1 | 5 | Ramesh R. Naik, Sanjay G. Patel, Sunil Gautam, Rohit Pachlor and Umesh Bodkhe | Substantiation System Using Facial Recognition and Principal Component Analysis |
2 | 19 | Archana Patnaik and Neelamadhab Padhy | A Hybrid Approach to Enhance Software Quality by Sentiment Analysis of Developer |
3 | 21 | Neelamadhab Padhy, Srinivasarao Dharmireddi, Dushmanta Kumar Padhy, R. Saikrishna and K. Srujan Raju | Stock Market Prediction Performance Analysis by using Machine Learning Regressor Techniques |
4 | 23 | Smiti Kothari, Jayneel Shah, JaiPrakash Verma, Sapan H Mankad and Sanjay Garg | Raster Big Data Processing using Spark with GeoTrellis |
5 | 30 | Soumya Snigdha Mohapatra, Rakesh Ranjan Kumar and Sujit Bebortta | Nearest Neighbor and Decision Tree based Cloud Service QoS Classification |
6 | 33 | Ravi Khatri and Kuldeep Kumar | Yolo and RetinaNet Ensemble Transfer Learning Detector: Application in Pavement Distress |
7 | 43 | Niva Tripathy and Sampa Sahoo | Energy Aware Effective Task Offloading Mechanism in Fog Computing |
8 | 50 | Prathi Naveena and Sandeep Kumar Dash | A GSJ Approach to Detect Near Duplicate Text Documents |
9 | 60 | Aakanksha Sharaff, Nandini Rajput and Sai Rohith Papatla | Unsupervised Sentiment Analysis of Amazon Fine Food Reviews using Fuzzy Logic |
10 | 62 | Gourav Vakare, Faraz Khan, Aaradhaya Naikwade, Dipanshu Rautela and Hemraj Lamkuche | Sentiment Analysis of Crypto Currency Trading Applications in India Using Machine Learning |
11 | 64 | Sourav Kumar Purohit and Sibarama Panigrahi | Forecasting Crude Oil Prices: A Machine Learning Perspective |
12 | 86 | Kumar Debi Prasad, Md Rizwan Khan and Bikramaditya Das | Implementation of WPIC for MUD Techniques UWA Communication |
13 | 103 | Akash Kumar Dey, Geeta Gayatri Behera and Alekha Kumar Mishra | An English Sentence Dictionary Based Secure Text Steganographic Technique for Message-Data Confidentiality |
14 | 106 | Rayudu Satwika, Bhabendu Kumar Mohanta, Gurpreet Singh Chahbra and Asesh Kumar Tripathy | Detection of Malicious Activity of Credit Card using Machine Learning |
15 | 108 | Vrindha Venugopal K.V. and K.R.M. Vijaya Chandrakala | Agent-Based Modeling for Optimum Location Selection: Enhancing Day-Ahead Market Analysis for Microgrid Integration |
16 | 109 | Subasish Mohapatra, Subhadarshini Mohanty, Santosh Kumar Maharana, Arabinda Dash, Sankarsan Sahoo and Subham Kumar Sahoo | A Comparative Approach for Skin Cancer Detection using Artificial Bee Colony |
17 | 112 | Rahul Ray, Sudarson Jena and Priyadarsan Parida | An Effective Threshold Based Technique for Retinal Image Blood Vessel Segmentation on Fundus Image using Average and Gaussian Filters |
18 | 113 | Binita Kumari and Ajay Kumar Yadav | Dynamic Cross-Layer Communication Design for Multi-objective optimization in Wireless Sensor Networks |
19 | 118 | Puja Yuvaraj Patil and Sujit Das | Application of Multi-Criteria Decision-Making Methods to Select Multi-Objective Optimization Based Pareto-Optimal Solutions |
20 | 119 | S. V. Siva Rama Raju and Shanmuk Srinivas Amiripalli | A Comparative Study on Social Behavior of Tribes and Non Tribes in ITDA Paderu by using Network Science |
21 | 122 | Srinivas Sethi, Manisa Rath, Sanjaya Kumar Kuanar and Ramesh Kumar Sahoo | Object Recognition Through Content Based Feature Extraction and Classification of Sounds in IoT Environment |
22 | 124 | Subasish Mohapatra, Hriteek Kumar Nayak, Millan Kumar Mallick and Subhadarshini Mohanty | Analysis and Comparison of Firefly Algorithm for Measuring Convergence Rate in Distributed Environment |
23 | 130 | Anurag Deep Kujur and Preeti Chandrakar | Three Factor Authentication Scheme for Telecare Medical Information System |
24 | 131 | Shilpi Saha, Reema Frank and Rashmi Kodikal | Impact of Stress on Faculties’ Attitudes: A Study of Higher Education Institutes |
25 | 133 | Subrat Mohanty and Mayank Agarwal | Recursive Feature Selection and Intrusion Classification in NSL-KDD Dataset using Multiple Machine Learning Methods |