


default search action
15th IC3 2023: Noida, India
- Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023. ACM 2023
Track 1: Computer Algorithms and Applications
- Bhavani K
, Shashank A
, M. T. Gopala Krishna
:
Deep Learning-Based Diagnosis of Lung Abnormalities on X-ray images: A Comparative Study of U-Net and Sequential CNN Models. 1-7 - Aastha Nautiyal
, Devesh Kumar Bhardwaj
, Rachna Narula
, Harshendra Singh
:
Real Time Emotion Recognition Using Image Classification. 8-12 - Reshma Raju
, Anjali T
, Nandakishor Prabhu Ramlal
:
Dual Deep Learning model for Electricity Price Forecasting: Bi-LSTM and GRU fusion. 13-17 - Aditi Sharma
, Shriyanshi Srivastava
, Prakash Singh Rautela
, Bansidhar Joshi
:
Metaheuristics-Based Routing Optimization in On-Chip Network. 18-23 - Abhijeet Rana
, Aman Garg
, Rishabh Jain
, Aditi Sharma
:
Audio Examination - Mental Health Diagnosis in Healthcare through Audio Analytics. 24-29 - Oshin Mumtaha
, Atia Afroz
, Mohammad-Sahadet Hossain
, Tahiya Tasneem Oishee
:
Matrix Computation Based on ADI Method for Solutions of Discrete Lyapunov Equations and Application. 30-35 - Vijayshri Khedkar
, Ashwini Jatti
, Sujay Kumar
, Vrushti Shah
, Vedanshi Sahu
:
An analysis of implementation of convolutional neural networks to make an accident detection model. 36-42 - Aayush Singh
, Riya Goyal
, Kartik Singh Raihal
, Aryan Mishra
, Kamal Thadiwal
, Abhinav Tomar
:
Smart Charging: A Deployment Algorithm for Optimizing Wireless Rechargeable Sensor Networks. 43-50 - Zoha Waseem
, Zeeshan Ali Haq
, Anil Kumar Mahto
:
Heart arrhythmia detection based on ECG wave classification using neural network and Fuzzy Inference system. 51-57 - S. B. Taneja
, G. C. Brahma
, Sanjay Bisht
, Vinita Jindal
, Punam Bedi
:
Predator-Prey PSO based Weapon deployment in Constructive Simulation. 58-65
Track 2: Data and Cloud Computing
- Meghna Manoj Nair
, Anand Kumar Mishra
, Amit Kumar Tyagi
:
Fog Computing and Edge Computing: Open Issues, Critical Challenges and the Road Ahead for Future. 66-76 - Anjali Chauhan
, Prakash Kumar
:
A Cloud Architecture for Monitoring and Controlling Viral COVID-19: An architecture suitable for efficiently handling pandemic situations like COVID-19. 77-84 - Shilpa Parkhi
, Saumya Singh
, Aman Pushp
, Shailesh Rastogi
, Rahul Singh Gautam
:
Debt Financing and Firm's Performance: Panel Data Analysis. 85-93 - Akoramurthy Balasubramaniam
, Surendiran Balasubramanian
:
Quantum-resistant Blockchain Cryptography-based Smart City Transactions. 94-101 - Tejasva Jugran
, Aniket Dubey
, Priti Kumari
, Parmeet Kaur
:
Efficient Use of Blockchain for Crowdfunding Platform. 102-108 - Sanjeeb Tiwary
, Subhashree Darshana
, Debabrata Mohanty
, Adyasha Dash
, Potnuru Rupsa
, Rabindra K. Barik
:
Prediction of Algae Growth: A Machine Learning Perspective. 109-114 - Priya Chanda
, Pritpal Singh
:
Mapping the Landscape of Blockchain Research in Human Resource Management: A Bibliometric Analysis. 115-126 - Hemant Kumar Apat
, Ahmed Alkhayyat
, Ankit Vidyarthi
, Rabindra K. Barik
:
Leveraging Towards Serverless Edge Computing Model for Intelligent IoMT Applications. 127-132 - Kashav Ajmera
, Tribhuwan Kumar Tewari
, Vivek Kumar Singh
, Vikash
, Pawan Kumar Upadhyay
:
Energy-Aware Dynamic Virtual Machine Scheduling in Cloud Computing: A Survey. 133-141 - Deven Westmoreland
, Gahangir Hossain
:
Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. 142-146 - Punam Bedi
, Tanisha Roy
, Vidhi Arora
, Pushkar Gole
:
Smart Contract based Skill Verification System for Recruitment. 147-152 - Aditya Nautiyal
, Shubhangi Saklani
, Aditi Pant
, Yutika Agarwal
, Avantika Gaur
, Preeti Mishra
:
VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environment. 153-160 - Balbir Singh
, Jyoti Yadav
:
A paradigm of multi-class classification for type 2 diabetic mellitus using Deep Neural Network. 161-164 - Prathamesh Vijay Lahande
, Parag Ravikant Kaveri:
Fault Tolerance using Reinforcement Learning for Cloud Resource Management: Fault Tolerance using RL for Cloud Resource Management. 165-170
Track 3: Intelligent Computing
- Vishruth B. Gowda
, M. T. Gopala Krishna
, Megha J
:
Dynamic Background Modeling and Foreground Detection using Orthogonal Projection onto the Subspace of Moving Objects. 171-176 - Divya A Kittur
, Divya Maithreyi Tenneti
:
Comparative survey analysis of the CNN and LBPH Face Recognition Learning Algorithms: A Survey of Learning Approaches and Performance Evaluation. 177-180 - Shivangi Sachan
, Khushbu Doulani
, Mainak Adhikari
:
Semantic Analysis and Classification of Emails through Informative Selection of Features and Ensemble AI Model. 181-187 - Vishu Gupta
, Yuhui Lyu
, Derick Suarez
, Yuwei Mao
, Wei-Keng Liao
, Alok N. Choudhary
, Wing Kam Liu
, Gianluca Cusatis
, Ankit Agrawal
:
Physics-based Data-Augmented Deep Learning for Enhanced Autogenous Shrinkage Prediction on Experimental Dataset. 188-197 - Sudi Murindanyi
, Margaret Nagwovuma
, Barbara Nansamba
, Ggaliwango Marvin
:
Explainable Ensemble Learning and Trustworthy Open AI for Customer Engagement Prediction in Retail Banking. 198-206 - Manorama Chouhan
, Partha Sarathy Banerjee
, Amit Kumar
:
Identifying the Suitability of Artificial Intelligence Technology for Modern Farming. 207-215 - Archana Purwar
, Manju
:
Credit card fraud detection using XGBoost for imbalanced data set. 216-219 - Kirti Jain
, Shrey Gandhi
, Shivam Singhal
, Suryansh Rajput
:
Semantic Image Captioning using Cosine Similarity Ranking with Semantic Search. 220-223 - Md Rezanur Islam
, Insu Oh
, Muminov Ibrokhim Botir Ugli
, Kangbin Yim
:
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection. 224-229 - Arvind Mewada
, Rupesh Kumar Dewang
, Paritosh Goldar
, Sushil Kumar Maurya
:
SentiBERT: A Novel Approach for Fake Review Detection Incorporating Sentiment Features with Contextual Features. 230-235 - Gillala Rekha
, Anand Kumar Mishra
, Amit Kumar Tyagi
:
An Improved Oversampling Algorithms based on Informative Sample Selection Strategy Solving Imbalance. 236-244 - Shabnam Kumari
, P. Muthulakshmi
:
Weather Prediction Using Futuristic Technologies: From Industry's Perspective. 245-251 - Ashutosh Singh
, Sarishty Gupta
:
Image Based Action Recognition and Captioning Using Deep Learning. 252-261 - Mayuri Gupta
, Ashish Mishra
:
AB-DeepLabv3+: An Encoder-Decoder Method with Attention Mechanism for Polyp Segmentation. 262-268 - Kshamta Chauhan
, Ekta Gandotra
:
Risk Analysis of Android Applications using Static Permissions and Convolutional Neural Network. 269-273 - Dharvi Mittal
, Vegesana Eshita Raj
, Vimal Kumar
:
Revolutionizing Finance and Travel with AI: Impacting through Machine Learning Models. 274-281 - Rajeev Verma
, Avinash Chandra Pandey
:
Improving Early Detection of Suicide Ideation using Oversampling Methods. 282-288 - Shilpa Ghode
, Mayuri Digalwar
:
A Novel Model based Energy Management Strategy for Plug-in Hybrid Electric Vehicles using Deep Reinforcement Learning. 289-293 - J. Divya Udayan
, Veerababu Addanki
, Sathvik Durgapu
, Dhanvanth Reddy Yerramreddy
, Dorasanaiah Kolla
:
Forward Kinematics Simulation Of KUKA KR5 Arc Robot With Robo Analyzer. 294-299 - Deepali Sharma
, Harish Kumar
, Sakshi Kaushal
, Shalini Gainder
:
Arogi Chatbot: A platform for pre-screening gynecology and obstetrics patients. 300-306 - Talgan Kumar Rao
, Narayana Darapaneni
, Anwesh Reddy Paduri
, Amarnath G. S
, Arun Kumar
, Guruprasad Ps
:
Insider Threat Detection: Using Classification Models. 307-312 - Varshali Jaiswal
, Preetam Suman
, Amrit Suman
, Sasmita Padhy
:
Intelligent Hardware for Preventing Road Accidents Through the Use of Image Processing. 313-321 - Asha S
, Vinod P
, Varun G. Menon
:
MMDFD- A Multimodal Custom Dataset for Deepfake Detection. 322-327 - Amit Kumar Tyagi
, Richa
:
Digital Twin Technology: Opportunities and Challenges for Smart Era's Applications. 328-336 - Keerthan Kumar T. G.
, Himanshu Dhakate
, Shashidhar G. Koolagudi
:
IIMH: Intention Identification In Multimodal Human Utterances. 337-344 - Meenal Jain
, Saksham Gupta
, Geetali Agarwal
, Kritarth Bansal
:
AdaBoost based hybrid concept drift detection approach for mental health prediction. 345-351 - Ananya Aggarwal
, Samarth Gupta
, Vanshita Varshney
, Shruti Jaiswal
:
Heart Failure Prediction Using Different Machine Learning Algorithms. 352-360 - Ishdeep Singh
, Vivek Kumar Garg
:
Artificial intelligence in the current management and prediction of diabetes mellites. 361-365 - Gargi Misra
, Divya Kumar
:
Deep Learning Technique to Diagnose Depression in Audio. 366-370 - Akanksha Mehndiratta
, Pulkit Mehndiratta
:
Factors Affecting Student's Academic Performance In Programming Using Association Rule Mining. 371-374 - Dharmveer Singh Rajpoot
, Bhavey Mittal
, Harshit Dudani
, Ujjwal Singhal
:
Sales Analysis and Forecasting using Machine Learning Approach. 375-377 - Pratyush Raj Mishra
, Ilavarasi A. K.
:
Intracranial Haemorrhage Detection Based on Deep Learning Using CT Images. 378-385 - Aman Gupta
, Megha Rathi
:
Disentangling the Hidden Patterns of Heart Disease: A Factor Analysis and Machine Learning Approach for Early Detection and Prevention. 386-395 - Syed Afnan Hashir
, Dhruv Raj Kashyap
, Shivansh Tripathi
, Bansidhar Joshi
:
An Effective Approach for Image-Based Forgery Detection. 396-401 - Jaivardhan Singh Chaudhary
, Anurag Soni
, Mohit Kumar
, Chandra Prakash
, Narendra Sharma
:
A Pilot Study of Migraine Detection Using Computational Techniques. 402-411 - Harshada A Jadhav
, Nisha Agrawal
, Sandeep K. Joshi
, V. Venkatesh Shenoi
:
Hardware Counter-based Performance Analysis of ANUGA Flood Simulator. 412-418 - Thode Sai Prajwal
, Ilavarasi A. K.
:
A Comparative Study Of RESNET-Pretrained Models For Computer Vision. 419-425 - Varun Sunil Salgarkar
, Ilavarasi A. K.
:
Multi-Class Breast Cancer Classification from Digital Mammograms Using Vision Transformers. 426-436 - Akshat Gour
, Harsh Gupta
, Mohit Gupta
, Himanshu Agrawal
:
Augmented Reality Based Fashion Store. 437-442 - Liza Kansal
, Anoushka Pandey
, Sanidhya Madhav Shukla
, Parneeta Dhaliwal
:
Review of Machine Learning Techniques for Crop Recommendation. 443-449 - Gouransh Agrawal
, Unnati Jha
, Ranjeet Vasant Bidwe
:
Automatic Facial Expression Recognition using Advanced Transfer Learning. 450-458 - Uroosa Khan
, Mohd. Nazim
:
Fake News Detection over the Social Media by using Machine Learning Techniques: A Systematic Literature Review. 459-466 - Om Hotkar
, Pratheeik Radhakrishnan
, Akarsh Singh
, Natasha Jhamnani
, Ranjeet Vasant Bidwe
:
U-Net and YOLO: AIML Models for Lane and Object Detection in Real-Time. 467-473 - Ranjeet Vasant Bidwe
, Sashikala Mishra
, Simi Kamini Bajaj
:
Performance evaluation of Transfer Learning models for ASD prediction using non-clinical analysis. 474-483 - Manik Sabharwal
, Aman Sinha
, Dhruv Gupta
, Payal Malik
:
Impact Of Backbone Architectures And Loss Functions On U-Net Models For Brain Tumor Segmentation: A Comparative Analysis. 484-492 - Aharnish K. S
, Ansh Kumar
, Mohammad Shahanwaz
, Chandra Prakash
:
Facial Emotion Recognition System Using Deep CNN For Rehabilitation With Hardware Integration. 493-500 - Aparna Shrivastava
, Potukuchi Raghu Vamsi
:
Anomaly Detection using Minimum Covariant Determinant as Feature in Multivariate Data. 501-514 - Pawan Lahoti
, Namita Mittal
, Girdhari Singh
:
OptBertDCNN: A framework based on BERT and optimized Deep Convolutional Neural Network for MQA. 515-522 - Vipul Kumar Mishra
, Aditya Varshney
, Shekhar Yadav
:
Mitigating Adversarial Attacks using Pruning. 523-529 - Ankita Wadhwa
, Sherry Garg
, Manish Kumar Thakur
:
Automatic detection of DBSCAN parameters using BAT algorithm. 530-536 - Sangeeta Mittal
:
Explaining URL Phishing Detection by Glass Box Models. 537-544 - Jayant Gupta
, Shuai An
, Shashi Shekhar
:
Towards Responsible Spatial Data Science and Geo-AI. 545-551 - Jaemoon Lee
, Anand Rangarajan
, Sanjay Ranka
:
Nonlinear-by-Linear: Guaranteeing Error Bounds in Compressive Autoencoders. 552-561 - Jaemoon Lee
, Anand Rangarajan
, Sanjay Ranka
:
Nonlinear constraint satisfaction for compressive autoencoders using instance-specific linear operators. 562-571
Track 4: Network and Social Computing
- Thangavel Saravanan
, S. Saravanakumar
:
Energy efficient optimization algorithms for MANET. 572-579 - Shefali Goel
, Abhishek Verma
, Vinod Kumar Jain
:
A Lightweight Mitigation Approach for Addressing DDAO Attacks in RPL-based Internet of Things. 580-586 - Aarti Goel
, Devender Kumar
, Deepak Kumar Sharma
:
Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment. 587-590 - Shambhu Kumar
, Arti Jain
, Dinesh C. S. Bisht
:
Hybrid Approach for Link Prediction using Supervised Machine Learning in Social Networks: Combining Global and Local Features. 591-597 - Gisha Marin Jose
, Geetha K. N
:
A Contemporary Technique to Place PMU in an Electrical Power Network using Graph Theory. 598-602 - T. N. Nisha
, Dhanya Pramod
, Ravi Singh
:
Zero trust security model: Defining new boundaries to organizational network. 603-609 - Kumar Vaibhav Bhatnagar
, Rashmi Kushwah
:
Cyber Security in Internet of Things using Optimization algorithms: A Systematic Mapping of Literature. 610-615 - Nitin Kumar Tyagi
, Mukta Goyal
:
Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A Review. 616-622 - Kalyani Pendke
, Mayuri Digalwar
, Charu Goel
:
Identification and Analysis of Emotions from the Text for Stress Detection. 623-630 - Shrey Rastogi
, Shivam Sharma
, Suraj Kumar
, Gaurav Singal
:
Aqua Clear: Efficient Water Management for home water supply. 631-637 - Umesh Singh
, Jyotirmoy Bhardwaj
, Binod Kumar Kanaujia
:
An Efficient Beamformer and Power Splitter Design for SWIPT in Spectrum Sharing Network. 638-642 - Hemant Kumar Saini
, Kusumlata Jain
:
Past, Present, and Future of UAV in Sustainable Development: A Bibliometric Analysis: Bibliometric analysis of UAVs in Sustainability. 643-653 - Kaustubh Ranjan Singh
, Parul Garg
:
Decode Forward SWIPT Relay with Energy and Data Buffer: Performance Analysis. 654-659 - Himansu Sekhar Pattanayak
, Bhawna Saxena
, Adwitiya Sinha
:
Community Detection in Weighted Time-Variant Social Network. 660-665 - Shariq Murtuza
, Krishna Asawa
:
Detecting DDoS Attacks in Software Defined Networks (SDNs) with Random Forests. 666-673 - Hemant Kumar Saini
, Kusumlata Jain
:
Impact of Adaptive Velocity based Hello Intervals in UAS to Sustainability: Enhancing Network Performance through Adaptive Velocity based Hello Intervals. 674-682 - J. L. Shreya
, Anu Saini
:
Delay Analysis in Programmable Data Plane Using Jitter Calculations. 683-691 - Abhishek Bharadwaj Medicherla
, Rithvik Vukka
, Sampat Srivatsav Jakkinapalli
, Deepthi L. R
:
Influential Node Identification on an Multilayered Attributed Network. 692-698 - Neetu Sardana
, Arpita Jadhav Bhatt
:
iPDS: Computing Privacy Disclosure Score for iOS apps and detection of privacy-infringing apps using Machine learning classifiers. 699-705 - Ankita Verma
, Savita Singh
, Sakshi Gupta
:
A Fuzzified Approach for Overlapping Community Detection in Social Networks Based on Nodes Similarity. 706-710 - Ashish Singh Parihar
, Amitesh Pandey
:
Proposing A Novel Key Agreement Protocol For Flying Ad-Hoc Network. 711-715 - Arpita Jadhav Bhatt
, Parul Agarwal
:
Statistical Detection of Malicious iOS Apps through Ensemble and Active Learning. 716-721
Track 5: System and Software Engineering
- Prashant Kaushik
, Vikas Saxena
:
Video Annotation & Descriptions using Machine Learning & Deep learning: Critical Survey of methods. 722-735 - Zainab Fatima
, Khushbu Doulani
, Mainak Adhikari
:
SVM Kernel and It's Aggregation Using Stacking on Imbalanced Dataset. 736-742 - Dhanya Pramod
, S. Vijayakumar Bharathi
, Kanchan Pranay Patil
:
Blockchain-based Cybersecurity for Smart Manufacturing in Industry 4.0: Technology-Organization-Environment Approach. 743-749 - Neetu Singh
, Sandeep Kumar Singh
:
An Empirical Assessment of the Performance of Multi-Armed Bandits and Contextual Multi-Armed Bandits in Handling Cold-Start Bugs. 750-758 - Asmita Yadav
, Govind Yadav
, Saksham Jain
, Suraj Ajay Dwivedi
:
Comparison of ML, Deep Learning and Bio-inspired Algorithms in Bug Triaging. 759-765

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.