default search action
ICIMMI 2022: Jaipur, India
- Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, December 23-24, 2022. ACM 2022, ISBN 978-1-4503-9993-7
- Palika Jajoo, Mayank Kumar Jain, Sarla Jangir:
Plant Disease Detection Over Multiple Datasets Using AlexNet. 1:1-1:6 - Sunita Chand, Virendra P. Vishwakarma:
Acute Leukaemia Diagnosis Using Transfer Learning on Resnet-50. 2:1-2:7 - Esha Saxena, Manoj Yadav, Meenakshi Yadav, Preety Shoran:
Artificial Intelligence-based Diagnostic Analysis for Wireless Capsule Endoscopy in Obscure Bowel Disease Detection: A Potential. 3:1-3:7 - P. D. Dewangan, Praveen Mande, Ankur Gupta, P. J. Krishna, Veerpratap P. Meena, Vinay Pratap Singh:
Performance Evaluation of Jaya Algorithm During Search Space Violation. 4:1-4:9 - Shathanaa Rajmohan, Mani Tej Mendem, Shankar Sreenu Vanam, Pavan Kumar Thalapally:
Online Grading of Fruits using Deep Learning Models and Computer Vision. 5:1-5:8 - Manisha Bhatnagar, Dolly Thankachan:
Improving Multi-Channel Wireless Network Security Performance Using Trust-Enhanced Blockchain Deployment. 6:1-6:7 - Kirtida Tejas Naik, Bindu Garg:
A Machine Learning Model for Disease Prediction and Remote Patient Monitoring. 7:1-7:5 - Manisha Rajendra Kuveskar, Prasad Khandekar, Anuradha Bakare:
Evapotranspiration Based Smart Irrigation System for Agriculture. 8:1-8:7 - Supriya Dhananjay Paigude, Sajeeda Riyaj Shikalgar:
Deep Learning Model for Work-Life Balance Prediction for Working Women in IT Industry. 9:1-9:8 - Prashant Acharya, Dushyant Singh, Sitaram Gupta:
A Scalable Data Processing Framework for BigData Using Hadoop and MapReduce. 10:1-10:9 - Aarushi Dua, Bhavya Kalra, Abhishek Bhatia, Mauktik Madan, Anuradha Dhull, Yogita Gigras:
Crime Alert Through Smart Surveillance Using Deep Learning Techniques. 11:1-11:8 - Ankita Nainwal, Garima Sharma, Bhaskar Pant, Devvrat Verma, Mahesh Kumar:
Classification of Corona virus between Humans and Bats using Support Vector Machine. 12:1-12:4 - Prashant Ahlawat, M. Sharma, Hitesh Kumar Sharma:
Automated Breast Cancer Detection using Convolutional Neural Network based Computer Added Design System. 13:1-13:5 - Ranjith Singh Koppaiyan, Abdul Shareef Pallivalappil, Pooja Singh, Husna Tabassum, Pragya Tewari, Ms Sweeti, Sarvesh Kumar:
High-Availability Encryption-Based Cloud Resource Provisioning System. 14:1-14:6 - Dinesh Babu K. M, Suresh Annamalai:
Android and Web Application to Assist Bachelors on Improving Their Living. 15:1-15:6 - Sandeep Kumar Sharma, Anil Kumar, Uday Pratap Singh:
Enhanced Edges Detection from Different Color Space. 16:1-16:6 - Dinesh Goyal, Kalu Ram Yadav:
Performance Analysis of Various on Demand Multipath Routing Protocols. 17:1-17:5 - C. T. Dora Pravina, Mrunalini Upendra Buradkar, Md Khalid Jamal, Ashish Tiwari, Udit Mamodiya, Dinesh Goyal:
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. 18:1-18:5 - Dasharathraj K. Shetty, Gayathri Prerepa, Nithesh Naik, Ritesh Bhat, Jayant Sharma, Parva Mehrotra:
Revolutionizing Aerospace and Defense: The Impact of AI and Robotics on Modern Warfare. 19:1-19:8 - M. Anto Bennet, S. S. Saranya, Dinesh Goyal, Pankaj Dadheech, S. Balu, Sudhakar Sengan:
Classification and Localization of COVID-19 based on a Pneumonia Radiograph using a Deep Learning Approach. 20:1-20:6 - Ravi Kumar M, Ashok Kumar, Shah Fahad Saboon, Shreay Kumar, Yashwin Gowda Bp, Shivam Deo Prasad:
A Review on Path Planning Technique for Bio-Inspired Robot. 21:1-21:6 - Saurabh Sureshrao Nimkar, Milind M. Khanapurkar:
Edge-Based HTSO Model via Markov Decision Process Using Q-Learning. 22:1-22:8 - Jameel A. Qurashi, Sandeep Singh Sandhu, Purushottam Lal Bhari:
Benchmark for Investigating the Security in Software Development Phases. 23:1-23:12 - Md Tabish Zahir, Mudit Sagar, Yasir Imam, Anshu Yadav, Pinki Yadav:
A Review on Gsm Based LPG Leakage Detection and Controller. 24:1-24:6 - Tanya Garg, Heemika Sharma, Ruchi Goyal:
Evolving Roles and Implications of Technology Enabled by 5 G in Various Industries. 25:1-25:6 - Shikha Sharma, Dinesh Goyal:
Making a long video short: A Systematic Review. 26:1-26:11 - Sanchith Venkatesan, Shivam Handa, Baskar M:
Car Price Prediction. 27:1-27:6 - Preet Jadhav, Kirti Wanjale, Abhijit Chitre, Vedmani Vaidya:
Monuments Identification using Satellite Images: A CNN based approach. 28:1-28:4 - Abhishek Dadhich, Dinesh Goyal:
Analytical review of existing techniques IoT based Home Automation and securing its data over Edge Computing using Machine Learning. 29:1-29:8 - Arun Prasath Selvaraj, Suresh Annamalai:
Towards Reliable Medical Transactions for Blockchain based Healthcare Systems using Hybrid Consensus Method. 30:1-30:8 - Arokiaraj S, Amudha T, Swamynathan R:
Intelligent Agents for Crowdsourced Software Engineering : A Survey. 31:1-31:8 - Ratnesh Kashyap, Juhi Singh, Shweta Sinha:
Recent Advancement in Education System Using AR Tools: A New Perspective. 32:1-32:5 - Depakkumar R, Suresh Annamalai:
Image Processing Model-Based Kidney Diseases Detection System Using CNN. 33:1-33:4 - Renjith V. Ravi, S. B. Goyal, Sanjay Singla:
Colour Image Cryptography using Chaotic Pixel Shuffling and 3D Logistic Diffusion. 34:1-34:4 - Kabir Swami, Anirudhi Thanvi, Nakul Joshi, Sunil Kumar Jangir, Dinesh Goyal:
Deep Convolution Neural Network-Based Analysis of Tomato Plant Leaves. 35:1-35:4 - Satish Kumar, C. Rama Krishna, Sahil Khattar, Raj Kumar Tickoo:
Adversarial Attack to Deceive One Stage Object Detection Algorithms. 36:1-36:6 - Ujwal Gupta, Ziya Javed, Sherin Zafar:
An analysis of Blockchain-based IoT solutions to overcome current challenges. 37:1-37:5 - Joyjit Patra, Mimo Patra, Subir Gupta:
Artificial intelligence-based indicators for ALGO trading strategy on the NSE derivatives. 38:1-38:6 - Harshrim Pardal, Komal Nagarajan, Tripti Mahara, Helen Josephine V. L:
Global and Indian Perspectives on Russia-Ukraine War using Sentiment Analysis. 39:1-39:7 - Saurabh Sharma, Gajanand Sharma, Ekta Menghani:
The Role of CNN in Detection and Prediction of Tomato Leaf Disease: A review. 40:1-40:5 - Ritu Shukla, Dinesh Goyal, Shruti Thapar, Rohit Chhabra:
Absolute Data Security Scheme: An Advanced Approach towards Data Security. 41:1-41:6 - Vivek Saxena, Deepika Saxena, Uday Pratap Singh:
Security Enhancement using Image verification method to Secure Docker Containers. 42:1-42:5 - Udendhran R, Mridul Garg, Abhishek Kumar Yadav:
Explainable Convolutional Neural Network with Facial Emotion Enabled Music Recommender System. 43:1-43:4 - Prashant Manuja, Rajveer Singh Shekhawat:
IT Security Frameworks: Risk Management Analysis and Solutions. 44:1-44:7 - Anil Kumar, Purushottam Lal Bhari, Uday Pratap Singh, Vivek Saxena:
Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. 45:1-45:6 - Arjun Taneja, Anju Yadav:
Sky-Net: A Deep Learning Approach to Predicting Lung Function Decline in Sufferers of Idiopathic Pulmonary Fibrosis. 46:1-46:4 - Rohit Kumar Verma, Sukhvir Singh:
Investigation of Algorithms for Task Scheduling and Resource Distribution in the Cloud. 47:1-47:7 - Nirmala Devi A, Rathna R:
Features Selection for EEG During Mental Arithmetic Task - Brain-Computer Interface. 48:1-48:4 - Geerija Lavania, Gajanand Sharma:
Blockchain and its dimensions: Future Security. 49:1-49:4 - Vinita Mirdha, Deepak Bhatnagar, Brajraj Sharma:
Size Reduction of a Circularly Polarized Ring Slot Antenna Using Asymmetrical Rectangular Slots and a Parasitic Patch for a Radio Beacon on a Nanosatellite. 50:1-50:4 - Uday Pratap Singh, Vivek Saxena, Anil Kumar, Purushottam Bhari, Deepika Saxena:
Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. 51:1-51:5 - Saurabh Sureshrao Nimkar, Milind M. Khanapurkar:
Bioinspired Model for Edge-based Task Scheduling Applications. 52:1-52:6 - Shashi Kant Rathore, Gaurav Kumar Das, Sachinpal Singh Yadav, Surendra Yadav, Amritpal Singh Yadav:
Survey on Foraging Behavior Algorithms. 53:1-53:6 - Atharva Parikh, Shreya Jain, Parikshit N. Mahalle, Gitanjali Rahul Shinde:
Offer and Deal-Quality Prediction using Machine learning and Fuzzy approach: A Shark Tank India Case Study. 54:1-54:10 - Rekha Vijayvergia, Bharti Nathani, Nisheeth Joshi, Rekha Jain:
A Survey on Various Approaches Used in Named Entity Recognition for Indian Languages. 55:1-55:5 - Yatish Sekaran, Tanmoy Debnath, Taeesh Azal Assadi, Sai Dileep Suvvari, Shubh Oswal:
Using Machine Learning to detect abnormalities on Modbus/TCP Networks. 56:1-56:6 - Suniti Chouhan, Gajanand Sharma:
Secure Online Voting System: Blockchain and other Approaches. 57:1-57:4 - Kirti Gupta, Parul Goyal:
Test Suites Generation using UML Modelling and Heuristic Techniques: A Systematic Study. 58:1-58:11 - Navneet Kumar Rajpoot, Prabhdeep Singh, Bhaskar Pant:
Cloud-IoT Based Smart Healthcare Framework: Application and Trends. 59:1-59:6 - Bhawna Suri, Shweta Taneja, Isha Bhanot, Himanshi Sharma, Aanchal Raj:
Cross-Platform Empirical Analysis of Mobile Application Development frameworks: Kotlin, React Native and Flutter. 60:1-60:6 - Sneha Das, Sonali Vyas:
The Utilization of AR/VR in Robotic Surgery: A Study. 61:1-61:8 - Sejal Sudhendu Dhamgaye, Shrikant V. Sonekar, Mirza Moiz Baig:
Evaluation of the Effectiveness of a Secure Blockchain Framework for IoT-Based Data Transmission. 62:1-62:7 - Mitali Chugh, Apoorva Pandey, Sonali Vyas:
A Comprehensive Study on the Association Between Personality Traits and Software Development. 63:1-63:6 - Pankaj Rahi, Monika Dandotiya, A. Anushya, Ajay Khunteta, Pankaj Agarwal:
An Effect of Stacked CNN for Network Intrusion Detection System. 64:1-64:9 - Arpan Bhattacharya, Ananya Seth, Dheeraj Malhotra, Neha Verma:
Cloud Steganography: An Intelligent Approach to Improve Data Security in the Cloud Environment. 65:1-65:5 - Amitabh Patnaik, Sunny Dawar, Pallavi Kudal:
Industry 5.0: Sustainability Challenges in Fusion of Human and AI. 66:1-66:7 - Sandeepkumar E. V, Kayalvizhi Jayavel:
Effective and light weight security system for highly confidential cloud data such as PHR. 67:1-67:7 - Pravek Sharma, Tushar Agarwal, Aarti Chugh, Charu Jain:
Churn Analysis for Constructive Employment Using Machine Learning Classifiers. 68:1-68:4 - Archana Ramrao Ugale, Amol Dnyaneshwar Potgantwar:
An Analytical Approach on Artificial Intelligence Based Models for Anomaly Detection in Sensor Networks. 69:1-69:6 - Lingaraj Mani, Senthilkumar Arumugam, Ramkumar Jaganathan:
Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol. 70:1-70:5 - Gagandeep Singh, Sagar Singh, Nikhil Upadhyay, Mayank Kumar, Ankit Krishnakumar Thakur:
DC Microgrid Protection. 71:1-71:5 - Anant Grover, Deepak Arora, Anuj Grover:
Human Pose Estimation using Deep Learning Techniques. 72:1-72:6 - Raj Kumar Sharma, Manisha Jailia:
Regression Analysis of Garbage Management System for Smart Cities. 73:1-73:8 - Hiteshkumar Harshadbhai Solanki, Paresh V. Virparya:
A Benchmarking Model based on Research Performance Indicators of Engineering Institutions: A Principal Component Analysis. 74:1-74:8 - Gaurav Nagpal, Singh Shrikant Ramesh, Naga Vamsi Krishna Jasti, Ankita Nagpal, Gunjan Mohan Sharma:
Ore Grade Estimation in Mining Industry from petro-physical data using neural networks. 75:1-75:5 - Ankita Sharma, Swati Arora:
Composites of ZnOxMgO1-x Thin Films. 76:1-76:3 - Sanjay Bhadu Patil, Dnyandeo j Pete:
Detection of Brain Tumors Using Magnetic Resonance Images through the Application of an Innovative Convolution Neural Network Model. 77:1-77:7 - Hemlata Panwar, Jaydeep Singh Parmar:
Designing of Optical Gain Analysis of Nano-Scale Heterostructure GaInP/AlGaInP Red Laser. 78:1-78:5 - Weing Kham Chap, Anindita Chatterjee Rao, Praveen Kumar Pandey:
A Technological Review on Rise of Esports in World Economy. 79:1-79:8 - Babli Kumari, Aman Jatain, Yojna Arora:
Skin Disease Diagnostic techniques using deep learning. 80:1-80:9 - Shikha Gautam, Ajay Khunteta, Debolina Ghosh:
A Review on Software Defect Prediction Using Machine Learning. 81:1-81:10 - Aman Singh Chauhan, Basireddy Chinna Ankalugari Vamsidhar Reddy, Mamta Arora, Mrinal Pandey:
NIFTY Banking Sector Closing Price Prediction Using Deep Learning. 82:1-82:6 - Puneet Kapoor, Sakshi Kaushal, Harish Kumar:
A Review on Architecture and Communication Protocols for Electric Vehicle Charging System. 83:1-83:6 - Jaroslaw Legierski, Kajetan Rachwal, Piotr Sowinski, Wojciech Niewolski, Przemyslaw Ratuszek, Zbigniew Kopertowski, Marcin Paprzycki, Maria Ganzha:
Towards Edge-Cloud Architectures for Personal Protective Equipment Detection. 84:1-84:6 - Saravanan M, Shiva Prasad S:
A Blockchain-Based, Distributed, Self Hosted And End To End Encrypted Cloud Storage System. 85:1-85:7 - Vaishali Sharma, Nitesh Nagpal, Ankit Shandilya, Aman Dureja, Ajay Dureja:
A Practical Approach to detect Indoor and Outdoor Scene Recognition. 86:1-86:10 - Tanubuddi Srinivasa Reddy, Suresh Annamalai:
A Cloud-Edge Collaboration Framework for Cognitive Service. 87:1-87:7 - Ashish Kumar, Yudhvir Singh:
Analyzing the Impact of Informed Attack Models in Recommender System. 88:1-88:5 - Monika Dandotiya, Pankaj Rahi, Ajay Khunteta, A. Anushya, Sayed Sayeed Ahmad:
SAFE: A Secure Authenticated & Integrated Framework for E-learning. 89:1-89:9 - Manoj Kumar Singhal:
Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment. 90:1-90:5 - Siddhartha Das Gupta, Teja Kolla, Ravi Yadav, Mamta Arora, Mrinal Pandey:
Forecasting Cryptocurrency Prices using Sequential and Time Series Models. 91:1-91:6 - Varun Prakash Saxena, Christabell Fredrick:
Fusion Techniques in Neural Network Model for Image Captioning. 92:1-92:6 - Yash Verma, Aakansha Gupta, Rahul Katarya:
Exploratory Data Analysis on Student Alcohol Consumption. 93:1-93:7 - Dhanush M. S, Thenmozhi M:
Missing Person Detection Using AI. 94:1-94:9 - Sakthirama Vadivelu:
Conglomeration of fin-tech and block chain for greater financial inclusion - Systematic review analysis. 95:1-95:9 - Anshu Singla, Vandana Pushe:
Text and Audio Framework for an Effective Mathematical Symbols' Visualization for Blind Students. 96:1-96:5 - Amit Kumar Singh Sanger, Rahul Johari:
CFES: Cloud, Fog, Edge Computing Simulators. 97:1-97:5 - Annapoorna Gopal, Gaurav Nagpal:
Text mining and Statistical Analysis based study on the effectiveness of Work Integrated Learning Program: Evidence from industry-academia collaboration between SAP Labs and BITS Pilani. 98:1-98:8 - Aarti Chugh, Charu Jain, Anil Kumar:
Design of Artificial Intelligence Enabled Game Engine. 99:1-99:5 - Nithya Chalapathy, Helen Josephine V. L., K. Rajalakshmi:
Sales Prediction Scheme Using RFM based Clustering and Regressor Model for Ecommerce Company. 100:1-100:6 - Akanksha Rai, Sonali Vyas:
A Review on Big Data Utilization in Metaverse World. 101:1-101:6 - Mahendra Balkrishna Salunke, Parikshit N. Mahalle, Gitanjali Rahul Shinde:
Importance of Lightweight Algorithm for Embedded Security in Machine-to-Machine Communication towards Internet of Things. 102:1-102:6 - Nikola Kaspríková:
The Data Analysis of Library Services in Regions of the Czech Republic: Library Services in Regions of the Czech Republic. 103:1-103:4 - Purushottam Lal Bhari, Geeta Tiwari:
Interventive Educational System: Participation of Artificial Neural Network. 104:1-104:6 - Ezhil Vijayarangan V, S. Metilda Florence:
Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption. 105:1-105:4 - Navneet Kumar Rajpoot, Prabhdeep Singh, Bhaskar Pant:
Nature-Inspired Load Balancing Approach in Cloud Computing Environment for Smart Healthcare. 106:1-106:6 - Rupal Gupta, Sanjay Kumar Malik:
RDF-ML: A Proposed SPARQL Tool for Machine Learning on Semantic Web Data. 107:1-107:7 - Noor Mohd, Kireet Joshi, Shahnawaz Husain, Indrajeet Kumar, Prakash Srivastava, Narayan Chaturvedi:
LTE Based Comparative Analysis of Routing Protocols in Heterogeneous Network (HETNet) Environment. 108:1-108:12 - Priya Mathur, Amit Kumar Gupta, Abhishek Dadhich:
Mental Health Classification on Social-Media: Systematic Review. 109:1-109:10 - Akshat Tanwar, Priyanka Sharma, Anjali Pandey, Sumit Kumar:
Intrusion Detection System Based Ameliorated Technique of Pattern Matching. 110:1-110:4 - Anuj Grover, Deepak Arora, Anant Grover:
Keypoint Detection for Identifying Body Joints using TensorFlow. 111:1-111:6 - Priyanka Shah, Paresh V. Virparya, Hardik B. Pandit:
Model of Recommendation System to Enhance the Employability: Machine Learning Approach. 112:1-112:4 - Vanjipriya V, Suresh Annamalai:
Machine Learning Technique for Energy, Performance and Cost-Effective Resource Management in Multi-Access Edge Computing. 113:1-113:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.