Loading...
List of Accepted Papers : View The acceptance rate is 21%.
COCOLE-2022

List of Accepted Papers

Si. No. Paper ID Authors Paper Title
15Ramesh R. Naik, Sanjay G. Patel, Sunil Gautam, Rohit Pachlor and Umesh BodkheSubstantiation System Using Facial Recognition and Principal Component Analysis
219Archana Patnaik and Neelamadhab Padhy A Hybrid Approach to Enhance Software Quality by Sentiment Analysis of Developer
321Neelamadhab Padhy, Srinivasarao Dharmireddi, Dushmanta Kumar Padhy, R. Saikrishna and K. Srujan RajuStock Market Prediction Performance Analysis by using Machine Learning Regressor Techniques
423Smiti Kothari, Jayneel Shah, JaiPrakash Verma, Sapan H Mankad and Sanjay GargRaster Big Data Processing using Spark with GeoTrellis
530Soumya Snigdha Mohapatra, Rakesh Ranjan Kumar and Sujit BeborttaNearest Neighbor and Decision Tree based Cloud Service QoS Classification
633Ravi Khatri and Kuldeep KumarYolo and RetinaNet Ensemble Transfer Learning Detector: Application in Pavement Distress
743Niva Tripathy and Sampa SahooEnergy Aware Effective Task Offloading Mechanism in Fog Computing
850Prathi Naveena and Sandeep Kumar DashA GSJ Approach to Detect Near Duplicate Text Documents
960Aakanksha Sharaff, Nandini Rajput and Sai Rohith PapatlaUnsupervised Sentiment Analysis of Amazon Fine Food Reviews using Fuzzy Logic
1062Gourav Vakare, Faraz Khan, Aaradhaya Naikwade, Dipanshu Rautela and Hemraj LamkucheSentiment Analysis of Crypto Currency Trading Applications in India Using Machine Learning
1164Sourav Kumar Purohit and Sibarama PanigrahiForecasting Crude Oil Prices: A Machine Learning Perspective
1286Kumar Debi Prasad, Md Rizwan Khan and Bikramaditya DasImplementation of WPIC for MUD Techniques UWA Communication
13103Akash Kumar Dey, Geeta Gayatri Behera and Alekha Kumar MishraAn English Sentence Dictionary Based Secure Text Steganographic Technique for Message-Data Confidentiality
14106Rayudu Satwika, Bhabendu Kumar Mohanta, Gurpreet Singh Chahbra and Asesh Kumar TripathyDetection of Malicious Activity of Credit Card using Machine Learning
15108Vrindha Venugopal K.V. and K.R.M. Vijaya ChandrakalaAgent-Based Modeling for Optimum Location Selection: Enhancing Day-Ahead Market Analysis for Microgrid Integration
16109Subasish Mohapatra, Subhadarshini Mohanty, Santosh Kumar Maharana, Arabinda Dash, Sankarsan Sahoo and Subham Kumar SahooA Comparative Approach for Skin Cancer Detection using Artificial Bee Colony
17112Rahul Ray, Sudarson Jena and Priyadarsan ParidaAn Effective Threshold Based Technique for Retinal Image Blood Vessel Segmentation on Fundus Image using Average and Gaussian Filters
18113Binita Kumari and Ajay Kumar YadavDynamic Cross-Layer Communication Design for Multi-objective optimization in Wireless Sensor Networks
19118Puja Yuvaraj Patil and Sujit DasApplication of Multi-Criteria Decision-Making Methods to Select Multi-Objective Optimization Based Pareto-Optimal Solutions
20119S. V. Siva Rama Raju and Shanmuk Srinivas AmiripalliA Comparative Study on Social Behavior of Tribes and Non Tribes in ITDA Paderu by using Network Science
21122Srinivas Sethi, Manisa Rath, Sanjaya Kumar Kuanar and Ramesh Kumar SahooObject Recognition Through Content Based Feature Extraction and Classification of Sounds in IoT Environment
22124Subasish Mohapatra, Hriteek Kumar Nayak, Millan Kumar Mallick and Subhadarshini MohantyAnalysis and Comparison of Firefly Algorithm for Measuring Convergence Rate in Distributed Environment
23130Anurag Deep Kujur and Preeti ChandrakarThree Factor Authentication Scheme for Telecare Medical Information System
24131Shilpi Saha, Reema Frank and Rashmi KodikalImpact of Stress on Faculties’ Attitudes: A Study of Higher Education Institutes
25133Subrat Mohanty and Mayank AgarwalRecursive Feature Selection and Intrusion Classification in NSL-KDD Dataset using Multiple Machine Learning Methods