Papers
List of accepted papers with status of Registration, Copyright and Final Paper Submission
Special Session on Computational Intelligence and Internet of Things- ABESEC
# | Title | Registered | IEEE_CPS
Upload |
120 | Identification of peak hour and active member on WhatsApp group using Python | Yes
|
Yes
|
1195 | Early Detection of Parkinson’s Disease Using Convolutional Neural Network | Yes
|
Yes
|
1328 | A Big Data Analytics Framework for analysing global tourism trends of Indians using Social Media Analytics | Yes | Yes |
1361 | A Hybrid Technology Based E-Clinical Diagnosis for Eye Diseases: A Framework | Yes
|
Yes
|
1584 | A Comprehensive Survey on Event Analysis Using Deep Learning | Yes
|
Yes
|
2142 | CREDIT CARD FRAUD DETECTION USING ADVANCED MACHINE LEARNING TECHNIQUES | Yes
|
Yes
|
2850 | A Review Paper on Drunk Driving Detection System using IOT & ML Techniques | Yes
|
Yes
|
3014 | Deep Learning Medical Solutions: A short review on COVID-19 detection Using Chest X-ray Image with CNN Multiple Architectures | Yes
|
Yes
|
3113 | A Deep Learning based hybrid model for improving accuracy of sentiment analysis | Yes
|
Yes
|
3867 | Evaluation of IoT based Real-Time Pulse & Temperature Monitoring System | Yes
|
Yes
|
4308 | An Analysis of SMS Spam Detection using Machine Learning Model | Yes
|
Yes
|
4349 | Deep Learning techniques for Object Detection in Images: Exploratory Study | Yes
|
Yes
|
4368 | Analysis and Development of E-Commerce Web Application | Yes
|
Yes
|
5380 | Deep-LSTM Model for Wheat Crop Yield Prediction in India | Yes
|
Yes
|
5504 | Plant Disease Identification Using Plant Images | Yes
|
Yes
|
5629 | Cognitive Radio Wireless Sensor Networks: A Survey | Yes
|
Yes
|
5645 | An Implemented review for Intent Creation and Detection using different Topic Clustering Techniques | Yes
|
Yes
|
6079 | Secure Android Location Tracking Application with Privacy Enhanced Technique | Yes
|
Yes
|
6140 | A Systematic Analysis and capturing of Complete and Latent Fingerprints | Yes
|
Yes
|
6216 | A Systematic Review of Encryption and Keylogging for Computer System Security | Yes
|
Yes
|
6688 | Content based image retrieval using feature fusion technique | Yes
|
Yes
|
6800 | Plant Recognition using Convolutional Neural Network | Yes
|
Yes
|
6815 | Smart Healthcare Ecosystems backed by IoT and Connected Bio- Medical Technologies | Yes
|
Yes
|
7168 | A review of SMS Spam Detection using features selection | Yes
|
Yes
|
7522 | Ant Colony Optimization based Edge Detection in Digital Images | Yes
|
Yes
|
8335 | Recommender System in E-commerce | Yes
|
Yes
|
8408 | Study on Lexical Analysis of Malicious URLs using Machine Learning | Yes
|
Yes
|
8454 | Store Management Security System | Yes
|
Yes
|
8498 | Abstractive Text Summarization Using Attention-based Stacked LSTM | Yes
|
Yes
|
8596 | Trusted Framework for Transitioning to Distributed Agile Development Environment – A Survey | Yes
|
Yes
|
8953 | Russia against the world tweets | Yes
|
Yes
|
9437 | An Assessment on Real Time Bidding Strategies for Advertising Markets | Yes | Yes
|
Special Session on Security and Trust in Computational Intelligence
# | Title | Registered | IEEE_CPS |
4551 | CHRONIC KIDNEY DISEASE DETECTION USING MACHINE LEARNING | YES | YES |
5499 | Ear disease detection using R-CNN | YES | YES |
8073 | Image Encryption Using Hyper Elliptic Curve and Phase Truncate Transformation | YES | YES |
8814 | Blockchain: Tools for controlling ransomware through pre-encryption and post-encryption behaviour | YES | YES |
9291 | Computational intelligence paradigms for audio-based video summarization | YES | YES |
CCICT MAIN TRACKS
# | Title | Registered | IEEE_CPS |
110 | On the Development of an Optimized Web Usage Mining Tool | Yes | Yes |
263 | Student’s Employability Indexing Using Machine Learning Approach | Yes | Yes |
418 | Metaheuristics for Software Test Case Optimization | Yes | Yes |
441 | Spam Email Assessment Using Machine Learning and Data Mining Approach | Yes | Yes |
492 | Analyzing the Potability of Water using Machine Learning Algorithm | Yes | Yes |
793 | Blockchain Based New E-voting Protocol System without Trusted Tallying Authorities | Yes | Yes |
1273 | A MACHINE LEARNING AND IOT BASED CONTACTLESS ENTRY SYSTEM | Yes | Yes |
1299 | Solving Modified DE Algorithm Based Expected Security Cost Problem Incorporating Solar and Flexible Resources | Yes | Yes |
1300 | Visualization Of Furniture Model Using Augmented Reality | Yes | Yes |
1316 | Identification of Diseases in Cassava Leaves using Convolutional Neural Network | Yes | Yes |
1494 | A Systematic Literature Review of Machine Learning Techniques for Software Effort Estimation Models | Yes | Yes |
1724 | A Comparison of Different Edge Detection Techniques Used in License Plate Localization | Yes | Yes |
1897 | Exploration of critical factors in adoption of electrical vehicles in India using Fuzzy Analytic Hierarchy Process method | Yes | Yes |
2177 | Nutrition Monitoring and Health Awareness System based on Crowd Sourced Food Images using Transfer Learning | Yes | Yes |
2565 | A Deeper CNN Approach For Detection Of Collapsed Buildings In Drone Images | Yes | Yes |
2908 | Natural Selection Simulator using Machine Learning | Yes | Yes |
2910 | Content-based fake news detection using deep learning techniques: Analysis, challenges and possible solutions | Yes | Yes |
3285 | River Water Quality Analysis and Prediction using Artificial Intelligence | Yes | Yes |
3305 | TRAVEL LOG ANALYSIS TRACKING SYSTEM BASED ON SALESFORCE FOR COVID-19 | Yes | Yes |
3382 | Leveraging Convolutional Neural Networks for Face Mask Detection | Yes | Yes |
3538 | Study on Online Education System and Comparative Analysis with Traditional Learning | Yes | Yes |
3945 | Machine learning based emotion detection system | Yes | Yes |
4466 | MULTICLASS LABELLING FOR BUG REPORT SEVERITY PREDICTION USING SEMANTIC ANALYSIS AND MACHINE LEARNING | Yes | Yes |
4476 | Fostering Consumers’ Attitude and Satisfaction Towards Voice Assistants: An Empirical Validation | Yes | Yes |
4573 | Issues and Challenges of Load Balancing Algorithms In Cloud Computing | Yes | Yes |
4878 | Machine Learning For Detecting Twitter Bot | Yes | Yes |
5139 | SPOTIFY GENRE RECOMMENDATION BASED ON USER EMOTION USING DEEP LEARNING | Yes | Yes |
5381 | Implementation of human body health parameters monitoring concepts-Heart rate, body temperature and blood pressure using IoT | Yes | Yes |
5631 | Monitoring and Remote Data Logging of Engine Operation via On Board Diagnostic port | Yes | Yes |
5667 | Opportunities and Challenges of Blockchain Technology for Tourism Industry in Future Smart Society | Yes | Yes |
5682 | MORTALITY PREDICTION OF LUNG CANCER FROM CT IMAGES USING DEEP LEARNING TECHNIQUES | Yes | Yes |
5724 | DETECTION OF SPAM MESSAGES IN E-MESSAGING PLATFORM USING MACHINE LEARNING | Yes | Yes |
5736 | RISK DETECTION OF STROKE USING CLASSIFIER ALGORITHMS | Yes | Yes |
5742 | Building a Spam Classifier with Machine Learning Algorithms in Python | Yes | Yes |
6503 | SIGN SCHOOL- An interactive website to promote Indian Sign Language | Yes | Yes |
6736 | Securing the transfer and controlling the piracy of digital files using Blockchain | Yes | Yes |
6956 | Blockchain and Autonomous Vehicles: Architecture, Security and Challenges | Yes | Yes |
7132 | Model for Predicting Cardiac Health using Deep Learning Classifier | Yes | Yes |
7162 | A Novel Approach for Software Effort Estimation using Optimized C&K Metrics | Yes | Yes |
7199 | GPT-3 Powered System for Content Generation and Transformation | Yes | Yes |
7484 | A Systematic Review for Crypto Currency Price Prediction using Machine Learning | Yes | Yes |
7556 | Applying Data Mining for Clustering Shoppers Based on Store Loyalty | Yes | Yes |
7594 | A Brief Survey of Detecting Spam Techniques: Twitter and Email | Yes | Yes |
7695 | Automated Detection of Diabetic Retinopathy: A Comprehensive Study | Yes | Yes |
7711 | ANALYSIS OF VARIOUS MACHINE LEARNING TECHNIQUES USED FOR AUTOMATIC TEXT SUMMARIZATION | Yes | Yes |
7726 | MalTDec3: Malicious Traffic Detection in a Network using 3 Layer Inspection | Yes | Yes |
7830 | Application of ensemble Machine Learning models for phishing detection on web networks | Yes | Yes |
7897 | Understanding the Dynamics of Employer Satisfaction in the Enrollment of Fresh Engineering Graduates in the Information Technology Based Organizations in India | Yes | Yes |
7905 | Use of Data mining Tools in Educational Data Mining | Yes | Yes |
8185 | Review on Credit Card Fraud Detection Techniques | Yes | Yes |
8251 | From linguistic features to their extractions: Understanding the semantics of a concept | Yes | Yes |
8595 | Enhancing action maze video games using Shuffled Frog Leaping Algorithm | Yes | Yes |
8868 | Detection of anomalous unmanned aerial vehicles: A systematic study, challenges, and future trends | Yes | Yes |
8999 | A Review on security schemes for Electronic Health Records | Yes | Yes |
9078 | Optimizing Image Captioning using Deep Learning based Object Detection | Yes | Yes |
9385 | Enhanced Machine Learning Model for Design and Evaluation of Various Algorithms for Clinical Cardiovascular Disease | Yes | Yes |
9567 | VIDEO BASED SENTIMENT ANALYSIS | Yes | Yes |
9818 | FIREBASE CLOUD: WEB-BASED VIDEO STREAMING PLATFORM | Yes | Yes |