Abstract is missing.
- Web Application Based Text EncryptionRashmi Kushwah, Rishabh Rajpurohit, Paul Jonathan, Gaurav Kumar. 1-6 [doi]
- Improving Classifier Efficiency by Expanding Number of Functions in the DatasetSujata Gudge, Preetam Suman, Varshali Jaiswal, Dhananjay Bisen. 7-10 [doi]
- DS-AT: An efficient watermarking technique based on Arnold transform in DCT and SVD domainMukesh Saraswat, Raju Pal, Roop Singh. 11-14 [doi]
- Brain Tumor Classification using Machine Learning and Deep Learning Algorithms: A Comparison: Classifying brain MRI images on thebasis of location of tumor and comparingthe various Machine Learning and Deep LEARNING models used to predict best performanceAnanya Joshi, Vipasha Rana, Aman Sharma. 15-21 [doi]
- CiAFP: Category-based Classification of iOS Apps by mining frequent permissionsNeetu Sardana, Arpita Jadhav Bhatt. 22-26 [doi]
- Identification of undamaged buildings after the event of disaster using Deep LearningNeha Tyagi, Mukesh Saraswat. 27-31 [doi]
- Covid-19 spread Forecast with respect to vaccination based on LSTM and GRUSidharth Sunil, Vishnu Dinesh Kumar, Akhil Babu, Goutham Thilak, Divya Udayan. 32-36 [doi]
- Food Image Recognition by optimizing CNN with PSO and GAMegha Chopra, Archana Purwar. 37-42 [doi]
- SVM and Logistic Regression for Facial Palsy Detection Utilizing Facial Landmark FeaturesAnuja Arora, Anubhav Sinha, Kaushal Bhansali, Rachit Goel, Isha Sharma, Ambikesh Jayal. 43-48 [doi]
- Implementation of Zero-Phase Zero Frequency Resonator Algorithm on FPGASyed Abdul Jabbar, Purva Sharma, Krishna Gurugubelli, Syed Azeemuddin, Anil Kumar Vuppala. 49-53 [doi]
- Analysis of Deep Learning Models for Anomaly Detection in Time Series IoT Sensor DataUjjwal Sachdeva, Potukuchi Raghu Vamsi. 54-62 [doi]
- Applications of Blockchain Technology: A ReviewRiya Sapra, Parneeta Dhaliwal. 63-66 [doi]
- An Exhaustive Investigation on Resource-aware Client Selection Mechanisms for Cross-device Federated LearningMonalisa Panigrahi, Sourabh Bharti, Arun Sharma. 67-73 [doi]
- Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspectionMohit Bhatt, Avantika Gaur, Saksham Badoni, Preeti Mishra. 74-80 [doi]
- Achieving multilevel elasticity for distributed stream processing systems in the cloud environment: A review and conceptual frameworkRiddhi Thakkar, Madhuri Bhavsar. 81-90 [doi]
- A Cost-Variant Renewable Energy-Based Scheduling Algorithm for Cloud ComputingManas Kumar Mishra, Sanjaya Kumar Panda. 91-97 [doi]
- Data Analysis of Agriculture using Data Mining TechniquesMohamed Ali Mohamed, Muhsin Abdi Mohamud. 98-105 [doi]
- Cloud Task Scheduling Algorithms using Teaching-Learning-Based Optimization and Jaya AlgorithmMonika Tak, Akanksha Joshi, Sanjaya Kumar Panda. 106-113 [doi]
- Dynamic Target Monitoring of Load Balancers in Cloud ComputingAyushi Verma, Tapas Badal, Indrajeet Gupta. 114-119 [doi]
- Mutual Authentication of Devices under Multi-Cluster Environment in Industrial Internet of Things (IIoT) NetworksAkshay Kumar, Muzzammil Hussain. 120-126 [doi]
- Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environmentChanchal Ahlawat, Rajalakshmi Krishnamurthi. 127-135 [doi]
- Ensemble based feature selection approach for malware analysisMahesh Gawali, Chandrashekhar Azad. 136-140 [doi]
- Virtual Machine Placement Techniques Based on Biological Models: Comprehensive Research and StudyMadala Guru Brahmam, Vijay Anand Rajasekaran. 141-148 [doi]
- Personalized Knee Angle Prediction Models Using Machine LearningAntarleen Pal, Chandra Prakash. 149-155 [doi]
- Minimizing Cold Start Times in Serverless DeploymentsDaniyaal Khan, Basant Subba, Sangeeta Sharma. 156-161 [doi]
- Obviating Multiple Attacks with Enhanced Logic LockingPaul Anu, N. Mohankumar 0003, M. Nirmala Devi. 162-167 [doi]
- Priority-Aware Resource Allocation Algorithm for Cloud ComputingKushagra Kinger, Ajeet Singh, Sanjaya Kumar Panda. 168-174 [doi]
- Secure ECC based Key Exchange Mechanism for Devices in IoT NetworksAkshay Kumar, Muzzammil Hussain. 175-179 [doi]
- Validation Intelligently of Automobile and People for Safe and Smart SocietyRohit Rastogi, Tribhuvan Mishra, Vaishnavi Mishra. 180-189 [doi]
- Intuitionistic Fuzzy Representation of Plant Images captured using Unmanned Aerial Vehicle for Measuring Mango Crop HealthVinita Vinita, Suma Dawn. 190-195 [doi]
- FExR.A-DCNN: Facial Emotion Recognition with Attention mechanism using Deep Convolution Neural NetworkPratishtha Verma, Vasu Aggrawal, Jyoti Maggu. 196-203 [doi]
- Solving basic and advanced human activities using LSTMNishu Bansal, Satish Chandra. 204-207 [doi]
- Sarcasm Detection in News Headlines using Voted ClassificationSantosh Kumar Bharti, Rajeev Kumar Gupta, Nikhlesh Pathik, Ashish Mishra. 208-212 [doi]
- Autism Spectrum Disorder Detection Using AI and IoTNitin Arvind Shelke, Sanjeev Rao, Anil Kumar Verma, Singara Singh Kasana. 213-219 [doi]
- Leveraging Towards Analytical Approach of Fixed batch-based Queueing assisted Blockchain SystemVeena Goswami, B. B. Dash, Subhranshu Sekhar Tripathy, Barun Bikram Dash, Sudhansu Shekhar Patra, Rabindra Kumar Barik. 220-224 [doi]
- Cryptocurrency Price Prediction Using Twitter and News Articles AnalysisPriya Bansal, Shikha Jain. 225-233 [doi]
- Investigation of Subword-Based Bilingual Automatic Speech Recognition for Indian LanguagesAditya Yadavalli, Shelly Jain, Ganesh Mirishkar, Anil Kumar Vuppala. 234-241 [doi]
- Object Detection for Autonomous Vehicle in Hazy Environment using Optimized Deep Learning TechniquesBagesh Kumar, Amritansh Mishra, Aayush Talesara, Shubham Kumar, Sourav Dey, O. P. Vyas 0001, Ranjana Vyas. 242-249 [doi]
- A Survey on Surveillance using DronesGolla Uday Sai Theja, Motukoori Sai Murari, M. Franckie Singha, Ripon Patgiri, Ananya Choudhury. 250-257 [doi]
- Multi-Vehicle Tracking and Speed Estimation Model using Deep LearningPrajwal, Navaneeth, Tharun, Anand Kumar. 258-262 [doi]
- Application of Machine Learning Techniques in Modern Agriculture: A ReviewAngelina Gill, Tarandeep Kaur, Yendrembam K. Devi. 263-270 [doi]
- Fake News Detection Using Machine Learning AlgorithmsJoan L. Imbwaga, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi. 271-275 [doi]
- Stock Prices Prediction Based on Social Influence & Historic DataPrashant Kumar, Sneha Adhikari, Parul Agarwal, Anita Sahoo. 276-283 [doi]
- Shifted Delta Cepstral Coefficients with RNN to Improve the Detection of Parkinson's Disease from the SpeechAnshul Lahoti, Krishna Gurugubelli, Juan Rafel Orozco-Arroyave, Anil Kumar Vuppala. 284-288 [doi]
- Analyzing Banking Services Applicability Using Explainable Artificial IntelligenceAnand Sriram, Sai Srivatsa Gorti, Eshaan Ganesh Amin, Anand Kumar. 289-293 [doi]
- Kernel Extreme Learning Machine with Mixture Correntropy for Face RecognitionBhawna Ahuja, Virendra P. Vishwakarma. 294-299 [doi]
- Fuzzy Kernel Extreme Learning Machine for Face RecognitionBhawna Ahuja, Virendra P. Vishwakarma. 300-304 [doi]
- Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning TechniquesDincy R. Arikkat, Rafidha Rehiman K. A., Vinod P., Suleiman Y. Yerima, Manoja W, Pooja S, Shilpa Sekhar, Sohan James, Josna Philomina. 305-312 [doi]
- Deepfake Creation and Detection using Ensemble Deep Learning ModelsSanjeev Rao, Nitin Arvind Shelke, Aditya Goel, Harshita Bansal. 313-319 [doi]
- A GWO based efficient approach to identify terrorist incident hotspots in IndiaAnkita Wadhwa, Manish Kumar Thakur. 320-325 [doi]
- Predictive Model for Object Classification and Detection using Deep LearningPriya Singh, Rajalakshmi Krishnamurthi. 326-333 [doi]
- A Sentimental Analysis System Using Zero-Shot Machine Learning TechniqueShreya Ganga, Arun Solanki. 334-341 [doi]
- A Literature Survey of Drunk Driving Detection ApproachesAnkit Kumar, Ajay Kumar. 342-349 [doi]
- Towards improving Disfluency Detection from Speech using Shifted Delta Cepstral CoefficientsUtkarsh Mehrotra, Sparsh Garg, Krishna Gurugubelli, Anil Kumar Vuppala. 350-355 [doi]
- Sentiment Analysis using Modified GRUAditya Agarwal, Prasanjit Dey, Sanjay Kumar. 356-361 [doi]
- Detecting Android Malicious Applications using Dynamic Malware Analysis and Machine LearningMeghna Dhalaria, Ekta Gandotra. 362-366 [doi]
- A Deep Learning approach for detection and analysis of respiratory infections in covid-19 patients using RGB and infrared imagesBhavya Avuthu, Naveen Yenuganti, Swathi Kasikala, Alekhya Viswanath, Sarath S. 367-371 [doi]
- AI-driven Real-time System for Land Surveillance and ReconnaissanceShaikh F. Shahnoor, Kishanlal Suthar, Ravi Kumar, Manish Rathore, Rajashekhar C. Biradar, Kartik Cholachgudda. 372-381 [doi]
- Prediction of Breast Cancer using Machine Learning TechniquesParthh Dikshit, Bhawna Dey, Ayush Shukla, Akhilesh Singh, Tarankit Chadha, Vivek Kumar Sehgal. 382-387 [doi]
- Diagnosis of Covid-19 using Deep LearningDivya Sharma, Kritika Shelly, Ekta Gandotra, Deepak Gupta 0005. 388-395 [doi]
- Impact of Image Pre-processing Operations on Wheat Canopy SegmentationAnkita Gupta, Lakhwinder Kaur, Gurmeet Kaur. 396-403 [doi]
- Density based geospatial clustering: Methods, Applications and Future DirectionsRichik Kuila, Prathamesh Sengupta, Minakhi Rout, Rabindra K. Barik. 404-409 [doi]
- Reward based Video Summarization using Advanced Deep Learning ArchitecturesJaya Gupta, Deepak Garg 0002, Vipul Kumar Mishra. 410-416 [doi]
- Optimized Forex Trading using Ensemble of Deep Q-Learning AgentsBagesh Kumar, Aadharsh Roshan, Ayush Baranwal, Sankalp Rajendran, Sahil Sharma, Amritansh Mishra, O. P. Vyas 0001. 417-428 [doi]
- An approach for classifying benign and malignant skin lesions using Optimized Deep Learning and SVMBagesh Kumar, Amritansh Mishra, Subham Raj, Aditya Kumar, Om Suhas Vibhandik, Aayush Talesara, Shubham Kumar, O. P. Vyas 0001. 429-439 [doi]
- Detection of COVID-19 Protocols Violation in Real Time using Deep LearningNishant Singh, Anurag Goel. 440-445 [doi]
- A Systematic Survey on COVID 19 Detection and Diagnosis by Utilizing Deep Learning Techniques and Modalities of RadiologyShrishtee Agrawal, Abhishek Singh, Abhishek Tiwari, Anushri Mishra, Abhinandan Tripathi. 446-452 [doi]
- Explainable Machine Learning For Malware Detection Using Ensemble Bagging AlgorithmsRajesh Kumar, Geetha Subbiah. 453-460 [doi]
- Mid Price Prediction via Statistical Feature Expansion and Kernel Adaptive FilteringShambhavi Mishra, Tanveer Ahmed, Vipul Kumar Mishra. 461-466 [doi]
- Sample Reduction for Support Vector Data Description (SVDD) by Farthest Boundary Point Estimation (FBPE) using Gradients of Data DensityPratyush Pareek, Aaryan Bhardwaj, Sanskar Patro, Anirudh Arora, Muskan Deep Kaur Maini, Bagesh Kumar, O. P. Vyas 0001. 467-475 [doi]
- Quantum Enhanced Machine Learning for Unobtrusive Stress MonitoringAnupama Padha, Anita Sahoo. 476-483 [doi]
- Recent Trends on Blockchain for Internet of Things based Applications: Open Issues and Future TrendsAtharva Deshmukh, Disha Patil, Amit Kumar Tyagi, Arumugam S. S, Arumugam. 484-492 [doi]
- NoiseBay: A Real-World Study on Transparent Data CollectionJulia Buwaya, José D. P. Rolim. 493-501 [doi]
- Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple ClientsDimitrios Melissourgos, Hanzhi Gao, Chaoyi Ma, Shigang Chen, Samuel S. Wu. 502-508 [doi]
- Block Chain Application for E-Voting Process Using ML for South Asian ContinentRohit Rastogi, Yash Rastogi, Saransh Chauhan. 509-513 [doi]
- Susceptible-Infected Epidemics on Human Contact NetworksKundan Kandhway. 514-519 [doi]
- Mitigating Epidemics Through Vaccination, Treatment, and Awareness ProgramsKundan Kandhway. 520-525 [doi]
- Secure On-demand Routing Protocol in VANETSAnubhuti Roda Mohindra, Charu Gandhi, Varsha Garg. 526-530 [doi]
- Assessment of Modified BAT Algorithm for MOOC Learner Influence MaximizationKirti Aggarwal, Anuja Arora. 531-537 [doi]
- A Solution to Evade Social Media DistractionAman Tahiliani, Adarsh Kumar Verma, Shubham Agrawal, Kavita Pandey. 538-543 [doi]
- Secure and Energy Efficient Routing in Wireless Sensor Network using Machine LearningMeena Pundir, Jasminder Kaur Sandhu, Puneet Kumar, Prateek Srivastava. 544-549 [doi]
- Internet of Medical Things (IoMT) Security and Privacy: A Survey of Recent Advances and Enabling TechnologiesArpna Saxena, Sangeeta Mittal. 550-559 [doi]
- Comparing the Performance of TCP/IP with Named Data Networking Using ns-3Naveen Kumar, Naveen Kumar Gupta. 560-563 [doi]
- Security Analysis of User Authentication and MethodsAdarsh Thapa, Chiraag Singh Dhapola, Hemraj Saini. 564-572 [doi]
- Combinational Features with centrality measurements on GCN+LR classification of Adversarial Attacks in homogenous GraphsGutta Akshitha Sai, Komma Naga Sai Likhitha, Maddi Pavan Kalyan, Perisetla Anjani Devi, Prathibhamol C.. 573-581 [doi]
- Preserving Privacy using Distributed Ledger Technology in Intelligent Transportation SystemAmit Kumar Tyagi, Meghna Manoj Nair. 582-590 [doi]
- MarineServe: An IoT-based AI-enabled Multi-Purpose Real-time Alerting System for Fishing BoatsGnana Yashaswini Sriram, Jivtesh M. R, Gaushik M. R, N. B. Sai Shibu, Sethuraman Rao. 591-596 [doi]
- Enhancing reliable communication to improve network lifetime in Wireless Sensor Networks by Displacement and Direction Conscious Adhoc On-Demand Multipath Distance Vector routing protocolT. Saravanan, S. Saravanakumar. 597-606 [doi]
- A Centroid Localization Improved CLLEACH Protocol to Improve the Performance of Sensor NetworkKapil Juneja, Vipul Kumar Mishra. 607-615 [doi]
- Neighbor-Node Analysis based Min-Max Algorithm to Generate Optimized Route in WSNKapil Juneja, Vipul Kumar Mishra. 616-621 [doi]
- Cluster Formation and Cluster Head Selection to Increase the Lifetime of Heterogeneous Wireless Sensor NetworkKumari Ritika, Arvind Kumar Pandey, Sudhir Shukla. 622-628 [doi]
- De-Fence: LoRa based Hop-to-Hop CommunicationAnav Chaudhary, Maanas Talwar, Avil Goel, Gaurav Singal, Riti Kushwaha. 629-637 [doi]
- Optimal and Dynamic Scheduling using Multiple Mobile Chargers in Rechargeable Sensor Networks: An MADM-based ApproachRiya Goyal, Abhinav Tomar. 638-645 [doi]
- Min-Hop Foremost Paths in Interval Temporal GraphsAnuj Jain, Sartaj Sahni. 646-652 [doi]
- Comparative Analysis of Smart Irrigation System Using IOTShivam Rajpoot, Deepti Singh. 653-659 [doi]
- Performance investigation of MZM based RoF link by employing Digital and Analog data transmissionAayushi Gupta, Parvin Kumar, Vibhav Kumar Sachan, Balram Tamrakar. 660-665 [doi]
- MLOps Automation - Developing a RESTful API for Text Based Emotion DetectionYusuf Omeiza Ahmed, Marko Manyang Monydit, Abhilasha Sharma. 666-672 [doi]
- Transmission Gate based Keeper Control for Domino Logic CircuitsAnsuman Rout, Sagar DN, A. Anita Angeline, Sasipriya P. 673-678 [doi]
- A Survey on Software Test Case Minimization: This is the subtitle of the paper, this document both explains and embodies the submission format for authors using WordSyed Rizwan, Md. Shazzad Ali Sobuj, Mostafijur Rahman Akhond. 679-684 [doi]
- A New High Performance Active Building Block Suitable for Low Voltage Low Power Signal ProcessingAtul Kumar, Bhartendu Chaturvedi, Shafali Jagga. 685-688 [doi]
- The State of Test Automation in DevOps: A Systematic Literature ReviewAkshit Raj Patel, Sulabh Tyagi. 689-695 [doi]
- End to End Framework for CNN Acceleration on FPGAs with Dynamic Algorithm MappingHaomei Liu, Yuan Meng, Sanmukh Rao Kuppannagari, Viktor K. Prasanna. 696-700 [doi]
- Checkpointing à la Young/Daly: An OverviewAnne Benoit, Yishu Du, Thomas Hérault, Loris Marchal, Guillaume Pallez, Lucas Perotin, Yves Robert, Hongyang Sun, Frédéric Vivien. 701-710 [doi]