15-March-2024
Paper Title | Author(s) | Time Slot |
---|---|---|
Exploring Cyber Security Training and Awareness Approaches | Reismary Armas, Hamed Taherdoost | 10:30 AM to 10:45 AM |
Segmentation of Handwritten Sanskrit Words using Image-Processing Techniques | Vijitha M, Vrinda Kore, Dhruva G, Sahana Rao, Preethi P | 10:45 AM to 11:00 AM |
An Empirical Study on Cybercrime Impacting People in Today's World | Dr.R. Jeevitha, Dr.R. Divya, Dr.G. Sophia Reena | 11:00 AM to 11:15 AM |
Blockchain based Robotics Applications in Industry and Healthcare Data Management | Dr. A B Manju, Dr.Meesala Shobha Rani, Dr. Naveen Kumar | 11:15 AM to 11:30 AM |
A Survey Paper on Medical Waste Classification | Swathi Tejah Yalla, Deviprasanna Ganji, Keerthi GA, Neha Reddy Singu | 11:30 AM to 11:45 AM |
A Review on Medical Image Segmentation using Deep Learning | Adline Sherifa C, Kanisha B | 11:45 AM to 12:00 PM |
Voice-based Accessibility: Open AI's GPT | R. Tamilkodi, P.Kalyan chakravarthy, V.V.Praveen varma, R.Satish, N.Garraju, S.Lokesh | 12:00 PM to 12:15 PM |
An Efficient Ensembled Deep Learning Technique for Stock Price Prediction | Shailaja K.P, Dr. S Anupama Kumar | 12:15 PM to 12:30 PM |
Brian Tumor Detection using NMDTF-IP Image Segmentation Approach | Vickneswari T, Uma Sree U P, Pratheeba T, Siva Raja P M | 12:30 PM to 12:45 PM |
Advancing Abstractive Summarization: Evaluating GPT-2, BART, T5-Small, and Pegasus Models with Baseline in ROUGE and BLEU Metrics | Bharathi Mohan G, Abdul Samad Shaik, Sushma R, Samuji Praneeth, Repakula Srimani, Kothamasu Sai Rishi | 12:45 PM to 01:00 PM |
Machine Learning-based Detection of Children at Risks for Mental Disorders | Rathiya R, Sreenivasa Perumal L, Ramya R, Krithika R, Devatharshini S, Vyshnavi R | 01:00 PM to 01:15 PM |
Selection of Aicraft with a Multimethodological Focus: A Combined Use of the Problem Structuring Method Strategic Choice Approach (SCA) and the Multicriteria Method MPSI-MARA | Tullio Mozart Pires De Castro Araujo, Valmiane Vieira Azevedo Almeida, Raffaella Regeira De Oliveira, Celio Manso Azevedo Junior, Johnny Das Neves Braz, MarcosDos Santos, Carlos Francisco Simões Gomes | 01:15 PM to 01:30 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Refined RSA Encryption Algorithm to Safeguard Privacy in Healthcare Data | Dr.A.B.Arockia Christopher, , M.Sivakumar, Dr.A.S.Muthanantha Murugavel, S.Priyatharsini, J Angeljulie, P.Revathi | 10:30 AM to 10:45 AM |
Deep Learning-based MRI Analysis for Early Brain Tumor Detection | Ashok Reddy Kandula, Srinivas Kalyanapu, Raghavendra Kodavalla, Sai Kumar Kapalavai, Hemanth Kaleswara Chowdary Dhanekula, Anirudh Kumar Talluri | 10:45 AM to 11:00 AM |
Natural Language Processing of HTTP Content for Insider Threat Detection Optimized by Modified Metaheuristic | Aleksandar Petrovic, Luka Jovanovic, Milos Antonijevic, Nebojsa Bacanin, Miodrag Zivkovic, Jelena Kaljevic | 11:00 AM to 11:15 AM |
Enhancement of Drone Facial Images with Low Resolution based on Super Resolution Generative Adversarial Network (SRGAN) | S. Mahitha, P. Ramesh Kumar, M. Bhavyasri | 11:15 AM to 11:30 AM |
Unveiling Vocal Biomarkers: Investigating Parkinson’s Disease Detection through PCA and Optimized MLP Models on Voice Datasets | Vijaya Bendalam, Chappa Ramesh | 11:30 AM to 11:45 AM |
Comparative Analysis of Deep Learning Models for Detection of Foot Ulcer for Diabetics Patients | Gowri Manohari. V, Dr. Mercy Paul Selvan | 11:45 AM to 12:00 PM |
Comparison of Existing Versus New Model of Tesseract OCR for the Gujarati Language | Kartik Joshi, Harshal Arolkar | 12:00 PM to 12:15 PM |
Revolutionizing Fast Food Classification: A Convolutional Neural Network Approach for Enhanced Nutrition Awareness | Dev Gundalia, Keya Patel, Nirava Parikh, Vatsal Doshi, Mrugendrasinh Rahevar, Dr. Atul Patel | 12:15 PM to 12:30 PM |
Machine Learning and Deep Learning Techniques for Pest and Disease Detection in Sustainable Agriculture: A Study | Guhan K. S, Helen K Joy, Sridevi. R, Electa Alice Jayarani A,Vanusha D | 12:30 PM to 12:45 PM |
EfficientNet B0 CNNs for Orange Huanglongbing and Tomato Pathogens | P. S. Agrawal, K. M. Dhakate, K. M. Parthani, A. S. Agnihotri | 12:45 PM to 01:00 PM |
Cloud Storage Platform using the MERN Stack | Shakti Gatla, Santosh Krishna B, Anitha M, Rajendra Prasad K | 01:00 PM to 01:15 PM |
Computer Vision in Heart Rate Measurement from Facial Video Feed: A Pioneering Frontier | Bhavesh Gyanchandani, Aditya Oza, Aniket Nayak, Dr. Mallikharjuna Rao K | 01:15 PM to 01:30 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Review on: Authentication in Blockchain based Internet of Things | Bharati B Pannyagol, Dr. Santosh Deshpande, Dr. Rohit. B. Kaliwal | 10:30 AM to 10:45 AM |
Multiclass Classification of Authentic and Forged Images based on Deep Learning | Rupali M. Bora, Dr. Mahesh R. Sanghavi, Shrikant S. Pawar | 10:45 AM to 11:00 AM |
Analyzing Various CNNs for Image Caption Generation | Nabeel Hasan Rizvi, Alok Sharma, Arsh Panesar, Roshan Lal | 11:00 AM to 11:15 AM |
IoT Data Security by Combining Cryptography and Local Differential Privacy | Vipin Vijayachandran, Suchithra R | 11:15 AM to 11:30 AM |
Soil Sensing using Internet of Things Technologies for Precision Agriculture | M. Pyingkodi, S. Parvathavarthini, Suresh Palarimath, D Deepa, Brindha. S, Atchayaprakassh. K S | 11:30 AM to 11:45 AM |
Blockchain Ethereum Framework Performance Analysis Considering Decentralized Loan Management System | Praveen M Dhulavvagol, Swapnil Manjunath Maladkar, Sharad C Katkol, Suresh H Bhajantri | 11:45 AM to 12:00 PM |
A Machine Learning Approach to Password Strength Analysis: A Comparative Analysis | Kartik Goyal, Wilson Vidyut Doloy, Dr. Sandosh S | 12:00 PM to 12:15 PM |
Information Retrieval of Marathi Query from a Linguistic Perspective | Vivek A. Manwar, Dr. A. B. Manwar | 12:15 PM to 12:30 PM |
Securing Cyberspace: A Survey on Effective Botnet Detection Strategies | Karmel Arockiasamy, Niranjana Junar | 12:30 PM to 12:45 PM |
Sharding-Powered Proof of Stake (SPPS): A Scalable and Secure Solution for Blockchain in Supply Chain Management | Vinayak Sudhakar Kone, Praveen M Dhulavvagol, S G Totad | 12:45 PM to 01:00 PM |
LifeChain: Organ Donation and Transplantation System using Blockchain | Prasad Padmakar Joshi, Aadit Kisanrao Palande, Aditya Atul Kode, Devashish Sanjay Gaikwad, Rachana Patil | 01:00 PM to 01:15 PM |
Deep Learning Approach for Driver Drowsiness Detection in Real-Time | Tanjim Mahmud, Bappa Saha, Dilshad Islam, Mohammad Tarek Aziz, Nippon Datta, Koushick Barua, Mohammad Shahadat Hossain, Karl Andersson | 01:15 PM to 01:30 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Deep Learning Methodologies for Object Motion Recognition | Sasirekha R, Mabel Nirmala Joseph, Johnpaul S, Kerolin Priya A, Hanitha G | 02:30 PM to 02:45 PM |
An Exploration on Explainable Ai with Background and Motivation for XAI. | SHEELA B. P, GIRISHA H | 02:45 PM to 03:00 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Crack Detection on Railway Tracks with Animal Disturbance Alert | Ashwin S, Nishaan K S, Preethika N, Sivabalan S, Dilip Kumar S, Kottaimalai Ramaraj | 02:30 PM to 02:45 PM |
Convolutional Neural Network based Infant Face Recognition System | Rajeshwari J , Dr. Shankar J , Mrs.Shalini KB , Meghana. S | 02:45 PM to 03:00 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
A State-of-the-Art Review of Machine Learning in Cybersecurity Data Science | Mohammad Tarek Aziz, Tanjim Mahmud, Nayeem Uddin Ahmed Khan, Md. Maskat Sharif, Nippon Datta, Suraiya Yasmin, MD Nizam Uddin, Mohammad Shahadat Hossain, Karl Andersson | 02:30 PM to 02:45 PM |
Multichannel Quantum Data Preprocessing for Image Classification | Yevhenii Trochun, Sergii Stirenko, Yuri Gordienko | 02:45 PM to 03:00 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Future-Proofing Industrial Protocol Security: Integration of Post-Quantum Cryptography in the Modbus protocol | Arshid Shyam Kumar, Prashanth Joshi | 03:30 PM to 03:45 PM |
Data Synergizing by Behavioural Cloning and RNN for Autonomous Vehicles | Sudharson D, Sathish M, Kalaiarasan T R, A. Saravanan, Sushmita V, Jyothi Lakshmi N | 03:45 PM to 04:00 PM |
Beyond Copy-Pasting - Contextualizing LLMs for Secure Code Generation | Arjun S, Durjoy Majumdar, Asadur Zaman Nabin, Anuj Kandel Sharma, Shaik Muzamil Raheman | 04:00 PM to 04:15 PM |
Improved UNet for Semantic Segmentation in Remote Sensing | Abdelaadim Khriss, Aissa Kerkour Elmiad, Mohammed Badaoui | 04:15 PM to 04:30 PM |
Digital Forensics in Cybersecurity: Roles, Responsibilities, and Strategies | Mohammed Al Qurashi, Esam Alzahrani | 04:30 PM to 04:45 PM |
Blockchain and AI Powered Intelligent Power Grid: Analysis and Implementation | Sandeep Ushkewar, Siddhant Vispute, Jagdish More, S.P Deshmukh, S.K Bhil | 04:45 PM to 05:00 PM |
Security, Privacy and Communication Efficiency in Federated Learning: Issues and Perspectives | Manisha S Otari, B. Suresh Kumar, Mithun B Patil | 05:00 PM to 05:15 PM |
Sorting Algorithm Visualization using Tkinter in Python | Vijayalakshmi S Katti, Dilip V, Uday Kumar T, Kotha Suneel Kumar | 05:15 PM to 05:30 PM |
Paper Title | Author(s) | Time Slot |
---|---|---|
Alzheimer’s Disease Classification Using Vision Transformer | Maria Achary, Siby Abraham | 03:30 PM to 03:45 PM |
From Imaging to Insights: A Review of Techniques for Brain Tumor Analysis | Tejaswi K, Varshitha M, G. Kavita | 03:45 PM to 04:00 PM |
Hybrid Auction system bridging centralized efficiency and decentralized trust | Mrs.Ariyamala.V, Selvendran.K, Ragul Karthik.G.U, Sashi Kumar.B | 04:00 PM to 04:15 PM |
Geospatial Deep Learning for Estimating Socioeconomic Well-being in Developing Regions: An Analysis of Burundi’s Poverty Projection | Darshana Durgamahanty, Suthir Sriram, Nivethitha V, Thangavel M | 04:15 PM to 04:30 PM |
Securing Data in the Cloud: An In-depth Analysis of Security Challenges and Frameworks | Sunita Rani, Ramesh Kait, Sudesh Kumari, Sonal Beniwal, Ritu Baniwal | 04:30 PM to 04:45 PM |
A Comprehensive Evaluation of GWO and FHE in Achieving Security and Privacy for Big Data | Madhavi Tota , Dr. Swapnili Karmore | 04:45 PM to 05:00 PM |
Development of a non invasive RPW management detection tool using machine learning approach | Leena Nangai. V, Dr. Betty Martin | 05:00 PM to 05:15 PM |
Synergizing VGG16 Convolutional Features with LSTM Architectures for Image Captioning Mastery | E. Chandrahasa Reddy, G. Banu Siva Teja Reddy, Y. Anudeep, R. Jansi | 05:15 PM to 05:30 PM |