


default search action
14th IC3 2022: Noida, India
- Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, IC3-2022, Noida, India, August 4-6, 2022. ACM 2022, ISBN 978-1-4503-9675-2

Track 1: Computer Algorithms and Applications
- Rashmi Kushwah, Rishabh Rajpurohit, Paul Jonathan, Gaurav Kumar:

Web Application Based Text Encryption. 1-6 - Sujata Gudge, Preetam Suman

, Varshali Jaiswal
, Dhananjay Bisen:
Improving Classifier Efficiency by Expanding Number of Functions in the Dataset. 7-10 - Mukesh Saraswat, Raju Pal

, Roop Singh:
DS-AT: An efficient watermarking technique based on Arnold transform in DCT and SVD domain. 11-14 - Ananya Joshi, Vipasha Rana, Aman Sharma

:
Brain Tumor Classification using Machine Learning and Deep Learning Algorithms: A Comparison: Classifying brain MRI images on thebasis of location of tumor and comparingthe various Machine Learning and Deep LEARNING models used to predict best performance. 15-21 - Neetu Sardana, Arpita Jadhav Bhatt:

CiAFP: Category-based Classification of iOS Apps by mining frequent permissions. 22-26 - Neha Tyagi, Mukesh Saraswat:

Identification of undamaged buildings after the event of disaster using Deep Learning. 27-31 - Sidharth Sunil, Vishnu Dinesh Kumar, Akhil Babu, Goutham Thilak, Divya Udayan

:
Covid-19 spread Forecast with respect to vaccination based on LSTM and GRU. 32-36 - Megha Chopra, Archana Purwar:

Food Image Recognition by optimizing CNN with PSO and GA. 37-42 - Anuja Arora

, Anubhav Sinha, Kaushal Bhansali, Rachit Goel, Isha Sharma, Ambikesh Jayal:
SVM and Logistic Regression for Facial Palsy Detection Utilizing Facial Landmark Features. 43-48 - Syed Abdul Jabbar, Purva Sharma, Krishna Gurugubelli, Syed Azeemuddin

, Anil Kumar Vuppala:
Implementation of Zero-Phase Zero Frequency Resonator Algorithm on FPGA. 49-53 - Ujjwal Sachdeva, Potukuchi Raghu Vamsi

:
Analysis of Deep Learning Models for Anomaly Detection in Time Series IoT Sensor Data. 54-62
Track 2: Data and Cloud Computing
- Riya Sapra, Parneeta Dhaliwal:

Applications of Blockchain Technology: A Review. 63-66 - Monalisa Panigrahi, Sourabh Bharti, Arun Sharma

:
An Exhaustive Investigation on Resource-aware Client Selection Mechanisms for Cross-device Federated Learning. 67-73 - Mohit Bhatt

, Avantika Gaur, Saksham Badoni, Preeti Mishra
:
Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspection. 74-80 - Riddhi Thakkar

, Madhuri Bhavsar:
Achieving multilevel elasticity for distributed stream processing systems in the cloud environment: A review and conceptual framework. 81-90 - Manas Kumar Mishra, Sanjaya Kumar Panda:

A Cost-Variant Renewable Energy-Based Scheduling Algorithm for Cloud Computing. 91-97 - Mohamed Ali Mohamed, Muhsin Abdi Mohamud:

Data Analysis of Agriculture using Data Mining Techniques. 98-105 - Monika Tak, Akanksha Joshi, Sanjaya Kumar Panda:

Cloud Task Scheduling Algorithms using Teaching-Learning-Based Optimization and Jaya Algorithm. 106-113 - Ayushi Verma

, Tapas Badal
, Indrajeet Gupta:
Dynamic Target Monitoring of Load Balancers in Cloud Computing. 114-119 - Akshay Kumar, Muzzammil Hussain:

Mutual Authentication of Devices under Multi-Cluster Environment in Industrial Internet of Things (IIoT) Networks. 120-126 - Chanchal Ahlawat

, Rajalakshmi Krishnamurthi:
Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environment. 127-135 - Mahesh Gawali, Chandrashekhar Azad

:
Ensemble based feature selection approach for malware analysis. 136-140 - Madala Guru Brahmam

, R. Vijay Anand:
Virtual Machine Placement Techniques Based on Biological Models: Comprehensive Research and Study. 141-148 - Antarleen Pal, Chandra Prakash:

Personalized Knee Angle Prediction Models Using Machine Learning. 149-155 - Daniyaal Khan, Basant Subba

, Sangeeta Sharma:
Minimizing Cold Start Times in Serverless Deployments. 156-161 - Paul Anu, N. Mohankumar, M. Nirmala Devi:

Obviating Multiple Attacks with Enhanced Logic Locking. 162-167 - Kushagra Kinger, Ajeet Singh, Sanjaya Kumar Panda:

Priority-Aware Resource Allocation Algorithm for Cloud Computing. 168-174 - Akshay Kumar, Muzzammil Hussain:

Secure ECC based Key Exchange Mechanism for Devices in IoT Networks. 175-179
Track 3: Intelligent Computing
- Rohit Rastogi, Tribhuvan Mishra, Vaishnavi Mishra:

Validation Intelligently of Automobile and People for Safe and Smart Society. 180-189 - Vinita Vinita, Suma Dawn:

Intuitionistic Fuzzy Representation of Plant Images captured using Unmanned Aerial Vehicle for Measuring Mango Crop Health. 190-195 - Pratishtha Verma

, Vasu Aggrawal, Jyoti Maggu
:
FExR.A-DCNN: Facial Emotion Recognition with Attention mechanism using Deep Convolution Neural Network. 196-203 - Nishu Bansal, Satish Chandra:

Solving basic and advanced human activities using LSTM. 204-207 - Santosh Kumar Bharti

, Rajeev Kumar Gupta, Nikhlesh Pathik
, Ashish Mishra
:
Sarcasm Detection in News Headlines using Voted Classification. 208-212 - Nitin Arvind Shelke, Sanjeev Rao

, Anil Kumar Verma, Singara Singh Kasana:
Autism Spectrum Disorder Detection Using AI and IoT. 213-219 - Veena Goswami

, Bibhuti Bhusan Dash
, Subhranshu Sekhar Tripathy
, Barun Bikram Dash, Sudhansu Shekhar Patra, Rabindra Kumar Barik:
Leveraging Towards Analytical Approach of Fixed batch-based Queueing assisted Blockchain System. 220-224 - Priya Bansal, Shikha Jain:

Cryptocurrency Price Prediction Using Twitter and News Articles Analysis. 225-233 - Aditya Yadavalli, Shelly Jain, Ganesh Mirishkar, Anil Kumar Vuppala:

Investigation of Subword-Based Bilingual Automatic Speech Recognition for Indian Languages. 234-241 - Bagesh Kumar, Amritansh Mishra, Aayush Talesara, Shubham Kumar, Sourav Dey, O. P. Vyas, Ranjana Vyas:

Object Detection for Autonomous Vehicle in Hazy Environment using Optimized Deep Learning Techniques. 242-249 - Golla Uday Sai Theja, Motukoori Sai Murari, M. Franckie Singha

, Ripon Patgiri
, Ananya Choudhury:
A Survey on Surveillance using Drones. 250-257 - Prajwal

, Navaneeth, Tharun, Anand Kumar
:
Multi-Vehicle Tracking and Speed Estimation Model using Deep Learning. 258-262 - Angelina Gill, Tarandeep Kaur, Yendrembam K. Devi:

Application of Machine Learning Techniques in Modern Agriculture: A Review. 263-270 - Joan L. Imbwaga, Nagaratna B. Chittaragi

, Shashidhar G. Koolagudi:
Fake News Detection Using Machine Learning Algorithms. 271-275 - Prashant Kumar, Sneha Adhikari, Parul Agarwal

, Anita Sahoo
:
Stock Prices Prediction Based on Social Influence & Historic Data. 276-283 - Anshul Lahoti, Krishna Gurugubelli, Juan Rafael Orozco-Arroyave

, Anil Kumar Vuppala:
Shifted Delta Cepstral Coefficients with RNN to Improve the Detection of Parkinson's Disease from the Speech. 284-288 - Anand Sriram, Sai Srivatsa Gorti, Eshaan Ganesh Amin, Anand Kumar

:
Analyzing Banking Services Applicability Using Explainable Artificial Intelligence. 289-293 - Bhawna Ahuja, Virendra P. Vishwakarma:

Kernel Extreme Learning Machine with Mixture Correntropy for Face Recognition. 294-299 - Bhawna Ahuja, Virendra P. Vishwakarma:

Fuzzy Kernel Extreme Learning Machine for Face Recognition. 300-304 - Dincy R. Arikkat, Rafidha Rehiman K. A., Vinod P., Suleiman Y. Yerima, Manoja W, Pooja S, Shilpa Sekhar, Sohan James, Josna Philomina:

Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques. 305-312 - Sanjeev Rao

, Nitin Arvind Shelke, Aditya Goel, Harshita Bansal:
Deepfake Creation and Detection using Ensemble Deep Learning Models. 313-319 - Ankita Wadhwa

, Manish Kumar Thakur:
A GWO based efficient approach to identify terrorist incident hotspots in India. 320-325 - Priya Singh

, Rajalakshmi Krishnamurthi:
Predictive Model for Object Classification and Detection using Deep Learning. 326-333 - Shreya Ganga, Arun Solanki:

A Sentimental Analysis System Using Zero-Shot Machine Learning Technique. 334-341 - Ankit Kumar, Ajay Kumar:

A Literature Survey of Drunk Driving Detection Approaches. 342-349 - Utkarsh Mehrotra, Sparsh Garg, Krishna Gurugubelli, Anil Kumar Vuppala:

Towards improving Disfluency Detection from Speech using Shifted Delta Cepstral Coefficients. 350-355 - Aditya Agarwal, Prasanjit Dey

, Sanjay Kumar:
Sentiment Analysis using Modified GRU. 356-361 - Meghna Dhalaria

, Ekta Gandotra:
Detecting Android Malicious Applications using Dynamic Malware Analysis and Machine Learning. 362-366 - Bhavya Avuthu

, Naveen Yenuganti, Swathi Kasikala, Alekhya Viswanath, Sarath S
:
A Deep Learning approach for detection and analysis of respiratory infections in covid-19 patients using RGB and infrared images. 367-371 - Shaikh F. Shahnoor, Kishanlal Suthar, Ravi Kumar, Manish Rathore, Rajashekhar C. Biradar, Kartik Cholachgudda:

AI-driven Real-time System for Land Surveillance and Reconnaissance. 372-381 - Parthh Dikshit, Bhawna Dey, Ayush Shukla, Akhilesh Singh, Tarankit Chadha, Vivek Kumar Sehgal:

Prediction of Breast Cancer using Machine Learning Techniques. 382-387 - Divya Sharma, Kritika Shelly, Ekta Gandotra, Deepak Gupta:

Diagnosis of Covid-19 using Deep Learning. 388-395 - Ankita Gupta

, Lakhwinder Kaur, Gurmeet Kaur:
Impact of Image Pre-processing Operations on Wheat Canopy Segmentation. 396-403 - Richik Kuila, Prathamesh Sengupta, Minakhi Rout, Rabindra K. Barik:

Density based geospatial clustering: Methods, Applications and Future Directions. 404-409 - Jaya Gupta

, Deepak Garg
, Vipul Kumar Mishra
:
Reward based Video Summarization using Advanced Deep Learning Architectures. 410-416 - Bagesh Kumar, Aadharsh Roshan, Ayush Baranwal, Sankalp Rajendran, Sahil Sharma

, Amritansh Mishra, O. P. Vyas:
Optimized Forex Trading using Ensemble of Deep Q-Learning Agents. 417-428 - Bagesh Kumar, Amritansh Mishra, Subham Raj, Aditya Kumar, Om Suhas Vibhandik, Aayush Talesara, Shubham Kumar, O. P. Vyas:

An approach for classifying benign and malignant skin lesions using Optimized Deep Learning and SVM. 429-439 - Nishant Singh, Anurag Goel:

Detection of COVID-19 Protocols Violation in Real Time using Deep Learning. 440-445 - Shrishtee Agrawal, Abhishek Singh, Abhishek Tiwari

, Anushri Mishra, Abhinandan Tripathi:
A Systematic Survey on COVID 19 Detection and Diagnosis by Utilizing Deep Learning Techniques and Modalities of Radiology. 446-452 - Rajesh Kumar

, Geetha Subbiah:
Explainable Machine Learning For Malware Detection Using Ensemble Bagging Algorithms. 453-460 - Shambhavi Mishra, Tanveer Ahmed, Vipul Kumar Mishra

:
Mid Price Prediction via Statistical Feature Expansion and Kernel Adaptive Filtering. 461-466 - Pratyush Pareek, Aaryan Bhardwaj, Sanskar Patro, Anirudh Arora, Muskan Deep Kaur Maini, Bagesh Kumar, O. P. Vyas:

Sample Reduction for Support Vector Data Description (SVDD) by Farthest Boundary Point Estimation (FBPE) using Gradients of Data Density. 467-475 - Anupama Padha, Anita Sahoo

:
Quantum Enhanced Machine Learning for Unobtrusive Stress Monitoring. 476-483 - Atharva Deshmukh, Disha Patil, Amit Kumar Tyagi, Arumugam S. S, Arumugam:

Recent Trends on Blockchain for Internet of Things based Applications: Open Issues and Future Trends. 484-492 - Julia Buwaya, José D. P. Rolim:

NoiseBay: A Real-World Study on Transparent Data Collection. 493-501 - Dimitrios Melissourgos, Hanzhi Gao, Chaoyi Ma, Shigang Chen, Samuel S. Wu:

Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple Clients. 502-508
Track 4: Network and Social Computing
- Rohit Rastogi, Yash Rastogi, Saransh Chauhan:

Block Chain Application for E-Voting Process Using ML for South Asian Continent. 509-513 - Kundan Kandhway:

Susceptible-Infected Epidemics on Human Contact Networks. 514-519 - Kundan Kandhway:

Mitigating Epidemics Through Vaccination, Treatment, and Awareness Programs. 520-525 - Anubhuti Roda Mohindra, Charu Gandhi, Varsha Garg:

Secure On-demand Routing Protocol in VANETS. 526-530 - Kirti Aggarwal

, Anuja Arora
:
Assessment of Modified BAT Algorithm for MOOC Learner Influence Maximization. 531-537 - Aman Tahiliani

, Adarsh Kumar Verma, Shubham Agrawal, Kavita Pandey:
A Solution to Evade Social Media Distraction. 538-543 - Meena Pundir, Jasminder Kaur Sandhu, Puneet Kumar, Prateek Srivastava:

Secure and Energy Efficient Routing in Wireless Sensor Network using Machine Learning. 544-549 - Arpna Saxena

, Sangeeta Mittal
:
Internet of Medical Things (IoMT) Security and Privacy: A Survey of Recent Advances and Enabling Technologies. 550-559 - Naveen Kumar, Naveen Kumar Gupta:

Comparing the Performance of TCP/IP with Named Data Networking Using ns-3. 560-563 - Adarsh Thapa

, Chiraag Singh Dhapola, Hemraj Saini
:
Security Analysis of User Authentication and Methods. 564-572 - Gutta Akshitha Sai, Komma Naga Sai Likhitha, Maddi Pavan Kalyan, Perisetla Anjani Devi, Prathibhamol C.:

Combinational Features with centrality measurements on GCN+LR classification of Adversarial Attacks in homogenous Graphs. 573-581 - Amit Kumar Tyagi, Meghna Manoj Nair:

Preserving Privacy using Distributed Ledger Technology in Intelligent Transportation System. 582-590 - Gnana Yashaswini Sriram, Jivtesh M. R, Gaushik M. R, N. B. Sai Shibu

, Sethuraman Rao:
MarineServe: An IoT-based AI-enabled Multi-Purpose Real-time Alerting System for Fishing Boats. 591-596 - Thangavel Saravanan

, S. Saravanakumar:
Enhancing reliable communication to improve network lifetime in Wireless Sensor Networks by Displacement and Direction Conscious Adhoc On-Demand Multipath Distance Vector routing protocol. 597-606 - Kapil Juneja, Vipul Kumar Mishra

:
A Centroid Localization Improved CLLEACH Protocol to Improve the Performance of Sensor Network. 607-615 - Kapil Juneja, Vipul Kumar Mishra

:
Neighbor-Node Analysis based Min-Max Algorithm to Generate Optimized Route in WSN. 616-621 - Kumari Ritika, Arvind Kumar Pandey

, Sudhir Shukla:
Cluster Formation and Cluster Head Selection to Increase the Lifetime of Heterogeneous Wireless Sensor Network. 622-628 - Anav Chaudhary, Maanas Talwar, Avil Goel, Gaurav Singal

, Riti Kushwaha:
De-Fence: LoRa based Hop-to-Hop Communication. 629-637 - Riya Goyal

, Abhinav Tomar:
Optimal and Dynamic Scheduling using Multiple Mobile Chargers in Rechargeable Sensor Networks: An MADM-based Approach. 638-645 - Anuj Jain

, Sartaj Sahni:
Min-Hop Foremost Paths in Interval Temporal Graphs. 646-652
Track 5: System and Software Engineering
- Shivam Rajpoot, Deepti Singh:

Comparative Analysis of Smart Irrigation System Using IOT. 653-659 - Aayushi Gupta, Parvin Kumar, Vibhav Kumar Sachan, Balram Tamrakar

:
Performance investigation of MZM based RoF link by employing Digital and Analog data transmission. 660-665 - Yusuf Omeiza Ahmed, Marko Manyang Monydit, Abhilasha Sharma:

MLOps Automation - Developing a RESTful API for Text Based Emotion Detection. 666-672 - Ansuman Rout, Sagar DN, A. Anita Angeline, Sasipriya P:

Transmission Gate based Keeper Control for Domino Logic Circuits. 673-678 - Syed Rizwan, Md. Shazzad Ali Sobuj

, Mostafijur Rahman Akhond:
A Survey on Software Test Case Minimization: This is the subtitle of the paper, this document both explains and embodies the submission format for authors using Word. 679-684 - Atul Kumar

, Bhartendu Chaturvedi
, Shafali Jagga
:
A New High Performance Active Building Block Suitable for Low Voltage Low Power Signal Processing. 685-688 - Akshit Raj Patel, Sulabh Tyagi

:
The State of Test Automation in DevOps: A Systematic Literature Review. 689-695 - Haomei Liu, Yuan Meng

, Sanmukh Rao Kuppannagari, Viktor K. Prasanna:
End to End Framework for CNN Acceleration on FPGAs with Dynamic Algorithm Mapping. 696-700 - Anne Benoit, Yishu Du, Thomas Hérault

, Loris Marchal, Guillaume Pallez, Lucas Perotin, Yves Robert
, Hongyang Sun, Frédéric Vivien:
Checkpointing à la Young/Daly: An Overview. 701-710

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














