Abstract is missing.
- A Study on Energy Efficient Resource Allocation for Cloud Data CenterSudhanshu Kulshrestha, Sanjeev Patel. 1-7 [doi]
- Enhancing Text Mining Using Deep Learning ModelsAvinash Chandra Pandey, Mukund Garg, Sonali Rajput. 1-5 [doi]
- Gender Identification using Spectral Features and Glottal Closure Instants (GCIs)Pravin Bhaskar Ramteke, Sujata Supanekar, Shashidhar G. Koolagudi. 1-6 [doi]
- INSTAFIER: Instagram Profile VerifierMayur Aggarwal, Vaibhav Upadhyaya, Niyati Aggrawal. 1-6 [doi]
- Short-Term Bitcoin Price Fluctuation Prediction Using Social Media and Web Search DataAditi Mittal, Vipasha Dhiman, Ashi Singh, Chandra Prakash. 1-6 [doi]
- Ensemble Learning Approach for Enhanced Stock PredictionShikha Mehta, Priyanka Rana, Shivam Singh, Ankita Sharma, Parul Agarwal. 1-5 [doi]
- Ethics in AI: Collaborative filtering based approach to alleviate strong user biases and prejudicesShruti Sahu, Sandeep Kumar Singh. 1-6 [doi]
- Hybrid Approach for detecting DDOS Attacks in Software Defined NetworksGaganjot Kaur, Prinima Gupta. 1-6 [doi]
- Gold and Diamond Price Prediction Using Enhanced Ensemble LearningAvinash Chandra Pandey, Shubhangi Misra, Mridul Saxena. 1-4 [doi]
- A Multi-sensor System for Traffic Analysis at Smart IntersectionsTania Banerjee, Ke Chen, Xiaohui Huang, Anand Rangarajan 0001, Sanjay Ranka. 1-6 [doi]
- VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in CloudPreeti Mishra, Kashish Khurana, Saloni Gupta, Manish K. Sharma. 1-6 [doi]
- Preferential Selection of Locations for Installing CCTV using Fuzzy TOPSIS approach: A case study for North DelhiAvneesh Kumar, Harsh Kashyap, Harshit Malhotra, Karan Rawat, Girish Kumar, Umang Soni. 1-7 [doi]
- ECDSA for Data Origin Authentication and Vehicle Security in VANETRashmi Kushwah, Ayushi Kulshreshtha, Krishnapal Singh, Shivanshu Sharma. 1-5 [doi]
- Energy-Efficient Model for Deployment of Sensor Nodes in IoT based SystemUtsav Gupta, Yugandhar Tripathi, Hardik Bhardwaj, Shivansh Goel, Amarjeet Kaur, Prakash Kumar. 1-5 [doi]
- Implementation of a 2D A. I. Agent for nondeterministic games using Convolution Neural NetworkVishrut Sharma, Devashish Satija, Ayush Srivastava, Akanksha Mehndiratta. 1-6 [doi]
- Role of Opinion Leader for the diffusion of products using Epidemic model in Online Social NetworkLokesh Jain, Rahul Katarya, Shelly Sachdeva. 1-6 [doi]
- Experimental Analysis of Device-to-Device CommunicationUdit Narayana Kar, Debarshi Kumar Sanyal. 1-6 [doi]
- Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoTAditya Tandon, Prakash Srivastava. 1-7 [doi]
- Deep Learning Approach to Determine the Impact of Socio Economic Factors on Bitcoin Price PredictionApoorva Aggarwal, Isha Gupta, Novesh Garg, Anurag Goel. 1-5 [doi]
- Local Feature Extraction based KELM for Face RecognitionBhawna Ahuja, Virendra P. Vishwakarma. 1-5 [doi]
- Brain MR Image Classification via PSO based SegmentationAsmita Dixit, Aparajita Nanda. 1-5 [doi]
- Augmentation of Images through DCGANsHimanshu Arora, Samyak Jain, Sanket Anand, Dharmveer Singh Rajpoot. 1-6 [doi]
- Characterization of splicing in digital images using gray scale co-occurrence matricesSavita Walia, Krishan Kumar. 1-6 [doi]
- TextRank enhanced Topic Model for Query focussed Text SummarizationNadeem Akhtar, M. M. Sufyan Beg, Hira Javed. 1-6 [doi]
- Performance Comparison of Deep Neural Networks on Image DatasetsTejasv Agarwal, Himanshu Mittal. 1-6 [doi]
- Infusing Software Quality Concepts in Computer Science Engineering CoursesRuchin Gupta, Sanjay Goel. 1-7 [doi]
- Circular and Cylindrical Hotspots Detection for Spatial and Spatio-temporal DataShubham Agarwal, Lavish Yadav, Manish K. Thakur. 1-5 [doi]
- Providing Low Cost IoT Enabled Security Solutions for High Intensity RegionsMradula Sharma, Gagandeep Kaur. 1-7 [doi]
- Vectorization of Architectural Floor PlansParamita De. 1-5 [doi]
- Cryptober: A Blockchain-based Secure and Cost-Optimal Car Rental PlatformVikas Hassija, Mohd-Zaid, Gurjot Singh, Amit Srivastava, Vikas Saxena. 1-6 [doi]
- ORFDetector: Ensemble Learning Based Online Recruitment Fraud DetectionSangeeta Lal, Rishabh Jiaswal, Neetu Sardana, Ayushi Verma, Amanpreet Kaur, Rahul Mourya. 1-5 [doi]
- Pairwise Reviews Ranking and Classification for Medicine E-Commerce ApplicationShaurya Uppal, Ambikesh Jayal, Anuja Arora. 1-6 [doi]
- FIND: Fake Information and News Detections using Deep LearningAbhishek Verma, Vanshika Mittal, Suma Dawn. 1-7 [doi]
- Prediction of CO2 emissions using deep learning hybrid approach: A Case Study in Indian ContextLakshay Amarpuri, Navdeep Yadav, Girish Kumar, Saurabh Agrawal. 1-6 [doi]
- Comparison of Machine Learning Algorithms for Cervical Abnormality DetectionAshutosh Kanitkar, Yash Karwa, G. V. Kale, Varun Joshi, Sanjyot Gindi. 1-6 [doi]
- Deploying Deep Learning Models via IOT Deployment ToolsRajalakshmi Krishnamurthi, Raghav Maheshwari, Rishabh Gulati. 1-6 [doi]
- Human Sketch Recognition using Generative Adversarial Networks and One-Shot LearningDeepanshu Wadhwa, Utkarsh Maharana, Devina Shah, Vaibhav Yadav, Prashant Pandey. 1-6 [doi]
- Abstract of the KeynotesInderjit S. Dhillon. 1-2 [doi]
- Fuzzy based Adaptive Cluster Head Selection for Wireless Sensor NetworksPriyank Gour, Neeraj Jain, Sanjeev Kumar Gupta. 1-5 [doi]
- SMS Phishing and Mitigation ApproachesSandhya Mishra, Devpriya Soni. 1-5 [doi]
- Classification of Breast Microscopic Imaging using Hybrid CLAHE-CNN Deep ArchitectureAnkit Vidyarthi, Jatin Shad, Shubham Sharma, Paridhi Agarwal. 1-5 [doi]
- Comparison of Machine Learning Approaches in the Prediction of Terrorist AttacksPalak Agarwal, Mahak Sharma, Satish Chandra. 1-7 [doi]
- Exploiting Oriented Gradient Histogram for Dorsal Vein RecognitionParul Arora, Gopal Chaudhary, Smriti Srivastava. 1-4 [doi]
- User Reputation Analysis for effective Trading on Bitcoin NetworkDivya Singh, Lakshay Kumar, Somya Jain. 1-5 [doi]
- TaxiScan: A scan statistics approach for detecting Taxi demand hotspotsRishabh Jain, Shreya Garg, Saurabh Gangal, Ankita, Manish K. Thakur. 1-6 [doi]
- Temporal Recommendations for Discovering Author InterestsRishabh Malhotra, Anu Taneja, Anuja Arora. 1-6 [doi]
- Auto Tuning of RNN Hyper-parameters using Cuckoo Search AlgorithmDhruv Srivastava, Yasha Singh, Anita Sahoo. 1-5 [doi]
- A Machine Learning Approach for Enhancing Defence Against Global TerrorismKanika Singh, Anurag Singh Chaudhary, Parmeet Kaur. 1-5 [doi]
- Hadoop based Analysis and Visualization of Diabetes Data through TableauPriti Bhardwaj, Niyati Baliyan. 1-5 [doi]
- A Secure Key Delegation Mechanism for Fog NetworkingShardha Porwal, Sangeeta Mittal. 1-7 [doi]
- Multi-user Adaptive Launcher for AndroidSamriddha Basu, Raj Gite, Pratiksha Singh, Nataasha Raul. 1-6 [doi]
- A Simple and Robust End-to-End Encryption Architecture for Anonymous and Secure WhistleblowingHariharan Jayakrishnan, Ritwik Murali. 1-6 [doi]
- Fake News Detection Using Sentiment AnalysisBhavika Bhutani, Neha Rastogi, Priyanshu Sehgal, Archana Purwar. 1-5 [doi]
- Performance study of node wakeup rate on the privacy enabled addressing scheme in duty-cycled 6LoWPANMonali Mavani, Krishna Asawa. 1-4 [doi]
- Parkinson Disease Detection Using Deep Neural NetworksShivangi, Anubhav Johri, Ashish Tripathi. 1-4 [doi]
- Empirical Analysis of Ensemble Machine Learning Techniques for Bug TriagingAnjali Goyal, Neetu Sardana. 1-6 [doi]
- Fuzzy Logic based Crop Yield Prediction using Temperature and Rainfall parameters predicted through ARMA, SARIMA, and ARMAX modelsShivam Bang, Rajat Bishnoi, Ankit Singh Chauhan, Akshay Kumar Dixit, Indu Chawla. 1-6 [doi]
- Attention based Residual-Time Delay Neural Network for Indian Language IdentificationTirusha Mandava, Anil Kumar Vuppala. 1-5 [doi]
- Adaptive Radial Basis Functions Neural Network For Motor Imagery Task ClassificationVandana Agarwal. 1-6 [doi]
- Predicting and Preventing Fatal CrashesKavita Pandey, Prasenjeet Fulzele, Rajat Singh, Prasant Kumar, Saransh Singh. 1-6 [doi]
- Multi-Head Self-Attention Networks for Language IdentificationRavi Kumar Vuddagiri, Tirusha Mandava, Hari Krishna Vydana, Anil Kumar Vuppala. 1-5 [doi]
- Tampering Detection of Distributed Databases using Blockchain TechnologyKritika Rani, Chinmay Sharma. 1-4 [doi]
- Crowd Analysis for Congestion Control Early Warning System on Foot Over BridgeNarinder Singh Punn, Sonali Agarwal. 1-6 [doi]
- Heart Rhythm Abnormality Detection from PCG SignalVarsha Garg, Arpit Mathur, Nishant Mangla, Aman Singh Rawat. 1-5 [doi]
- A Multitenant Data Store Using a Column Based NoSQL DatabaseAditi Sharma, Parmeet Kaur. 1-5 [doi]
- An Automated Computer Vision Based System for Bottle Cap Fitting InspectionRutwik Kulkarni, Sourav Kulkarni, Shardul Dabhane, Nachiket Lele, R. S. Paswan. 1-5 [doi]
- Image Captioning using Google's Inception-resnet-v2 and Recurrent Neural NetworkYajurv Bhatia, Aman Bajpayee, Deepanshu Raghuvanshi, Himanshu Mittal. 1-6 [doi]
- Network System Design using Hyperledger Fabric: Permissioned Blockchain FrameworkShishir Ranjan, Amit Negi, Himansh Jain, Bhuvnesh Pal, Himanshu Agrawal. 1-6 [doi]
- Multi-level Trust Agreement in Cloud EnvironmentShweta Kaushik, Charu Gandhi. 1-5 [doi]
- On the Selection of Number of Sensors for a Wearable Sign Language Recognition SystemRinki Gupta. 1-6 [doi]
- A step towards Home Automation using IOTHarsh Kumar Singh, Saurabh Verma, Shashank Pal, Kavita Pandey. 1-5 [doi]
- Neural-Based Machine Translation System Outperforming Statistical Phrase-Based Machine Translation for Low-Resource LanguagesMuskaan Singh, Ravinder Kumar, Inderveer Chana. 1-7 [doi]
- Temporal measures for analysis of emotional states from human electroencephalography signalsMunaza Ramzan, Suma Dawn. 1-6 [doi]
- A novel method to estimate Height, Weight and Body Mass Index from face imagesAnkur Haritosh, Ayush Gupta, Ekam Singh Chahal, Ashwin Misra, Satish Chandra. 1-6 [doi]