Papers
List of accepted papers with status of Registration, Copyright and Final Paper Submission
Special Session on Computational Intelligence and Internet of Things- ABESEC
| # | Title | Registered | IEEE_CPS
Upload |
| 120 | Identification of peak hour and active member on WhatsApp group using Python | Yes
|
Yes
|
| 1195 | Early Detection of Parkinson’s Disease Using Convolutional Neural Network | Yes
|
Yes
|
| 1328 | A Big Data Analytics Framework for analysing global tourism trends of Indians using Social Media Analytics | Yes | Yes |
| 1361 | A Hybrid Technology Based E-Clinical Diagnosis for Eye Diseases: A Framework | Yes
|
Yes
|
| 1584 | A Comprehensive Survey on Event Analysis Using Deep Learning | Yes
|
Yes
|
| 2142 | CREDIT CARD FRAUD DETECTION USING ADVANCED MACHINE LEARNING TECHNIQUES | Yes
|
Yes
|
| 2850 | A Review Paper on Drunk Driving Detection System using IOT & ML Techniques | Yes
|
Yes
|
| 3014 | Deep Learning Medical Solutions: A short review on COVID-19 detection Using Chest X-ray Image with CNN Multiple Architectures | Yes
|
Yes
|
| 3113 | A Deep Learning based hybrid model for improving accuracy of sentiment analysis | Yes
|
Yes
|
| 3867 | Evaluation of IoT based Real-Time Pulse & Temperature Monitoring System | Yes
|
Yes
|
| 4308 | An Analysis of SMS Spam Detection using Machine Learning Model | Yes
|
Yes
|
| 4349 | Deep Learning techniques for Object Detection in Images: Exploratory Study | Yes
|
Yes
|
| 4368 | Analysis and Development of E-Commerce Web Application | Yes
|
Yes
|
| 5380 | Deep-LSTM Model for Wheat Crop Yield Prediction in India | Yes
|
Yes
|
| 5504 | Plant Disease Identification Using Plant Images | Yes
|
Yes
|
| 5629 | Cognitive Radio Wireless Sensor Networks: A Survey | Yes
|
Yes
|
| 5645 | An Implemented review for Intent Creation and Detection using different Topic Clustering Techniques | Yes
|
Yes
|
| 6079 | Secure Android Location Tracking Application with Privacy Enhanced Technique | Yes
|
Yes
|
| 6140 | A Systematic Analysis and capturing of Complete and Latent Fingerprints | Yes
|
Yes
|
| 6216 | A Systematic Review of Encryption and Keylogging for Computer System Security | Yes
|
Yes
|
| 6688 | Content based image retrieval using feature fusion technique | Yes
|
Yes
|
| 6800 | Plant Recognition using Convolutional Neural Network | Yes
|
Yes
|
| 6815 | Smart Healthcare Ecosystems backed by IoT and Connected Bio- Medical Technologies | Yes
|
Yes
|
| 7168 | A review of SMS Spam Detection using features selection | Yes
|
Yes
|
| 7522 | Ant Colony Optimization based Edge Detection in Digital Images | Yes
|
Yes
|
| 8335 | Recommender System in E-commerce | Yes
|
Yes
|
| 8408 | Study on Lexical Analysis of Malicious URLs using Machine Learning | Yes
|
Yes
|
| 8454 | Store Management Security System | Yes
|
Yes
|
| 8498 | Abstractive Text Summarization Using Attention-based Stacked LSTM | Yes
|
Yes
|
| 8596 | Trusted Framework for Transitioning to Distributed Agile Development Environment – A Survey | Yes
|
Yes
|
| 8953 | Russia against the world tweets | Yes
|
Yes
|
| 9437 | An Assessment on Real Time Bidding Strategies for Advertising Markets | Yes | Yes
|
Special Session on Security and Trust in Computational Intelligence
| # | Title | Registered | IEEE_CPS |
| 4551 | CHRONIC KIDNEY DISEASE DETECTION USING MACHINE LEARNING | YES | YES |
| 5499 | Ear disease detection using R-CNN | YES | YES |
| 8073 | Image Encryption Using Hyper Elliptic Curve and Phase Truncate Transformation | YES | YES |
| 8814 | Blockchain: Tools for controlling ransomware through pre-encryption and post-encryption behaviour | YES | YES |
| 9291 | Computational intelligence paradigms for audio-based video summarization | YES | YES |
CCICT MAIN TRACKS
| # | Title | Registered | IEEE_CPS |
| 110 | On the Development of an Optimized Web Usage Mining Tool | Yes | Yes |
| 263 | Student’s Employability Indexing Using Machine Learning Approach | Yes | Yes |
| 418 | Metaheuristics for Software Test Case Optimization | Yes | Yes |
| 441 | Spam Email Assessment Using Machine Learning and Data Mining Approach | Yes | Yes |
| 492 | Analyzing the Potability of Water using Machine Learning Algorithm | Yes | Yes |
| 793 | Blockchain Based New E-voting Protocol System without Trusted Tallying Authorities | Yes | Yes |
| 1273 | A MACHINE LEARNING AND IOT BASED CONTACTLESS ENTRY SYSTEM | Yes | Yes |
| 1299 | Solving Modified DE Algorithm Based Expected Security Cost Problem Incorporating Solar and Flexible Resources | Yes | Yes |
| 1300 | Visualization Of Furniture Model Using Augmented Reality | Yes | Yes |
| 1316 | Identification of Diseases in Cassava Leaves using Convolutional Neural Network | Yes | Yes |
| 1494 | A Systematic Literature Review of Machine Learning Techniques for Software Effort Estimation Models | Yes | Yes |
| 1724 | A Comparison of Different Edge Detection Techniques Used in License Plate Localization | Yes | Yes |
| 1897 | Exploration of critical factors in adoption of electrical vehicles in India using Fuzzy Analytic Hierarchy Process method | Yes | Yes |
| 2177 | Nutrition Monitoring and Health Awareness System based on Crowd Sourced Food Images using Transfer Learning | Yes | Yes |
| 2565 | A Deeper CNN Approach For Detection Of Collapsed Buildings In Drone Images | Yes | Yes |
| 2908 | Natural Selection Simulator using Machine Learning | Yes | Yes |
| 2910 | Content-based fake news detection using deep learning techniques: Analysis, challenges and possible solutions | Yes | Yes |
| 3285 | River Water Quality Analysis and Prediction using Artificial Intelligence | Yes | Yes |
| 3305 | TRAVEL LOG ANALYSIS TRACKING SYSTEM BASED ON SALESFORCE FOR COVID-19 | Yes | Yes |
| 3382 | Leveraging Convolutional Neural Networks for Face Mask Detection | Yes | Yes |
| 3538 | Study on Online Education System and Comparative Analysis with Traditional Learning | Yes | Yes |
| 3945 | Machine learning based emotion detection system | Yes | Yes |
| 4466 | MULTICLASS LABELLING FOR BUG REPORT SEVERITY PREDICTION USING SEMANTIC ANALYSIS AND MACHINE LEARNING | Yes | Yes |
| 4476 | Fostering Consumers’ Attitude and Satisfaction Towards Voice Assistants: An Empirical Validation | Yes | Yes |
| 4573 | Issues and Challenges of Load Balancing Algorithms In Cloud Computing | Yes | Yes |
| 4878 | Machine Learning For Detecting Twitter Bot | Yes | Yes |
| 5139 | SPOTIFY GENRE RECOMMENDATION BASED ON USER EMOTION USING DEEP LEARNING | Yes | Yes |
| 5381 | Implementation of human body health parameters monitoring concepts-Heart rate, body temperature and blood pressure using IoT | Yes | Yes |
| 5631 | Monitoring and Remote Data Logging of Engine Operation via On Board Diagnostic port | Yes | Yes |
| 5667 | Opportunities and Challenges of Blockchain Technology for Tourism Industry in Future Smart Society | Yes | Yes |
| 5682 | MORTALITY PREDICTION OF LUNG CANCER FROM CT IMAGES USING DEEP LEARNING TECHNIQUES | Yes | Yes |
| 5724 | DETECTION OF SPAM MESSAGES IN E-MESSAGING PLATFORM USING MACHINE LEARNING | Yes | Yes |
| 5736 | RISK DETECTION OF STROKE USING CLASSIFIER ALGORITHMS | Yes | Yes |
| 5742 | Building a Spam Classifier with Machine Learning Algorithms in Python | Yes | Yes |
| 6503 | SIGN SCHOOL- An interactive website to promote Indian Sign Language | Yes | Yes |
| 6736 | Securing the transfer and controlling the piracy of digital files using Blockchain | Yes | Yes |
| 6956 | Blockchain and Autonomous Vehicles: Architecture, Security and Challenges | Yes | Yes |
| 7132 | Model for Predicting Cardiac Health using Deep Learning Classifier | Yes | Yes |
| 7162 | A Novel Approach for Software Effort Estimation using Optimized C&K Metrics | Yes | Yes |
| 7199 | GPT-3 Powered System for Content Generation and Transformation | Yes | Yes |
| 7484 | A Systematic Review for Crypto Currency Price Prediction using Machine Learning | Yes | Yes |
| 7556 | Applying Data Mining for Clustering Shoppers Based on Store Loyalty | Yes | Yes |
| 7594 | A Brief Survey of Detecting Spam Techniques: Twitter and Email | Yes | Yes |
| 7695 | Automated Detection of Diabetic Retinopathy: A Comprehensive Study | Yes | Yes |
| 7711 | ANALYSIS OF VARIOUS MACHINE LEARNING TECHNIQUES USED FOR AUTOMATIC TEXT SUMMARIZATION | Yes | Yes |
| 7726 | MalTDec3: Malicious Traffic Detection in a Network using 3 Layer Inspection | Yes | Yes |
| 7830 | Application of ensemble Machine Learning models for phishing detection on web networks | Yes | Yes |
| 7897 | Understanding the Dynamics of Employer Satisfaction in the Enrollment of Fresh Engineering Graduates in the Information Technology Based Organizations in India | Yes | Yes |
| 7905 | Use of Data mining Tools in Educational Data Mining | Yes | Yes |
| 8185 | Review on Credit Card Fraud Detection Techniques | Yes | Yes |
| 8251 | From linguistic features to their extractions: Understanding the semantics of a concept | Yes | Yes |
| 8595 | Enhancing action maze video games using Shuffled Frog Leaping Algorithm | Yes | Yes |
| 8868 | Detection of anomalous unmanned aerial vehicles: A systematic study, challenges, and future trends | Yes | Yes |
| 8999 | A Review on security schemes for Electronic Health Records | Yes | Yes |
| 9078 | Optimizing Image Captioning using Deep Learning based Object Detection | Yes | Yes |
| 9385 | Enhanced Machine Learning Model for Design and Evaluation of Various Algorithms for Clinical Cardiovascular Disease | Yes | Yes |
| 9567 | VIDEO BASED SENTIMENT ANALYSIS | Yes | Yes |
| 9818 | FIREBASE CLOUD: WEB-BASED VIDEO STREAMING PLATFORM | Yes | Yes |