


default search action
ICIMMI 2022: Jaipur, India
- Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, December 23-24, 2022. ACM 2022, ISBN 978-1-4503-9993-7

- Palika Jajoo, Mayank Kumar Jain

, Sarla Jangir:
Plant Disease Detection Over Multiple Datasets Using AlexNet. 1:1-1:6 - Sunita Chand

, Virendra P. Vishwakarma
:
Acute Leukaemia Diagnosis Using Transfer Learning on Resnet-50. 2:1-2:7 - Esha Saxena

, Manoj Yadav, Meenakshi Yadav
, Preety Shoran
:
Artificial Intelligence-based Diagnostic Analysis for Wireless Capsule Endoscopy in Obscure Bowel Disease Detection: A Potential. 3:1-3:7 - P. D. Dewangan, Praveen Mande

, Ankur Gupta
, P. J. Krishna
, Veerpratap Meena
, Vinay Pratap Singh:
Performance Evaluation of Jaya Algorithm During Search Space Violation. 4:1-4:9 - Shathanaa Rajmohan

, Mani Tej Mendem
, Shankar Sreenu Vanam
, Pavan Kumar Thalapally
:
Online Grading of Fruits using Deep Learning Models and Computer Vision. 5:1-5:8 - Manisha Bhatnagar

, Dolly Thankachan
:
Improving Multi-Channel Wireless Network Security Performance Using Trust-Enhanced Blockchain Deployment. 6:1-6:7 - Kirtida Tejas Naik

, Bindu Garg
:
A Machine Learning Model for Disease Prediction and Remote Patient Monitoring. 7:1-7:5 - Manisha Rajendra Kuveskar

, Prasad Khandekar
, Anuradha Bakare
:
Evapotranspiration Based Smart Irrigation System for Agriculture. 8:1-8:7 - Supriya Dhananjay Paigude

, Sajeeda Riyaj Shikalgar
:
Deep Learning Model for Work-Life Balance Prediction for Working Women in IT Industry. 9:1-9:8 - Prashant Acharya, Dushyant Singh

, Sitaram Gupta:
A Scalable Data Processing Framework for BigData Using Hadoop and MapReduce. 10:1-10:9 - Aarushi Dua

, Bhavya Kalra
, Abhishek Bhatia
, Mauktik Madan
, Anuradha Dhull
, Yogita Gigras
:
Crime Alert Through Smart Surveillance Using Deep Learning Techniques. 11:1-11:8 - Ankita Nainwal, Garima Sharma

, Bhaskar Pant, Devvret Verma
, Mahesh Kumar:
Classification of Corona virus between Humans and Bats using Support Vector Machine. 12:1-12:4 - Prashant Ahlawat

, M. Sharma
, Hitesh Kumar Sharma
:
Automated Breast Cancer Detection using Convolutional Neural Network based Computer Added Design System. 13:1-13:5 - Ranjith Singh Koppaiyan

, Abdul Shareef Pallivalappil
, Pooja Singh
, Husna Tabassum
, Pragya Tewari
, Ms Sweeti
, Sarvesh Kumar
:
High-Availability Encryption-Based Cloud Resource Provisioning System. 14:1-14:6 - Dinesh Babu K. M, Suresh Annamalai:

Android and Web Application to Assist Bachelors on Improving Their Living. 15:1-15:6 - Sandeep Kumar Sharma

, Anil Kumar
, Uday Pratap Singh
:
Enhanced Edges Detection from Different Color Space. 16:1-16:6 - Dinesh Goyal

, Kalu Ram Yadav
:
Performance Analysis of Various on Demand Multipath Routing Protocols. 17:1-17:5 - C. T. Dora Pravina

, Mrunalini Upendra Buradkar
, Md Khalid Jamal
, Ashish Tiwari
, Udit Mamodiya
, Dinesh Goyal
:
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. 18:1-18:5 - Dasharathraj K. Shetty

, Gayathri Prerepa
, Nithesh Naik
, Ritesh Bhat
, Jayant Sharma
, Parva Mehrotra
:
Revolutionizing Aerospace and Defense: The Impact of AI and Robotics on Modern Warfare. 19:1-19:8 - M. Anto Bennet

, S. S. Saranya
, Dinesh Goyal
, Pankaj Dadheech
, S. Balu
, Sudhakar Sengan
:
Classification and Localization of COVID-19 based on a Pneumonia Radiograph using a Deep Learning Approach. 20:1-20:6 - Ravi Kumar M

, Ashok Kumar
, Shah Fahad Saboon
, Shreay Kumar
, Yashwin Gowda Bp
, Shivam Deo Prasad
:
A Review on Path Planning Technique for Bio-Inspired Robot. 21:1-21:6 - Saurabh Sureshrao Nimkar

, Milind M. Khanapurkar
:
Edge-Based HTSO Model via Markov Decision Process Using Q-Learning. 22:1-22:8 - Jameel A. Qurashi, Sandeep Singh Sandhu

, Purushottam Lal Bhari
:
Benchmark for Investigating the Security in Software Development Phases. 23:1-23:12 - Md Tabish Zahir, Mudit Sagar, Yasir Imam, Anshu Yadav, Pinki Yadav:

A Review on Gsm Based LPG Leakage Detection and Controller. 24:1-24:6 - Tanya Garg

, Heemika Sharma
, Ruchi Goyal
:
Evolving Roles and Implications of Technology Enabled by 5 G in Various Industries. 25:1-25:6 - Shikha Sharma

, Dinesh Goyal
:
Making a long video short: A Systematic Review. 26:1-26:11 - Sanchith Venkatesan

, Shivam Handa
, Baskar M
:
Car Price Prediction. 27:1-27:6 - Preet Jadhav

, Kirti H. Wanjale
, Abhijit Chitre
, Vedmani Vaidya
:
Monuments Identification using Satellite Images: A CNN based approach. 28:1-28:4 - Abhishek Dadhich

, Dinesh Goyal
:
Analytical review of existing techniques IoT based Home Automation and securing its data over Edge Computing using Machine Learning. 29:1-29:8 - Arun Prasath Selvaraj

, Suresh Annamalai
:
Towards Reliable Medical Transactions for Blockchain based Healthcare Systems using Hybrid Consensus Method. 30:1-30:8 - Arokiaraj S

, Amudha T
, Swamynathan Ramakrishnan
:
Intelligent Agents for Crowdsourced Software Engineering : A Survey. 31:1-31:8 - Ratnesh Kashyap

, Juhi Singh
, Shweta Sinha
:
Recent Advancement in Education System Using AR Tools: A New Perspective. 32:1-32:5 - Depakkumar R

, Suresh Annamalai
:
Image Processing Model-Based Kidney Diseases Detection System Using CNN. 33:1-33:4 - Renjith V. Ravi

, S. B. Goyal
, Sanjay Singla
:
Colour Image Cryptography using Chaotic Pixel Shuffling and 3D Logistic Diffusion. 34:1-34:4 - Kabir Swami, Anirudhi Thanvi, Nakul Joshi, Sunil Kumar Jangir, Dinesh Goyal:

Deep Convolution Neural Network-Based Analysis of Tomato Plant Leaves. 35:1-35:4 - Satish Kumar

, C. Rama Krishna
, Sahil Khattar
, Raj Kumar Tickoo
:
Adversarial Attack to Deceive One Stage Object Detection Algorithms. 36:1-36:6 - Ujwal Gupta

, Ziya Javed
, Sherin Zafar
:
An analysis of Blockchain-based IoT solutions to overcome current challenges. 37:1-37:5 - Joyjit Patra

, Mimo Patra
, Subir Gupta
:
Artificial intelligence-based indicators for ALGO trading strategy on the NSE derivatives. 38:1-38:6 - Harshrim Pardal

, Komal Nagarajan
, Tripti Mahara
, Helen Josephine V. L
:
Global and Indian Perspectives on Russia-Ukraine War using Sentiment Analysis. 39:1-39:7 - Saurabh Sharma

, Gajanand Sharma
, Ekta Menghani
:
The Role of CNN in Detection and Prediction of Tomato Leaf Disease: A review. 40:1-40:5 - Ritu Shukla

, Dinesh Goyal
, Shruti Thapar
, Rohit Chhabra
:
Absolute Data Security Scheme: An Advanced Approach towards Data Security. 41:1-41:6 - Vivek Saxena

, Deepika Saxena
, Uday Pratap Singh
:
Security Enhancement using Image verification method to Secure Docker Containers. 42:1-42:5 - Udendhran R

, Mridul Garg
, Abhishek Kumar Yadav
:
Explainable Convolutional Neural Network with Facial Emotion Enabled Music Recommender System. 43:1-43:4 - Prashant Manuja

, Rajveer Singh Shekhawat
:
IT Security Frameworks: Risk Management Analysis and Solutions. 44:1-44:7 - Anil Kumar

, Purushottam Lal Bhari
, Uday Pratap Singh
, Vivek Saxena
:
Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. 45:1-45:6 - Arjun Taneja

, Anju Yadav
:
Sky-Net: A Deep Learning Approach to Predicting Lung Function Decline in Sufferers of Idiopathic Pulmonary Fibrosis. 46:1-46:4 - Rohit Kumar Verma

, Sukhvir Singh
:
Investigation of Algorithms for Task Scheduling and Resource Distribution in the Cloud. 47:1-47:7 - Nirmala Devi A

, Rathna R
:
Features Selection for EEG During Mental Arithmetic Task - Brain-Computer Interface. 48:1-48:4 - Geerija Lavania

, Gajanand Sharma
:
Blockchain and its dimensions: Future Security. 49:1-49:4 - Vinita Mirdha

, Deepak Bhatnagar
, Brajraj Sharma
:
Size Reduction of a Circularly Polarized Ring Slot Antenna Using Asymmetrical Rectangular Slots and a Parasitic Patch for a Radio Beacon on a Nanosatellite. 50:1-50:4 - Uday Pratap Singh

, Vivek Saxena
, Anil Kumar
, Purushottam Bhari
, Deepika Saxena
:
Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. 51:1-51:5 - Saurabh Sureshrao Nimkar

, Milind M. Khanapurkar
:
Bioinspired Model for Edge-based Task Scheduling Applications. 52:1-52:6 - Shashi Kant Rathore

, Gaurav Kumar Das
, Sachinpal Singh Yadav
, Surendra Yadav
, Amritpal Singh Yadav
:
Survey on Foraging Behavior Algorithms. 53:1-53:6 - Atharva Parikh

, Shreya Jain
, Parikshit N. Mahalle
, Gitanjali Rahul Shinde
:
Offer and Deal-Quality Prediction using Machine learning and Fuzzy approach: A Shark Tank India Case Study. 54:1-54:10 - Rekha Vijayvergia

, Bharti Nathani
, Nisheeth Joshi
, Rekha Jain
:
A Survey on Various Approaches Used in Named Entity Recognition for Indian Languages. 55:1-55:5 - Yatish Sekaran

, Tanmoy Debnath
, Taeesh Azal Assadi
, Sai Dileep Suvvari
, Shubh Oswal
:
Using Machine Learning to detect abnormalities on Modbus/TCP Networks. 56:1-56:6 - Suniti Chouhan

, Gajanand Sharma
:
Secure Online Voting System: Blockchain and other Approaches. 57:1-57:4 - Kirti Gupta

, Parul Goyal
:
Test Suites Generation using UML Modelling and Heuristic Techniques: A Systematic Study. 58:1-58:11 - Navneet Kumar Rajpoot

, Prabhdeep Singh
, Bhaskar Pant
:
Cloud-IoT Based Smart Healthcare Framework: Application and Trends. 59:1-59:6 - Bhawna Suri

, Shweta Taneja
, Isha Bhanot
, Himanshi Sharma
, Aanchal Raj
:
Cross-Platform Empirical Analysis of Mobile Application Development frameworks: Kotlin, React Native and Flutter. 60:1-60:6 - Sneha Das

, Sonali Vyas
:
The Utilization of AR/VR in Robotic Surgery: A Study. 61:1-61:8 - Sejal Sudhendu Dhamgaye

, Shrikant V. Sonekar
, Mirza Moiz Baig
:
Evaluation of the Effectiveness of a Secure Blockchain Framework for IoT-Based Data Transmission. 62:1-62:7 - Mitali Chugh

, Apoorva Pandey
, Sonali Vyas
:
A Comprehensive Study on the Association Between Personality Traits and Software Development. 63:1-63:6 - Pankaj Rahi

, Monika Dandotiya
, A. Anushya
, Ajay Khunteta
, Pankaj Agarwal
:
An Effect of Stacked CNN for Network Intrusion Detection System. 64:1-64:9 - Arpan Bhattacharya

, Ananya Seth
, Dheeraj Malhotra
, Neha Verma
:
Cloud Steganography: An Intelligent Approach to Improve Data Security in the Cloud Environment. 65:1-65:5 - Amitabh Patnaik

, Sunny Dawar
, Pallavi Kudal
:
Industry 5.0: Sustainability Challenges in Fusion of Human and AI. 66:1-66:7 - Sandeepkumar E. V

, Kayalvizhi Jayavel
:
Effective and light weight security system for highly confidential cloud data such as PHR. 67:1-67:7 - Pravek Sharma

, Tushar Agarwal
, Aarti Chugh
, Charu Jain
:
Churn Analysis for Constructive Employment Using Machine Learning Classifiers. 68:1-68:4 - Archana Ramrao Ugale

, Amol Dnyaneshwar Potgantwar
:
An Analytical Approach on Artificial Intelligence Based Models for Anomaly Detection in Sensor Networks. 69:1-69:6 - Lingaraj Mani

, Senthilkumar Arumugam
, Ramkumar Jaganathan
:
Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol. 70:1-70:5 - Gagandeep Singh

, Sagar Singh
, Nikhil Upadhyay
, Mayank Kumar
, Ankit Krishnakumar Thakur
:
DC Microgrid Protection. 71:1-71:5 - Anant Grover

, Deepak Arora
, Anuj Grover
:
Human Pose Estimation using Deep Learning Techniques. 72:1-72:6 - Raj Kumar Sharma

, Manisha Jailia
:
Regression Analysis of Garbage Management System for Smart Cities. 73:1-73:8 - Hiteshkumar Harshadbhai Solanki

, Paresh V. Virparya
:
A Benchmarking Model based on Research Performance Indicators of Engineering Institutions: A Principal Component Analysis. 74:1-74:8 - Gaurav Nagpal

, Singh Shrikant Ramesh
, Naga Vamsi Krishna Jasti
, Ankita Nagpal
, Gunjan Mohan Sharma
:
Ore Grade Estimation in Mining Industry from petro-physical data using neural networks. 75:1-75:5 - Ankita Sharma

, Swati Arora
:
Composites of ZnOxMgO1-x Thin Films. 76:1-76:3 - Sanjay Bhadu Patil

, Dnyandeo j Pete
:
Detection of Brain Tumors Using Magnetic Resonance Images through the Application of an Innovative Convolution Neural Network Model. 77:1-77:7 - Hemlata Panwar

, Jaydeep Singh Parmar
:
Designing of Optical Gain Analysis of Nano-Scale Heterostructure GaInP/AlGaInP Red Laser. 78:1-78:5 - Weing Kham Chap

, Anindita Chatterjee Rao
, Praveen Kumar Pandey
:
A Technological Review on Rise of Esports in World Economy. 79:1-79:8 - Babli Kumari

, Aman Jatain
, Yojna Arora
:
Skin Disease Diagnostic techniques using deep learning. 80:1-80:9 - Shikha Gautam

, Ajay Khunteta
, Debolina Ghosh
:
A Review on Software Defect Prediction Using Machine Learning. 81:1-81:10 - Aman Singh Chauhan

, Basireddy Chinna Ankalugari Vamsidhar Reddy
, Mamta Arora
, Mrinal Pandey
:
NIFTY Banking Sector Closing Price Prediction Using Deep Learning. 82:1-82:6 - Puneet Kapoor

, Sakshi Kaushal
, Harish Kumar
:
A Review on Architecture and Communication Protocols for Electric Vehicle Charging System. 83:1-83:6 - Jaroslaw Legierski

, Kajetan Rachwal
, Piotr Sowinski
, Wojciech Niewolski
, Przemyslaw Ratuszek
, Zbigniew Kopertowski
, Marcin Paprzycki
, Maria Ganzha
:
Towards Edge-Cloud Architectures for Personal Protective Equipment Detection. 84:1-84:6 - M. Saravanan

, Shiva Prasad S
:
A Blockchain-Based, Distributed, Self Hosted And End To End Encrypted Cloud Storage System. 85:1-85:7 - Vaishali Sharma

, Nitesh Nagpal
, Ankit Shandilya
, Aman Dureja
, Ajay Dureja
:
A Practical Approach to detect Indoor and Outdoor Scene Recognition. 86:1-86:10 - Tanubuddi Srinivasa Reddy

, Suresh Annamalai
:
A Cloud-Edge Collaboration Framework for Cognitive Service. 87:1-87:7 - Ashish Kumar

, Yudhvir Singh
:
Analyzing the Impact of Informed Attack Models in Recommender System. 88:1-88:5 - Monika Dandotiya

, Pankaj Rahi
, Ajay Khunteta
, A. Anushya
, Sayed Sayeed Ahmad
:
SAFE: A Secure Authenticated & Integrated Framework for E-learning. 89:1-89:9 - Manoj Kumar Singhal

:
Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment. 90:1-90:5 - Siddhartha Das Gupta

, Teja Kolla
, Ravi Yadav
, Mamta Arora
, Mrinal Pandey
:
Forecasting Cryptocurrency Prices using Sequential and Time Series Models. 91:1-91:6 - Varun Prakash Saxena

, Christabell Fredrick
:
Fusion Techniques in Neural Network Model for Image Captioning. 92:1-92:6 - Yash Verma

, Aakansha Gupta
, Rahul Katarya
:
Exploratory Data Analysis on Student Alcohol Consumption. 93:1-93:7 - Dhanush M. S

, Thenmozhi M
:
Missing Person Detection Using AI. 94:1-94:9 - Sakthirama Vadivelu

:
Conglomeration of fin-tech and block chain for greater financial inclusion - Systematic review analysis. 95:1-95:9 - Anshu Singla

, Vandana Pushe
:
Text and Audio Framework for an Effective Mathematical Symbols' Visualization for Blind Students. 96:1-96:5 - Amit Kumar Singh Sanger

, Rahul Johari
:
CFES: Cloud, Fog, Edge Computing Simulators. 97:1-97:5 - Annapoorna Gopal

, Gaurav Nagpal
:
Text mining and Statistical Analysis based study on the effectiveness of Work Integrated Learning Program: Evidence from industry-academia collaboration between SAP Labs and BITS Pilani. 98:1-98:8 - Aarti Chugh

, Charu Jain
, Anil Kumar
:
Design of Artificial Intelligence Enabled Game Engine. 99:1-99:5 - Nithya Chalapathy

, Helen Josephine V. L.
, K. Rajalakshmi
:
Sales Prediction Scheme Using RFM based Clustering and Regressor Model for Ecommerce Company. 100:1-100:6 - Akanksha Rai

, Sonali Vyas
:
A Review on Big Data Utilization in Metaverse World. 101:1-101:6 - Mahendra Balkrishna Salunke

, Parikshit N. Mahalle
, Gitanjali Rahul Shinde
:
Importance of Lightweight Algorithm for Embedded Security in Machine-to-Machine Communication towards Internet of Things. 102:1-102:6 - Nikola Kaspríková:

The Data Analysis of Library Services in Regions of the Czech Republic: Library Services in Regions of the Czech Republic. 103:1-103:4 - Purushottam Lal Bhari

, Geeta Tiwari
:
Interventive Educational System: Participation of Artificial Neural Network. 104:1-104:6 - Ezhil Vijayarangan V

, S. Metilda Florence
:
Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption. 105:1-105:4 - Navneet Kumar Rajpoot

, Prabhdeep Singh
, Bhaskar Pant
:
Nature-Inspired Load Balancing Approach in Cloud Computing Environment for Smart Healthcare. 106:1-106:6 - Rupal Gupta

, Sanjay Kumar Malik
:
RDF-ML: A Proposed SPARQL Tool for Machine Learning on Semantic Web Data. 107:1-107:7 - Noor Mohd

, Kireet Joshi
, Shahnawaz Husain
, Indrajeet Kumar
, Prakash Srivastava
, Narayan Chaturvedi
:
LTE Based Comparative Analysis of Routing Protocols in Heterogeneous Network (HETNet) Environment. 108:1-108:12 - Priya Mathur

, Amit Kumar Gupta
, Abhishek Dadhich
:
Mental Health Classification on Social-Media: Systematic Review. 109:1-109:10 - Akshat Tanwar

, Priyanka Sharma
, Anjali Pandey
, Sumit Kumar
:
Intrusion Detection System Based Ameliorated Technique of Pattern Matching. 110:1-110:4 - Anuj Grover

, Deepak Arora
, Anant Grover
:
Keypoint Detection for Identifying Body Joints using TensorFlow. 111:1-111:6 - Priyanka Shah

, Paresh V. Virparya
, Hardik B. Pandit
:
Model of Recommendation System to Enhance the Employability: Machine Learning Approach. 112:1-112:4 - Vanjipriya V

, Suresh Annamalai
:
Machine Learning Technique for Energy, Performance and Cost-Effective Resource Management in Multi-Access Edge Computing. 113:1-113:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














