Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)
251 authors
- Abdulla, Mohamed
- Vulnerabilities in Public Key Cryptography
- Abdulla, Mohamed
- Common Security Protocols for Wireless Networks: A Comparative Analysis
- Abebe, Abel
- Study the Relationship Between LULC, LST, NDVI, NDWI and NDBI in Greater Arba Minch Area, Rift Valley, Ethiopia
- Abirami, A
- Penetration Testing Analysis with Standardized Report Generation
- Aftab, Muhammad Omer
- Predicting Growth and Trends of COVID-19 by Implementing Machine Learning Algorithms
- Agarkhed, Jayashree
- Smart Assistive Activity Recognition Device for Differently Abled People Based on Machine Learning -SAARD
- Agarkhed, Jayashree
- Enhanced Security Model for Pervasive Computing Using Machine Learning Techniques
- Aji, S
- A Hybrid Hierarchical Sparse Kernel Classification Model for Remote Sensing Image Retrieval
- Ajina, A.
- A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography
- Amathlingam, Darshini
- Automated Academic Assignment Submission and Management System: Proposed Design Using Agile Methodology
- Anitha, S
- Natural Disaster Mapping in Real-Time Using Unmanned Aerial Vehicles (Drone)
- Anitha, S
- Disaster Monitoring of Satellite Image Processing Using Image Classification Algorithm for Flood Alerts
- Anjali
- A Review on Challenges and Latest Trends on Cyber Security Using Text Cryptography
- Anne, Lahari
- A New Combined Model with Reduced Label Dependency for Malware Classification
- Anwar, Syed Mahmood Nabeel
- Aadhaar Data Analysis Comparison in MapReduce, Hive and Spark
- Apoorva, V
- Breast Cancer Prediction Using Machine Learning Techniques
- Arabee, Zailan
- Automated Academic Assignment Submission and Management System: Proposed Design Using Agile Methodology
- Arpitha Shankar, S I
- Implementation of ICP Slam Algorithm on Fire Bird V for Mapping of an Indoor Environment
- Arun, Kuruvikulam Chandrasekaran
- Common Security Protocols for Wireless Networks: A Comparative Analysis
- Asha, K
- Women Healthcare Mobile App-An Approach to Predict Early Stage of Cervical Cancer
- Asha, V.
- More Accurate Organ Recipient Identification Using Survey Informatics of New Age Technologies
- Asha Gowda, Karegowda
- Design of a Fuzzy Inference Based Ultrasound Image Analysis System for Differential Diagnosis of Thyroid Nodules
- Asha Gowda, Karegowda
- Change Detection of LULC using Machine Learning
- Ashok Kumar, R
- Strategic Framework for Campus Network Environment Using Virtual Switching System
- Banerjee, Archita
- Penetration Testing Analysis with Standardized Report Generation
- Barik, Kousik
- Penetration Testing Analysis with Standardized Report Generation
- Bhardwaj, Rishav
- Deep Cross of Intra and Inter Modalities for Visual Question Answering
- Bhaskar, Seelam Ch Vijaya
- Natural Disaster Mapping in Real-Time Using Unmanned Aerial Vehicles (Drone)
- Bhatt, Chintan
- The Convergence of Deep Learning and Computer Vision: Smart City Applications and Research Challenges
- Bilal, Muhammad
- A Framework for the Promotion of Tourism Industry Using Blockchain Technology
- Bobby, M.
- Study on Security Improvement with Transmission of Aggregated Data Through Hamilton Clustering Protocol
- Bohara, Mohammed
- An AI Based Web Portal for Cotton Price Analysis and Prediction
- Chaithra, K
- A Deep Learning Approach to Detect COVID-19
- Chalissery, Benita Jose
- More Accurate Organ Recipient Identification Using Survey Informatics of New Age Technologies
- Chaudhari, Aayushi
- The Convergence of Deep Learning and Computer Vision: Smart City Applications and Research Challenges
- Chayadevi, M L
- Breast Cancer Prediction Using Machine Learning Techniques
- Cheah, Chee Sam
- A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF)
- Cheng, Tan Guan
- A Review on Service Business Model Using IoT
- Chethana, HT
- Detection of Partially Occluded Faces Using Convolutional Neural Networks
- Chhabra, Indu
- Automatic Invigilation Using Computer Vision
- Choudhury, Ananya
- Microblaze Implementation of GPS
- Das, Saptarshi
- Penetration Testing Analysis with Standardized Report Generation
- Deeksha, A
- Mulberry Leaf Yield Prediction Using Machine Learning Techniques
- Deepak, D J
- Retinopathy Based Multistage Classification of Diabeties
- Deepak, D J
- Data Acquisition Using IoT to Monitor Coal Mining Environment
- Deepak, N A
- Retinopathy Based Multistage Classification of Diabeties
- Deepak, N A
- Data Acquisition Using IoT to Monitor Coal Mining Environment
- Deepu, R
- Analysing Mental Health Evaluation Techniques from a Statistical Perspective
- Delsy, T. Thaj Mary
- ML Based Smart Energy Meter Observing & Bill Supervision Using Raspberry Pi
- Desai, Jesal
- An AI Based Web Portal for Cotton Price Analysis and Prediction
- Devika, G
- State-of-Art Deep Learning Based Tomato Leaf Disease Detection
- Devika, G
- Identification of Edible and Non-Edible Mushroom Through Convolution Neural Network
- Dhananjayamurthy, B V
- The Nonsplit Resolving Domination Polynomial of a Graph
- Dhanush, V
- Speech to Indian Sign Language Translator
- Duraisamy, Radhakrishnan
- Study the Relationship Between LULC, LST, NDVI, NDWI and NDBI in Greater Arba Minch Area, Rift Valley, Ethiopia
- Emmanuel, Emelda I.
- Quality Attributes for an LMS Cognitive Model for User Experience Design and Evaluation of Learning Management Systems
- Emmanuel, Emelda I.
- Quality Characteristics of an LMS UX Psychomotor Model for the Design and Evaluation of Learning Management Systems
- Eugene
- A Case Study: SYN Flood Attack Launched Through Metasploit
- Farooq, Muhammad Shoaib
- A Framework for the Promotion of Tourism Industry Using Blockchain Technology
- Farooq, Muhammad Shoaib
- Smart Application Based Blockchain Consensus Protocols: A Systematic Mapping Study
- Farooq, Muhammad Shoaib
- Fraud Prevention in Taxation System of Pakistan Using Blockchain Technology
- Farooq, Muhammad Shoaib
- Predicting Growth and Trends of COVID-19 by Implementing Machine Learning Algorithms
- Farooq, Muhammad Shoaib
- Applications and Challenges of Blockchain with IoT in Food Supply Chain Management System: A Review
- Geetha, M
- Change Detection of LULC using Machine Learning
- Ghosh, Reet Rahul
- Comparison of Standard Computation Against Distributed Computation Using Hadoop Cluster
- Gowrishankar, B S
- Automated Transcription for Raga Recognition and Classification in Indian Classical Music Using Machine Learning
- Gudla, Balakrishna
- A Deep Learning Approach to Detect COVID-19
- Gunalan, Jagadeshan
- Study the Relationship Between LULC, LST, NDVI, NDWI and NDBI in Greater Arba Minch Area, Rift Valley, Ethiopia
- Gupta, Tanu
- Learning Improved Class Vector for Multi-Class Question Type Classification
- Hanifa, Abdullah
- Development of Electric Wheelchair for Smart Navigation and Health Monitoring System
- Hassini, T S
- A Deep Learning Approach to Detect COVID-19
- Heng, Lai Yi
- IoT-based Child Security Monitoring System
- Heng, Ong Chun
- Outdoor Parking Payment with IoT in Malaysia
- Hiremath, Shraddha B
- Microblaze Implementation of GPS
- Honnavalli, Prasad B
- Container Security: An Extensive Roadmap
- Iftikhar, Waleed
- Blockchain Technology Adoption by Malaysian Higher Education Institutes: A Perspective of Integrated Tam Model and Toe Framework
- Ishtiaq, Shazah
- Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry
- Jagan, Mohan.K
- Conceptual Analytics on Integration of Network Technologies with Crowdsourcing Infrastructure
- Jain, Raksha
- State-of-Art Deep Learning Based Tomato Leaf Disease Detection
- Jamuna, C J
- Strategic Framework for Campus Network Environment Using Virtual Switching System
- Jamuna, M
- A Study of Communication Protocols for Internet of Things (IoT) Devices: Review
- Jian, Ng Jia
- Cybersecurity Awareness Among the Youngs in Malaysia by Gamification
- Jie, Ng Xin
- Self- Checkout Service with RFID Technology in Supermarket
- Joe, Foong Yew
- A Study of SQL Injection Hacking Techniques
- Jothimani, Muralitharan
- Study the Relationship Between LULC, LST, NDVI, NDWI and NDBI in Greater Arba Minch Area, Rift Valley, Ethiopia
- Kamsin, Intan Farahana Binti
- IoT-based Child Security Monitoring System
- Kamsin, Intan Farahana Binti
- Implementation of IoT in Patient Health Monitoring and Healthcare for Hospitals
- Kamsin, Intan Farahana Binti
- Cybersecurity Awareness Among the Youngs in Malaysia by Gamification
- Kamsin, Intan Farahana Binti
- Self- Checkout Service with RFID Technology in Supermarket
- Kamsin, Intan Farahana Binti
- Outdoor Parking Payment with IoT in Malaysia
- Kamsin, Intan Farahana Binti
- A Comprehensive Review on Smart IoT Applications
- Kamsin, Intan Farahana Binti
- A Review on Service Business Model Using IoT
- Karegowda, Asha Gowda
- State-of-Art Deep Learning Based Tomato Leaf Disease Detection
- Karegowda, Asha Gowda
- Identification of Edible and Non-Edible Mushroom Through Convolution Neural Network
- Kariyal, Archith Vinod
- Speech to Indian Sign Language Translator
- Kartheek, P.
- ML Based Smart Energy Meter Observing & Bill Supervision Using Raspberry Pi
- Kasa, Madhavi
- Customer Churns Prediction Model Based on Machine Learning Techniques: A Systematic Review
- Kashyap, Pavan
- Analysis of Different Methods of Reconnaissance
- Kattimani, Aditya R
- Microblaze Implementation of GPS
- Kaur, Pawandeep
- ESP32 Based Implementation of Water Quality and Quantity Regulating System