Abstract is missing.
- Prostate Cancer Prognosis Using Multi-Layer Perceptron and Class Balancing TechniquesSurbhi Gupta, Manoj Kumar. 1-6 [doi]
- Restricted Randomness DBSCAN : A faster DBSCAN AlgorithmSashakt Pathak, Arushi Agarwal, Ankita Ankita, Mahendra Kumar Gurve. 7-12 [doi]
- Applying Cognitive and Neural Network Approach over Control Flow Graph for Software Defect PredictionKumar Rajnish, Vandana Bhattacharjee, Vishnu Chandrabanshi. 13-17 [doi]
- Recent Trends in Artificial Intelligence for Emotion Detection using Facial Image AnalysisPriti Rai Jain, S. M. K. Quadri, Muskan Lalit. 18-36 [doi]
- A Study of Network-on-Chip PerformanceVijaya Bhaskar. 37-42 [doi]
- Malignancy Grade Identification and Classification of Brain MR Images with New 2D Co-occurrence Matrix and Wavelet TransformationAnkit Vidyarthi, Jyoti Nagpal. 43-50 [doi]
- Quantum Communication: Concept, Applications, and Future OutlookTanya Rastogi, Vikas Hassija, Vikas Saxena. 51-56 [doi]
- A Sequential Algorithm to Solve gH-Differentiable Interval Optimization ProblemsShaveta Kumari, Saurabh Srivastava. 57-62 [doi]
- TryItOut : Machine Learning Based Virtual Fashion AssistantAnkit Ankit, Bharti Bharti, Chandra Prakash. 63-69 [doi]
- Early Diagnosis of Alzheimer's Disease using Machine Learning Based MethodsMuskan Kapoor, Mehak Kapoor, Rohit Shukla, Tiratha Raj Singh. 70-76 [doi]
- Image Segmentation based Background Removal and ReplacementMeenal Gupta, Ritik Goyal, Siddharth Shekhar, Rajalakshmi Krishnamurthi. 77-85 [doi]
- Detection of iOS Malware apps based on Significant Services Identification using Borda countNeetu Sardana, Arpita Jadhav Bhatt. 86-91 [doi]
- A Novel Threshold Secret Sharing Scheme for CP-ABE: A secret sharing approach for CP-ABEShardha Porwal, Sangeeta Mittal. 92-98 [doi]
- A Secure Blockchain based Finance ApplicationUrshila Ravindran, P. Raghu Vamsi. 99-109 [doi]
- Active Human Pose Estimation for Assisted LivingAnkur raj, Divyanshi Singh, Chandra Prakash. 110-116 [doi]
- Virtual Machine Introspection in Virtualization: A Security PerspectiveDivya Kapil, Preeti Mishra. 117-124 [doi]
- Low Power XNOR based Single Ended VCO Circuit Design with Dynamic Threshold MOSVivek Jangra, Manoj Kumar. 125-131 [doi]
- A Full Mirror Computation Model for Edge-Cloud ComputingYuanda Wang, Ye Xia 0001, Youlin Zhang, Dimitrios Melissourgos, Olufemi Odegbile, Shigang Chen. 132-139 [doi]
- Platforms for Edge Computing and Internet of Things applications: A surveyDaniel Balouek-Thomert, Manish Parashar. 140-149 [doi]
- ROAMM: A customizable and interactive smartwatch platform for patient-generated health dataYashaswi Karnati, Ruben Zapata, Matthew J. McConnell, Rohith R. K. Reddy, Varun Reddy Regalla, Aseem Thakkar, Jordan Alpert, Tonatiuh Mendoza, Parisa Rashidi, Mamoun T. Mardini, Michael Marsiske, Thomas M. Gill, Todd M. Manini, Sanjay Ranka. 150-158 [doi]
- Leveraging Spatial Information in Smart Grids using STGCN for Short-Term Load ForecastingChung-Ming Cheung, Sanmukh R. Kuppannagari, Rajgopal Kannan, Viktor K. Prasanna. 159-167 [doi]
- FABEMD based Innovative Watermarking MethodEswaraiah Rayachoti, Sudhir Tirumalasetty. 168-173 [doi]
- Robust Video Watermarking in Frequency Domain for Copyright ProtectionRoop Singh, Alaknanda Ashok, Mukesh Saraswat. 174-178 [doi]
- A New Harris Hawk Whale Optimization Algorithm for Enhancing Neural NetworksParul Agarwal, Naima Farooqi, Aditya Gupta, Shikha Mehta, Saransh Khandelwal. 179-186 [doi]
- Fusion Framework for Morphological and Multispectral Textural Features for Identification of Endometrial TuberculosisVarsha Garg, Anita Sahoo, Vikas Saxena. 187-195 [doi]
- Performance Analysis and Evaluation of Routing Protocols for Mobile Adhoc NetworksGaurav Kumar Nigam. 196-202 [doi]
- CbPIS: Cyberbullying Profile Identification System with Users in LoopMonika Choudhary, Satyendra Singh Chouhan, Emmanuel S. Pilli. 203-208 [doi]
- Explainable AI for Deep Learning Based Disease DetectionShakti Kinger, Vrushali Kulkarni. 209-216 [doi]
- Close-Price Prediction using Online Kernel Adaptive FilteringShambhavi Mishra, Tanveer Ahmed, Vipul Kumar Mishra. 217-222 [doi]
- The Variegated Applications of Deep Learning Techniques in Human Activity RecognitionGautham Sathish Nambissan, Prateek Mahajan, Shivam Sharma, Neha Gupta. 223-233 [doi]
- Functional Brain Image Clustering and Edge Analysis of Acute Stroke Speech Arrest MRISudhanshu Saurabh, P. K. Gupta. 234-240 [doi]
- Machine Unlearning: Its Need and Implementation StrategiesAman Tahiliani, Vikas Hassija, Vinay Chamola, Mohsen Guizani. 241-246 [doi]
- Revisiting Machine Learning Training Process for Enhanced Data PrivacyAdit Goyal, Vikas Hassija, Victor Hugo C. de Albuquerque. 247-251 [doi]
- Shallow learning for MTL in end-to-end RNN for basic sequence taggingRajat Subhra Bhowmick, Trina Ghosh, Astha Singh, Sayak Chakraborty, Jaya Sil. 252-261 [doi]
- Real Life Violence Detection in Surveillance Videos using Spatiotemporal FeaturesAnugrah Srivastava, Tapas Badal, Rishav Singh. 262-266 [doi]
- Acoustic Features, Bert Model and their complementary Nature for Alzheimer's Dementia DetectionNayan Anand Vats, Aditya Yadavalli, Krishna Gurugubelli, Anil Kumar Vuppala. 267-272 [doi]
- A Generative Adversarial Network based Training Framework for Robust TTS in Noisy EnvironmentKishore Kumar Botsa, Lithin Reddy Marla, Suryakanth V. Gangashetty. 273-277 [doi]
- Investigate the Impact of Resampling Techniques on Imbalanced Datasets: A Case Study in Plant Disease PredictionAnshul Bhatia, Anuradha Chug, Amit Prakash Singh, Dinesh Singh. 278-285 [doi]
- Medical Prescription and Report AnalyzerBipin Kumar Rai, Shivani Sharma, Anjani Kumar, Akash Goyal. 286-295 [doi]
- An Encoder-decoder based approach for generating Faces using Facial Attributes using CNNAnu Saini, Mukul Rawat, Nikhil Pandey, Puneet Gupta. 296-302 [doi]
- Effect of stationarity on traditional machine learning models: Time series analysisAnkit Dixit, Shikha Jain. 303-308 [doi]
- Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service ClusteringNeha Agarwal, Geeta Sikka, Lalit Kumar Awasthi. 309-313 [doi]
- GATT: A Genetic Algorithm-based Tool for Automating Timetable Scheduling at Netaji Subhas University of TechnologyHarnirvair Singh, Ritu Sibal, Sulabh Tyagi. 314-319 [doi]
- Speech Emotion Recognition Using MFCC and Wide Residual NetworkManas Gupta, Satish Chandra. 320-327 [doi]
- e-Epidemic Model on Covid-19: A Fuzzy ApproachSamir Kumar Pandey, Shiv Shankar Prasad Shukla, Anil Kumar Yadav, Dharmveer Singh Rajpoot. 328-332 [doi]
- Improving Classification Performance of Deep Learning Models Using Bio-Inspired ComputingVaishali Baviskar, Madhushi Verma, Pradeep Chatterjee. 333-340 [doi]
- An AI based Solution for Predicting the Text Pattern from Sign Languagebhargav, Abhishek DN, Deekshitha, Skanda Talanki, Sumalatha Aradhya, Thejaswini. 341-348 [doi]
- Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis EnvironmentAnandaram S., Ashik Mathew, Jyothish A., Vinod P., Francesco Mercaldo. 349-354 [doi]
- GeoAI - Accelerating a Virtuous Cycle between AI and GeoLokendra P. S. Chauhan, Shashi Shekhar. 355-370 [doi]
- Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstratorChristos Grigoriadis, Spyridon Papastergiou, Panayiotis Kotzanikolaou, Christos Douligeris, Antreas Dionysiou, Elias Athanasopoulos, Karin Bernsmed, Per HÃ¥kon Meland, Liina Kamm. 371-377 [doi]
- Performance Analysis of Python-based Finite Volume Solver ANUGA on Modern ArchitecturesNisha Agrawal, Abhishek Das, Girishchandra R. Yendargaye, T. S. Murugesh Prabhu, Sandeep K. Joshi, V. Venkatesh Shenoi. 378-387 [doi]
- Locally Linear Embedding based Indoor Localization in Internet of ThingsAkshat Jain, Neeraj Jain. 388-393 [doi]
- Study on Blockchain Scalability SolutionsShobha Tyagi, Madhumita Kathuria. 394-401 [doi]
- Evaluation of Text Representation Method to Detect Cyber Aggression in Hindi English Code Mixed Social Media TextShikha Mundra, Namita Mittal. 402-409 [doi]
- Measure Brand Influencing Index across Social Media PlatformsAnu Taneja, Anuja Arora, Arjun Goyal, Rhythm Gupta. 410-416 [doi]
- Intelligent Traffic Signal Management using DRL for a Real-time Road Network in ITSAnanya Paul, Krishnendu Bera, Devtanu Misra, Sattwik Barua, Saurabh Singh, Nishu Nishant Kumar, Sulata Mitra. 417-425 [doi]
- Enhancement of Network Life Time in the LEACH Protocol for Real Time ApplicationsMonika Malik, Gayatri Sakya, Alok Joshi. 426-431 [doi]
- AI Driven Identification of Fake News Propagation in Twitter Social Media with Geo-Spatial AnalysisPriyanshu Sehgal, Bhavika Bhutani, Neha Rastogi, Adwitiya Sinha, Megha Rathi. 432-437 [doi]
- A Tensor Decomposition Based Approach for Context-Aware Recommender Systems (CARS)Sparsh Shukla, Ishita Kalsi, Ayush Jain, Ankita Verma. 438-442 [doi]
- Topic Wise Influence Maximisation based on fuzzy modelling, Sentiments, Engagement, Activity and Connectivity IndexesNeetu Sardana, Dhanshree Tejwani, Tanvi Thakur, Mansi Mehrotra. 443-449 [doi]
- Analyzing the Relationship between Software Metrics and Bad Smells Using Critical Metric Value (CMV)Mansi Agnihotri, Anuradha Chug. 450-456 [doi]
- MABTriage: Multi Armed Bandit Triaging Model ApproachNeetu Singh, Sandeep Kumar Singh. 457-460 [doi]
- Examining Security for Different Data ModelsVartika Puri, Shelly Sachdeva. 461-468 [doi]
- Parental Security Control: A tool for monitoring and securing children's online activitiesMilind Kumar, Vaibhav Dwivedi, Anubhav Sanyal, Parth Bhatt, Rupesh Koshariya. 469-474 [doi]
- Optimized Test Case Generation for Basis Path Testing using Improved Fitness Function with PSOUpdesh Jaiswal, Amarjeet Prajapati. 475-483 [doi]