Abstract is missing.
- Deep Learning-Based Diagnosis of Lung Abnormalities on X-ray images: A Comparative Study of U-Net and Sequential CNN ModelsBhavani K, Shashank A, Gopalakrishna M. T. 1-7 [doi]
- Real Time Emotion Recognition Using Image ClassificationAastha Nautiyal, Devesh Kumar Bhardwaj, Rachna Narula, Harshendra Singh. 8-12 [doi]
- Dual Deep Learning model for Electricity Price Forecasting: Bi-LSTM and GRU fusionReshma Raju, Anjali T, Nandakishor Prabhu Ramlal. 13-17 [doi]
- Metaheuristics-Based Routing Optimization in On-Chip NetworkAditi Sharma, Shriyanshi Srivastava, Prakash Singh Rautela, Bansidhar Joshi. 18-23 [doi]
- Audio Examination - Mental Health Diagnosis in Healthcare through Audio AnalyticsAbhijeet Rana, Aman Garg, Rishabh Jain, Aditi Sharma. 24-29 [doi]
- Matrix Computation Based on ADI Method for Solutions of Discrete Lyapunov Equations and ApplicationOshin Mumtaha, Atia Afroz, Mohammad-Sahadet Hossain, Tahiya Tasneem Oishee. 30-35 [doi]
- An analysis of implementation of convolutional neural networks to make an accident detection modelVijayshri Khedkar, Ashwini Jatti, Sujay Kumar, Vrushti Shah, Vedanshi Sahu. 36-42 [doi]
- Smart Charging: A Deployment Algorithm for Optimizing Wireless Rechargeable Sensor NetworksAayush Singh, Riya Goyal, Kartik Singh Raihal, Aryan Mishra, Kamal Thadiwal, Abhinav Tomar. 43-50 [doi]
- Heart arrhythmia detection based on ECG wave classification using neural network and Fuzzy Inference systemZoha Waseem, Zeeshan Ali Haq, Anil Kumar Mahto. 51-57 [doi]
- Predator-Prey PSO based Weapon deployment in Constructive SimulationS. B. Taneja, G. C. Brahma, Sanjay Bisht, Vinita Jindal, Punam Bedi. 58-65 [doi]
- Fog Computing and Edge Computing: Open Issues, Critical Challenges and the Road Ahead for FutureMeghna Manoj Nair, Anand Kumar Mishra, Amit Kumar Tyagi. 66-76 [doi]
- A Cloud Architecture for Monitoring and Controlling Viral COVID-19: An architecture suitable for efficiently handling pandemic situations like COVID-19Anjali Chauhan, Prakash Kumar. 77-84 [doi]
- Debt Financing and Firm's Performance: Panel Data AnalysisShilpa Parkhi, Saumya Singh, Aman Pushp, Shailesh Rastogi, Rahul Singh Gautam. 85-93 [doi]
- Quantum-resistant Blockchain Cryptography-based Smart City TransactionsAkoramurthy Balasubramaniam, Surendiran B. 94-101 [doi]
- Efficient Use of Blockchain for Crowdfunding PlatformTejasva Jugran, Aniket Dubey, Priti Kumari 0004, Parmeet Kaur. 102-108 [doi]
- Prediction of Algae Growth: A Machine Learning PerspectiveSanjeeb Tiwary, Subhashree Darshana, Debabrata Mohanty, Adyasha Dash, Potnuru Rupsa, Rabindra K. Barik. 109-114 [doi]
- Mapping the Landscape of Blockchain Research in Human Resource Management: A Bibliometric AnalysisPriya Chanda, Pritpal Singh. 115-126 [doi]
- Leveraging Towards Serverless Edge Computing Model for Intelligent IoMT ApplicationsHemant K. Apat, Ahmed Alkhayyat, Ankit Vidyarthi, Rabindra K. Barik. 127-132 [doi]
- Energy-Aware Dynamic Virtual Machine Scheduling in Cloud Computing: A SurveyKashav Ajmera, Tribhuwan Kumar Tewari, Vivek Kumar Singh, Vikash, Pawan Kumar Upadhyay. 133-141 [doi]
- Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat IntelligenceDeven Westmoreland, Gahangir Hossain. 142-146 [doi]
- Smart Contract based Skill Verification System for RecruitmentPunam Bedi, Tanisha Roy, Vidhi Arora, Pushkar Gole. 147-152 [doi]
- VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environmentAditya Nautiyal, Shubhangi Saklani, Aditi Pant, Yutika Agarwal, Avantika Gaur, Preeti Mishra. 153-160 [doi]
- A paradigm of multi-class classification for type 2 diabetic mellitus using Deep Neural NetworkBalbir Singh, Jyoti Yadav. 161-164 [doi]
- Fault Tolerance using Reinforcement Learning for Cloud Resource Management: Fault Tolerance using RL for Cloud Resource ManagementPrathamesh Vijay Lahande, Parag Ravikant Kaveri. 165-170 [doi]
- Dynamic Background Modeling and Foreground Detection using Orthogonal Projection onto the Subspace of Moving ObjectsVishruth B. G, Gopalakrishna MT, Megha J. 171-176 [doi]
- Comparative survey analysis of the CNN and LBPH Face Recognition Learning Algorithms: A Survey of Learning Approaches and Performance EvaluationDivya A Kittur, Divya Maithreyi Tenneti. 177-180 [doi]
- Semantic Analysis and Classification of Emails through Informative Selection of Features and Ensemble AI ModelShivangi Sachan, Khushbu Doulani, Mainak Adhikari. 181-187 [doi]
- Physics-based Data-Augmented Deep Learning for Enhanced Autogenous Shrinkage Prediction on Experimental DatasetVishu Gupta, Yuhui Lyu, Derick Suarez, Yuwei Mao, Wei-keng Liao, Alok N. Choudhary, Wing Kam Liu, Gianluca Cusatis, Ankit Agrawal 0001. 188-197 [doi]
- Explainable Ensemble Learning and Trustworthy Open AI for Customer Engagement Prediction in Retail BankingSudi Murindanyi, Margaret Nagwovuma, Barbara Nansamba, Ggaliwango Marvin. 198-206 [doi]
- Identifying the Suitability of Artificial Intelligence Technology for Modern FarmingManorama Chouhan, Partha Sarathy Banerjee, Amit Kumar. 207-215 [doi]
- Credit card fraud detection using XGBoost for imbalanced data setArchana Purwar, Manju. 216-219 [doi]
- Semantic Image Captioning using Cosine Similarity Ranking with Semantic SearchKirti Jain, Shrey Gandhi, Shivam Singhal, Suryansh Rajput. 220-223 [doi]
- Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion DetectionMd Rezanur Islam, Insu Oh, Muminov Ibrokhim Botir Ugli, Kangbin Yim. 224-229 [doi]
- SentiBERT: A Novel Approach for Fake Review Detection Incorporating Sentiment Features with Contextual FeaturesArvind Mewada, Rupesh Kumar Dewang, Paritosh Goldar, Sushil Kumar Maurya. 230-235 [doi]
- An Improved Oversampling Algorithms based on Informative Sample Selection Strategy Solving ImbalanceGillala Rekha, Anand Kumar Mishra, Amit Kumar Tyagi. 236-244 [doi]
- Weather Prediction Using Futuristic Technologies: From Industry's PerspectiveShabnam Kumari, P. Muthulakshmi. 245-251 [doi]
- Image Based Action Recognition and Captioning Using Deep LearningAshutosh Singh, Sarishty Gupta. 252-261 [doi]
- AB-DeepLabv3+: An Encoder-Decoder Method with Attention Mechanism for Polyp SegmentationMayuri Gupta, Ashish Mishra. 262-268 [doi]
- Risk Analysis of Android Applications using Static Permissions and Convolutional Neural NetworkKshamta Chauhan, Ekta Gandotra. 269-273 [doi]
- Revolutionizing Finance and Travel with AI: Impacting through Machine Learning ModelsDharvi Mittal, Vegesana Eshita Raj, Vimal Kumar. 274-281 [doi]
- Improving Early Detection of Suicide Ideation using Oversampling MethodsRajeev Verma, Avinash Chandra Pandey. 282-288 [doi]
- A Novel Model based Energy Management Strategy for Plug-in Hybrid Electric Vehicles using Deep Reinforcement LearningShilpa Ghode, Mayuri Digalwar. 289-293 [doi]
- Forward Kinematics Simulation Of KUKA KR5 Arc Robot With Robo AnalyzerDivya Udayan J, Veerababu Addanki, Sathvik Durgapu, Dhanvanth Reddy Yerramreddy, Dorasanaiah Kolla. 294-299 [doi]
- Arogi Chatbot: A platform for pre-screening gynecology and obstetrics patientsDeepali Sharma, Harish Kumar, Sakshi Kaushal, Shalini Gainder. 300-306 [doi]
- Insider Threat Detection: Using Classification ModelsTalgan Kumar Rao, Narayana Darapaneni, Anwesh Reddy Paduri, Amarnath G. S, Arun Kumar, Guruprasad Ps. 307-312 [doi]
- Intelligent Hardware for Preventing Road Accidents Through the Use of Image ProcessingVarshali Jaiswal, Preetam Suman, Amrit Suman, Sasmita Padhy. 313-321 [doi]
- MMDFD- A Multimodal Custom Dataset for Deepfake DetectionAsha S, Vinod P 0001, Varun G. Menon. 322-327 [doi]
- Digital Twin Technology: Opportunities and Challenges for Smart Era's ApplicationsAmit Kumar Tyagi, Richa. 328-336 [doi]
- IIMH: Intention Identification In Multimodal Human UtterancesKeerthan Kumar T. G., Himanshu Dhakate, Shashidhar G. Koolagudi. 337-344 [doi]
- AdaBoost based hybrid concept drift detection approach for mental health predictionMeenal Jain, Saksham Gupta, Geetali Agarwal, Kritarth Bansal. 345-351 [doi]
- Heart Failure Prediction Using Different Machine Learning AlgorithmsAnanya Aggarwal, Samarth Gupta, Vanshita Varshney, Shruti Jaiswal. 352-360 [doi]
- Artificial intelligence in the current management and prediction of diabetes mellitesIshdeep Singh, Vivek Kumar Garg. 361-365 [doi]
- Deep Learning Technique to Diagnose Depression in AudioGargi Misra, Divya Kumar. 366-370 [doi]
- Factors Affecting Student's Academic Performance In Programming Using Association Rule MiningAkanksha Mehndiratta, Pulkit Mehndiratta. 371-374 [doi]
- Sales Analysis and Forecasting using Machine Learning ApproachDharmveer Singh Rajpoot, Bhavey Mittal, Harshit Dudani, Ujjwal Singhal. 375-377 [doi]
- Intracranial Haemorrhage Detection Based on Deep Learning Using CT ImagesPratyush Raj Mishra, Ilavarasi A. K.. 378-385 [doi]
- Disentangling the Hidden Patterns of Heart Disease: A Factor Analysis and Machine Learning Approach for Early Detection and PreventionAman Gupta, Megha Rathi. 386-395 [doi]
- An Effective Approach for Image-Based Forgery DetectionSyed Afnan Hashir, Dhruv Raj Kashyap, Shivansh Tripathi, Bansidhar Joshi. 396-401 [doi]
- A Pilot Study of Migraine Detection Using Computational TechniquesJaivardhan Singh Chaudhary, Anurag Soni, Mohit Kumar, Chandra Prakash, Narendra Sharma. 402-411 [doi]
- Hardware Counter-based Performance Analysis of ANUGA Flood SimulatorHarshada A Jadhav, Nisha Agrawal, Sandeep K. Joshi, V. Venkatesh Shenoi. 412-418 [doi]
- A Comparative Study Of RESNET-Pretrained Models For Computer VisionThode Sai Prajwal, Ilavarasi A. K.. 419-425 [doi]
- Multi-Class Breast Cancer Classification from Digital Mammograms Using Vision TransformersVarun Sunil Salgarkar, Ilavarasi A. K.. 426-436 [doi]
- Augmented Reality Based Fashion StoreAkshat Gour, Harsh Gupta, Mohit Gupta, Himanshu Agrawal. 437-442 [doi]
- Review of Machine Learning Techniques for Crop RecommendationLiza Kansal, Anoushka Pandey, Sanidhya Madhav Shukla, Parneeta Dhaliwal. 443-449 [doi]
- Automatic Facial Expression Recognition using Advanced Transfer LearningGouransh Agrawal, Unnati Jha, Ranjeet Bidwe. 450-458 [doi]
- Fake News Detection over the Social Media by using Machine Learning Techniques: A Systematic Literature ReviewUroosa Khan, Mohd. Nazim. 459-466 [doi]
- U-Net and YOLO: AIML Models for Lane and Object Detection in Real-TimeOm Hotkar, Pratheeik Radhakrishnan, Akarsh Singh, Natasha Jhamnani, Ranjeet Vasant Bidwe. 467-473 [doi]
- Performance evaluation of Transfer Learning models for ASD prediction using non-clinical analysisRanjeet Vasant Bidwe, Sashikala Mishra, Simi Bajaj. 474-483 [doi]
- Impact Of Backbone Architectures And Loss Functions On U-Net Models For Brain Tumor Segmentation: A Comparative AnalysisManik Sabharwal, Aman Sinha, Dhruv Gupta, Payal Malik. 484-492 [doi]
- Facial Emotion Recognition System Using Deep CNN For Rehabilitation With Hardware IntegrationAharnish K. S, Ansh Kumar, Mohammad Shahanwaz, Chandra Prakash. 493-500 [doi]
- Anomaly Detection using Minimum Covariant Determinant as Feature in Multivariate DataAparna Shrivastava, P. Raghu Vamsi. 501-514 [doi]
- OptBertDCNN: A framework based on BERT and optimized Deep Convolutional Neural Network for MQAPawan Lahoti, Namita Mittal, Girdhari Singh. 515-522 [doi]
- Mitigating Adversarial Attacks using PruningVipul Kumar Mishra, Aditya Varshney, Shekhar Yadav. 523-529 [doi]
- Automatic detection of DBSCAN parameters using BAT algorithmAnkita Wadhwa, Sherry Garg, Manish Kumar Thakur. 530-536 [doi]
- Explaining URL Phishing Detection by Glass Box ModelsSangeeta Mittal. 537-544 [doi]
- Towards Responsible Spatial Data Science and Geo-AIJayant Gupta, Shuai An, Shashi Shekhar. 545-551 [doi]
- Nonlinear-by-Linear: Guaranteeing Error Bounds in Compressive AutoencodersJaemoon Lee, Anand Rangarajan 0001, Sanjay Ranka. 552-561 [doi]
- Nonlinear constraint satisfaction for compressive autoencoders using instance-specific linear operatorsJaemoon Lee, Anand Rangarajan 0001, Sanjay Ranka. 562-571 [doi]
- Energy efficient optimization algorithms for MANETT. Saravanan, S. Saravanakumar. 572-579 [doi]
- A Lightweight Mitigation Approach for Addressing DDAO Attacks in RPL-based Internet of ThingsShefali Goel, Abhishek Verma, Vinod Kumar Jain. 580-586 [doi]
- Cryptanalysis of an Authentication Scheme for WSN within an IoT EnvironmentAarti Goel, Devender Kumar, Deepak Kumar Sharma. 587-590 [doi]
- Hybrid Approach for Link Prediction using Supervised Machine Learning in Social Networks: Combining Global and Local FeaturesShambhu Kumar, Arti Jain, Dinesh Bisht. 591-597 [doi]
- A Contemporary Technique to Place PMU in an Electrical Power Network using Graph TheoryGisha Marin Jose, Geetha K. N. 598-602 [doi]
- Zero trust security model: Defining new boundaries to organizational networkT. N. Nisha, Dhanya Pramod, Ravi Singh. 603-609 [doi]
- Cyber Security in Internet of Things using Optimization algorithms: A Systematic Mapping of LiteratureKumar Vaibhav Bhatnagar, Rashmi Kushwah. 610-615 [doi]
- Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A ReviewNitin Kumar Tyagi, Mukta Goyal. 616-622 [doi]
- Identification and Analysis of Emotions from the Text for Stress DetectionKalyani Pendke, Mayuri Digalwar, Charu Goel. 623-630 [doi]
- Aqua Clear: Efficient Water Management for home water supplyShrey Rastogi, Shivam Sharma, Suraj Kumar, Gaurav Singal. 631-637 [doi]
- An Efficient Beamformer and Power Splitter Design for SWIPT in Spectrum Sharing NetworkUmesh Singh, Jyotirmoy Bhardwaj, Binod Kumar Kanaujia. 638-642 [doi]
- Past, Present, and Future of UAV in Sustainable Development: A Bibliometric Analysis: Bibliometric analysis of UAVs in SustainabilityHemant Kumar Saini, Kusumlata Jain. 643-653 [doi]
- Decode Forward SWIPT Relay with Energy and Data Buffer: Performance AnalysisKaustubh Ranjan Singh, Parul Garg. 654-659 [doi]
- Community Detection in Weighted Time-Variant Social NetworkHimansu Sekhar Pattanayak, Bhawna Saxena, Adwitiya Sinha. 660-665 [doi]
- Detecting DDoS Attacks in Software Defined Networks (SDNs) with Random ForestsShariq Murtuza, Krishna Asawa. 666-673 [doi]
- Impact of Adaptive Velocity based Hello Intervals in UAS to Sustainability: Enhancing Network Performance through Adaptive Velocity based Hello IntervalsHemant Kumar Saini, Kusumlata Jain. 674-682 [doi]
- Delay Analysis in Programmable Data Plane Using Jitter CalculationsJ. L. Shreya, Anu Saini. 683-691 [doi]
- Influential Node Identification on an Multilayered Attributed NetworkAbhishek Bharadwaj Medicherla, Rithvik Vukka, Sampat Srivatsav Jakkinapalli, Deepthi L. R. 692-698 [doi]
- iPDS: Computing Privacy Disclosure Score for iOS apps and detection of privacy-infringing apps using Machine learning classifiersNeetu Sardana, Arpita Jadhav Bhatt. 699-705 [doi]
- A Fuzzified Approach for Overlapping Community Detection in Social Networks Based on Nodes SimilarityAnkita Verma, Savita Singh, Sakshi Gupta. 706-710 [doi]
- Proposing A Novel Key Agreement Protocol For Flying Ad-Hoc NetworkAshish Singh Parihar, Amitesh Pandey. 711-715 [doi]
- Statistical Detection of Malicious iOS Apps through Ensemble and Active LearningArpita Jadhav Bhatt, Parul Agarwal. 716-721 [doi]
- Video Annotation & Descriptions using Machine Learning & Deep learning: Critical Survey of methodsPrashant Kaushik, Vikas Saxena. 722-735 [doi]
- SVM Kernel and It's Aggregation Using Stacking on Imbalanced DatasetZainab Fatima, Khushbu Doulani, Mainak Adhikari. 736-742 [doi]
- Blockchain-based Cybersecurity for Smart Manufacturing in Industry 4.0: Technology-Organization-Environment ApproachDhanya Pramod, S. Vijayakumar Bharathi, Kanchan Pranay Patil. 743-749 [doi]
- An Empirical Assessment of the Performance of Multi-Armed Bandits and Contextual Multi-Armed Bandits in Handling Cold-Start BugsNeetu Singh, Sandeep Kumar Singh 0001. 750-758 [doi]
- Comparison of ML, Deep Learning and Bio-inspired Algorithms in Bug TriagingAsmita Yadav, Govind Yadav, Saksham Jain, Suraj Ajay Dwivedi. 759-765 [doi]