Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IC3
IC3 2017
Generate Citations
2017 Tenth International Conference on Contemporary Computing (IC3)
Aug. 10 2017 to Aug. 12 2017
Noida, India
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Conference organization
Freely available from IEEE.
pp. i-x
Table of contents
Freely available from IEEE.
pp. xi-xv
Hybrid step size based cuckoo search
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Avinash Chandra Pandey
,
Dharmveer Singh Rajpoot
,
Mukesh Saraswat
Biometric analysis for the recognition of spider species according to their webs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
David Batista-Plaza
,
Carlos M. Travieso
,
Malay Kishore Dutta
,
Anushikha Singh
A study on the minimum dominating set problem approximation in parallel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mahak Gambhir
,
Kishore Kothapalli
No-escape search: Design and implementation ofcloud based directory content search
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Harshit Gujral
,
Abhinav Sharma
,
Sangeeta Mittal
Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Shardha Porwal
,
Sangeeta Mittal
An efficient algorithm for sampling of a single large graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vandana Bhatia
,
Rinkle Rani
Power-log based plateau limit histogram equalization algorithm for infrared image enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Abhisek Paul
,
Prantik Biswas
,
Paritosh Bhattacharya
,
Santi Prasad Maity
Biometric identifier based on hand and hand-written signature contour information
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fernando A. Pitters-Figueroa
,
Carlos M. Travieso
,
Malay Kishore Dutta
,
Anushikha Singh
A fast GPU algorithm for biconnected components
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mihir Wadwekar
,
Kishore Kothapalli
Adversarial attacks on computer vision algorithms using natural perturbations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Arvind Ramanathan
,
Laura Pullum
,
Zubir Husein
,
Sunny Raj
,
Neslisah Torosdagli
,
Sumanta Pattanaik
,
Sumit K. Jha
Quantum genetic algorithm with rotation angle refinement for dependent task scheduling on distributed systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tanvi Gandhi
,
Nitin
,
Taj Alam
Sentiment analysis using relative prosody features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Harika Abburi
,
K. N. R. K. Raju Alluri
,
Anil Kumar Vuppala
,
Manish Shrivastava
,
Suryakanth V. Gangashetty
Analyzing fault prediction usefulness from cost perspective using source code metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Lov Kumar
,
Ashish Sureka
Measuring the randomness of speech cues for emotion recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Seba Susan
,
Amandeep Kaur
Fraud detection and frequent pattern matching in insurance claims using data mining techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Aayushi Verma
,
Anu Taneja
,
Anuja Arora
Currency recognition system using image processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vedasamhitha Abburu
,
Saumya Gupta
,
S. R. Rimitha
,
Manjunath Mulimani
,
Shashidhar G. Koolagudi
Image based search engine using deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Surbhi Jain
,
Joydip Dhar
Fixed and dynamic threshold selection criteria in energy detection for cognitive radio communication systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Alok Kumar
,
Prabhat Thakur
,
Shweta Pandit
,
G Singh
A fast and scalable crowd sensing based trajectory tracking system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rajdeep Niyogi
,
Tarun Kulshrestha
,
Dhaval Patel
Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rajdeep Niyogi
,
Manoj Misra
,
Tarun Kulshrestha
,
Dhaval Patel
Data clustering using enhanced biogeography-based optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Raju Pal
,
Mukesh Saraswat
Recognition of epilepsy from non-seizure electroencephalogram using combination of linear SVM and time domain attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Debanshu Bhowmick
,
Atrija Singh
,
Sarini Sanyal
Neural network with multiple training methods for web service quality of service parameter prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Lov Kumar
,
Ashish Sureka
CRUISE: A platform for crowdsourcing Requirements Elicitation and evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Richa Sharma
,
Ashish Sureka
Are tweets the real estimators of election results?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Munaza Ramzan
,
Shikha Mehta
,
E. Annapoorna
Fault tolerant streaming of live news using multi-node Cassandra
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shubham Dhingra
,
Shreeya Sharma
,
Parmeet Kaur
,
Chetna Dabas
Authorship attribution for textual data on online social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ritu Banga
,
Pulkit Mehndiratta
Keystroke dynamics based authentication system with unrestricted data collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shashank Gupta
,
Kavita Pandey
,
Jatin Yadav
,
Richa Sharma
CPLAG: Efficient plagiarism detection using bitwise operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shikha Jain
,
Parmeet Kaur
,
Mukta Goyal
,
G. Dhanalekshmi
Tension detection in online communities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Kriti Baindail
,
Pami Gupta
,
Parmeet Kaur
Acoustic features based word level dialect classification using SVM and ensemble methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nagaratna B. Chittaragi
,
Shashidhar G. Koolagudi
Secure live virtual machine migration through runtime monitors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ahmed M. Mahfouz
,
Md Lutfar Rahman
,
Sajjan G. Shiva
Sarcasm detection of tweets: A comparative study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tanya Jain
,
Nilesh Agrawal
,
Garima Goyal
,
Niyati Aggrawal
Deep sequential model for review rating prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sharad Verma
,
Mayank Saini
,
Aditi Sharan
MSD-Apriori: Discovering borderline-rare items using association mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Shikhar Kesarwani
,
Astha Goel
,
Neetu Sardana
A frequent itemset reduction algorithm for global pattern mining on distributed data streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shalini
,
Sanjay Kumar Jain
Cryptographic key generation from multimodal template using fuzzy extractor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Taranpreet Kaur
,
Manvjeet Kaur
Region and feature matching based vehicle tracking for accident detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abhinav Saini
,
Sameer Suregaonkar
,
Neena Gupta
,
Vinod Karar
,
Shashi Poddar
Delay-based workflow scheduling for cost optimization in heterogeneous cloud system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Madhu Sudan Kumar
,
Indrajeet Gupta
,
Prasanta K. Jana
Approaches for information retrieval in legal documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rachayita Giri
,
Yosha Porwal
,
Vaibhavi Shukla
,
Palak Chadha
,
Rishabh Kaushal
Normalized videosnapping: A non-linear video synchronization approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ankit Tripathi
,
Benu Changmai
,
Shrukul Habib
,
Nagaratna B. Chittaragi
,
Shashidhar G. Koolagudi
Disassembling and patching iOS applications at assembly level
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chetna Gupta
,
Arpita Jadhav Bhatt
,
Sangeeta Mittal
Sentiment analysis of text using deep convolution neural networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anmol Chachra
,
Pulkit Mehndiratta
,
Mohit Gupta
Clickstream & behavioral analysis with context awareness for e-commercial applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sakshi Bansal
,
Chetna Gupta
,
Adwitiya Sinha
Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Denzil Correa
,
Ashish Sureka
,
Sangeeta Lal
Supporting collaborative software development in academic learning environment: A collaborative pair and quadruple programming based approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ritu Arora
,
Sanjay Goel
,
R. K. Mittal
A feature-based analysis of MOOC for learning analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jyoti Chauhan
,
Anita Goel
Designing energy efficient traveling paths for multiple mobile chargers in wireless rechargeable sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abhinav Tomar
,
Prasanta K. Jana
A game-theoretic approach to solve the free-rider problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Avadh Kishor
,
Rajdeep Niyogi
Design and implementation of an intelligent cab service system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Amar Nath
,
Ankit Khandelwal
,
Akul Kanojia
,
Ishitva Minocha
,
Rajdeep Niyogi
Stability analysis of SRAM cell using CNT and GNR field effect transistors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Parmjit Singh
,
Rajeevan Chandel
,
Neha Sharma
Efficient design of full adder and subtractor using 5-input majority gate in QCA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ramanand Jaiswal
,
Trailokya Nath Sasamal
Meta-heuristic solution for relay nodes placement in constrained environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Gaurav Kumar
,
Virender Ranga
Keystroke dynamics based authentication using fuzzy logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jatin Yadav
,
Kavita Pandey
,
Shashank Gupta
,
Richa Sharma
Impact of non-linear numerical methods on localization algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Amanpreet Kaur
,
Padam Kumar
,
Govind P. Gupta
Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Krishna Kumar Rai
,
Krishna Asawa
Evaluation of parameters and techniques for genetic algorithm based channel allocation in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Deepak Kumar Sharma
,
Anurag Singh
,
Anshul Khanna
,
Anubhav Jain
KNNR:K-nearest neighbour classification based routing protocol for opportunistic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Deepak Kumar Sharma
,
Aayush
,
Abhishek Sharma
,
Jaideep Kumar
A horizontal fat mesh interconnection network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Akash Punhani
,
Pardeep Kumar
,
Nitin
Design of people counting system using MATLAB
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Surbhi Saxena
,
Dalpat Songara
Algorithms for projecting a bipartite network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Suman Banerjee
,
Mamata Jenamani
,
Dilip Kumar Pratihar
Aspects of entrepreneurship education in higher education institutes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Mukta Mani
A ranking based recommender system for cold start & data sparsity problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Anshu Sang
,
Santosh K. Vishwakarma
Reach360: A comprehensive safety solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Saumya Pandey
,
Nikita Jain
,
Aditi Bhardwaj
,
Gagandeep Kaur
,
Vimal Kumar
Clustering based minimum spanning tree algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Sakshi Saxena
,
Priyanka Verma
,
Dharmveer Singh Rajpoot
Diabetic retinopathy detection using feedforward neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Jayant Yadav
,
Manish Sharma
,
Vikas Saxena
Performance evaluation of various data structures in building efficient indexing schemes for XML documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
G. Dhanalekshmi
,
Krishna Asawa
Efficient content based image retrieval using SVM and color histogram
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Shiraaz Saad
,
Harendra Kumar
,
Tribhuwan Kumar Tewari
An approach to maintain attendance using image processing techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
C. B. Yuvaraj
,
M. Srikanth
,
V. Santhosh Kumar
,
Y. V. Srinivasa Murthy
,
Shashidhar G. Koolagudi
Resolving identities on Facebook and Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Suyash Somani
,
Somya Jain
Randomized grey wolf optimizer (RGWO) with randomly weighted coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Kartikeya Jaiswal
,
Himanshu Mittal
,
Sonia Kukreja
Hybrid particle swarm training for convolution neural network (CNN)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Yoshika Chhabra
,
Sanchit Varshney
,
Ankita
An improved content based collaborative filtering algorithm for movie recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Ashish Pal
,
Prateek Parhi
,
Manuj Aggarwal
Network diffusion for information propagation in online social communities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Shubham Jain
,
Govind Mohan
,
Adwitiya Sinha
Differential evolution-based subspace clustering via thresholding ridge regression
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Ankur Kulhari
,
Mukesh Saraswat
The low-rate denial of service attack based comparative study of active queue management scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Sanjeev Patel
,
Abhinav Sharma
Smart intersection control algorithms for automated vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mahmoud Pourmehrab
,
Lily Elefteriadou
,
Sanjay Ranka
Author index
Freely available from IEEE.
pp. 401-403
Showing 82 out of 82