Abstract is missing.
- Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted TreesDeepak Kumarsharma, Sumit Vohra, Tarun Gupta, Vipul Goyal. 1-6 [doi]
- A Hybrid Model for Music Genre Classification Using LSTM and SVMPrasenjeet Fulzele, Rajat Singh, Naman Kaushik, Kavita Pandey. 1-3 [doi]
- Supporting E-Mentoring for Programming Labs in Engineering EducationRitu Arora, Sanjay Goel. 1-6 [doi]
- Audio Acoustic Features Based Tagging and Comparative Analysis of its ClassificationsSomya Goel, Raghav Pangasa, Suma Dawn, Anuja Arora. 1-5 [doi]
- cKGSA Based Fuzzy Clustering Method for Image Segmentation of RGB-D ImagesHimanshu Mittal, Mukesh Saraswat. 1-6 [doi]
- Sentiment Analysis of Tweets Using Machine Learning ApproachMegha Rathi, Aditya Malik, Daksh Varshney, Rachita Sharma, Sarthak Mendiratta. 1-3 [doi]
- Sustainable Waste Management ModelRishabh Jain, Shreya Garg, Tarushi Agrawal, Saurabh Gangal, Indu Chawla, Shikha Jain. 1-6 [doi]
- Integrity Checking Using Third Party Auditor in Cloud StorageSutirtha Chakraborty, Shubham Singh, Surmila Thokchom. 1-6 [doi]
- Machine Learning Based Framework to Predict Performance Evaluation of On-Chip NetworksAnil Kumar, Basavaraj Talawar. 1-6 [doi]
- Extraction of Influencers Across Twitter Using Credibility and Trend AnalysisPriyansh Sharma, Avruty Agarwal, Neetu Sardana. 1-3 [doi]
- A Novel Approach for Detecting Malware in Android Applications Using Deep LearningPrashant Kaushik, Pankaj K. Yadav. 1-4 [doi]
- Collusion Attack Resistant SVD Based Secured Audio Watermarking Scheme with Chaotic EncryptionTribhuwan Kumar Tewari, Vikas Saxena. 1-5 [doi]
- Empirical Evidence of Heuristic and Cost Based Query Optimizations in Relational DatabasesShikha Mehta, Parmeet Kaur, Pooja Lodhi, Omji Mishra. 1-3 [doi]
- A Novel Multimedia Based Approach of Classification and Visualisation of Extremist HotspotsNaincy Saxena, Manasvi Duggal, Aditya Mishra, Sandeep Kumar Singh. 1-4 [doi]
- Network Forensics Analysis of iOS Social Networking and Messaging AppsArpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal. 1-6 [doi]
- A Stacked Technique for Gender Recognition Through VoicePramit Gupta, Somya Goel, Archana Purwar. 1-3 [doi]
- Mitigation and Detection of DDoS Attacks in Software Defined NetworksShariq Murtuza, Krishna Asawa. 1-3 [doi]
- Design and Development of Integrated Insole System for Gait AnalysisAbhinandan Aggarwal, Rohit Gupta, Ravinder Agarwal. 1-5 [doi]
- An Ensemble Model for Breast Cancer Prediction Using Sequential Least Squares Programming Method (SLSQP)Madhuri Gupta, Bharat Gupta. 1-3 [doi]
- On-Demand Energy Provisioning in Wireless Sensor Networks with Capacity-Constrained Mobile ChargersAbhinav Tomar, Amar Kaswan, Prasanta K. Jana. 1-6 [doi]
- Enhanced Bag of Features Using AlexNet and Improved Biogeography-Based Optimization for Histopathological Image AnalysisRaju Pal, Mukesh Saraswat. 1-6 [doi]
- Tomato Leaf Disease Detection Using Convolutional Neural NetworksT. M. Prajwala, Alla Pranathi, Kandiraju Sai Ashritha, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi. 1-5 [doi]
- Empirical Analysis of Q&A Websites and a Sustainable Solution to Ensure Water-SecurityHarshit Gujral, Abhinav Sharma, Sangeeta Lal. 1-7 [doi]
- A New Approach for Vehicle Number Plate DetectionSarthak Babbar, Saommya Kesarwani, Navroz Dewan, Kartik Shangle, Sanjeev Patel. 1-6 [doi]
- Importance of Non-Technical Skills for Employment Opportunities: A Gap Analysis of Students and Employers Perception Importance of Non-Technical SkillsSuhail M. Ghouse, Monica Chaudhary, Sumit Garg. 1-6 [doi]
- A Novel Approach to Solve Set-Theory Word Problems AutomaticallyArushi Gupta, Medha Sagar, Rishabh Kaushal. 1-6 [doi]
- TOEP: Threshold Oriented Energy Prediction Mechanism for MPI-OpenMP Hybrid ApplicationsShajulin Benedict, Philipp Gschwandtner, Thomas Fahringer. 1-6 [doi]
- Multiple Team Formation Using an Evolutionary ApproachVivek Singh Baghel, S. Durga Bhavani. 1-6 [doi]
- Real-Time Driver's Drowsiness Monitoring Based on Dynamically Varying ThresholdIsha Gupta, Novesh Garg, Apoorva Aggarwal, Nitin Nepalia, Bindu Verma. 1-6 [doi]
- Enhancing Influence Maximization in Social Networks Using Parallel Reverse Reachability Set ComputationsMridul Haque, Dip SankarBanerjee. 1-6 [doi]
- Detection and Mitigation of DDoS in SDNBhavika Pande, Gargi Bhagat, Shanu Priya, Himanshu Agrawal. 1-3 [doi]
- A Comparative Study of Spam SMS Detection Using Machine Learning ClassifiersMehul Gupta, Aditya Bakliwal, Shubhangi Agarwal, Pulkit Mehndiratta. 1-7 [doi]
- Threshold-Based Heuristics for Trust Inference in a Social NetworkBithika Pal, Suman Banerjee, Mamata Jenamani. 1-7 [doi]
- Automated Sign Language InterpreterHardik Rewari, Vishal Dixit, Dhroov Batra, N. Hema. 1-5 [doi]
- Matching Witness' Account with Mugshots for Forensic ApplicationsAgnitha Mohan, Rajeswari Dhir, Hrishikesh Hirashkar, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi. 1-5 [doi]
- Gender Identification From Children's SpeechPravin Bhaskar Ramteke, Amulya A. Dixit, Sujata Supanekar, Nagraj V. Dharwadkar, Shashidhar G. Koolagudi. 1-6 [doi]
- Direct Perceptive Routing Protocol for Opportunistic NetworksDeepak Kumar Sharma, Gurmehr Sohi, Hitesh Dhankhar, Mayank Yadav. 1-6 [doi]
- A Novel Distributed Machine Learning Framework for Semi-Supervised Detection of Botnet AttacksGagandeep Kaur. 1-7 [doi]
- Recommending Optimal Tour for Groups Using Ant Colony OptimizationParul Agarwal, Mayank Sourabh, Rishabh Sachdeva, Siddharh Sharma, Shikha Mehta. 1-6 [doi]
- Teaching Methodology for IoT Workshop Course Using Node-REDRajalakshmi Krishnamurthi. 1-3 [doi]
- Moedor Cleaning RobotAnmol Taneja, Gagan Bansal, Rohil Setia, N. Hema. 1-5 [doi]
- Forecasting Price of Cryptocurrencies Using Tweets Sentiment AnalysisArti Jain, Shashank Tripathi, Harsh DharDwivedi, Pranav Saxena. 1-7 [doi]
- Modeling Recommendation System for Real Time Analysis of Social Media DynamicsShipra Goel, Muskan Banthia, Adwitiya Sinha. 1-5 [doi]
- Green IoT Systems: An Energy Efficient PerspectiveVinita Tahiliani, Mavuri Dizalwar. 1-6 [doi]
- Empirical Analysis of Bitcoin Market Volatility Using Supervised Learning ApproachHrishikesh Singh, Parul Agarwal. 1-5 [doi]
- Enhancing RansomwareElite App for Detection of Ransomware in Android ApplicationsShivangi, Gautam Sharma, Anubhav Johri, Akshita, Anurag Goel, Anuradha Gupta. 1-4 [doi]
- Optimised Prediction Model for Stock Market Trend AnalysisDevpriya Soni, Sparsh Agarwal, Tushar Agarwel, Pooshan Arora, Kopal Gupta. 1-3 [doi]
- Identification of Relevant Contextual Dimensions Using Regression AnalysisAnu Taneja, Anuja Arora. 1-6 [doi]
- Data Clustering Based on Data Transformation and Hybrid Step Size-Based Cuckoo SearchAvinash Chandra Pandey, Dharmveer Singh Rajpoot, Mukesh Saraswat. 1-6 [doi]
- An Intelligent Task Scheduling Approach for Cloud Using IPSO and A* Search AlgorithmBalasubramanian Prabhu Kavin, Sannasi Ganapathy, Arputharaj Karman. 1-5 [doi]
- Crime Prediction Based on Statistical ModelsShubham Agarwal, Lavish Yadav, Manish K. Thakur. 1-3 [doi]
- Robust Real Time Breaking of Image CAPTCHAs Using Inception v3 ModelSangeeta Mittal, Prashant Kaushik, Saquib Nadeem Hashmi, Kaushtubh Kumar. 1-5 [doi]
- Social Influence Maximization Using Genetic Algorithm with Dynamic ProbabilitiesSakshi Agarwal, Shikha Mehta. 1-6 [doi]
- Influence Indexing of Developers, Repositories, Technologies and Programming Languages on Social Coding Community GitHubRiyu Bana, Anuja Arora. 1-6 [doi]
- Empirical Investigation of Trends in NoSQL-Based Big-Data Solutions in the Last DecadeHarshit Gujral, Abhinav Sharma, Parmeet Kaur. 1-3 [doi]
- Link Prediction Method Using Topological Features and Ensemble ModelShruti Pachaury, Nilesh Kumar, Ayush Khanduri, Himanshu Mittal. 1-6 [doi]
- Application of Soft Computing on Localization in Wireless Sensor NetworksAmanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal. 1-5 [doi]
- Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection MethodsAmanpreet Kaur, Savita Walia, Krishan Kumar. 1-5 [doi]
- Parameter Estimation in a Biological System Using Differential Evolution AlgorithmSrikumar Panda, Ranjan Das. 1-6 [doi]
- Predicting Computer Network Traffic: A Time Series Forecasting Approach Using DWT, ARIMA and RNNRishabh Madan, Partha Sarathi Mangipudi. 1-5 [doi]
- A Data-Driven Framework for Survivable Wireless Sensor NetworksJasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana. 1-6 [doi]
- A Recommendation System for Online Purchase Using Feature and Product RankingR. V. Karthik, Sannasi Ganapathy, Arputharaj Kannan. 1-6 [doi]
- Requirement Risk Prioritization Using Analytic Hierarchy Process: A Gateway to Identify Risky RequirementsPriyanka Chandani, Chetna Gupta. 1-6 [doi]
- Early Detection of Distributed Denial of Service Attack in Era of Software-Defined NetworkBineet Kumar Joshi, Nitin Joshi, Mahesh Chandra Joshi. 1-3 [doi]
- Towards Dependency Based Collaborative Method for Requirement PrioritizationAnkita Gupta, Chetna Gupta. 1-3 [doi]
- Invitation or Bait? Detecting Malicious URLs in Facebook EventsSonu Gupta, Shelly Sachdeva. 1-6 [doi]
- Greening the Cloud Through Power-Aware Virtual Machine AllocationKashav Ajmera, Tribhuwan Kumar Tewari. 1-6 [doi]
- Fractional Discrete Cosine Transform Based Approach for Compensating the Effect of Light Variations for Robust Face RecognitionVirendra P. Vishwakarma. 1-6 [doi]
- A Lip Reading Model Using CNN with Batch NormalizationSaquib Nadeem Hashmi, Harsh Gupta, Dhruv Mittal, Kaushtubh Kumar, Aparajita Nanda, Sarishty Gupta. 1-6 [doi]
- An Overview of Pixel Value Differencing Based Data Hiding TechniquesAkanksha Singh, Mukesh Rawat, Awdhesh Kumar Shukla, Amod Kumar, Balvinder Singh. 1-3 [doi]
- Determination of Optimal Thread Pool for Cloud Based Concurrent Enhanced No-Escape SearchHarshit Gujral, Abhinav Sharma, Sangeeta Mittal. 1-6 [doi]
- Characterization Study of Developers in Non-Reproducible BugsAnjali Goyal, Neetu Sardana. 1-6 [doi]
- Recommendation Systems: Past, Present and FutureSeema P. Nehete, Satish R. Devane. 1-7 [doi]
- Modified DBSCAN Using Particle Swarm Optimization for Spatial Hotspot IdentificationAnkita, Manish K. Thakur. 1-3 [doi]
- Framework for Freight Truck Return-Trip Assignment SystemSumit Mishra, Vishal Singh, Devanjan Bhattacharya. 1-3 [doi]
- Singer Identification from Smaller Snippets of Audio Clips Using Acoustic Features and DNNsY. V. Srinivasa Murthy, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, Shashidhar G. Koolagudi. 1-6 [doi]