Search Results - "2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)"

Refine Results
  1. 1

    BloCoV6: A blockchain-based 6G-assisted UAV contact tracing scheme for COVID-19 pandemic by Zuhair, Mohd, Patel, Farnazbanu, Navapara, Dhruvin, Bhattacharya, Pronaya, Saraswat, Deepti

    “…In this article, the authors propose a scheme, BloCoV6, that integrates sixth-generation (6G)-assisted unmanned aerial vehicles (UAVs) and blockchain (BC) to…”
    Get full text
    Conference Proceeding
  2. 2

    Stability Analysis of a Cantilever Structure using ANSYS and MATLAB by Siddiqui, Shahida Anusha, Ahmad, Ali, Siddiqui, Ahmad Allam, Chaturvedi, Prateek

    “…The objective is to study the behavior of gallery in a concert hall under forced vibration (Man Induced Vibration) without damping to avoid deformations in the…”
    Get full text
    Conference Proceeding
  3. 3

    Exploiting UML Diagrams for Test Case Generation: A Review by Tiwari, Raj Gaurang, Pratap Srivastava, Arun, Bhardwaj, Garima, Kumar, Vinay

    “…Testing is an integral part of life cycle of software development/ It aims to create a highly uncompromising framework. The program tests are conducted to…”
    Get full text
    Conference Proceeding
  4. 4

    Study of Wearable IoT devices in 2021: Analysis & Future Prospects by Bisht, Rajendra Singh, Jain, Sourabh, Tewari, Naveen

    “…Advancement in the Internet of Things created excitement in the market of wearable devices. Wearable devices help humans to restructure the e-medical facility…”
    Get full text
    Conference Proceeding
  5. 5

    Isolation Enhancement of MIMO Antenna for Millimeter wave Applications by Singh, S Vikram, Pratap, Janendra, Singh, Akanksha, Sharma, Smita, Gupta, Shubhi

    “…In this paper a novel 2x2 multi input multi output antenna system with two crown shaped radiators is introduced. This work illustrates the effect of novel T…”
    Get full text
    Conference Proceeding
  6. 6

    Cyber Threat Landscape of G4 Nations: Analysis of Threat Incidents & Response Strategies by Bhardwaj, Garima, Gupta, Ruchika, Pratap Srivastava, Arun, Vikram Singh, S.

    “…The application and development of communications and information technology has created a new battleground. The cyber threat is growing rapidly with high pace…”
    Get full text
    Conference Proceeding
  7. 7

    Application of Machine Learning in Precision Agriculture using IoT by Murlidharan, Sharvane, Shukla, Vinod Kumar, Chaubey, Anjuli

    “…The demand for food has been increasing over the past six decades with the global population increase. Scientists have been finding different ways to meet this…”
    Get full text
    Conference Proceeding
  8. 8

    Circularly Polarized Magneto-Electric Dipole Antennas: Review Article by Sharma, Smita, Pratap, Janendra, Chaturvedi, Prateek, Kumar Jain, Abhishek, Gupta, Ruchika

    “…This review article presented method s of producing circular polarization in magneto-electric dipole antennas (MEDAs) with considering parameters such as…”
    Get full text
    Conference Proceeding
  9. 9

    A Novel Optimization Technique for Integrated Supply Chain Network in Industries - A Technical Perspective by Singh, Divya, Garjan, Hossein Shokri, Singh, S Vikram, Bhardhwaj, Garima

    “…Supply chain (SC) management is an integral part of the technological advancement of industries nowadays. This study designed and presents an optimization…”
    Get full text
    Conference Proceeding
  10. 10

    Hazard Warning & Turn Signal Indication Technologies and Acquisition in Automotive Sector by Chaturvedi, Prateek, Pachauri, Praveen, Srivastava, Ruchira, Thakur, Ayushi

    “…This work aims to review the hazard warning & turn signal indication technologies used in automotive sector, as a whole, heretofore and to conjecture a…”
    Get full text
    Conference Proceeding
  11. 11

    SQL Injection: Classification and Prevention by Rai, Aditya, Miraz, MD. Mazharul Islam, Das, Deshbandhu, Kaur, Harpreet, Swati

    “…With the world moving towards digitalization, more applications and servers are online hosted on the internet, more number of vulnerabilities came out which…”
    Get full text
    Conference Proceeding
  12. 12

    Security Challenges, Applications and Vehicular Authentication Methods in VANET For Smart Traffic Management by Kohli, Priya, Sharma, Sachin, Matta, Priya

    “…Vehicular Ad hoc Networks (VANET) is an emerging and promising technology that provides real-time assistance to automobiles. An increasing rate of accidents on…”
    Get full text
    Conference Proceeding
  13. 13

    Improving Business Intelligence through Machine Learning Algorithms by Tamang, Minsang D., Kumar Shukla, Vinod, Anwar, Shaista, Punhani, Ritu

    “…Machine learning (ML) is the study of various algorithms that help in making computers learn and work on itself without any specific programming done…”
    Get full text
    Conference Proceeding
  14. 14

    A Survey on Network Penetration Testing by Jayasuryapal, G, Pranay, P. Meher, Kaur, Harpreet, Swati

    “…Penetration on network is an important security measurements every company want to take into the consideration. Day-to-Day life as it is seen that cybercrimes…”
    Get full text
    Conference Proceeding
  15. 15

    Use of Artificial Intelligence in Healthcare Systems: State-of-the-Art Survey by Komal, Sethi, Ganesh Kumar, Ahmad, Nazir, Rehman, Mohammed Burhanur, Ibrahim Dafallaa, Hatim M. Elhassan, Rashid, Mamoon

    “…Artificial Intelligence (AI) techniques getting at any point present in modern business and regular day to day existence is additionally consistently being…”
    Get full text
    Conference Proceeding
  16. 16

    A review on gain enhancement techniques of microstrip antenna by Kumar, Arun, Khandelwal, Raghav, Singh, Samarth, Kumar, Ambuj, Makhdumi, Arsh

    “…Recently, a lot of research has been carried out to improve the performance of microstrip antenna specially in terms of their gain. In this paper, several…”
    Get full text
    Conference Proceeding
  17. 17
  18. 18

    Face Detection for Real World Application by Brar, Dilpreet Singh, Kumar, Amit, Pallavi, Mittal, Usha, Rana, Pooja

    “…Face Detection has become a very prevalent issue in Machine Learning, not only in machine learning but in any field, one can think of. Due to this, it has…”
    Get full text
    Conference Proceeding
  19. 19

    An Overview on Plant Disease Detection Algorithm Using Deep Learning by Adi, Manivarsh, Singh, Abhishek Kumar, Reddy A, Harinath, Kumar, Yeshwanth, Challa, Venkata Reddy, Rana, Pooja, Mittal, Usha

    “…Disease detection in plants is one of the major concerns for farmers nowadays. As many new techniques like Deep Learning capability to dive into deep analysis…”
    Get full text
    Conference Proceeding
  20. 20

    DME: An Efficient Encryption Technique for Body Sensor Network in Healthcare Internet of Things (HIoT) by Pandey, Chetan, Sharma, Sachin, Matta, Priya

    “…In order to secure the precious data and make a secure communication way between the user and their health assistance, the authors of this paper are going to…”
    Get full text
    Conference Proceeding