default search action
11th IC3 2018: Noida, India
- Srinivas Aluru, Ananth Kalyanaraman, Debajyoti Bera, Kishore Kothapalli, David Abramson, Ilkay Altintas, Sanjukta Bhowmick, Madhu Govindaraju, Smruti Ranjan Sarangi, Sushil K. Prasad, Steven Bogaerts, Vikas Saxena, Sanjay Goel:
2018 Eleventh International Conference on Contemporary Computing, IC3 2018, Noida, India, August 2-4, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-6834-4 - Devpriya Soni, Sparsh Agarwal, Tushar Agarwel, Pooshan Arora, Kopal Gupta:
Optimised Prediction Model for Stock Market Trend Analysis. 1-3 - Shipra Goel, Muskan Banthia, Adwitiya Sinha:
Modeling Recommendation System for Real Time Analysis of Social Media Dynamics. 1-5 - Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana:
A Data-Driven Framework for Survivable Wireless Sensor Networks. 1-6 - Priyansh Sharma, Avruty Agarwal, Neetu Sardana:
Extraction of Influencers Across Twitter Using Credibility and Trend Analysis. 1-3 - Shikha Mehta, Parmeet Kaur, Pooja Lodhi, Omji Mishra:
Empirical Evidence of Heuristic and Cost Based Query Optimizations in Relational Databases. 1-3 - Mehul Gupta, Aditya Bakliwal, Shubhangi Agarwal, Pulkit Mehndiratta:
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers. 1-7 - Deepak Kumar Sharma, Sumit Vohra, Tarun Gupta, Vipul Goyal:
Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees. 1-6 - Ritu Arora, Sanjay Goel:
Supporting E-Mentoring for Programming Labs in Engineering Education. 1-6 - Tribhuwan Kumar Tewari, Vikas Saxena:
Collusion Attack Resistant SVD Based Secured Audio Watermarking Scheme with Chaotic Encryption. 1-5 - Amanpreet Kaur, Savita Walia, Krishan Kumar:
Comparative Analysis of Different Keypoint Based Copy-Move Forgery Detection Methods. 1-5 - Arushi Gupta, Medha Sagar, Rishabh Kaushal:
A Novel Approach to Solve Set-Theory Word Problems Automatically. 1-6 - Bithika Pal, Suman Banerjee, Mamata Jenamani:
Threshold-Based Heuristics for Trust Inference in a Social Network. 1-7 - Sumit Mishra, Vishal Singh, Devanjan Bhattacharya:
Framework for Freight Truck Return-Trip Assignment System. 1-3 - Anmol Taneja, Gagan Bansal, Rohil Setia, N. Hema:
Moedor Cleaning Robot. 1-5 - Anil Kumar, Basavaraj Talawar:
Machine Learning Based Framework to Predict Performance Evaluation of On-Chip Networks. 1-6 - Srikumar Panda, Ranjan Das:
Parameter Estimation in a Biological System Using Differential Evolution Algorithm. 1-6 - Saquib Nadeem Hashmi, Harsh Gupta, Dhruv Mittal, Kaushtubh Kumar, Aparajita Nanda, Sarishty Gupta:
A Lip Reading Model Using CNN with Batch Normalization. 1-6 - Somya Goel, Raghav Pangasa, Suma Dawn, Anuja Arora:
Audio Acoustic Features Based Tagging and Comparative Analysis of its Classifications. 1-5 - Shariq Murtuza, Krishna Asawa:
Mitigation and Detection of DDoS Attacks in Software Defined Networks. 1-3 - Megha Rathi, Aditya Malik, Daksh Varshney, Rachita Sharma, Sarthak Mendiratta:
Sentiment Analysis of Tweets Using Machine Learning Approach. 1-3 - Pramit Gupta, Somya Goel, Archana Purwar:
A Stacked Technique for Gender Recognition Through Voice. 1-3 - Parul Agarwal, Mayank Sourabh, Rishabh Sachdeva, Siddharh Sharma, Shikha Mehta:
Recommending Optimal Tour for Groups Using Ant Colony Optimization. 1-6 - Sonu Gupta, Shelly Sachdeva:
Invitation or Bait? Detecting Malicious URLs in Facebook Events. 1-6 - T. M. Prajwala, Alla Pranathi, Kandiraju Sai Ashritha, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi:
Tomato Leaf Disease Detection Using Convolutional Neural Networks. 1-5 - Raju Pal, Mukesh Saraswat:
Enhanced Bag of Features Using AlexNet and Improved Biogeography-Based Optimization for Histopathological Image Analysis. 1-6 - Ankita Gupta, Chetna Gupta:
Towards Dependency Based Collaborative Method for Requirement Prioritization. 1-3 - Abhinandan Aggarwal, Rohit Gupta, Ravinder Agarwal:
Design and Development of Integrated Insole System for Gait Analysis. 1-5 - Rishabh Jain, Shreya Garg, Tarushi Agrawal, Saurabh Gangal, Indu Chawla, Shikha Jain:
Sustainable Waste Management Model. 1-6 - Balasubramanian Prabhu Kavin, Sannasi Ganapathy, Arputharaj Kannan:
An Intelligent Task Scheduling Approach for Cloud Using IPSO and A* Search Algorithm. 1-5 - Bineet Kumar Joshi, Nitin Joshi, Mahesh Chandra Joshi:
Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network. 1-3 - Naincy Saxena, Manasvi Duggal, Aditya Mishra, Sandeep Kumar Singh:
A Novel Multimedia Based Approach of Classification and Visualisation of Extremist Hotspots. 1-4 - Shubham Agarwal, Lavish Yadav, Manish K. Thakur:
Crime Prediction Based on Statistical Models. 1-3 - Vinita Tahiliani, Mavuri Dizalwar:
Green IoT Systems: An Energy Efficient Perspective. 1-6 - Bhavika Pande, Gargi Bhagat, Shanu Priya, Himanshu Agrawal:
Detection and Mitigation of DDoS in SDN. 1-3 - Prasenjeet Fulzele, Rajat Singh, Naman Kaushik, Kavita Pandey:
A Hybrid Model for Music Genre Classification Using LSTM and SVM. 1-3 - Ankita, Manish K. Thakur:
Modified DBSCAN Using Particle Swarm Optimization for Spatial Hotspot Identification. 1-3 - Gagandeep Kaur:
A Novel Distributed Machine Learning Framework for Semi-Supervised Detection of Botnet Attacks. 1-7 - Anu Taneja, Anuja Arora:
Identification of Relevant Contextual Dimensions Using Regression Analysis. 1-6 - Himanshu Mittal, Mukesh Saraswat:
cKGSA Based Fuzzy Clustering Method for Image Segmentation of RGB-D Images. 1-6 - Priyanka Chandani, Chetna Gupta:
Requirement Risk Prioritization Using Analytic Hierarchy Process: A Gateway to Identify Risky Requirements. 1-6 - Avinash Chandra Pandey, Dharmveer Singh Rajpoot, Mukesh Saraswat:
Data Clustering Based on Data Transformation and Hybrid Step Size-Based Cuckoo Search. 1-6 - Madhuri Gupta, Bharat Gupta:
An Ensemble Model for Breast Cancer Prediction Using Sequential Least Squares Programming Method (SLSQP). 1-3 - R. V. Karthik, Sannasi Ganapathy, Arputharaj Kannan:
A Recommendation System for Online Purchase Using Feature and Product Ranking. 1-6 - Shajulin Benedict, Philipp Gschwandtner, Thomas Fahringer:
TOEP: Threshold Oriented Energy Prediction Mechanism for MPI-OpenMP Hybrid Applications. 1-6 - Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal:
Network Forensics Analysis of iOS Social Networking and Messaging Apps. 1-6 - Harshit Gujral, Abhinav Sharma, Parmeet Kaur:
Empirical Investigation of Trends in NoSQL-Based Big-Data Solutions in the Last Decade. 1-3 - Deepak Kumar Sharma, Gurmehr Sohi, Hitesh Dhankhar, Mayank Yadav:
Direct Perceptive Routing Protocol for Opportunistic Networks. 1-6 - Sarthak Babbar, Saommya Kesarwani, Navroz Dewan, Kartik Shangle, Sanjeev Patel:
A New Approach for Vehicle Number Plate Detection. 1-6 - Vishnu Srinivasa Murthy Yarlagadda, T. K. R. Jeshventh, M. Zoeb, M. Saumyadip, Shashidhar G. Koolagudi:
Singer Identification from Smaller Snippets of Audio Clips Using Acoustic Features and DNNs. 1-6 - Sangeeta Mittal, Prashant Kaushik, Saquib Nadeem Hashmi, Kaushtubh Kumar:
Robust Real Time Breaking of Image CAPTCHAs Using Inception v3 Model. 1-5 - Rishabh Madan, Mangipudi Partha Sarathi:
Predicting Computer Network Traffic: A Time Series Forecasting Approach Using DWT, ARIMA and RNN. 1-5 - Virendra P. Vishwakarma:
Fractional Discrete Cosine Transform Based Approach for Compensating the Effect of Light Variations for Robust Face Recognition. 1-6 - Shivangi, Gautam Sharma, Anubhav Johri, Akshita, Anurag Goel, Anuradha Gupta:
Enhancing RansomwareElite App for Detection of Ransomware in Android Applications. 1-4 - Harshit Gujral, Abhinav Sharma, Sangeeta Lal:
Empirical Analysis of Q&A Websites and a Sustainable Solution to Ensure Water-Security. 1-7 - Seema P. Nehete, Satish R. Devane:
Recommendation Systems: Past, Present and Future. 1-7 - Shruti Pachaury, Nilesh Kumar, Ayush Khanduri, Himanshu Mittal:
Link Prediction Method Using Topological Features and Ensemble Model. 1-6 - Kashav Ajmera, Tribhuwan Kumar Tewari:
Greening the Cloud Through Power-Aware Virtual Machine Allocation. 1-6 - Sakshi Agarwal, Shikha Mehta:
Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities. 1-6 - Hrishikesh Singh, Parul Agarwal:
Empirical Analysis of Bitcoin Market Volatility Using Supervised Learning Approach. 1-5 - Mridul Haque, Dip Sankar Banerjee:
Enhancing Influence Maximization in Social Networks Using Parallel Reverse Reachability Set Computations. 1-6 - Anjali Goyal, Neetu Sardana:
Characterization Study of Developers in Non-Reproducible Bugs. 1-6 - Riyu Bana, Anuja Arora:
Influence Indexing of Developers, Repositories, Technologies and Programming Languages on Social Coding Community GitHub. 1-6 - Harshit Gujral, Abhinav Sharma, Sangeeta Mittal:
Determination of Optimal Thread Pool for Cloud Based Concurrent Enhanced No-Escape Search. 1-6 - Sutirtha Chakraborty, Shubham Singh, Surmila Thokchom:
Integrity Checking Using Third Party Auditor in Cloud Storage. 1-6 - Amanpreet Kaur, Padam Kumar, Govind P. Gupta, Sangeeta Lal:
Application of Soft Computing on Localization in Wireless Sensor Networks. 1-5 - Isha Gupta, Novesh Garg, Apoorva Aggarwal, Nitin Nepalia, Bindu Verma:
Real-Time Driver's Drowsiness Monitoring Based on Dynamically Varying Threshold. 1-6 - Abhinav Tomar, Amar Kaswan, Prasanta K. Jana:
On-Demand Energy Provisioning in Wireless Sensor Networks with Capacity-Constrained Mobile Chargers. 1-6 - Hardik Rewari, Vishal Dixit, Dhroov Batra, N. Hema:
Automated Sign Language Interpreter. 1-5 - Arti Jain, Shashank Tripathi, Harsh DharDwivedi, Pranav Saxena:
Forecasting Price of Cryptocurrencies Using Tweets Sentiment Analysis. 1-7 - Vivek Singh Baghel, S. Durga Bhavani:
Multiple Team Formation Using an Evolutionary Approach. 1-6 - Suhail M. Ghouse, Monica Chaudhary, Sumit Garg:
Importance of Non-Technical Skills for Employment Opportunities: A Gap Analysis of Students and Employers Perception Importance of Non-Technical Skills. 1-6 - Rajalakshmi Krishnamurthi:
Teaching Methodology for IoT Workshop Course Using Node-RED. 1-3 - Pravin Bhaskar Ramteke, Amulya A. Dixit, Sujata Supanekar, Nagaraj V. Dharwadkar, Shashidhar G. Koolagudi:
Gender Identification From Children's Speech. 1-6 - Prashant Kaushik, Pankaj Kumar Yadav:
A Novel Approach for Detecting Malware in Android Applications Using Deep Learning. 1-4 - Agnitha Mohan, Rajeswari Dhir, Hrishikesh Hirashkar, Nagaratna B. Chittaragi, Shashidhar G. Koolagudi:
Matching Witness' Account with Mugshots for Forensic Applications. 1-5 - Akanksha Singh, Mukesh Rawat, Awdhesh Kumar Shukla, Amod Kumar, Balvinder Singh:
An Overview of Pixel Value Differencing Based Data Hiding Techniques. 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.