,Vaddepally Sai Kartheek Teja
DOI: 10.48047/IJIEMR/V13/ISSUE 05/03
|
18-28 |
Download |
DEEP LEARNING BASED DIGITAL MEDIA DESIGN ENHANCEMENT
MECHANISM
Authors: S. Maruthi, Naga Siva Jyothi Kompalli, Ummadi Ajay, Seepelll Adithya, Duvva Yashwanth
DOI: 10.48047/IJIEMR/V13/ISSUE 05/04
|
29-36 |
Download |
An Effective way to Utilize the Drowsiness Detection System
Using Facial Landmark Analysis and Real-Time Video
Processing
Authors: Seggyam Abhinav Ram, P.L. Manjunath, Adarsh Kondoju, Dr. K.C. Sreedhar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/05
|
36-47 |
Download |
Evolution of Remote Device Security System: From Remote IoT
Device to Cloud
Authors: Nitu Sharma, Dr. Ramesh Vishwakarma
DOI: 10.48047/IJIEMR/V13/ISSUE 05/06
|
48-51 |
Download |
REAL-TIME OBJECT DETECTION USING DEEP LEARNING FOR
VIDEO STREAMS
Authors: Devasani Aakash , Polasi Vineeth, Suryavamshi Haripal ,MS P.HARITHA
DOI: 10.48047/IJIEMR/V13/ISSUE 05/07
|
52-60 |
Download |
DESIGN AND DEPLOYMENT OF SMART CONTRACT FOR
CROWDFUNDING
Authors: Naga Siva Jyothi Kompalli ,Karre Harshavardhan ,Mandava Durgaprasad, Bandaru Raju
DOI: 10.48047/IJIEMR/V13/ISSUE 05/08
|
61-67 |
Download |
AN IMPROVED COST-SENSITIVE PAYMENT CARD FRAUD DETECTION BASED
ON DYNAMIC RANDOM FOREST AND K-NEAREST NEIGHBOURS
Authors: Dr Ali Mirza Mahmood , Borra Loknath
DOI: 10.48047/IJIEMR/V13/ISSUE 05/09
|
68-94 |
Download |
A Deep Learning Framework for Content Based Image
Retrieval using Enhanced InceptionV3
Authors: Vignesh Thati, Rohan Yadav Kothapally, Sri Phani Kumar, V Satheesh Kumar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/10
|
95-102 |
Download |
ENHANCING PATIENT CARE THROUGH COMPREHENSIVE
MEDICAL HISTORY MANAGEMENT AND PREDICTIVE ANALYTIC
Authors: Poudala Akshith,Bahoju Bhanu Prakash,Padala Sougandh
DOI: 10.48047/IJIEMR/V13/ISSUE 05/11
|
103-106 |
Download |
Voice Disorder Classification using Convolutional Neural Network
Based on Deep Transfer Learning
Authors: KURRI DURGA PRASAD, SAMALA MANIKESH REDDY, MASTAN VALI
DOI: 10.48047/IJIEMR/V13/ISSUE 05/12
|
107-119 |
Download |
DETECTION OF CARDIOVASCULAR DISEASES IN ECG IMAGES
USING MACHINE LEARNING AND DEEP LEARNING METHODS
Authors: Mekala Varsha Reddy, Settipalli Varsha Deepika, Dr.CH Niranjan Kumar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/13
|
120-134 |
Download |
Confidentiality Preserve Health Check Behavior System Through
Nondeterministic Predetermined Automaton
Authors: Balli.Saketh, Ch.Siddhartha, S.Sai Teja, K.C.Sreedhar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/14
|
135-141 |
Download |
SEMI-SUPERVISED K-MEANS DDOS DETECTION METHOD
USING HYBRID FEATURE SELECTION ALGORITHM
Authors: V. Vinay Sai darshan, K. Sahith, P. Praneeth, G. Yogesh
DOI: 10.48047/IJIEMR/V13/ISSUE 05/15
|
142-152 |
Download |
Forensics Activity Logger for Mobile Devices
Authors: K.Hitesh sai, K.prajvala, S. Indu, K. SPANDANA
DOI: 10.48047/IJIEMR/V13/ISSUE 05/16
|
153-163 |
Download |
NETWORK INTRUSION DETECTION USING SUPERVISED
MACHINE LEARNING TECHNIQUE WITH FEATURE SELECTION
Authors: V. Varshini, T. Harshitha Reddy, V. Jahnavi, B. Vyshali
DOI: 10.48047/IJIEMR/V13/ISSUE 05/17
|
164-175 |
Download |
DEEP FAKE IMAGES AND VIDEOS DETECTION USING DEEP
LEARNING TECHNIQUES
Authors: D. Sathwik, B. Sahith Reddy, A. Chandrashekar, Duba Sriveni
DOI: 10.48047/IJIEMR/V13/ISSUE 05/18
|
176-184 |
Download |
ELECTRICITY THEFT DETECTION IN POWER GRIDS WITH DEEP
LEARNING AND RANDOM FORESTs
Authors: A. Yeshwanth Reddy, J. Shiva Reddy, Baddam Sricharan Reddy, Maddela Yellamma
DOI: 10.48047/IJIEMR/V13/ISSUE 05/19
|
185-193 |
Download |
AN EXPERIMENTAL STUDY ON SELF HEALING CONCRETE
Authors: Esampelly Balakrishna, Thangarala Pranay Kumar ,Teegala Vijay Kumar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/20
|
194-202 |
Download |
Study on Construction Safety and Technology of Civil Engineering in High-Rise
Building
Authors: Mohammed Yakub Ali , Teegala Vijay Kumar ,Kranthi Kumar Kuchana
DOI: 10.48047/IJIEMR/V13/ISSUE 05/21
|
203-206 |
Download |
MUSIC RECOMMENDATION BASED ON FACIAL
EXPRESSION RECOGNITION
Authors: MOHAMMED MUSHARRAF KHAN, JIDGE SAIMANI, VAVILALA KOUSHIK, DR ARUNA VARANASI
DOI: 10.48047/IJIEMR/V13/ISSUE 05/22
|
207-216 |
Download |
ADVANCED COMPUTER VISION SYSTEM FOR ENHANCED
PAN CARD SECURITY
Authors: Mrs. B. Vasundhara Devi, Rishik Goud Thallapally, Ane Dheepak Vanam Tanusha
DOI: 10.48047/IJIEMR/V13/ISSUE 05/23
|
217-226 |
Download |
Stock Market Trend Prediction Using K-Nearest Neighbor (KNN)
Algorithm
Authors: A. Siddartha Reddy,M. Praneeth,K. Praneeth Reddy,Amedapu Srinivas Reddy
DOI: 10.48047/IJIEMR/V13/ISSUE 05/24
|
227-233 |
Download |
ELECTRICITY THEFT DETECTION IN POWER GRIDS
WITH DEEP LEARNING AND RANDOM FORESTs
Authors: A. Yeshwanth Reddy,Baddam Sricharan Reddy,J. Shiva Reddy,Maddela Yellamma
DOI: 10.48047/IJIEMR/V13/ISSUE 05/25
|
234-242 |
Download |
MOTION ACTIVATED VIRTUAL CURSOR WITH VOICE ASSITANT
Authors: Gade Anish Reddy ,Bonthala Suraj , Aaron, P Deepa
DOI: 10.48047/IJIEMR/V13/ISSUE 05/26
|
243-250 |
Download |
TRANSFORMATIVE ADVANCES IN ROAD SAFETY: AUTOMATIC
VEHICLE ACCIDENT DETECTION USING MACHINE LEARNING
Authors: Mekala srinivas,Dr.Rohita Y,Addagatla Varun, Pandala kaushik
DOI: 10.48047/IJIEMR/V13/ISSUE 05/27
|
251-261 |
Download |
Automated Android Malware Detection Using Optimal Ensemble
Learning Approach for Cybersecurity
Authors: S.Shasank,Srikanth N,G.Indra sena Reddy,Dr.G Thirupathi
DOI: 10.48047/IJIEMR/V13/ISSUE 05/28
|
262-270 |
Download |
Image Forgery Detection Based on Fusion of Lightweight Deep
Learning Models
Authors: Koppula Umarani , D Deepthi
DOI: 10.48047/IJIEMR/V13/ISSUE 05/29
|
271-280 |
Download |
Deep Learning Approach for Shrewd Intrusion Detection System
Authors: Dr. Putti. Srinivasa Rao, Chittimalla Mithun Kumar, Suryadevara Anusha, Komati Pooja, Kashi Reddy Akshitha
DOI: 10.48047/IJIEMR/V13/ISSUE 05/30
|
281-290 |
Download |
पुस्तकालय ोंमेंछात् ोंके व्यवहार की जानकारी प्राप्त का अध्ययन
Authors: ववन द व ोंह,डॉ. देबदा मोंडल
DOI: 10.48047/IJIEMR/V13/ISSUE 05/31
|
291-303 |
Download |
HUMAN COMPUTER INTERACTION IN EVERYDAY LIFE BY
USING DEEP LEARNINIG
Authors: Prof. Ritesh Deshmukh,Gayatri Gadekar ,Sujal Ghayal,Sakshi Khandare ,Rohit Kolse Mayuri Jadhao,Sakshi Thorat
DOI: 10.48047/IJIEMR/V13/ISSUE 05/32
|
304-310 |
Download |
Final Paper on “Analyzing and Implementing Traffic Safety Measures for
Accident Reduction on the Samruddhi Expressway: A Comprehensive
Study”.
Authors: Prof. Pranay. P. Deogade, Vaibhav S. Deshmukh, Abhishek K. Bhoyar, Santosh G. Kandale, Prathamesh V. Kinhikar, Jay S. Bhoyar, Prashant S. Mandade
DOI: 10.48047/IJIEMR/V13/ISSUE 05/33
|
311-319 |
Download |
Final Paper on “Analyzing and Implementing Traffic Safety Measures for
Accident Reduction on the Samruddhi Expressway: A Comprehensive
Study”.
Authors: Prof. Pranay. P. Deogade, Vaibhav S. Deshmukh, Abhishek K. Bhoyar, Santosh G. Kandale, Prathamesh V. Kinhikar, Jay S. Bhoyar, Prashant S. Mandade
DOI: 10.48047/IJIEMR/V13/ISSUE 05/34
|
320-327 |
Download |
"Optimization of Drug Delivery Systems: Enhancing Efficacy
and Patient Compliance"
Authors: Kaushik Saini , Dr. Vijaysinh Uttamrao Sable
DOI: 10.48047/IJIEMR/V13/ISSUE 05/35
|
328-336 |
Download |
"Advancements in Glaucoma Surgical Techniques: A
Comprehensive Overview"
Authors: Akash Kumar , Dr. Vijaysinh Uttamrao Sable
DOI: 10.48047/IJIEMR/V13/ISSUE 05/36
|
337-345 |
Download |
“An Analytical study on the Fish and Animals dangerous to
due substantial Metals”
Authors: Dhruv Kishor Vishwakarma , Dr. Vijaysinh Uttamrao Sable
DOI: 10.48047/IJIEMR/V13/ISSUE 05/37
|
346-362 |
Download |
DEEP LEARNING BASED AI VIRTUAL MOUSE SYSTEM
Authors: SUNIL BHUTADA,M.SREENIVAS, ROHITA.Y, SAHANA.M
DOI: 10.48047/IJIEMR/V13/ISSUE 05/38
|
363-373 |
Download |
VISUALIZING DESCRIPTIONS TEXT TO IMAGE
GENERATION USING AI
Authors: M.Sudhakar, harshith Reddy Pasham , eldi Srinivas Phani Kumar , pallapu Sandhya, vaddeman Gayathri Soumya
DOI: 10.48047/IJIEMR/V13/ISSUE 05/39
|
374-382 |
Download |
AN EFFECTIVE PREDICTIVE MODEL FOR OCULAR MELANOMA
DETECTION USINGDEEP LEARNING APPROACH
Authors: SELVI S , SHALOME A , CHANDRU D
DOI: 10.48047/IJIEMR/V13/ISSUE 05/40
|
383-388 |
Download |
ACCESS TO THE UNKNOWN VEHICLE INTO THE
APARTMENT THROUGH THE AUTOMATIC PASSWORD
GENERATOR
Authors: Mrs. P. VIJAYA LAKSHMI, KUNDURU ACHYUTH REDDY, KOTHA YAMINI REDDY, PRABHALA AKASH, NANAM BHAGYA SHREE
DOI: 10.48047/IJIEMR/V13/ISSUE 05/41
|
389-401 |
Download |
EMPLOYING BLOCKCHAIN TECHNOLOGY TO STRENGTHEN
SECURITY OF WIRELESS SENSOR NETWORKS
Authors: MR. MAHESH BABU CHERUKURI, KANDHALA ANANTH PAL REDDY, TIRUVEEDULA BADRINATH, SURAKANTI KAVYA REDDY, BIRADAR SWETHA
DOI: 10.48047/IJIEMR/V13/ISSUE 05/42
|
402-412 |
Download |
FLOOD PREDICTION USING MACHINE LEARNING
Authors: Sumanta Saha, GONGADA NAGARAJU
DOI: 10.48047/IJIEMR/V13/ISSUE 05/43
|
413-421 |
Download |
Deep Learning Approach for Shrewd Intrusion Detection
System
Authors: Dr. Putti. Srinivasa Rao, Chittimalla Mithun Kumar, Suryadevara Anusha, . Komati Pooja, Kashi Reddy Akshitha
DOI: 10.48047/IJIEMR/V13/ISSUE 05/44
|
422-431 |
Download |
Design of Low Power Voltage Level Shifter for IoT Applications
Authors: R. Praveen,Mrs.B.Hemalatha
DOI: 10.48047/IJIEMR/V13/ISSUE 05/45
|
432-440 |
Download |
DESIGN OF DEEP LEARNING MODELS FOR THE IDENTIFICATION
OF HARMFUL ATTACK ACTIVITIES IN IIOT
Authors: M.Sudhakar, Mohammed Abdul Kaif Ali, Thirumani manasa, bujji Asmitha, M Yogesh
DOI: 10.48047/IJIEMR/V13/ISSUE 05/47
|
449-456 |
Download |
Role of Artificial Intelligence in Everyday Life
Authors: Santhosh Chitraju, Gopal Varma
DOI: 10.48047/IJIEMR/V13/ISSUE 05/48
|
457-473 |
Download |
CYBERSECURITY CHALLENGES IN E-COMMERCE
TRANSACTIONS
Authors: TVL kedareshwari, Dr M Chandra Sekhar Reddy
DOI: 10.48047/IJIEMR/V13/ISSUE 05/49
|
474-481 |
Download |
SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED
ON MULTIPLE AUTHENTICATION AND LIGHTWEIGHT
CRYPTOGRAPHY
Authors: Mrs. B Mahalakshmi, Dhanwada Anisha, Deekonda Aravind, Nakka Shreya, Katikam Umesh Reddy
DOI: 10.48047/IJIEMR/V13/ISSUE 05/50
|
482-491 |
Download |
Article 21 and Constitutional validity of Right to Die
Authors: RIYA SINHA (LLB, LLM.), DR. DHARM PAL KHATRI
DOI: 10.48047/IJIEMR/V13/ISSUE 05/51
|
492-498 |
Download |
PREVALENCE OF DEPRESSION IN TYPE 2 DIABETES: A METAANALYSIS PERSPECTIVE
Authors: Vishnu Bhat, Dr. Ravindra Rohidas Patil
DOI: 10.48047/IJIEMR/V13/ISSUE 05/52
|
499-503 |
Download |
Beyond the Breach: Building Trust through Integrated
Security and Customer Relationship Management
Authors: Sukender Reddy Mallreddy, ShivaDutt Jangampeta, Jaipal Reddy Padamati
DOI: 10.48047/IJIEMR/V13/ISSUE 05/53
|
504-512 |
Download |
ANALYSIS AND ENHANCEMENT OF CLOUD SECURITY
PROTOCOLS FOR DATA STORAGE
Authors: Ashwani Kumar, Dr. Rajeev Yadav
DOI: 10.48047/IJIEMR/V13/ISSUE 05/54
|
513-518 |
Download |
A DECADE OF RESEARCH ON DEVICES AND CYBER ARCHITECTURES FOR
IOT SECURITY
Authors: Tanishaq , Dr. Rishi Kumar Sharma, Gaurav Kumar, Nikita jatav
DOI: 10.48047/IJIEMR/V13/ISSUE 05/55
|
519-523 |
Download |
Calories Burnt Prediction System Using Machine
Learning: A Survey
Authors: Vaishnavi Chaudhary, Mukesh Kumar Tiwari, Dr. Rishi Kumar Sharma, Nitika Saini, Varnika Mittal
DOI: 10.48047/IJIEMR/V13/ISSUE 05/56
|
524-526 |
Download |
CLOUD ROBOTICS: CURRENT SECURITY STATUS AND DEVICE
AUTHENTICATION ON THE REMOTE LOCATION
Authors: Dr. Rishi Kumar Sharma , Dr.Daya Shankar Pandey, Dr Bharti chourasia,Dr Dinesh Sahu
DOI: 10.48047/IJIEMR/V13/ISSUE 05/57
|
527-530 |
Download |
Exploring Machine Learning for Depression Detection: A Systematic Review
and Analysis
Authors: Rajesh Saxena1 , Dr. Ashish Saini2 ,Dr. Rishi Kumar Sharma3
DOI: 10.48047/IJIEMR/V13/ISSUE 05/58
|
531-545 |
Download |
Image Detection And Processing For Wireless Surveillance Camera
Using Cloud Heritage Technique And Network Security
Authors: Somyadeep,Dr. Rishi Kumar Sharma ,Deepak Saini
DOI: 10.48047/IJIEMR/V13/ISSUE 05/59
|
546-551 |
Download |
Mental Health Solutions with AI: Benefits, Implications and Limitations
Authors: Tanuj Garg, d Zaki Neyaz, Rohit Rawat, Dr. Rishi Kumar Sharma
DOI: 10.48047/IJIEMR/V13/ISSUE 05/60
|
552-557 |
Download |
ROLE OF BIOMETRICS SYSTEM FOR CYBERSECURITY SURVEILLANCE
Authors: Sakshi Dubey, Dr. Rishi Kumar Sharma, Bhanu Partap, Deepak Saini
DOI: 10.48047/IJIEMR/V13/ISSUE 05/61
|
558-562 |
Download |
Sentiment Analysis Based on Customer Reviews System on Restaurants
Authors: Arya Badal Singh,Dr. Rishi Kumar Sharma ,Dr. Ashish Saini
DOI: 10.48047/IJIEMR/V13/ISSUE 05/62
|
563-568 |
Download |
ANALYZING THE HEALTH EFFECTS OF PACKAGED FOOD SAUCES THROUGH
AI-POWERED NUTRITIONAL SCORING
Authors: T. Kusuma , Dr Vijaykumar Varadarajan
DOI: 10.48047/IJIEMR/V13/ISSUE 05/63
|
569-582 |
Download |
Electrochemical Sensors for Blood Glucose Measurement
Authors: Kollipara Kanaka Mahalakshmi
DOI: 10.48047/IJIEMR/V13/ISSUE 05/64
|
583-592 |
Download |
CORRELATION STUDIES ON DYNAMICS OF SOIL CARBON FRACTIONS
UNDER INM PRACTICES IN MAIZE-GROUNDNUT CROPPING SEQUENCE
IN RED-ALLUVIAL SOILS OF ANDHRA PRADESH
Authors: PRABHAVATHI N. RATNA PRASAD P, NAGA MADHURI K. V, HEMALATHA S, LAVANYA KUMARI P , RAVEENDRA REDDY. M
DOI: 10.48047/IJIEMR/V13/ISSUE 05/65
|
593-604 |
Download |
ANALYSIS ON USAGE OF SARCASM INCREASING DAY BY DAY
Authors: RANGANATH KANAKAM , B. KRANTHI KIRAN
DOI: 10.48047/IJIEMR/V13/ISSUE 05/66
|
605-615 |
Download |
EXAMINE THE VIVID IMAGERY AND SYMBOLISM EMPLOYED BY
OWEN IN HIS POEMS
Authors: Dr. Supriya Paithankar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/67
|
616-620 |
Download |
ASSESSING THE INFLUENCE OF SEWAGE WATER OBTAINED FROM STP OF
PATNA ON BEHAVIOUR AND BODY WEIGHT OF CATLA CATLA
Authors: Dr. Akhilesh Kumar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/68
|
621-631 |
Download |
ROLE OF INFORMATION AND COMMUNICATION TECHNOLOGY FOR
EDUCATION IN RURAL SCHOOL IN M.P
Authors: Deepti Ashok Gound
DOI: 10.48047/IJIEMR/V13/ISSUE 05/69
|
632-643 |
Download |
INVISIBLESHIELD: ADVANCED FILE PROTECTION THROUGH
MULTI-IMAGE STEGANOGRAPHY
Authors: M. Venkatesh, M. Nikhilkunar, V. Abhinav , P. Sandeep , J. Siddhu
DOI: 10.48047/IJIEMR/V13/ISSUE 05/70
|
644-651 |
Download |
Smart Network Monitoring: Improving IoT Device Classification for
Enhanced Security and Resource Optimization
Authors: Dr. A. Yashwanth Reddy , K. Thanmayi , G. Sindhu Bhargavi, Md. Fazalulla , K. Pavan Kumar
DOI: 10.48047/IJIEMR/V13/ISSUE 05/71
|
652 -660 |
Download |
Transforming Hop Farming: Innovations in Crop Classification for
Sustainable Agriculture and Brewing Industry Quality
Authors: Dr. A. Yashwanth Reddy, B. Sowmya , D. Umesh Chandra , A. Akhila , A. Architha
DOI: 10.48047/IJIEMR/V13/ISSUE 05/72
|
661-670 |
Download |
Advancing Robotic Navigation: AI-driven Surface Identification for
Precision and Context-Aware Actions
Authors: Sundeep Kumar , V. Dhanusri, Md. Fareed , B. Sai Nithin , I. Jeyanth
DOI: 10.48047/IJIEMR/V13/ISSUE 05/73
|
671-679 |
Download |
ARTIFICIAL INTELLIGENCE-BASED HELMET DETECTION FOR
TRAFFIC CHALLAN SYSTEM
Authors: Dr. S. Venkata Achuta Rao , P. Chandrakanth , P. Anudeep , S. Kamalakar , B. Teja
DOI: 10.48047/IJIEMR/V13/ISSUE 05/74
|
680-692 |
Download |
Enhancing Wireless Network Security with Adaptive Sampling and Deep
Learning-Based Intrusion Detection System
Authors: Dr. G. N. V. Vibhav Reddy , K. Kalyan, K. Varun , P. Nikhil, K. Deepthi
DOI: 10.48047/IJIEMR/V13/ISSUE 05/75
|
693-702 |
Download |
वर्धा जिले के डायट द्वारा आयोजित सेवाकालीन शिक्षको पर भौतिक सुविधाओ का उनकी दक्षता पर प्रभाव का अध्ययन
Authors: Vandana Tulshiramji Dhabekar, Dr. M.L. Pandey
DOI: 10.48047/IJIEMR/V13/ISSUE 05/76
|
703-713 |
Download |
"STRATEGIES FOR SUCCESS: A COMPARATIVE STUDY OF NPM IMPLEMENTATION IN ONGC AND SAIL"
Authors: Kangna Yadav, Dr. Sanjeev Saxena
DOI: 10.48047/IJIEMR/V13/ISSUE 05/77
|
714-718 |
Download |