default search action
15th IC3 2023: Noida, India
- Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023. ACM 2023
Track 1: Computer Algorithms and Applications
- Bhavani K, Shashank A, M. T. Gopala Krishna:
Deep Learning-Based Diagnosis of Lung Abnormalities on X-ray images: A Comparative Study of U-Net and Sequential CNN Models. 1-7 - Aastha Nautiyal, Devesh Kumar Bhardwaj, Rachna Narula, Harshendra Singh:
Real Time Emotion Recognition Using Image Classification. 8-12 - Reshma Raju, Anjali T, Nandakishor Prabhu Ramlal:
Dual Deep Learning model for Electricity Price Forecasting: Bi-LSTM and GRU fusion. 13-17 - Aditi Sharma, Shriyanshi Srivastava, Prakash Singh Rautela, Bansidhar Joshi:
Metaheuristics-Based Routing Optimization in On-Chip Network. 18-23 - Abhijeet Rana, Aman Garg, Rishabh Jain, Aditi Sharma:
Audio Examination - Mental Health Diagnosis in Healthcare through Audio Analytics. 24-29 - Oshin Mumtaha, Atia Afroz, Mohammad-Sahadet Hossain, Tahiya Tasneem Oishee:
Matrix Computation Based on ADI Method for Solutions of Discrete Lyapunov Equations and Application. 30-35 - Vijayshri Khedkar, Ashwini Jatti, Sujay Kumar, Vrushti Shah, Vedanshi Sahu:
An analysis of implementation of convolutional neural networks to make an accident detection model. 36-42 - Aayush Singh, Riya Goyal, Kartik Singh Raihal, Aryan Mishra, Kamal Thadiwal, Abhinav Tomar:
Smart Charging: A Deployment Algorithm for Optimizing Wireless Rechargeable Sensor Networks. 43-50 - Zoha Waseem, Zeeshan Ali Haq, Anil Kumar Mahto:
Heart arrhythmia detection based on ECG wave classification using neural network and Fuzzy Inference system. 51-57 - S. B. Taneja, G. C. Brahma, Sanjay Bisht, Vinita Jindal, Punam Bedi:
Predator-Prey PSO based Weapon deployment in Constructive Simulation. 58-65
Track 2: Data and Cloud Computing
- Meghna Manoj Nair, Anand Kumar Mishra, Amit Kumar Tyagi:
Fog Computing and Edge Computing: Open Issues, Critical Challenges and the Road Ahead for Future. 66-76 - Anjali Chauhan, Prakash Kumar:
A Cloud Architecture for Monitoring and Controlling Viral COVID-19: An architecture suitable for efficiently handling pandemic situations like COVID-19. 77-84 - Shilpa Parkhi, Saumya Singh, Aman Pushp, Shailesh Rastogi, Rahul Singh Gautam:
Debt Financing and Firm's Performance: Panel Data Analysis. 85-93 - Akoramurthy Balasubramaniam, Surendiran Balasubramanian:
Quantum-resistant Blockchain Cryptography-based Smart City Transactions. 94-101 - Tejasva Jugran, Aniket Dubey, Priti Kumari, Parmeet Kaur:
Efficient Use of Blockchain for Crowdfunding Platform. 102-108 - Sanjeeb Tiwary, Subhashree Darshana, Debabrata Mohanty, Adyasha Dash, Potnuru Rupsa, Rabindra K. Barik:
Prediction of Algae Growth: A Machine Learning Perspective. 109-114 - Priya Chanda, Pritpal Singh:
Mapping the Landscape of Blockchain Research in Human Resource Management: A Bibliometric Analysis. 115-126 - Hemant Kumar Apat, Ahmed Alkhayyat, Ankit Vidyarthi, Rabindra K. Barik:
Leveraging Towards Serverless Edge Computing Model for Intelligent IoMT Applications. 127-132 - Kashav Ajmera, Tribhuwan Kumar Tewari, Vivek Kumar Singh, Vikash, Pawan Kumar Upadhyay:
Energy-Aware Dynamic Virtual Machine Scheduling in Cloud Computing: A Survey. 133-141 - Deven Westmoreland, Gahangir Hossain:
Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. 142-146 - Punam Bedi, Tanisha Roy, Vidhi Arora, Pushkar Gole:
Smart Contract based Skill Verification System for Recruitment. 147-152 - Aditya Nautiyal, Shubhangi Saklani, Aditi Pant, Yutika Agarwal, Avantika Gaur, Preeti Mishra:
VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environment. 153-160 - Balbir Singh, Jyoti Yadav:
A paradigm of multi-class classification for type 2 diabetic mellitus using Deep Neural Network. 161-164 - Prathamesh Vijay Lahande, Parag Ravikant Kaveri:
Fault Tolerance using Reinforcement Learning for Cloud Resource Management: Fault Tolerance using RL for Cloud Resource Management. 165-170
Track 3: Intelligent Computing
- Vishruth B. Gowda, M. T. Gopala Krishna, Megha J:
Dynamic Background Modeling and Foreground Detection using Orthogonal Projection onto the Subspace of Moving Objects. 171-176 - Divya A Kittur, Divya Maithreyi Tenneti:
Comparative survey analysis of the CNN and LBPH Face Recognition Learning Algorithms: A Survey of Learning Approaches and Performance Evaluation. 177-180 - Shivangi Sachan, Khushbu Doulani, Mainak Adhikari:
Semantic Analysis and Classification of Emails through Informative Selection of Features and Ensemble AI Model. 181-187 - Vishu Gupta, Yuhui Lyu, Derick Suarez, Yuwei Mao, Wei-Keng Liao, Alok N. Choudhary, Wing Kam Liu, Gianluca Cusatis, Ankit Agrawal:
Physics-based Data-Augmented Deep Learning for Enhanced Autogenous Shrinkage Prediction on Experimental Dataset. 188-197 - Sudi Murindanyi, Margaret Nagwovuma, Barbara Nansamba, Ggaliwango Marvin:
Explainable Ensemble Learning and Trustworthy Open AI for Customer Engagement Prediction in Retail Banking. 198-206 - Manorama Chouhan, Partha Sarathy Banerjee, Amit Kumar:
Identifying the Suitability of Artificial Intelligence Technology for Modern Farming. 207-215 - Archana Purwar, Manju:
Credit card fraud detection using XGBoost for imbalanced data set. 216-219 - Kirti Jain, Shrey Gandhi, Shivam Singhal, Suryansh Rajput:
Semantic Image Captioning using Cosine Similarity Ranking with Semantic Search. 220-223 - Md Rezanur Islam, Insu Oh, Muminov Ibrokhim Botir Ugli, Kangbin Yim:
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection. 224-229 - Arvind Mewada, Rupesh Kumar Dewang, Paritosh Goldar, Sushil Kumar Maurya:
SentiBERT: A Novel Approach for Fake Review Detection Incorporating Sentiment Features with Contextual Features. 230-235 - Gillala Rekha, Anand Kumar Mishra, Amit Kumar Tyagi:
An Improved Oversampling Algorithms based on Informative Sample Selection Strategy Solving Imbalance. 236-244 - Shabnam Kumari, P. Muthulakshmi:
Weather Prediction Using Futuristic Technologies: From Industry's Perspective. 245-251 - Ashutosh Singh, Sarishty Gupta:
Image Based Action Recognition and Captioning Using Deep Learning. 252-261 - Mayuri Gupta, Ashish Mishra:
AB-DeepLabv3+: An Encoder-Decoder Method with Attention Mechanism for Polyp Segmentation. 262-268 - Kshamta Chauhan, Ekta Gandotra:
Risk Analysis of Android Applications using Static Permissions and Convolutional Neural Network. 269-273 - Dharvi Mittal, Vegesana Eshita Raj, Vimal Kumar:
Revolutionizing Finance and Travel with AI: Impacting through Machine Learning Models. 274-281 - Rajeev Verma, Avinash Chandra Pandey:
Improving Early Detection of Suicide Ideation using Oversampling Methods. 282-288 - Shilpa Ghode, Mayuri Digalwar:
A Novel Model based Energy Management Strategy for Plug-in Hybrid Electric Vehicles using Deep Reinforcement Learning. 289-293 - J. Divya Udayan, Veerababu Addanki, Sathvik Durgapu, Dhanvanth Reddy Yerramreddy, Dorasanaiah Kolla:
Forward Kinematics Simulation Of KUKA KR5 Arc Robot With Robo Analyzer. 294-299 - Deepali Sharma, Harish Kumar, Sakshi Kaushal, Shalini Gainder:
Arogi Chatbot: A platform for pre-screening gynecology and obstetrics patients. 300-306 - Talgan Kumar Rao, Narayana Darapaneni, Anwesh Reddy Paduri, Amarnath G. S, Arun Kumar, Guruprasad Ps:
Insider Threat Detection: Using Classification Models. 307-312 - Varshali Jaiswal, Preetam Suman, Amrit Suman, Sasmita Padhy:
Intelligent Hardware for Preventing Road Accidents Through the Use of Image Processing. 313-321 - Asha S, Vinod P, Varun G. Menon:
MMDFD- A Multimodal Custom Dataset for Deepfake Detection. 322-327 - Amit Kumar Tyagi, Richa:
Digital Twin Technology: Opportunities and Challenges for Smart Era's Applications. 328-336 - Keerthan Kumar T. G., Himanshu Dhakate, Shashidhar G. Koolagudi:
IIMH: Intention Identification In Multimodal Human Utterances. 337-344 - Meenal Jain, Saksham Gupta, Geetali Agarwal, Kritarth Bansal:
AdaBoost based hybrid concept drift detection approach for mental health prediction. 345-351 - Ananya Aggarwal, Samarth Gupta, Vanshita Varshney, Shruti Jaiswal:
Heart Failure Prediction Using Different Machine Learning Algorithms. 352-360 - Ishdeep Singh, Vivek Kumar Garg:
Artificial intelligence in the current management and prediction of diabetes mellites. 361-365 - Gargi Misra, Divya Kumar:
Deep Learning Technique to Diagnose Depression in Audio. 366-370 - Akanksha Mehndiratta, Pulkit Mehndiratta:
Factors Affecting Student's Academic Performance In Programming Using Association Rule Mining. 371-374 - Dharmveer Singh Rajpoot, Bhavey Mittal, Harshit Dudani, Ujjwal Singhal:
Sales Analysis and Forecasting using Machine Learning Approach. 375-377 - Pratyush Raj Mishra, Ilavarasi A. K.:
Intracranial Haemorrhage Detection Based on Deep Learning Using CT Images. 378-385 - Aman Gupta, Megha Rathi:
Disentangling the Hidden Patterns of Heart Disease: A Factor Analysis and Machine Learning Approach for Early Detection and Prevention. 386-395 - Syed Afnan Hashir, Dhruv Raj Kashyap, Shivansh Tripathi, Bansidhar Joshi:
An Effective Approach for Image-Based Forgery Detection. 396-401 - Jaivardhan Singh Chaudhary, Anurag Soni, Mohit Kumar, Chandra Prakash, Narendra Sharma:
A Pilot Study of Migraine Detection Using Computational Techniques. 402-411 - Harshada A Jadhav, Nisha Agrawal, Sandeep K. Joshi, V. Venkatesh Shenoi:
Hardware Counter-based Performance Analysis of ANUGA Flood Simulator. 412-418 - Thode Sai Prajwal, Ilavarasi A. K.:
A Comparative Study Of RESNET-Pretrained Models For Computer Vision. 419-425 - Varun Sunil Salgarkar, Ilavarasi A. K.:
Multi-Class Breast Cancer Classification from Digital Mammograms Using Vision Transformers. 426-436 - Akshat Gour, Harsh Gupta, Mohit Gupta, Himanshu Agrawal:
Augmented Reality Based Fashion Store. 437-442 - Liza Kansal, Anoushka Pandey, Sanidhya Madhav Shukla, Parneeta Dhaliwal:
Review of Machine Learning Techniques for Crop Recommendation. 443-449 - Gouransh Agrawal, Unnati Jha, Ranjeet Vasant Bidwe:
Automatic Facial Expression Recognition using Advanced Transfer Learning. 450-458 - Uroosa Khan, Mohd. Nazim:
Fake News Detection over the Social Media by using Machine Learning Techniques: A Systematic Literature Review. 459-466 - Om Hotkar, Pratheeik Radhakrishnan, Akarsh Singh, Natasha Jhamnani, Ranjeet Vasant Bidwe:
U-Net and YOLO: AIML Models for Lane and Object Detection in Real-Time. 467-473 - Ranjeet Vasant Bidwe, Sashikala Mishra, Simi Kamini Bajaj:
Performance evaluation of Transfer Learning models for ASD prediction using non-clinical analysis. 474-483 - Manik Sabharwal, Aman Sinha, Dhruv Gupta, Payal Malik:
Impact Of Backbone Architectures And Loss Functions On U-Net Models For Brain Tumor Segmentation: A Comparative Analysis. 484-492 - Aharnish K. S, Ansh Kumar, Mohammad Shahanwaz, Chandra Prakash:
Facial Emotion Recognition System Using Deep CNN For Rehabilitation With Hardware Integration. 493-500 - Aparna Shrivastava, Potukuchi Raghu Vamsi:
Anomaly Detection using Minimum Covariant Determinant as Feature in Multivariate Data. 501-514 - Pawan Lahoti, Namita Mittal, Girdhari Singh:
OptBertDCNN: A framework based on BERT and optimized Deep Convolutional Neural Network for MQA. 515-522 - Vipul Kumar Mishra, Aditya Varshney, Shekhar Yadav:
Mitigating Adversarial Attacks using Pruning. 523-529 - Ankita Wadhwa, Sherry Garg, Manish Kumar Thakur:
Automatic detection of DBSCAN parameters using BAT algorithm. 530-536 - Sangeeta Mittal:
Explaining URL Phishing Detection by Glass Box Models. 537-544 - Jayant Gupta, Shuai An, Shashi Shekhar:
Towards Responsible Spatial Data Science and Geo-AI. 545-551 - Jaemoon Lee, Anand Rangarajan, Sanjay Ranka:
Nonlinear-by-Linear: Guaranteeing Error Bounds in Compressive Autoencoders. 552-561 - Jaemoon Lee, Anand Rangarajan, Sanjay Ranka:
Nonlinear constraint satisfaction for compressive autoencoders using instance-specific linear operators. 562-571
Track 4: Network and Social Computing
- Thangavel Saravanan, S. Saravanakumar:
Energy efficient optimization algorithms for MANET. 572-579 - Shefali Goel, Abhishek Verma, Vinod Kumar Jain:
A Lightweight Mitigation Approach for Addressing DDAO Attacks in RPL-based Internet of Things. 580-586 - Aarti Goel, Devender Kumar, Deepak Kumar Sharma:
Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment. 587-590 - Shambhu Kumar, Arti Jain, Dinesh C. S. Bisht:
Hybrid Approach for Link Prediction using Supervised Machine Learning in Social Networks: Combining Global and Local Features. 591-597 - Gisha Marin Jose, Geetha K. N:
A Contemporary Technique to Place PMU in an Electrical Power Network using Graph Theory. 598-602 - T. N. Nisha, Dhanya Pramod, Ravi Singh:
Zero trust security model: Defining new boundaries to organizational network. 603-609 - Kumar Vaibhav Bhatnagar, Rashmi Kushwah:
Cyber Security in Internet of Things using Optimization algorithms: A Systematic Mapping of Literature. 610-615 - Nitin Kumar Tyagi, Mukta Goyal:
Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A Review. 616-622 - Kalyani Pendke, Mayuri Digalwar, Charu Goel:
Identification and Analysis of Emotions from the Text for Stress Detection. 623-630 - Shrey Rastogi, Shivam Sharma, Suraj Kumar, Gaurav Singal:
Aqua Clear: Efficient Water Management for home water supply. 631-637 - Umesh Singh, Jyotirmoy Bhardwaj, Binod Kumar Kanaujia:
An Efficient Beamformer and Power Splitter Design for SWIPT in Spectrum Sharing Network. 638-642 - Hemant Kumar Saini, Kusumlata Jain:
Past, Present, and Future of UAV in Sustainable Development: A Bibliometric Analysis: Bibliometric analysis of UAVs in Sustainability. 643-653 - Kaustubh Ranjan Singh, Parul Garg:
Decode Forward SWIPT Relay with Energy and Data Buffer: Performance Analysis. 654-659 - Himansu Sekhar Pattanayak, Bhawna Saxena, Adwitiya Sinha:
Community Detection in Weighted Time-Variant Social Network. 660-665 - Shariq Murtuza, Krishna Asawa:
Detecting DDoS Attacks in Software Defined Networks (SDNs) with Random Forests. 666-673 - Hemant Kumar Saini, Kusumlata Jain:
Impact of Adaptive Velocity based Hello Intervals in UAS to Sustainability: Enhancing Network Performance through Adaptive Velocity based Hello Intervals. 674-682 - J. L. Shreya, Anu Saini:
Delay Analysis in Programmable Data Plane Using Jitter Calculations. 683-691 - Abhishek Bharadwaj Medicherla, Rithvik Vukka, Sampat Srivatsav Jakkinapalli, Deepthi L. R:
Influential Node Identification on an Multilayered Attributed Network. 692-698 - Neetu Sardana, Arpita Jadhav Bhatt:
iPDS: Computing Privacy Disclosure Score for iOS apps and detection of privacy-infringing apps using Machine learning classifiers. 699-705 - Ankita Verma, Savita Singh, Sakshi Gupta:
A Fuzzified Approach for Overlapping Community Detection in Social Networks Based on Nodes Similarity. 706-710 - Ashish Singh Parihar, Amitesh Pandey:
Proposing A Novel Key Agreement Protocol For Flying Ad-Hoc Network. 711-715 - Arpita Jadhav Bhatt, Parul Agarwal:
Statistical Detection of Malicious iOS Apps through Ensemble and Active Learning. 716-721
Track 5: System and Software Engineering
- Prashant Kaushik, Vikas Saxena:
Video Annotation & Descriptions using Machine Learning & Deep learning: Critical Survey of methods. 722-735 - Zainab Fatima, Khushbu Doulani, Mainak Adhikari:
SVM Kernel and It's Aggregation Using Stacking on Imbalanced Dataset. 736-742 - Dhanya Pramod, S. Vijayakumar Bharathi, Kanchan Pranay Patil:
Blockchain-based Cybersecurity for Smart Manufacturing in Industry 4.0: Technology-Organization-Environment Approach. 743-749 - Neetu Singh, Sandeep Kumar Singh:
An Empirical Assessment of the Performance of Multi-Armed Bandits and Contextual Multi-Armed Bandits in Handling Cold-Start Bugs. 750-758 - Asmita Yadav, Govind Yadav, Saksham Jain, Suraj Ajay Dwivedi:
Comparison of ML, Deep Learning and Bio-inspired Algorithms in Bug Triaging. 759-765
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.