


default search action
ICIMMI 2022: Jaipur, India
- Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, December 23-24, 2022. ACM 2022, ISBN 978-1-4503-9993-7
- Palika Jajoo, Mayank Kumar Jain, Sarla Jangir:
Plant Disease Detection Over Multiple Datasets Using AlexNet. 1:1-1:6 - Sunita Chand
, Virendra P. Vishwakarma
:
Acute Leukaemia Diagnosis Using Transfer Learning on Resnet-50. 2:1-2:7 - Esha Saxena, Manoj Yadav, Meenakshi Yadav
, Preety Shoran
:
Artificial Intelligence-based Diagnostic Analysis for Wireless Capsule Endoscopy in Obscure Bowel Disease Detection: A Potential. 3:1-3:7 - P. D. Dewangan, Praveen Mande
, Ankur Gupta
, P. J. Krishna
, Veerpratap P. Meena, Vinay Pratap Singh:
Performance Evaluation of Jaya Algorithm During Search Space Violation. 4:1-4:9 - Shathanaa Rajmohan
, Mani Tej Mendem
, Shankar Sreenu Vanam
, Pavan Kumar Thalapally
:
Online Grading of Fruits using Deep Learning Models and Computer Vision. 5:1-5:8 - Manisha Bhatnagar
, Dolly Thankachan
:
Improving Multi-Channel Wireless Network Security Performance Using Trust-Enhanced Blockchain Deployment. 6:1-6:7 - Kirtida Tejas Naik
, Bindu Garg
:
A Machine Learning Model for Disease Prediction and Remote Patient Monitoring. 7:1-7:5 - Manisha Rajendra Kuveskar
, Prasad Khandekar
, Anuradha Bakare
:
Evapotranspiration Based Smart Irrigation System for Agriculture. 8:1-8:7 - Supriya Dhananjay Paigude
, Sajeeda Riyaj Shikalgar
:
Deep Learning Model for Work-Life Balance Prediction for Working Women in IT Industry. 9:1-9:8 - Prashant Acharya, Dushyant Singh
, Sitaram Gupta:
A Scalable Data Processing Framework for BigData Using Hadoop and MapReduce. 10:1-10:9 - Aarushi Dua
, Bhavya Kalra
, Abhishek Bhatia
, Mauktik Madan
, Anuradha Dhull
, Yogita Gigras
:
Crime Alert Through Smart Surveillance Using Deep Learning Techniques. 11:1-11:8 - Ankita Nainwal, Garima Sharma
, Bhaskar Pant, Devvrat Verma
, Mahesh Kumar:
Classification of Corona virus between Humans and Bats using Support Vector Machine. 12:1-12:4 - Prashant Ahlawat
, M. Sharma
, Hitesh Kumar Sharma
:
Automated Breast Cancer Detection using Convolutional Neural Network based Computer Added Design System. 13:1-13:5 - Ranjith Singh Koppaiyan
, Abdul Shareef Pallivalappil
, Pooja Singh
, Husna Tabassum
, Pragya Tewari
, Ms Sweeti
, Sarvesh Kumar
:
High-Availability Encryption-Based Cloud Resource Provisioning System. 14:1-14:6 - Dinesh Babu K. M, Suresh Annamalai:
Android and Web Application to Assist Bachelors on Improving Their Living. 15:1-15:6 - Sandeep Kumar Sharma
, Anil Kumar
, Uday Pratap Singh
:
Enhanced Edges Detection from Different Color Space. 16:1-16:6 - Dinesh Goyal
, Kalu Ram Yadav
:
Performance Analysis of Various on Demand Multipath Routing Protocols. 17:1-17:5 - C. T. Dora Pravina
, Mrunalini Upendra Buradkar
, Md Khalid Jamal
, Ashish Tiwari
, Udit Mamodiya
, Dinesh Goyal
:
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. 18:1-18:5 - Dasharathraj K. Shetty
, Gayathri Prerepa
, Nithesh Naik
, Ritesh Bhat
, Jayant Sharma
, Parva Mehrotra
:
Revolutionizing Aerospace and Defense: The Impact of AI and Robotics on Modern Warfare. 19:1-19:8 - M. Anto Bennet
, S. S. Saranya
, Dinesh Goyal
, Pankaj Dadheech
, S. Balu
, Sudhakar Sengan
:
Classification and Localization of COVID-19 based on a Pneumonia Radiograph using a Deep Learning Approach. 20:1-20:6 - Ravi Kumar M
, Ashok Kumar
, Shah Fahad Saboon
, Shreay Kumar
, Yashwin Gowda Bp
, Shivam Deo Prasad
:
A Review on Path Planning Technique for Bio-Inspired Robot. 21:1-21:6 - Saurabh Sureshrao Nimkar
, Milind M. Khanapurkar
:
Edge-Based HTSO Model via Markov Decision Process Using Q-Learning. 22:1-22:8 - Jameel A. Qurashi, Sandeep Singh Sandhu
, Purushottam Lal Bhari
:
Benchmark for Investigating the Security in Software Development Phases. 23:1-23:12 - Md Tabish Zahir, Mudit Sagar, Yasir Imam, Anshu Yadav, Pinki Yadav:
A Review on Gsm Based LPG Leakage Detection and Controller. 24:1-24:6 - Tanya Garg
, Heemika Sharma
, Ruchi Goyal
:
Evolving Roles and Implications of Technology Enabled by 5 G in Various Industries. 25:1-25:6 - Shikha Sharma
, Dinesh Goyal
:
Making a long video short: A Systematic Review. 26:1-26:11 - Sanchith Venkatesan
, Shivam Handa
, Baskar M
:
Car Price Prediction. 27:1-27:6 - Preet Jadhav
, Kirti Wanjale
, Abhijit Chitre
, Vedmani Vaidya
:
Monuments Identification using Satellite Images: A CNN based approach. 28:1-28:4 - Abhishek Dadhich
, Dinesh Goyal
:
Analytical review of existing techniques IoT based Home Automation and securing its data over Edge Computing using Machine Learning. 29:1-29:8 - Arun Prasath Selvaraj
, Suresh Annamalai
:
Towards Reliable Medical Transactions for Blockchain based Healthcare Systems using Hybrid Consensus Method. 30:1-30:8 - Arokiaraj S
, Amudha T
, Swamynathan R
:
Intelligent Agents for Crowdsourced Software Engineering : A Survey. 31:1-31:8 - Ratnesh Kashyap
, Juhi Singh
, Shweta Sinha
:
Recent Advancement in Education System Using AR Tools: A New Perspective. 32:1-32:5 - Depakkumar R
, Suresh Annamalai
:
Image Processing Model-Based Kidney Diseases Detection System Using CNN. 33:1-33:4 - Renjith V. Ravi
, S. B. Goyal
, Sanjay Singla
:
Colour Image Cryptography using Chaotic Pixel Shuffling and 3D Logistic Diffusion. 34:1-34:4 - Kabir Swami, Anirudhi Thanvi, Nakul Joshi, Sunil Kumar Jangir, Dinesh Goyal:
Deep Convolution Neural Network-Based Analysis of Tomato Plant Leaves. 35:1-35:4 - Satish Kumar
, C. Rama Krishna
, Sahil Khattar
, Raj Kumar Tickoo
:
Adversarial Attack to Deceive One Stage Object Detection Algorithms. 36:1-36:6 - Ujwal Gupta
, Ziya Javed
, Sherin Zafar
:
An analysis of Blockchain-based IoT solutions to overcome current challenges. 37:1-37:5 - Joyjit Patra
, Mimo Patra
, Subir Gupta
:
Artificial intelligence-based indicators for ALGO trading strategy on the NSE derivatives. 38:1-38:6 - Harshrim Pardal
, Komal Nagarajan
, Tripti Mahara
, Helen Josephine V. L
:
Global and Indian Perspectives on Russia-Ukraine War using Sentiment Analysis. 39:1-39:7 - Saurabh Sharma
, Gajanand Sharma
, Ekta Menghani
:
The Role of CNN in Detection and Prediction of Tomato Leaf Disease: A review. 40:1-40:5 - Ritu Shukla
, Dinesh Goyal
, Shruti Thapar
, Rohit Chhabra
:
Absolute Data Security Scheme: An Advanced Approach towards Data Security. 41:1-41:6 - Vivek Saxena
, Deepika Saxena
, Uday Pratap Singh
:
Security Enhancement using Image verification method to Secure Docker Containers. 42:1-42:5 - Udendhran R
, Mridul Garg
, Abhishek Kumar Yadav
:
Explainable Convolutional Neural Network with Facial Emotion Enabled Music Recommender System. 43:1-43:4 - Prashant Manuja
, Rajveer Singh Shekhawat
:
IT Security Frameworks: Risk Management Analysis and Solutions. 44:1-44:7 - Anil Kumar
, Purushottam Lal Bhari
, Uday Pratap Singh
, Vivek Saxena
:
Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. 45:1-45:6 - Arjun Taneja
, Anju Yadav
:
Sky-Net: A Deep Learning Approach to Predicting Lung Function Decline in Sufferers of Idiopathic Pulmonary Fibrosis. 46:1-46:4 - Rohit Kumar Verma
, Sukhvir Singh
:
Investigation of Algorithms for Task Scheduling and Resource Distribution in the Cloud. 47:1-47:7 - Nirmala Devi A
, Rathna R
:
Features Selection for EEG During Mental Arithmetic Task - Brain-Computer Interface. 48:1-48:4 - Geerija Lavania
, Gajanand Sharma
:
Blockchain and its dimensions: Future Security. 49:1-49:4 - Vinita Mirdha
, Deepak Bhatnagar
, Brajraj Sharma
:
Size Reduction of a Circularly Polarized Ring Slot Antenna Using Asymmetrical Rectangular Slots and a Parasitic Patch for a Radio Beacon on a Nanosatellite. 50:1-50:4 - Uday Pratap Singh
, Vivek Saxena
, Anil Kumar
, Purushottam Bhari
, Deepika Saxena
:
Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. 51:1-51:5 - Saurabh Sureshrao Nimkar
, Milind M. Khanapurkar
:
Bioinspired Model for Edge-based Task Scheduling Applications. 52:1-52:6 - Shashi Kant Rathore
, Gaurav Kumar Das
, Sachinpal Singh Yadav
, Surendra Yadav
, Amritpal Singh Yadav
:
Survey on Foraging Behavior Algorithms. 53:1-53:6 - Atharva Parikh
, Shreya Jain
, Parikshit N. Mahalle
, Gitanjali Rahul Shinde
:
Offer and Deal-Quality Prediction using Machine learning and Fuzzy approach: A Shark Tank India Case Study. 54:1-54:10 - Rekha Vijayvergia
, Bharti Nathani
, Nisheeth Joshi
, Rekha Jain
:
A Survey on Various Approaches Used in Named Entity Recognition for Indian Languages. 55:1-55:5 - Yatish Sekaran
, Tanmoy Debnath
, Taeesh Azal Assadi
, Sai Dileep Suvvari
, Shubh Oswal
:
Using Machine Learning to detect abnormalities on Modbus/TCP Networks. 56:1-56:6 - Suniti Chouhan
, Gajanand Sharma
:
Secure Online Voting System: Blockchain and other Approaches. 57:1-57:4 - Kirti Gupta
, Parul Goyal
:
Test Suites Generation using UML Modelling and Heuristic Techniques: A Systematic Study. 58:1-58:11 - Navneet Kumar Rajpoot
, Prabhdeep Singh
, Bhaskar Pant
:
Cloud-IoT Based Smart Healthcare Framework: Application and Trends. 59:1-59:6 - Bhawna Suri
, Shweta Taneja
, Isha Bhanot
, Himanshi Sharma
, Aanchal Raj
:
Cross-Platform Empirical Analysis of Mobile Application Development frameworks: Kotlin, React Native and Flutter. 60:1-60:6 - Sneha Das
, Sonali Vyas
:
The Utilization of AR/VR in Robotic Surgery: A Study. 61:1-61:8 - Sejal Sudhendu Dhamgaye
, Shrikant V. Sonekar
, Mirza Moiz Baig
:
Evaluation of the Effectiveness of a Secure Blockchain Framework for IoT-Based Data Transmission. 62:1-62:7 - Mitali Chugh
, Apoorva Pandey
, Sonali Vyas
:
A Comprehensive Study on the Association Between Personality Traits and Software Development. 63:1-63:6 - Pankaj Rahi
, Monika Dandotiya
, A. Anushya
, Ajay Khunteta
, Pankaj Agarwal
:
An Effect of Stacked CNN for Network Intrusion Detection System. 64:1-64:9 - Arpan Bhattacharya
, Ananya Seth
, Dheeraj Malhotra
, Neha Verma
:
Cloud Steganography: An Intelligent Approach to Improve Data Security in the Cloud Environment. 65:1-65:5 - Amitabh Patnaik
, Sunny Dawar
, Pallavi Kudal
:
Industry 5.0: Sustainability Challenges in Fusion of Human and AI. 66:1-66:7 - Sandeepkumar E. V
, Kayalvizhi Jayavel
:
Effective and light weight security system for highly confidential cloud data such as PHR. 67:1-67:7 - Pravek Sharma
, Tushar Agarwal
, Aarti Chugh
, Charu Jain
:
Churn Analysis for Constructive Employment Using Machine Learning Classifiers. 68:1-68:4 - Archana Ramrao Ugale
, Amol Dnyaneshwar Potgantwar
:
An Analytical Approach on Artificial Intelligence Based Models for Anomaly Detection in Sensor Networks. 69:1-69:6 - Lingaraj Mani
, Senthilkumar Arumugam
, Ramkumar Jaganathan
:
Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol. 70:1-70:5 - Gagandeep Singh
, Sagar Singh
, Nikhil Upadhyay
, Mayank Kumar
, Ankit Krishnakumar Thakur
:
DC Microgrid Protection. 71:1-71:5 - Anant Grover
, Deepak Arora
, Anuj Grover
:
Human Pose Estimation using Deep Learning Techniques. 72:1-72:6 - Raj Kumar Sharma
, Manisha Jailia
:
Regression Analysis of Garbage Management System for Smart Cities. 73:1-73:8 - Hiteshkumar Harshadbhai Solanki
, Paresh V. Virparya
:
A Benchmarking Model based on Research Performance Indicators of Engineering Institutions: A Principal Component Analysis. 74:1-74:8 - Gaurav Nagpal
, Singh Shrikant Ramesh
, Naga Vamsi Krishna Jasti
, Ankita Nagpal
, Gunjan Mohan Sharma
:
Ore Grade Estimation in Mining Industry from petro-physical data using neural networks. 75:1-75:5 - Ankita Sharma
, Swati Arora
:
Composites of ZnOxMgO1-x Thin Films. 76:1-76:3 - Sanjay Bhadu Patil
, Dnyandeo j Pete
:
Detection of Brain Tumors Using Magnetic Resonance Images through the Application of an Innovative Convolution Neural Network Model. 77:1-77:7 - Hemlata Panwar
, Jaydeep Singh Parmar
:
Designing of Optical Gain Analysis of Nano-Scale Heterostructure GaInP/AlGaInP Red Laser. 78:1-78:5 - Weing Kham Chap
, Anindita Chatterjee Rao
, Praveen Kumar Pandey
:
A Technological Review on Rise of Esports in World Economy. 79:1-79:8 - Babli Kumari
, Aman Jatain
, Yojna Arora
:
Skin Disease Diagnostic techniques using deep learning. 80:1-80:9 - Shikha Gautam
, Ajay Khunteta
, Debolina Ghosh
:
A Review on Software Defect Prediction Using Machine Learning. 81:1-81:10 - Aman Singh Chauhan
, Basireddy Chinna Ankalugari Vamsidhar Reddy
, Mamta Arora
, Mrinal Pandey
:
NIFTY Banking Sector Closing Price Prediction Using Deep Learning. 82:1-82:6 - Puneet Kapoor
, Sakshi Kaushal
, Harish Kumar
:
A Review on Architecture and Communication Protocols for Electric Vehicle Charging System. 83:1-83:6 - Jaroslaw Legierski
, Kajetan Rachwal
, Piotr Sowinski
, Wojciech Niewolski
, Przemyslaw Ratuszek
, Zbigniew Kopertowski
, Marcin Paprzycki
, Maria Ganzha
:
Towards Edge-Cloud Architectures for Personal Protective Equipment Detection. 84:1-84:6 - M. Saravanan
, Shiva Prasad S
:
A Blockchain-Based, Distributed, Self Hosted And End To End Encrypted Cloud Storage System. 85:1-85:7 - Vaishali Sharma
, Nitesh Nagpal
, Ankit Shandilya
, Aman Dureja
, Ajay Dureja
:
A Practical Approach to detect Indoor and Outdoor Scene Recognition. 86:1-86:10 - Tanubuddi Srinivasa Reddy
, Suresh Annamalai
:
A Cloud-Edge Collaboration Framework for Cognitive Service. 87:1-87:7 - Ashish Kumar
, Yudhvir Singh
:
Analyzing the Impact of Informed Attack Models in Recommender System. 88:1-88:5 - Monika Dandotiya
, Pankaj Rahi
, Ajay Khunteta
, A. Anushya
, Sayed Sayeed Ahmad
:
SAFE: A Secure Authenticated & Integrated Framework for E-learning. 89:1-89:9 - Manoj Kumar Singhal
:
Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment. 90:1-90:5 - Siddhartha Das Gupta
, Teja Kolla
, Ravi Yadav
, Mamta Arora
, Mrinal Pandey
:
Forecasting Cryptocurrency Prices using Sequential and Time Series Models. 91:1-91:6 - Varun Prakash Saxena
, Christabell Fredrick
:
Fusion Techniques in Neural Network Model for Image Captioning. 92:1-92:6 - Yash Verma
, Aakansha Gupta
, Rahul Katarya
:
Exploratory Data Analysis on Student Alcohol Consumption. 93:1-93:7 - Dhanush M. S
, Thenmozhi M
:
Missing Person Detection Using AI. 94:1-94:9 - Sakthirama Vadivelu
:
Conglomeration of fin-tech and block chain for greater financial inclusion - Systematic review analysis. 95:1-95:9 - Anshu Singla
, Vandana Pushe
:
Text and Audio Framework for an Effective Mathematical Symbols' Visualization for Blind Students. 96:1-96:5 - Amit Kumar Singh Sanger
, Rahul Johari
:
CFES: Cloud, Fog, Edge Computing Simulators. 97:1-97:5 - Annapoorna Gopal
, Gaurav Nagpal
:
Text mining and Statistical Analysis based study on the effectiveness of Work Integrated Learning Program: Evidence from industry-academia collaboration between SAP Labs and BITS Pilani. 98:1-98:8 - Aarti Chugh
, Charu Jain
, Anil Kumar
:
Design of Artificial Intelligence Enabled Game Engine. 99:1-99:5 - Nithya Chalapathy
, Helen Josephine V. L.
, K. Rajalakshmi
:
Sales Prediction Scheme Using RFM based Clustering and Regressor Model for Ecommerce Company. 100:1-100:6 - Akanksha Rai
, Sonali Vyas
:
A Review on Big Data Utilization in Metaverse World. 101:1-101:6 - Mahendra Balkrishna Salunke
, Parikshit N. Mahalle
, Gitanjali Rahul Shinde
:
Importance of Lightweight Algorithm for Embedded Security in Machine-to-Machine Communication towards Internet of Things. 102:1-102:6 - Nikola Kaspríková:
The Data Analysis of Library Services in Regions of the Czech Republic: Library Services in Regions of the Czech Republic. 103:1-103:4 - Purushottam Lal Bhari
, Geeta Tiwari
:
Interventive Educational System: Participation of Artificial Neural Network. 104:1-104:6 - Ezhil Vijayarangan V
, S. Metilda Florence
:
Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption. 105:1-105:4 - Navneet Kumar Rajpoot
, Prabhdeep Singh
, Bhaskar Pant
:
Nature-Inspired Load Balancing Approach in Cloud Computing Environment for Smart Healthcare. 106:1-106:6 - Rupal Gupta
, Sanjay Kumar Malik
:
RDF-ML: A Proposed SPARQL Tool for Machine Learning on Semantic Web Data. 107:1-107:7 - Noor Mohd
, Kireet Joshi
, Shahnawaz Husain
, Indrajeet Kumar
, Prakash Srivastava
, Narayan Chaturvedi
:
LTE Based Comparative Analysis of Routing Protocols in Heterogeneous Network (HETNet) Environment. 108:1-108:12 - Priya Mathur
, Amit Kumar Gupta
, Abhishek Dadhich
:
Mental Health Classification on Social-Media: Systematic Review. 109:1-109:10 - Akshat Tanwar
, Priyanka Sharma
, Anjali Pandey
, Sumit Kumar
:
Intrusion Detection System Based Ameliorated Technique of Pattern Matching. 110:1-110:4 - Anuj Grover
, Deepak Arora
, Anant Grover
:
Keypoint Detection for Identifying Body Joints using TensorFlow. 111:1-111:6 - Priyanka Shah
, Paresh V. Virparya
, Hardik B. Pandit
:
Model of Recommendation System to Enhance the Employability: Machine Learning Approach. 112:1-112:4 - Vanjipriya V
, Suresh Annamalai
:
Machine Learning Technique for Energy, Performance and Cost-Effective Resource Management in Multi-Access Edge Computing. 113:1-113:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.