default search action
11th ICCCNT 2020: Kharagpur, India
- 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020, Kharagpur, India, July 1-3, 2020. IEEE 2020, ISBN 978-1-7281-6851-7
- Om M. Rajpurkar, Siddesh S. Kamble, Jayram P. Nandagiri, Anant V. Nimkar:
Alert Generation on Detection of Suspicious Activity Using Transfer Learning. 1-7 - Md. Rafiuzzaman Bhuiyan, Abu Kaisar Mohammad Masum, Md. Abdullahil-Oaphy, Syed Akhter Hossain, Sheikh Abujar:
An Approach for Bengali Automatic Question Answering System using Attention Mechanism. 1-5 - Pavitra Haveri, Rashmi U. B, D. G. Narayan, Nagaratna K., Shivaraj K.:
EduBlock: Securing Educational Documents using Blockchain Technology. 1-7 - Adhesh Shenoy, Mahathi Amencherla, Rahul Nagaraj, T. S. Chandar:
Optick - A Low Cost Wearable Head up Display for Search and Rescue Operations. 1-7 - Merlin Sundar, Sriram Kailasam, Timothy A. Gonsalves:
Benchmarking Distributed Stream Processing Frameworks for Real Time Classical Machine Learning Applications. 1-7 - Leela Aishwarya T, Manoj Panda:
Road Boundary Detection using 3D-to-2D Transformation of LIDAR Data and Conditional Generative Adversarial Networks. 1-6 - M. Hussayeen Khan Anik, Sakib Mahmud, M. Ifaz Ahmed Isti, Samiha Nuzhat, Shovasis Kumar Biswas, Hriteshwar Talukder:
A Novel Highly Sensitive Photonic Crystal Fiber Sensor for Detecting PH Levels of Acetic Acid Aqueous Solution Based on Surface Plasmon Resonance. 1-5 - Anuran Mitra, Soumita Biswas, Tinku Adhikari, Arindam Ghosh, Soumalya De, Raja Karmakar:
Emergence of Edge Computing: An Advancement over Cloud and Fog. 1-7 - Sana Akbar, Sri Khetwat Saritha:
QML Based Community Detection in the realm of Social Network Analysis. 1-7 - Bhabendu Kumar Mohanta, Utkalika Satapathy, Meenu Rani Dey, Soumyashree S. Panda, Debasish Jena:
Trust Management in Cyber Physical System using Blockchain. 1-5 - Suraj K, Melisa Miranda:
A Switching Capacitor Based Buck-Boost Converter and its Analysis. 1-7 - Kalyanee Devi, Rohit Tripathi:
Social Network Analysis for efficient delivery of Agricultural Extension Services. 1-6 - Sankalp More, Imran Jamadar, Faruk Kazi:
Security Visualization and Active Querying for OT Network. 1-6 - Aroof Aimen, Amandeep Kaur, Sahil Sidheekh:
Scale Invariant Fast PHT based Copy-Move Forgery Detection. 1-7 - Namrata Hosamani, Nageshwar Albur, Prajna Yaji, Mohammed Moin Mulla, D. G. Narayan:
Elastic Provisioning of Hadoop Clusters on OpenStack Private Cloud. 1-7 - Ravi Kumar Tanti, Saurabh Ramesh Warathe, Nella Anveshkumar:
Planar Yagi-Uda Antenna with Mirrored Ground Plane for WLAN. 1-5 - Aditya Sarin, Deveshi Thanawala, Saurav Verma, Chetana Prakash:
Implementation of New Approach to Secure IoT Networks with Encryption and Decryption Techniques. 1-7 - Kamana Sai Charan, Harsha Vardhan Nakkina, B. R. Chandavarkar:
Generation of Symmetric Key Using Randomness of Hash Function. 1-7 - Rajat Kumar, Amit Mankodi, Amit Bhatt, Bhaskar Chaudhury, Aditya Amrutiya:
Cross-Platform Performance Prediction with Transfer Learning using Machine Learning. 1-7 - Saswata Satpathi, Mohamed Ismail Yasar Arafath K, Aurobinda Routray, Partha Sarathi Satpathi:
Detection of Deceit from Thermal Videos on Real Crime Database. 1-6 - Eshtiak Ahmed, Ashraful Islam, Mohsena Ashraf, Atiqul Islam Chowdhury, Mohammad Masudur Rahman:
Internet of Things (IoT): Vulnerabilities, Security Concerns and Things to Consider. 1-6 - Rayeesa Mehmood, Amandeep Kaur:
Modified Difference Squared Image Based Non Local Means Filter. 1-7 - Abhay Katiyar, Satyam Kumar Gupta, Dinesh Singh, Rama Shankar Yadav:
A dynamic single-hop clustering algorithm (DSCA) in VANET. 1-6 - Md. Al-Hasan, Hasan Muhammad Kafi, Md. Arif Rizvee, Mohammad Hasan, Md. Mamunur Rashid:
Context-Aware Computing for Balanced Agricultural Production using Machine Learning. 1-6 - Shreya T, Mohammed Moin Mulla, Sumedha Shinde, D. G. Narayan:
Ant Colony Optimization-based Dynamic Routing in Software Defined Networks. 1-7 - Sajal Jain, Shivam Sharma, Beerappa R. Chandavarkar:
Mitigating Man-in-the-Middle Attack in Digital Signature. 1-5 - Pradeep Nazareth, B. R. Chandavarkar:
Link Quality-based Routing Protocol for Underwater Acoustic Sensor Networks. 1-6 - Aashka Trivedi, Anya Trivedi, Sourabh Varshney, Vidhey Joshipura, Rupa G. Mehta, Jenish Dhanani:
Extracted Summary Based Recommendation System for Indian Legal Documents. 1-6 - Smita Tiwari, Shivani Goel, Arpit Bhardwaj:
Machine Learning approach for the classification of EEG signals of multiple imagery tasks. 1-7 - Anirban Dam, Ashish Verma, Charan Tej Pangi, Raja Raviteja, Chandra Shekhar Prasad:
Person Following Mobile Robot using Pedestrian Dead-Reckoning with Inertial data of Smartphones. 1-4 - Nagib Mahfuz, Shawan Karmokar, Md. Ismail Hossain Rana:
A Smart Approach of LPG Monitoring and Detection System Using IoT. 1-4 - Purva Chaitanya Badhe, Vaishali Kulkarni:
Artificial Neural Network based Indian Sign Language Recognition using hand crafted features. 1-6 - N. Sahana, Usha Rani K. R:
Design of Intelligent IP Address Management System for Communication Networks. 1-6 - Sa Bijay Kumar, Rutuparna Panda, Sanjay Agrawal:
Brain Magnetic Resonance Image Tumor Detection and Segmentation Using Edgeless Active Contour. 1-7 - Samiha Nuzhat, M. Ifaz Ahmad Isti, Hriteshwar Talukder, Shovasis Kumar Biswas:
Dual Core Surface Plasmon Resonance Based Photonic Crystal Fiber Sensor In IR-Range. 1-4 - S. Sathish Kumar, Aruchamy Rajini:
Airline tweets sentimental analysis using Adaptive rider optimization based support vector neural network. 1-10 - Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan:
Security Assessment in Foggy Era through Analytical Hierarchy Process. 1-6 - S. K. Bahuguna, S. Mukhopadhyay, A. P. Tiwari:
Distributed Artificial Neural Network Model for Neutron Flux Mapping in Nuclear Reactors. 1-7 - Earnest Paul Ijjina, Aniruddha Srinivas Joshi, Goutham Kanahasabai, Keerthi Priyanka P:
Customer Analytics using Surveillance Video. 1-7 - Akshada Dongre, Rodney Pinto, Ameya Patkar, Minal Lopes:
Computer Cursor Control Using Eye and Face Gestures. 1-6 - Nandini Av, Nilita Anil Kumar:
Image Encryption Using Genetic Algorithm and Bit-Slice Rotation. 1-6 - S. Maheswaran, Govindasamy Murugesan, Prakash Duraisamy, Balasubramaniam Vivek, Selvapriya S, Vinith S, Vasantharajan V:
Unmanned Ground Vehicle for Surveillance. 1-5 - Akilandeswary G, J. Martin Leo Manickam:
Next Generation Network Coding Technique for IoT. 1-6 - Sneha R. Deshmukh, Vijay T. Raisinghani:
AdCoCoA- Adaptive Congestion Control Algorithm for CoAP. 1-7 - Sumith N.:
Open RnSIR model for Information Spread in Social Networks. 1-5 - Adarsh Jain, Abhishek Khanna, Jay Bhatt, Parthkumar V. Sakhiya, Rajesh Kumar Bahl:
Experimental Demonstration of Free Space Quantum Key Distribution System based on the BB84 Protocol. 1-5 - Debadri Basak, Dhruv Ramani, Ghanshyam Singh:
Enhancement of Unsupervised Object Detection using Supervised Method. 1-9 - Naresh Kumar, Seba Susan:
COVID-19 Pandemic Prediction using Time Series Forecasting Models. 1-7 - Neethu Mohan, S. Sachin Kumar, K. P. Soman:
Group Sparsity Assisted Synchrosqueezing Approach for Phonocardiogram Signal Denoising. 1-5 - Elakkiya E, S. Selvakumar, R. Leela Velusamy:
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection. 1-7 - Raja Karmakar, Soumalya De, Arindam Ghosh, Tinku Adhikari, Punit Jain:
S2-GI: Intelligent Selection of Guard Interval in High Throughput WLANs. 1-7 - Priyam Das, Dhananjay R. Kalbande:
Behavioural Analysis of Multi-Source Social Network Data Using Object-Centric Behavioural Constraints and Data Mining Technique. 1-8 - Alekha Kumar Mishra, Arun Kumar:
Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications. 1-5 - Nileshkumar Kakade, Utpalkumar Patel:
Secure Secret Sharing Using Homomorphic Encryption. 1-7 - Harsh Jain, Shreeyaa Agrawal, Harshita Khandelwal, Vinaya Sawant:
Financial Investment Recommendation and Decentralized Account Management. 1-6 - Shital S. Supase, Rajesh B. Ingle:
Are Coordinator Election Algorithms in Distributed Systems Vulnerable? 1-5 - Naimul Hossain, Md. Rafiuzzaman Bhuiyan, Zerin Nasrin Tumpa, Syed Akhter Hossain:
Sentiment Analysis of Restaurant Reviews using Combined CNN-LSTM. 1-5 - Shilpa Dua, Dhruv P. Shahi, Jyotsna Singh, Harish Parthasarathy:
Passive Copy-Move Forgery Detection using Localized Intensity Feature. 1-7 - Bhabendu Kumar Mohanta, Meenu Rani Dey, Utkalika Satapathy, Soumyashree S. Panda, Debasish Jena:
GreenVANET: Greening Vehicular Ad-hoc Network by Scheduling Up-link Channel. 1-5 - S. Kaushik, Abhishek Raman, K. V. S. Rajeswara Rao:
Leveraging Computer Vision for Emergency Vehicle Detection-Implementation and Analysis. 1-6 - N. Sri Sai, B. Naga Subrahmanyam, K. Yeshwanth Sai, A. Vara Durga Siva Sai, K. Pavan Kumar, S. Sai Harsha, U. Adi Lakshmi Satya Sri:
Efficient design of $8\times 8\times 8$ LED Cube with Low Power consumption using Arduino UNO. 1-6 - Soumyashree S. Panda, Bhabendu Kumar Mohanta, Meenu Rani Dey, Utkalika Satapathy, Debasish Jena:
Distributed Ledger Technology for Securing IoT. 1-6 - Satyajit Nayak, Surya Teja, Aurobinda Routray, Monalisa Sarma:
A Non-contact Framework for Shortness of Breath Recognition and effects on Health Parameters during HCI. 1-7 - Madhu Sharma, Vishal Bharti:
Image encryption using a new 2D bit reversed logistic map. 1-6 - Aradhana Behura, Ashutosh Behura:
Road Accident Prediction and Feature Analysis By Using Deep Learning. 1-7 - Pooja Sainath Jadhav, Gargi S. Phadke:
"Algorithmic Comparative Classification Approach for Defect Detection of Pyrus Malus. 1-6 - Arijit Das, Ankita Das, Anisha Datta, Shukrity Si, Subhas Barman:
Deep Approaches on Malicious URL Classification. 1-6 - Akshay Rajapkar, Pranita Binnar, Faruk Kazi:
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks. 1-6 - Deepa Rani, Narottam Chand Kaushal:
Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. 1-7 - Md. Rakib Ahmed, Sheikh Tariqul Islam Tahid, Nazneen Akter Mitu, Pipasha Kundu, Soniya Yeasmin:
A Comprehensive Analysis on Undergraduate Student Academic Performance using Feature Selection Techniques on Classification Algorithms. 1-6 - Sunil Samanta Singhar, Debasish Jena, Suraj Sharma:
Integrating Machine Learning with Blockchain to Ensure Data Privacy. 1-6 - A. V. Anandhalekshmi, V. Srinivasa Rao, G. R. Kanagachidambaresan:
HMM Based on Baum-Welch Algorithm for Predicting Critical Data Packets in IoT Network. 1-6 - Ganesan Ponnuswami, Sriram Kailasam, Dileep Aroor Dinesh:
Event-Driven Data Pipeline for Network Management Systems. 1-6 - Ravi Kant Jain, Bikash Gupta, Mustaq Ansari, Partha Pratim Ray:
IOT Enabled Smart Drip Irrigation System Using Web/Android Applications. 1-6 - Agostino Forestiero, Giuseppe Papuzzo, Rosaria de Simone, Francesco Forestiero, Francesca Giordano:
Multiagent approach for resource management in Smart Environments. 1-5 - Tejaskumar K, Ishaan R. Dharamdas, B. R. Chandavarkar:
A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor Networks. 1-6 - Sakshi Ranjan, Subhankar Mishra:
Comparative Sentiment Analysis of App Reviews. 1-7 - Monjur Bin Shams, Md. Junaed Hossain, Sheak Rashid Haider Noori:
A Time Series Analysis of Trends With Twitter Hashtags Using LSTM. 1-6 - Sumit Jahagirdar, Aditya Ghatak, Abhiram Ajith Kumar:
WiFi based Indoor Positioning System using Machine Learning and Multi-Node Triangulation Algorithms. 1-6 - Debojyoti Seth:
A Novel Joint Sum and Per Antenna Power Constraints Model based on a Comparative Approach of Optimal Transmission Strategies and Capacity of MIMO channels. 1-5 - Murat Cetiner, Ozgur Koray Sahingoz:
A Comparative Analysis for Machine Learning based Software Defect Prediction Systems. 1-7 - Nabendu Bhui, Pintu Kumar Ram, Pratyay Kuila:
Feature Selection from Microarray Data based on Deep Learning Approach. 1-5 - Gopalakrishnan P, Sidhant Gupta, Rahul Krishnan, Dhruv Patel, Dhivvya J. P, Sruthy Anand, Dhanesh Raj:
Routing protocol Analysis for Heterogeneous Nodes in a Dynamic and Sparse Environment. 1-7 - Md. Mehedi Hassan, Zahrul Jannat Peya, Sadika Zaman, Jarif Huda Angon, Afrin Islam Keya, Asaf Ud Dulla:
A Machine Learning Approach to Identify the Correlation and Association among the Students' Drug Addict Behavior. 1-5 - Sheikh Arif Ahmed, Md. Aref Billah, Shahidul Islam Khan:
A Machine Learning Approach to Performance and Dropout prediction in Computer Science: Bangladesh Perspective. 1-6 - Sameer Ajmera, T. R. Pattanshetti:
A Survey Report on Identifying Different Machine Learning Algorithms in Detecting Domain Generation Algorithms within Enterprise Network. 1-5 - Nushrat Jahan Ria, Sharun Akter Khushbu, Mohammad Abu Yousuf, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain:
Toward an Enhanced Bengali Text Classification Using Saint and Common Form. 1-5 - Rinkesh Kumar Dubey, Rahul Yadav, Taimoor Alam, Nirbhay Kumar Singh, Ram Lal Yadava:
A modified Miniaturized UWB Bi-Planar Yagi-Like MIMO Antenna System. 1-5 - Leena Wanganoo, Vinod Kumar Shukla:
Real-Time Data Monitoring in Cold Supply Chain Through NB- IoT. 1-6 - Binish Fatimah, Priyanka G, Rehana Sultana, Rekha N:
Analysis of ECG for biometric identification. 1-5 - Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy:
A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS Technology. 1-4 - Nagib Mahfuz, Mehen Nigar, Nawshin Ulfat:
Smart Energy Meter and Digital Billing System for Bangladesh. 1-4 - Niveditha Oruganti, Tripty Singh:
Best Fit Polygonal Approximation for Multiple ROI Estimation. 1-6 - Amrita Naik, Damodar Reddy Edla, Venkatanareshbabu Kuppili:
A combination of FractalNet and CNN for Lung Nodule Classification. 1-7 - Romana Rahman Ema, Pintu Chandra Shill:
Integration of Fuzzy C-Means and Artificial Neural Network with Principle Component Analysis for Heart Disease Prediction. 1-6 - Md. Jahid Hasan, Md Ferdous Wahid, Md. Shahin Alom, Mohammad Mahmudul Alam Mia:
A New State of Art Deep Learning Approach for Bangla Handwritten Digit Recognition using SVM Classifier. 1-6 - Hemanth Madasu, Mohitha Kondapalli, Sulakshana Chilukuri, Y. Pandu Rangaiah:
Circularly Polarized Dipole Antenna with Pattern Reconfiguration for Wireless Communications. 1-5 - Ajay Khare, Ashwini Dalvi, Faruk Kazi:
Smart Crawler for Harvesting Deep web with Multi-Classification. 1-5 - Harish Krishnamoorthy, Basundhara Chakrabarty, S. Nandakumar:
Secured Routing Paradigm for Intelligent Transportation Systems. 1-7 - Kokila Bharti Jaiswal, Toshanlal Meenpal:
Continuous Pulse Rate Monitoring from Facial Video Using rPPG. 1-5 - Raja Sekar Kumaresan, Marshal Raj, Gopalakrishnan Lakshminarayanan:
Area-Efficient D-Flip Flop and XOR in QCA. 1-5 - Abdullah Al-Mamun Bulbul, Md. Abdul Awal, Md. Ekhlasur Rahaman, Farjana Imam, Etu Podder, Md. Salim Ahmed, Md. Bellal Hossain, Himadri Shekhar Mondal, Faysal Iqbal:
Highly Sensitive Photonic Crystal Fiber for Illegal Drugs Detection in THz Regime. 1-6 - Abhishek Singh J, Paramananda Jena, Veena Devi S. V:
Tracking Targets using Digital Beamforming. 1-5 - Sagar Deep Deb, Mohammad Akhlaqur Rahman, Rajib Kumar Jha:
Breast Cancer Detection and Classification using Global Pooling. 1-5 - Susmita Das, Samya Muhuri, Susanta Chakraborty, Samit Biswas:
Graph Based Keyword Extraction for Similarity Identification among Born-Digital News Contents. 1-7 - Pankaj Joshi, Anoj Kumar:
A Novel Framework for Decentralized C2C E-commerce using Smart Contract. 1-5 - Snehashis Majhi, Ratnakar Dash, Pankaj Kumar Sa:
Temporal Pooling in Inflated 3DCNN for Weakly-supervised Video Anomaly Detection. 1-6 - Shivam Raj, Natasha Sebastian, Raj Bisht:
ExtraDet With Quad Feature Pyramid Networks. 1-6 - Sambhram Pattanayak, Vinod Kumar Shukla:
Comparative Analysis of ENG, EFP and Drone camera and its Impact in Television Production. 1-8 - Sharma Hitesh Omprakash, Margam K. Suthar:
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network. 1-5 - Mayuri Khadpe, Pranita Binnar, Faruk Kazi:
Malware Injection in Operational Technology Networks. 1-6 - Akshay Kumar, Viranjay M. Srivastava:
A Novel Feeder Protection System Using Fast Switching PhotoMOS Relay. 1-4 - Md. Rafiuzzaman Bhuiyan, Sharun Akter Khushbu, Md. Sanzidul Islam:
A Deep Learning Based Assistive System to Classify COVID-19 Face Mask for Human Safety with YOLOv3. 1-5 - Navneet Singh, Vishtasp Meherhomji, B. R. Chandavarkar:
Automated versus Manual Approach of Web Application Penetration Testing. 1-6 - Anas Najdawi:
Assessing AI Readiness Across Organizations: The Case of UAE. 1-5 - Pranay Sharma, Naveksha Sood:
Application of IoT and Machine Learning for Real-time Driver Monitoring and Assisting Device. 1-7 - Tayeb Bin Lokman, Mohammad Touhidul Islam, Mouslah Uddin Apple:
Design & Implementation Of IoT Based Industrial Automation Syste. 1-6