PaperID |
Authors |
Paper Title |
18 |
Anand Nayyar and Rajeshwar Singh |
IEEMARP: Improvised Energy Efficient Multipath Ant Colony Based Routing Protocol for Wireless Sensor Networks |
23 |
Priya Gupta, Aradhya Neeraj Mathur, Rishabh Chandak, Kriti Kathuria and Satyam Sangal |
Recommender System based on Fuzzy c-means |
29 |
Shelly . and Mamta Kathuria |
A Novel Approach to Measure the Semantic Similarity for Information Retrieval |
37 |
Nitya Komalan and Aarti Chauhan |
Locating Real Time Faults in Modern Metro Train Tracks using Wireless Sensor Network |
51 |
Minhaj Khan, Neha Agarwal and Saurabh Jaiswal |
An Announcer Based Bully Election Leader Algorithm in Distributed Environment |
57 |
Subiya Zaidi, Shrish Kumar Singh and Sandhya Tarar |
Isotropic Pore Detection Algorithm for Level 3 Feature Extraction |
71 |
Geetha Ramalingam and Geetha Subbiah |
Improved Reversible Data Embedding In Medical Images Using I-IWT and Pairwise Pixel Difference Expansion |
93 |
Akshata Shendre and Lalit Damahe |
Fusion Based Image Retrieval Using Local and Global Descriptor |
97 |
Ruchi Sharma and Lalit B. Damahe |
V-HOG: Towards Modified Query Based Image Retrieval |
103 |
Abhisek Gour |
A hybrid feature extraction approach for finding local discriminative coordinates for face recognition |
104 |
Abhishek Kumar and Bhawana Saini |
A Sugeno- Mamdani Fuzzy System Based Soft Computing Approach towards Sensor Node Localization with Optimization |
105 |
Gourav Takhar, Chandra Prakash, Namita Mittal and Rajesh Kumar |
Vision Based Gender Recognition using Hybrid Background Subtraction Technique |
108 |
Manoj Kumar and Kh.Manglem Singh |
Content Based Medical Image Retrieval System (CBMIRS) To Diagnose Hepatobiliary Images |
110 |
Amanpreet Kaur, Bikrampal Kaur and Dheerendra Singh |
Comparative Analysis of Metaheuristics based Load Balancing Optimization in Cloud Environment |
137 |
Dr.Amit Verma, Bharti Chhabra and Baljeet Nagra |
Twitter Recommendation and Interest of user using Convolutional neural network |
146 |
Nagaraj Bhat, U Eranna and Manoj Kumar Singh |
Robust Global Gradient Thresholds Estimation in Anisotropic diffusion for Image Restoration using DE |
151 |
Diwaker Mourya and Ashutosh Bhatt |
Classification of Hyperspectral imagery using Random Forest |
156 |
Reya Sharma, Rashika Bangroo, Manoj Kumar and Neetesh Kumar |
A Model for Resource Constraint Project Scheduling Problem Using Quantum inspired PSO |
165 |
Arshad Husain and Rakesh Chandra Vaishya |
An AHP Based Automated Approach for Pole-Like Objects Detection using Three Dimensional Terrestrial Laser Scanner Data |
166 |
Mridul Ghosh and Debotosh Bhattacharjee |
Human Identification By Gait Using Fourier Descriptor And Angle-Based Pseudo Anatomical Landmark Model |
185 |
Jasvir Kaur, Isha Vatts and Amit Verma |
Acute Myeloid Leukemia Detection in WBC Cell Based on ICA Feature Extraction |
189 |
Toran Verma and Sipi Dubey |
Optimizing Rice Plant Diseases Recognition in Image Processing and Decision Tree Based Model |
190 |
Vikram K and Sarat Kumar Sahoo |
Interference Aware Adaptive Transmission Power Control Algorithm for Zigbee Wireless Networks |
229 |
Rahul Chauhan, Surbhi Negi and Subhi Jain |
Detection and Estimation of 2-D brain tumor size using Fuzzy c-means clustering |
257 |
Saurav Dhakad, Jayesh Gangrade, Jyoti Bharti and Antriksha Somani |
Real Time Hand Gesture Recognition using Histogram of Oriented Gradient with Support Vector Machine |
259 |
Sudha P and Rengarajan A |
Delay and Interference Aware Sleep Scheduling Technique for WiMAX networks |
270 |
Sweta Jain and Pavan Yadav |
Controlled Replication based Bubble Rap routing Algorithm in Delay Tolerant Network |
271 |
Rupak Chakraborty, Kuntal Chowdhury and Rama Sushil |
A New Objective Function Based Multi-Level Image Segmentation Using Differential Evolution |
273 |
B. Prathiba, Dr.K. Jaya Sankar and Dr.V. Sumalatha |
A Novel Clustering Algorithm for Leveraging Data Qual-ity in Wireless Sensor Network |
276 |
Saurabh Shanu and Sudeepto Bhattacharya |
A COMPUTATIONAL APPROACH FOR DESIGNING TIGER CORRIDORS IN INDIA |
282 |
Manisha Khulbe, Malay Ranjan Tripathy and Harish Parthasarathy |
Plasmonics for THz applications: Design of Graphene square patch antenna tested with different substrates for THz Applications |
283 |
Abhikriti Narwal and Sunita Dhingra |
Enhanced Task Scheduling Algorithm Using Multi-Objective Function for Cloud Computing Framework |
285 |
Mitali Desai and Mayuri A. Mehta |
Descriptive, Dynamic and Hybrid Classification Algorithm to Classify Engineering Students’ Sentiments |
327 |
Moxanki Bhavsar, Jayesh Munjani and Maulin Joshi |
Target Tracking in WSN using Dynamic Neural Network Techniques |
328 |
Shaji N Raj and Elizabeth Sherly |
AN SQL INJECTION DEFENSIVE MECHANISM USING REVERSE INSERTION TECHNIQUE |
331 |
Ramachandran Venaktesan, Yi Zhang, Octavia Dobre and Cheng Li |
Compressed Sensing-based Sparse Channel Estimation with Overcomplete Dictionaries |
336 |
Atul Mishra |
Study and Proposal of Probabilisitic Model for SIP Server Overload Control |
344 |
Toran Verma, Sipi Dubey and Hiteshwari Sabrol |
Color Image Segmentation of Disease Infected Plant Images Captured in an Uncontrolled Environment |
367 |
Shailaja Kalvagadda and Dr. B.Anuradha B |
Deep Learning based Adaptive Linear Collaborative Discriminant Regression Classification for Face Recognition |
369 |
Selvi Rajendran |
Gesture Supporting Smart Notice Board Using Augmented Reality |
379 |
Deepti Yadav and Arunima Verma |
Comparative Performance Analysis of PMSM Drive using ANFIS and MPSO Techniques |
388 |
Muhammad Nouman Shafique |
Developing the Hybrid Multi Criteria Decision Making Approach for Green Supplier Evaluation |
396 |
Natarajan Meghanathan |
A Quadratic Model for the Kurtosis of Decay Centrality |
419 |
Anindya Kr. Biswas and G.P. Biswas |
A Dealer- and Cheating-Less Multi-Threshold Secret Sharing Scheme |
427 |
Neelam Panwar, Sarita Negi and Man Mohan Singh Rauthan |
Non-Live Task Migration Approach for Scheduling in Cloud Based Applications |
429 |
Ravi Raj Choudhary, Savita Sharma and Gaurav Meena |
Detection of leukemia in human blood samples through image processing |
432 |
Punal M Arabi, Gayatri Joshi, Tejaswi Bhat and Varini Chinnabhandar |
Automatic screening method for bone health diagnosis |
434 |
Sumit Kumar, Anurag Singh Tomar and Sandip K Chaurasiya |
Enhanced Secure Transmission of Data in Wireless Body Area Network for Health Care Applications |
436 |
Anil Kumar Bisht, Ravendra Singh, Ashutosh Bhatt and Rakesh Bhutiani |
Development of an Automated Water Quality Classification Model for the river Ganga |
441 |
Jaya Sheela C S |
Reliable Vertical Handoff Technique Based on Probabilistic Classification Model |
445 |
Mugdha Sharma and Laxmi Ahuja |
A Data Mining Approach towards HealthCare Recommender System |
452 |
Bharati Ainapure, Dr. Deven Shah and A Ananda Rao |
A Novel Approach to Detect and Mitigate Cache Side Channel Attack in Cloud Environment |
454 |
Jagana Bihari Padhy and Bijayananda Patnaik |
Optical wireless systems with DPSK and Manchester coding |
459 |
Smithamol M B and Dr Rajeswari Sridhar |
Root Table: Dynamic Indexing Scheme for Access Protection in e-Healthcare Cloud |
467 |
Ankita Rajawat, Nirmala Sharma and Harish Sharma |
Efficient Artificial Bee Colony Optimization |
470 |
Vikram Sunil Bajaj, Varun Sunil Bajaj and D.Teja Santosh |
DEVELOPMENT OF A MICRO HINDI OPINION WORDNET AND ALIGNING WITH HOWN ONTOLOGY FOR AUTOMATIC RECOGNITION OF OPINION WORDS FROM HINDI DOCUMENTS |
474 |
Rashmi Agarwal, Harish Sharma and Nirmala Sharma |
Gaussian scale factor based Differential Evolution |
488 |
Jaspreet Singh, Gurvinder Singh, Rajinder Singh and Prithvipal Singh |
Evaluation and Analysis of Word Embedding Vectors of English Text using Deep Learning Technique |
489 |
Abhishek Bajpai and Shivangi Nigam |
Normalized Scores for Routes in MANET to Analyze and Detect Collaborative Blackhole Attack |
490 |
Sahla Habeeba M.A, Philomina Simon and Prajith R |
Robust Face Recognition using Sparse and Dense Hybrid Representation with Local Correlation |
491 |
Kokila Jagadeesh, Arjun Murali Das, Ramasubramanian N and Manjith B.C |
Light weight two-Factor Authentication using Hybrid PUF and FSM for SOC FPGA |
503 |
Ashish Gupta and Bikash Sarkar |
An Efficient Parallel Approach for Mapping of Finite Binomial Series (Special Cases) on BSN mesh |
519 |
K Abhimanyu Kumar Patro, Ayushi Banerjee and Bibhudendra Acharya |
A Simple, Secure and Time Efficient Multi – Way Rotational Permutation and Diffusion based Image Encryption by Using Multiple 1 – D Chaotic Maps |
523 |
Rajesh Singh, Mamta Mittal and Anita Gehlot |
DESIGN AND DEVELOPMENT OF A CLOUD ASSISTED ROBOT |
524 |
Jitendra Tembhurne |
Parallel Multiplication of Big Integer on GPU |
525 |
Manjith Bc, Kokila J and Ramasubramanian N |
Adaptive Dynamic Partial Reconfigurable Security System |
526 |
Avita Katal and Vinayak Bajoria |
A Cloudlet Allocation Strategy Using Multilevel Queue and User factor (CAMQU) |
527 |
Sukhada Bhingarkar and Deven Shah |
Fuzzy Entropy based Feature Selection for Website User Classification in EDoS Defense |
533 |
Vaibhavi Rajendran and G Bharadwaja Kumar |
Prosody Detection from Text using Aggregative Linguistic Features |
535 |
Ravi Kumar Yb and C K Narayanappa |
Simple Analysis of Virtual Triangles to Determine the Facial Similarities among Relatives |
547 |
Narendrababu Reddy G and Dr. S.Phani Kumar |
Multi Objective Task Scheduling Algorithm for Cloud computing using Whale Optimization technique |
548 |
Ganesan P |
CIELch Color Space based Satellite Image Segmentation using Soft Computing Techniques |
557 |
Dr. T P Singh and Manisha Singh |
Multilayered Feedforward Neural Network (MLFNN) Architecture as Bidirectional Associative Memory (BAM) for Pattern Storage and Recall |
572 |
Mitali Chugh and Nitin Chanderwal |
Critical Success Factors and Critical Barriers for Application of Information Technology to Knowledge Management/ Experience Management for Software Process Improvement – Findings from literary studies |
581 |
Hemalatha R.J and Vijaybaskar V |
Despeckling Filter Evaluation Using Image Quality Metrics and Coefficient of Variation |
587 |
Sanjoy Chowdhury, Partha Sarathi Mukherjee and Ujjwal Bhattacharya |
Not Too Deep CNN for Face Detection in Real Life Scenario |
588 |
Suvitha D and Dr.M.Vijayalakshmi Muthuswamy |
Traffic Prediction using Viterbi Algorithm in Machine Learning Approach |
598 |
Santosh Verma and Shyam Krishna Nagar |
Application of Grey Wolf Optimizer for Optimization of Fractional Order Controllers for a Non-Monotonic Phase System |
606 |
Punal M Arabi, Prathibha Tp, Surekha Nigudgi and Divya Susheel |
FEASIBILITY STUDY OF NIR,DSLR IMAGING TECHNIQUES FOR AUTOMATIC DIABETIC FOOT SCREENING |
619 |
Thakur Santosh |
Spark based ANFIS Approach for Anomaly Detection in Big Data |
626 |
Harvinder Singh, Sachin Kumar Sarin, Arushi Patel and Supriya Sen |
Performance Analysis of Hybrid CPU Scheduling Algorithm in Multi-tasking Environment |
629 |
Srikanta Kumar Mohapatra, Tripti Swarnkar, Sushanta Kumar Kamilla and Susanta Kumar Mohapatra |
Forecasting hydrogen fuel requirement for highly populated countries using NARnet |
633 |
Tanmay Bhowmik, Shyamal Kumar Das Mandal and Amitava Choudhury |
Deep Neural Network based Recognition and Classication of Bengali Phonemes: A case study of Bengali Unconstrained Speech |
643 |
Kavitha P.K. and Vidhya Saraswathi P. |
Color Image Encryption : A New Public Key Cryptosystem based on Polynomial Equation |
645 |
Vamsha Deepa N, Nanditha Krishna and Hemanth Kumar G |
Feature extraction and classification of x-ray lung images using Haralick texture features |
650 |
Dr.Punal M Arabi, Naveen Ts, Vamsha Deepa N and Deepak Samantha |
Automatic Diagnosis of Dental Diseases |
654 |
Praveen Kaushik and Varsha Tayde |
Data privacy in Hadoop using Anonymization and T-Closeness |
658 |
Savita Walia and Krishan Kumar |
An Eagle-Eye View of Recent Digital Image Forgery Detection Methods |
664 |
Awadhesh Kumar Srivastava and K. K. Biswas |
Human Activity Recognition Using Local Motion Histogram |
677 |
Pl Chithra and B Prashanthi |
Feature Based Multiple Vehicle License Plate Detection and Video Based Traffic Counting |
680 |
Damanjeet Kaur and Ruby Pandey |
ENSEMBLE ALGORITHMS FOR ISLANDING DETECTION IN SMART GRIDS |
689 |
Somnath Roy and Bimrisha Mali |
Do Heavy and Superheavy Syllables Always Bear Prominence in Hindi? |
690 |
Yagnesh Balasubramanian, Durga Shankar Baggam, Swaminathan Venkatraman and Ramaswamy V |
Quantum IDS for Mitigation of DDoS Attacks by Mirai Botnets |
700 |
Probir K Dhar, Tarun Kanti Naskar and Durjoy Majumder |
An Analytical Approach for the Determination of Chemotherapeutic Drug Application Trade-offs in Leukemia |
706 |
Sudarshan Sonawane and Satish Kolhe |
Term Co-occurrence Based Feature Selection for Sentiment Classification |
708 |
Ankit Jain and Diksha Goel |
Smishing-Classifier: A Novel Framework for detection of Smishing Attack in Mobile Environment |
709 |
Christalin Nelson and Dhiviya Rose |
Location and Energy based Hierarchical Dynamic Key Management Protocol for Wireless Sensor Networks |
713 |
Rijo Jackson Tom and Suresh Sankaranarayanan |
Performance Evaluation of RPL Routing Protocol for IoT based Power Distribution Network |
722 |
Shailesh Porwal, Mahak Vijay and S C Jain |
A Classification Approach for Monitoring and Locating Leakages in a Smart Water Distribution Framework |
729 |
Mahak Vijay, Shailesh Porwal and S C Jain |
Chlorine Decay Modelling in Water Distribution System Case Study: CEERI Network |
730 |
Harshali Patil, Neelima Mhaske and Ajay Patil |
Design and Development of a Dictionary Based Stemmer for Marathi Language |
731 |
Vinod Kiran Kappala, Santos Kumar Das, Vikram Kumar and Ashok Kumar Turuk |
Estimation of Link Margin for Performance Analysis of FSO Network |
734 |
Mahesh Miriyala and Harigovindan V.P |
Throughput and Energy Efficiency Analysis of the IEEE 802.11ah Restricted Access Window Mechanism |
741 |
Madasamy Sornam and C Vishnupriya |
Deep Convolutional Neural Network For Handwritten Tamil Character Recognition Using Principal Component Analysis |
743 |
Kshiti Agnihotri and K. James Mathai |
Clamped Accelerated Particle swarm optimization based linear discriminant analysis for classification |
747 |
Kamika Agrohi |
Web Documents Prioritization Using Iterative Improvement |
748 |
Parashjyoti Borah and Deepak Gupta |
On Lagrangian Twin Parametric-Margin Support Vector Machine |
751 |
Bagirathi S, Dr. Sharmila Sankar and Dr. Sandhya |
Cluster based mechanism for Avoidance of Duplicate Tag Data in RFID Networks |
771 |
Sachi Choudhary, Amit Kumar Mondal and Vindhya Devalla |
Underwater Navigation Systems for AUVs |
787 |
Meena Kumari and Rajender Nath |
A secure and flexible one way hash function for data integrity verification in cloud computing environment |
791 |
Divya P Soman, P Kalaichelvi and T K Radhakrishnan |
Artificial Neural Network & Response Surface Methodology Modelling of Surface Tension of 1-Butyl-3-methylimidazolium Bromide Solution |
797 |
Parth Shah, Vishvajit Bakrola and Supriya Pati |
Neural Machine Translation system for Indic Languages using Deep Neural Architecture |
803 |
Anusha B, Sabena S and Sairamesh L |
OPTIMIZED FOOD RECOGNITION SYSTEM FOR DIABETIC PATIENTS |
810 |
Azka Wani and S Revathi |
Analyzing Threats of IoT networks Using SDN based Intrusion Detection System (SDIoT-IDS) |
817 |
Manish Pandey, Sachin Dhanoriya and Amit Bhagat |
Fast and Efficient Data Acquisition in Radiation Affected Large WSN by Predicting Transfaulty Nodes |
819 |
Manish Pandey, Lalit Kumar Vishwakarma and Amit Bhagat |
An Energy Efficient Clustering Algorithm for Increasing Lifespan of Heterogeneous Wireless Sensor Networks |
826 |
V S Anoop and S Asharaf |
Distributional Semantic Phrase Clustering and Conceptualization using Probabilistic Knowledgebase |
845 |
Vishal Gupta and Aditya Singh |
Pong game optimization using Policy Gradient Algorithm |
847 |
Sairamya N J, Thomas George Selvaraj, Subathra M S P and Narain Ponraj |
AUTOMATED DETECTION OF EPILEPTIC SEIZURE USING HISTOGRAM OF GRADIENTS FOR ANALYSING TIME FREQUENCY IMAGES OF EEG SIGNALS |
851 |
S Mahaboob Hussain, Prathyusha Kanakam and D Suryanarayana |
Forensics Data Analysis for Behavioral Pattern with Cognitive Predictive Task |
860 |
Sukhwinder Sharma, Rakesh Bansal and Savina Bansal |
Analysis of Heterogeneity Characteristics for Heterogeneous WSNs |
861 |
Suman Deb and Paritosh Bhattacharya |
Enhancing personalized learning with interactive note taking on video lectures-an analysis of effective HCI design on learning outcome |
867 |
Subhendu Sekhar Paik, Dr. Diptendu Sinha Roy, Hemant Kumar Reddy and Rajat Subhra Goswami |
Intelligent Data Placement in Heterogeneous Hadoop Cluster |
877 |
Prerna Singh and Dr. Priti Sehgal |
A Comparative Analysis of Various Segmentation Techniques in Dental Images |
884 |
Prem Prakash, Patvardhan Chellapilla and Anand Srivastav |
Effective Heuristics for the Bi-objective Euclidean Bounded Diameter Minimum Spanning Tree Problem |
885 |
Mrinal Bachute and Ravindra Kharadkhar |
Analysis of Least Mean Square and Recursive Least Mean Square Adaptive Filter Algorithm for Speech Enhancement Application |
892 |
Lakshmi Prasanthi Malyala and Sambasivarao Nandam |
A Novel Statistical Pre-processing based spatial anomaly detection model on cyclone dataset |
899 |
Pijus Kanti De, Mitali Debnath and A.C. Paul |
Mathematical Modeling of Economic Order Quantity in a Fuzzy Inventory Problem under Shortages |
900 |
Ananthi M and Sumalatha Ramachandran |
Dynamic Processing and Analysis of Continuous Streaming Stock Market Data Using MBCQ tree Approach |
905 |
Sanjay Misra and Oluwaseun Aderemi |
Energy Consumption Forecast using Demographic data Approach with Canaanland as case study |
906 |
Segun I. Popoola and Sanjay Misra |
A Cloud-Based Intelligent Toll Collection System for Smart Cities |
909 |
Mahalakshmi G.S., Muthu Selvi G and S. Sendhilkumar |
Gibbs Sampled Hierarchical Dirichlet Mixture Model based Approach for Clustering Scientific Articles |
922 |
Satishkumar Varma and Megha Shinde |
Analysis of PCA and LDA Features for Facial Expression Recognition using SVM and HMM Classifiers |
925 |
Jaspreet Kaur, Sidharth Pancholi and Amit Joshi |
DETECTION OF LUNG CANCER WITH THE FUSION OF COMPUTED TOMOGRAPHY & POSITRON EMISSION TOMOGRAPHY |
927 |
Shifaa Basharat and Dr. Manzoor Ahmad |
INFERRING TRUST FROM MESSAGE FEATURES USING LINEAR REGRESSION AND SUPPORT VECTOR MACHINES |
931 |
Amrita Singh and Amit Joshi |
SPEAKER IDENTIFICATION THROUGH NATURAL AND WHISPER SPEECH SIGNAL |
938 |
Meenakshi Srivastava, Dr. Sanjay Kumar Singh and S.Q Abbas |
Multi Minimum Product Spanning Tree Based Indexing Approach for Content Based Retrieval of Bio Images |
941 |
Hareesh Kumar, Nirmala Yn and Dr.Mn Sreerangaraju |
PERFORMANCE EVALUATION OF ADAPTIVE TELEMETRY ACOUSTIC MODEM FOR UNDERWATER WIRELESS SENSOR NETWORKS |
943 |
Shivangi Katiyar and Devendra Prasad |
Chain Assisted Tree based self healing protocol for topology managed WSNs |
registeredpapers
List of Registered Papers (Scroll Below for Schedule)