callback( { "result":{ "query":":facetid:toc:\"db/conf/rice/rice2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"194.04" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"63", "@dc":"63", "@oc":"63", "@id":"43421151", "text":":facetid:toc:db/conf/rice/rice2017.bht" } }, "hits":{ "@total":"63", "@computed":"63", "@sent":"63", "@first":"0", "hit":[{ "@score":"1", "@id":"3007122", "info":{"authors":{"author":[{"@pid":"256/0705","text":"Shahegul Ansari"},{"@pid":"57/9700","text":"Veena Gulhane"}]},"title":"RSSI Algorithm Based Interference Reduction Technique for LTE Networks.","venue":"RICE","pages":"111-115","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/AnsariG17","doi":"10.15439/2017R109","ee":"https://doi.org/10.15439/2017R109","url":"https://dblp.org/rec/conf/rice/AnsariG17"}, "url":"URL#3007122" }, { "@score":"1", "@id":"3007123", "info":{"authors":{"author":[{"@pid":"256/0714","text":"Sheeba Ansari"},{"@pid":"256/0737","text":"Suresh Salankar"}]},"title":"An Overview on Thermal Image Processing.","venue":"RICE","pages":"117-120","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/AnsariS17","doi":"10.15439/2017R111","ee":"https://doi.org/10.15439/2017R111","url":"https://dblp.org/rec/conf/rice/AnsariS17"}, "url":"URL#3007123" }, { "@score":"1", "@id":"3007124", "info":{"authors":{"author":[{"@pid":"256/0717","text":"R. Anubhama"},{"@pid":"05/5975","text":"T. Rajendran"}]},"title":"A Survey on Mac Protocols for Wireless Sensor Networks.","venue":"RICE","pages":"121-126","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/AnubhamaR17","doi":"10.15439/2017R26","ee":"https://doi.org/10.15439/2017R26","url":"https://dblp.org/rec/conf/rice/AnubhamaR17"}, "url":"URL#3007124" }, { "@score":"1", "@id":"3007125", "info":{"authors":{"author":[{"@pid":"166/2695","text":"John Anzola"},{"@pid":"214/2424","text":"Andrés Jiménez"},{"@pid":"01/10030","text":"Jordán Pascual Espada"},{"@pid":"76/10044","text":"Vijay Bhaskar Semwal"},{"@pid":"143/8305","text":"Vishwanath Bijalwan"}]},"title":"Analysis of TCP streaming over VANETs.","venue":"RICE","pages":"39-43","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/AnzolaJESB17","doi":"10.15439/2017R107","ee":"https://doi.org/10.15439/2017R107","url":"https://dblp.org/rec/conf/rice/AnzolaJESB17"}, "url":"URL#3007125" }, { "@score":"1", "@id":"3007126", "info":{"authors":{"author":[{"@pid":"256/0695","text":"Monika Bartwal"},{"@pid":"256/0757","text":"Rajendra Bharti"}]},"title":"Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography.","venue":"RICE","pages":"127-134","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/BartwalB17","doi":"10.15439/2017R88","ee":"https://doi.org/10.15439/2017R88","url":"https://dblp.org/rec/conf/rice/BartwalB17"}, "url":"URL#3007126" }, { "@score":"1", "@id":"3007127", "info":{"authors":{"author":[{"@pid":"256/0676","text":"Shraddha S. Bhanuse"},{"@pid":"190/9009","text":"Shailesh D. Kamble"},{"@pid":"47/1244","text":"Nileshsingh V. Thakur"},{"@pid":"221/3528","text":"Akshay S. Patharkar"}]},"title":"Metadata based Text Mining for Generation of Side Information.","venue":"RICE","pages":"135-141","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/BhanuseKTP17","doi":"10.15439/2017R86","ee":"https://doi.org/10.15439/2017R86","url":"https://dblp.org/rec/conf/rice/BhanuseKTP17"}, "url":"URL#3007127" }, { "@score":"1", "@id":"3007128", "info":{"authors":{"author":[{"@pid":"61/5874","text":"Vivek Bhatt"},{"@pid":"256/0680","text":"Pramod Benjwal"},{"@pid":"200/5455","text":"Manoj Joshi"}]},"title":"OTRA Based Second Order Universal Filter and its optimization like Butterworth, Chebyshev and Bessel.","venue":"RICE","pages":"143-150","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/BhattBJ17","doi":"10.15439/2017R01","ee":"https://doi.org/10.15439/2017R01","url":"https://dblp.org/rec/conf/rice/BhattBJ17"}, "url":"URL#3007128" }, { "@score":"1", "@id":"3007129", "info":{"authors":{"author":{"@pid":"144/7822","text":"Dibya Jyoti Bora"}},"title":"AERSCIEA: An Efficient and Robust Satellite Color Image Enhancement Approach.","venue":"RICE","pages":"3-13","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/Bora17","doi":"10.15439/2017R53","ee":"https://doi.org/10.15439/2017R53","url":"https://dblp.org/rec/conf/rice/Bora17"}, "url":"URL#3007129" }, { "@score":"1", "@id":"3007130", "info":{"authors":{"author":[{"@pid":"24/5288","text":"Kailash Chandra"},{"@pid":"256/0706","text":"Prashant Kushwaha"},{"@pid":"256/0759","text":"Sachin Sati"}]},"title":"Comparative Study of Vector Control of Induction Motor by Using PI Controller and Fuzzy Controller.","venue":"RICE","pages":"151-155","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/ChandraKS17","doi":"10.15439/2017R11","ee":"https://doi.org/10.15439/2017R11","url":"https://dblp.org/rec/conf/rice/ChandraKS17"}, "url":"URL#3007130" }, { "@score":"1", "@id":"3007131", "info":{"authors":{"author":[{"@pid":"256/0754","text":"Kuldeep Choudhary"},{"@pid":"07/2616","text":"Santosh Kumar"}]},"title":"Optimal design of 2-Bit Optical Magnitude Comparator using electro-optic effect inside Mach-Zehnder interferometers.","venue":"RICE","pages":"15-20","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/ChoudharyK17","doi":"10.15439/2017R93","ee":"https://doi.org/10.15439/2017R93","url":"https://dblp.org/rec/conf/rice/ChoudharyK17"}, "url":"URL#3007131" }, { "@score":"1", "@id":"3007132", "info":{"authors":{"author":[{"@pid":"256/0710","text":"Sonal Dabral"},{"@pid":"67/340","text":"Amit Agarwal"},{"@pid":"31/4484","text":"Sachin Kumar"},{"@pid":"216/0891","text":"Bhaskar Gautam"}]},"title":"Passenger Abnormal Behaviour Detection using Machine Learning Approach.","venue":"RICE","pages":"21-25","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/DabralAKG17","doi":"10.15439/2017R113","ee":"https://doi.org/10.15439/2017R113","url":"https://dblp.org/rec/conf/rice/DabralAKG17"}, "url":"URL#3007132" }, { "@score":"1", "@id":"3007133", "info":{"authors":{"author":[{"@pid":"256/0713","text":"Shradha Deshmukh"},{"@pid":"256/0722","text":"Mangala Madankar"}]},"title":"Nature Inspired Techniques for Interference Management in Femtocells: A Survey.","venue":"RICE","pages":"157-160","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/DeshmukhM17","doi":"10.15439/2017R115","ee":"https://doi.org/10.15439/2017R115","url":"https://dblp.org/rec/conf/rice/DeshmukhM17"}, "url":"URL#3007133" }, { "@score":"1", "@id":"3007134", "info":{"authors":{"author":[{"@pid":"256/0696","text":"Swapna S. Deshpande"},{"@pid":"256/0715","text":"Renuka S. Gound"}]},"title":"An approach for smart parking system based on cloud using IoT.","venue":"RICE","pages":"161-163","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/DeshpandeG17","doi":"10.15439/2017R80","ee":"https://doi.org/10.15439/2017R80","url":"https://dblp.org/rec/conf/rice/DeshpandeG17"}, "url":"URL#3007134" }, { "@score":"1", "@id":"3007135", "info":{"authors":{"author":[{"@pid":"37/10498","text":"Sharmistha Dey"},{"@pid":"256/0566","text":"Santanu Kumar Sen"}]},"title":"Four Dimensional Security and Vulnerability Matrix for Cloud (4-SVM).","venue":"RICE","pages":"165-169","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/DeyS17","doi":"10.15439/2017R41","ee":"https://doi.org/10.15439/2017R41","url":"https://dblp.org/rec/conf/rice/DeyS17"}, "url":"URL#3007135" }, { "@score":"1", "@id":"3007136", "info":{"authors":{"author":{"@pid":"186/3875","text":"Rohit Dhall"}},"title":"Designing Graceful Degradation in Software Systems.","venue":"RICE","pages":"171-179","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/Dhall17","doi":"10.15439/2017R15","ee":"https://doi.org/10.15439/2017R15","url":"https://dblp.org/rec/conf/rice/Dhall17"}, "url":"URL#3007136" }, { "@score":"1", "@id":"3007137", "info":{"authors":{"author":[{"@pid":"256/0763","text":"Swikruti Dongaonkar"},{"@pid":"256/0730","text":"Ramkrishna Vadali"},{"@pid":"256/0698","text":"Chandrakant Dhutadmal"}]},"title":"Content Accessibility Evaluation of Government Website using WCAG (Web Content Accessibility Guidelines).","venue":"RICE","pages":"27-31","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/DongaonkarVD17","doi":"10.15439/2017R79","ee":"https://doi.org/10.15439/2017R79","url":"https://dblp.org/rec/conf/rice/DongaonkarVD17"}, "url":"URL#3007137" }, { "@score":"1", "@id":"3007138", "info":{"authors":{"author":[{"@pid":"256/0752","text":"Aparitosh Gahankari"},{"@pid":"59/6763","text":"Urmila Shrawankar"}]},"title":"Hurdles For Designing Flowcharting Process.","venue":"RICE","pages":"181-186","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/GahankariS17","doi":"10.15439/2017R31","ee":"https://doi.org/10.15439/2017R31","url":"https://dblp.org/rec/conf/rice/GahankariS17"}, "url":"URL#3007138" }, { "@score":"1", "@id":"3007139", "info":{"authors":{"author":[{"@pid":"256/0723","text":"Pooja R. Gaikwad"},{"@pid":"190/9009","text":"Shailesh D. Kamble"},{"@pid":"47/1244","text":"Nileshsingh V. Thakur"},{"@pid":"221/3528","text":"Akshay S. Patharkar"}]},"title":"Evaluation of Apriori Algorithm on Retail Market Transactional Database to get Frequent Itemsets.","venue":"RICE","pages":"187-192","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/GaikwadKTP17","doi":"10.15439/2017R83","ee":"https://doi.org/10.15439/2017R83","url":"https://dblp.org/rec/conf/rice/GaikwadKTP17"}, "url":"URL#3007139" }, { "@score":"1", "@id":"3007140", "info":{"authors":{"author":[{"@pid":"256/0740","text":"Neha Gaydhane"},{"@pid":"256/0712","text":"Archana Raut"}]},"title":"Survey on Time Efficient Data Gathering Approach for Wireless Sensor Network.","venue":"RICE","pages":"193-196","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/GaydhaneR17","doi":"10.15439/2017R108","ee":"https://doi.org/10.15439/2017R108","url":"https://dblp.org/rec/conf/rice/GaydhaneR17"}, "url":"URL#3007140" }, { "@score":"1", "@id":"3007141", "info":{"authors":{"author":[{"@pid":"256/0687","text":"Sanket Ghule"},{"@pid":"256/0730","text":"Ramkrishna Vadali"}]},"title":"A review of NoSQL Databases and Performance Testing of Cassandra over single and multiple nodes.","venue":"RICE","pages":"33-38","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/GhuleV17","doi":"10.15439/2017R65","ee":"https://doi.org/10.15439/2017R65","url":"https://dblp.org/rec/conf/rice/GhuleV17"}, "url":"URL#3007141" }, { "@score":"1", "@id":"3007142", "info":{"authors":{"author":[{"@pid":"205/5719","text":"Meenu Gupta"},{"@pid":"148/8621","text":"Vijender Kumar Solanki"},{"@pid":"127/1280","text":"Vijay Kumar Singh"}]},"title":"Analysis of Datamining Technique for Traffic Accident Severity Problem: A Review.","venue":"RICE","pages":"197-199","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/GuptaSS17","doi":"10.15439/2017R121","ee":"https://doi.org/10.15439/2017R121","url":"https://dblp.org/rec/conf/rice/GuptaSS17"}, "url":"URL#3007142" }, { "@score":"1", "@id":"3007143", "info":{"authors":{"author":[{"@pid":"200/5455","text":"Manoj Joshi"},{"@pid":"61/5874","text":"Vivek Bhatt"},{"@pid":"96/10413-2","text":"Ashish Ranjan 0002"},{"@pid":"256/0680","text":"Pramod Benjwal"}]},"title":"Realization of Colpitts Oscillator using second generation current controlled current conveyor.","venue":"RICE","pages":"49-52","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/JoshiBRB17","doi":"10.15439/2017R02","ee":"https://doi.org/10.15439/2017R02","url":"https://dblp.org/rec/conf/rice/JoshiBRB17"}, "url":"URL#3007143" }, { "@score":"1", "@id":"3007144", "info":{"authors":{"author":[{"@pid":"121/3374","text":"Swati Joshi"},{"@pid":"77/3904ohio","text":"Hemant Purohit"}]},"title":"A Wide Band Speech Coding Technique using Low Delay Code Excited Linear Predictive Algorithm (LD-CELP).","venue":"RICE","pages":"45-48","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/JoshiP17","doi":"10.15439/2017R03","ee":"https://doi.org/10.15439/2017R03","url":"https://dblp.org/rec/conf/rice/JoshiP17"}, "url":"URL#3007144" }, { "@score":"1", "@id":"3007145", "info":{"authors":{"author":[{"@pid":"256/0694","text":"Sarika Katkade"},{"@pid":"215/3309","text":"Jayashree Katti"},{"@pid":"256/0698","text":"Chandrakant Dhutadmal"}]},"title":"Evaluation of multilingual websites using localization matrix.","venue":"RICE","pages":"201-205","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KatkadeKD17","doi":"10.15439/2017R122","ee":"https://doi.org/10.15439/2017R122","url":"https://dblp.org/rec/conf/rice/KatkadeKD17"}, "url":"URL#3007145" }, { "@score":"1", "@id":"3007146", "info":{"authors":{"author":[{"@pid":"09/3683","text":"Gagandeep Kaur"},{"@pid":"211/6594","text":"Vinod Kumar Mishra"}]},"title":"Performance Enhancement Heterogeneous Based EECP for Bandwidth Utilization.","venue":"RICE","pages":"207-215","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KaurM17","doi":"10.15439/2017R89","ee":"https://doi.org/10.15439/2017R89","url":"https://dblp.org/rec/conf/rice/KaurM17"}, "url":"URL#3007146" }, { "@score":"1", "@id":"3007147", "info":{"authors":{"author":[{"@pid":"216/6888","text":"Sonam T. Khawase"},{"@pid":"190/9009","text":"Shailesh D. Kamble"},{"@pid":"47/1244","text":"Nileshsingh V. Thakur"},{"@pid":"221/3528","text":"Akshay S. Patharkar"}]},"title":"An Overview of Block Matching Algorithms for Motion Vector Estimation.","venue":"RICE","pages":"217-222","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KhawaseKTP17","doi":"10.15439/2017R85","ee":"https://doi.org/10.15439/2017R85","url":"https://dblp.org/rec/conf/rice/KhawaseKTP17"}, "url":"URL#3007147" }, { "@score":"1", "@id":"3007148", "info":{"authors":{"author":[{"@pid":"256/0716","text":"Arati Koli"},{"@pid":"174/9266","text":"Swati Shinde"}]},"title":"Approaches used in efficient migration from Relational Database to NoSQL Database.","venue":"RICE","pages":"223-227","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KoliS17","doi":"10.15439/2017R76","ee":"https://doi.org/10.15439/2017R76","url":"https://dblp.org/rec/conf/rice/KoliS17"}, "url":"URL#3007148" }, { "@score":"1", "@id":"3007149", "info":{"authors":{"author":[{"@pid":"27/343","text":"Sanjeev Kumar"},{"@pid":"154/2518","text":"Rakesh P. Badoni"},{"@pid":"130/0035","text":"P. J. Mohan"}]},"title":"Application of MADM Methods for Selecting the Best Private Institution for Professional Courses in Uttarakhand State, India.","venue":"RICE","pages":"229-233","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KumarBM17","doi":"10.15439/2017R123","ee":"https://doi.org/10.15439/2017R123","url":"https://dblp.org/rec/conf/rice/KumarBM17"}, "url":"URL#3007149" }, { "@score":"1", "@id":"3007150", "info":{"authors":{"author":[{"@pid":"31/4484-1","text":"Sachin Kumar 0001"},{"@pid":"76/10044","text":"Vijay Bhaskar Semwal"},{"@pid":"148/8621","text":"Vijender Kumar Solanki"},{"@pid":"198/3643","text":"Prayag Tiwari"},{"@pid":"256/0688","text":"Denis Kalitin"}]},"title":"A Conjoint Analysis of Road Accident Data using K-modes Clustering and Bayesian Networks (Road Accident Analysis using clustering and classification).","venue":"RICE","pages":"53-56","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KumarSSTK17","doi":"10.15439/2017R44","ee":"https://doi.org/10.15439/2017R44","url":"https://dblp.org/rec/conf/rice/KumarSSTK17"}, "url":"URL#3007150" }, { "@score":"1", "@id":"3007151", "info":{"authors":{"author":[{"@pid":"35/4332","text":"Manish Kumar"},{"@pid":"158/4488","text":"Kunwar Singh Vaisla"}]},"title":"To study of various security attacks against Biometric template in a generic Biometric Recognition System.","venue":"RICE","pages":"235-240","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/KumarV17","doi":"10.15439/2017R57","ee":"https://doi.org/10.15439/2017R57","url":"https://dblp.org/rec/conf/rice/KumarV17"}, "url":"URL#3007151" }, { "@score":"1", "@id":"3007152", "info":{"authors":{"author":[{"@pid":"256/0685","text":"Gorav Kumar Malik"},{"@pid":"142/3899","text":"Yatindra Kumar"},{"@pid":"96/10835","text":"Manoj Panda"}]},"title":"Cardiac arrhythmia detection in ECG signals by feature Extraction and support vector machine.","venue":"RICE","pages":"241-244","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/MalikKP17","doi":"10.15439/2017R63","ee":"https://doi.org/10.15439/2017R63","url":"https://dblp.org/rec/conf/rice/MalikKP17"}, "url":"URL#3007152" }, { "@score":"1", "@id":"3007153", "info":{"authors":{"author":[{"@pid":"256/0692","text":"Steven Mathew"},{"@pid":"151/1321","text":"Sarita Gulia"},{"@pid":"211/6190","text":"Varinder Singh"},{"@pid":"256/0679","text":"Vivek Dev"}]},"title":"A Review Paper on Cloud Computing and Its Security Concerns.","venue":"RICE","pages":"245-250","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/MathewGSD17","doi":"10.15439/2017R70","ee":"https://doi.org/10.15439/2017R70","url":"https://dblp.org/rec/conf/rice/MathewGSD17"}, "url":"URL#3007153" }, { "@score":"1", "@id":"3007154", "info":{"authors":{"author":[{"@pid":"183/2638","text":"Daniel Meana-Llorián"},{"@pid":"144/9558","text":"Cristian González García"},{"@pid":"01/10030","text":"Jordán Pascual Espada"},{"@pid":"72/10130","text":"Manju Khari"},{"@pid":"76/10044","text":"Vijay Bhaskar Semwal"}]},"title":"Bilrost: Connecting the Internet of Things through human Social Networks with a Domain-Specific Language.","venue":"RICE","pages":"57-61","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/Meana-LlorianGE17","doi":"10.15439/2017R110","ee":"https://doi.org/10.15439/2017R110","url":"https://dblp.org/rec/conf/rice/Meana-LlorianGE17"}, "url":"URL#3007154" }, { "@score":"1", "@id":"3007155", "info":{"authors":{"author":[{"@pid":"34/8757","text":"Saurabh Mishra"},{"@pid":"91/8186","text":"Sandip Vijay"}]},"title":"Comparative Analysis of Angle Based and Traditional Routing Protocols for MANETs / WSNs.","venue":"RICE","pages":"251-254","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/MishraV17","doi":"10.15439/2017R90","ee":"https://doi.org/10.15439/2017R90","url":"https://dblp.org/rec/conf/rice/MishraV17"}, "url":"URL#3007155" }, { "@score":"1", "@id":"3007156", "info":{"authors":{"author":[{"@pid":"126/2287","text":"Mihir Narayan Mohanty"},{"@pid":"177/7420","text":"Sarthak Panda"}]},"title":"Impulsive Noise Cancellation from Cardiac Signal using Modified WLMS Algorithm.","venue":"RICE","pages":"255-260","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/MohantyP17","doi":"10.15439/2017R19","ee":"https://doi.org/10.15439/2017R19","url":"https://dblp.org/rec/conf/rice/MohantyP17"}, "url":"URL#3007156" }, { "@score":"1", "@id":"3007157", "info":{"authors":{"author":[{"@pid":"132/3946","text":"Bhaskar Mondal"},{"@pid":"227/4365","text":"Neel Biswas"},{"@pid":"195/0019","text":"Tarni Mandal"}]},"title":"A Comparative study on Cryptographic Image Scrambling.","venue":"RICE","pages":"261-268","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/MondalBM17","doi":"10.15439/2017R47","ee":"https://doi.org/10.15439/2017R47","url":"https://dblp.org/rec/conf/rice/MondalBM17"}, "url":"URL#3007157" }, { "@score":"1", "@id":"3007158", "info":{"authors":{"author":[{"@pid":"256/0762","text":"Ashish Nainwal"},{"@pid":"142/3899","text":"Yatindra Kumar"},{"@pid":"256/0738","text":"Bhola Jha"}]},"title":"Comparative Study of Tachyarrhythmia ECG and Normal ECG.","venue":"RICE","pages":"63-65","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/NainwalKJ17","doi":"10.15439/2017R62","ee":"https://doi.org/10.15439/2017R62","url":"https://dblp.org/rec/conf/rice/NainwalKJ17"}, "url":"URL#3007158" }, { "@score":"1", "@id":"3007159", "info":{"authors":{"author":[{"@pid":"256/0755","text":"Sachin Negi"},{"@pid":"142/3899","text":"Yatindra Kumar"},{"@pid":"154/2983","text":"V. M. Mishra"}]},"title":"MLPNN and kNN Based Classification of sEMG Signal for Myoelectric Control of Upper Limb Prosthesis.","venue":"RICE","pages":"269-272","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/NegiKM17","doi":"10.15439/2017R96","ee":"https://doi.org/10.15439/2017R96","url":"https://dblp.org/rec/conf/rice/NegiKM17"}, "url":"URL#3007159" }, { "@score":"1", "@id":"3007160", "info":{"authors":{"author":[{"@pid":"256/0753","text":"Manchanda Nidhi"},{"@pid":"28/6341","text":"Sarita"},{"@pid":"256/0742","text":"Sanatan Jha"},{"@pid":"30/2802","text":"Saurabh Mukherjee"}]},"title":"Overview: Human-Computer Interaction an Globally Used Technique in Society.","venue":"RICE","pages":"273-277","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/NidhiSJM17","doi":"10.15439/2017R69","ee":"https://doi.org/10.15439/2017R69","url":"https://dblp.org/rec/conf/rice/NidhiSJM17"}, "url":"URL#3007160" }, { "@score":"1", "@id":"3007161", "info":{"authors":{"author":[{"@pid":"256/0720","text":"Vasundhara R. Pagar"},{"@pid":"256/0721","text":"Rohini G. Pise"}]},"title":"Password Security Mechanisms: Comparitive Study.","venue":"RICE","pages":"279-282","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/PagarP17","doi":"10.15439/2017R67","ee":"https://doi.org/10.15439/2017R67","url":"https://dblp.org/rec/conf/rice/PagarP17"}, "url":"URL#3007161" }, { "@score":"1", "@id":"3007162", "info":{"authors":{"author":[{"@pid":"165/8690","text":"Hemanta Kumar Palo"},{"@pid":"126/2287","text":"Mihir Narayan Mohanty"},{"@pid":"57/7998","text":"Mahesh Chandra"}]},"title":"Emotion Analysis from Speech of Different Age Groups.","venue":"RICE","pages":"283-287","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/PaloMC17","doi":"10.15439/2017R21","ee":"https://doi.org/10.15439/2017R21","url":"https://dblp.org/rec/conf/rice/PaloMC17"}, "url":"URL#3007162" }, { "@score":"1", "@id":"3007163", "info":{"authors":{"author":[{"@pid":"256/0684","text":"Sandhya R"},{"@pid":"256/0749","text":"Nallasamy Sengottaiyan"}]},"title":"An AI Approach to Locate Cluster Centre in Wireless Sensor Networks.","venue":"RICE","pages":"289-292","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/RS17","doi":"10.15439/2017R58","ee":"https://doi.org/10.15439/2017R58","url":"https://dblp.org/rec/conf/rice/RS17"}, "url":"URL#3007163" }, { "@score":"1", "@id":"3007164", "info":{"authors":{"author":[{"@pid":"209/7123","text":"Rashmirekha Ram"},{"@pid":"93/5028","text":"Sabyasachi Patra"},{"@pid":"126/2287","text":"Mihir Narayan Mohanty"}]},"title":"Application of Variational Mode Decomposition on Speech Enhancement.","venue":"RICE","pages":"293-296","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/RamPM17","doi":"10.15439/2017R27","ee":"https://doi.org/10.15439/2017R27","url":"https://dblp.org/rec/conf/rice/RamPM17"}, "url":"URL#3007164" }, { "@score":"1", "@id":"3007165", "info":{"authors":{"author":[{"@pid":"85/7456","text":"Arti Rana"},{"@pid":"256/0625","text":"Arvind Singh Rawat"},{"@pid":"164/0544","text":"Anchit Bijalwan"}]},"title":"Process of finding defects in software testing.","venue":"RICE","pages":"297-300","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/RanaRB17","doi":"10.15439/2017R18","ee":"https://doi.org/10.15439/2017R18","url":"https://dblp.org/rec/conf/rice/RanaRB17"}, "url":"URL#3007165" }, { "@score":"1", "@id":"3007166", "info":{"authors":{"author":[{"@pid":"256/0700","text":"J. S. Rauthan"},{"@pid":"158/4488","text":"Kunwar Singh Vaisla"}]},"title":"Privacy and Security of User's Sensitive Data: A Viable Analysis.","venue":"RICE","pages":"67-71","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/RauthanV17","doi":"10.15439/2017R45","ee":"https://doi.org/10.15439/2017R45","url":"https://dblp.org/rec/conf/rice/RauthanV17"}, "url":"URL#3007166" }, { "@score":"1", "@id":"3007167", "info":{"authors":{"author":[{"@pid":"169/0509","text":"Arabinda Sahoo"},{"@pid":"53/11463","text":"Pranati Das"}]},"title":"Dictionary Based Intra Prediction for Image Compression.","venue":"RICE","pages":"73-76","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SahooD17","doi":"10.15439/2017R17","ee":"https://doi.org/10.15439/2017R17","url":"https://dblp.org/rec/conf/rice/SahooD17"}, "url":"URL#3007167" }, { "@score":"1", "@id":"3007168", "info":{"authors":{"author":[{"@pid":"256/0756","text":"Swarnaprava Sahoo"},{"@pid":"126/2287","text":"Mihir Narayan Mohanty"},{"@pid":"256/0745","text":"Rabindra Kumar Mishra"}]},"title":"Design of Z-Shape Compact Antenna for Next Generation Wireless Network.","venue":"RICE","pages":"301-304","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SahooMM17","doi":"10.15439/2017R20","ee":"https://doi.org/10.15439/2017R20","url":"https://dblp.org/rec/conf/rice/SahooMM17"}, "url":"URL#3007168" }, { "@score":"1", "@id":"3007169", "info":{"authors":{"author":{"@pid":"256/0681","text":"Ombeer Saini"}},"title":"Short-Term Variable - Head Hydrothermal Generation Scheduling for Heuristic Search Method.","venue":"RICE","pages":"305-311","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/Saini17","doi":"10.15439/2017R94","ee":"https://doi.org/10.15439/2017R94","url":"https://dblp.org/rec/conf/rice/Saini17"}, "url":"URL#3007169" }, { "@score":"1", "@id":"3007170", "info":{"authors":{"author":[{"@pid":"221/3627","text":"Apurva S. Samdurkar"},{"@pid":"190/9009","text":"Shailesh D. Kamble"},{"@pid":"47/1244","text":"Nileshsingh V. Thakur"},{"@pid":"221/3528","text":"Akshay S. Patharkar"}]},"title":"Overview of Object Detection and Tracking based on Block Matching Techniques.","venue":"RICE","pages":"313-319","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SamdurkarKTP17","doi":"10.15439/2017R84","ee":"https://doi.org/10.15439/2017R84","url":"https://dblp.org/rec/conf/rice/SamdurkarKTP17"}, "url":"URL#3007170" }, { "@score":"1", "@id":"3007171", "info":{"authors":{"author":[{"@pid":"182/7071","text":"A. Sangeetha"},{"@pid":"05/5975","text":"T. Rajendran"}]},"title":"An Intrinsic Study on Routing Protocols in Mobile Ad-Hoc Network.","venue":"RICE","pages":"77-82","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SangeethaR17","doi":"10.15439/2017R25","ee":"https://doi.org/10.15439/2017R25","url":"https://dblp.org/rec/conf/rice/SangeethaR17"}, "url":"URL#3007171" }, { "@score":"1", "@id":"3007172", "info":{"authors":{"author":[{"@pid":"212/0266","text":"Lokanath Sarangi"},{"@pid":"126/2287","text":"Mihir Narayan Mohanty"},{"@pid":"18/399","text":"Srikanta Patnaik"}]},"title":"Design of Diagnosis and Monitoring System of Heart Related Diseases using Fuzzy Inference System.","venue":"RICE","pages":"321-327","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SarangiMP17","doi":"10.15439/2017R22","ee":"https://doi.org/10.15439/2017R22","url":"https://dblp.org/rec/conf/rice/SarangiMP17"}, "url":"URL#3007172" }, { "@score":"1", "@id":"3007173", "info":{"authors":{"author":[{"@pid":"256/0750","text":"Gajanan Shinde"},{"@pid":"256/0724","text":"Sandhya S. Waghere"}]},"title":"Analysis of SQL Injection Using DVWA Tool.","venue":"RICE","pages":"107-110","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/ShindeW17","doi":"10.15439/2017R66","ee":"https://doi.org/10.15439/2017R66","url":"https://dblp.org/rec/conf/rice/ShindeW17"}, "url":"URL#3007173" }, { "@score":"1", "@id":"3007174", "info":{"authors":{"author":[{"@pid":"91/4259","text":"Harvinder Singh"},{"@pid":"164/0544","text":"Anchit Bijalwan"}]},"title":"A Framework on botnet detection and forensics.","venue":"RICE","pages":"93-101","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SinghB17","doi":"10.15439/2017R28","ee":"https://doi.org/10.15439/2017R28","url":"https://dblp.org/rec/conf/rice/SinghB17"}, "url":"URL#3007174" }, { "@score":"1", "@id":"3007175", "info":{"authors":{"author":[{"@pid":"28/7685","text":"Bharat Singh"},{"@pid":"256/0731","text":"Aswani Kumar Chandel"},{"@pid":"86/660","text":"Arvind Kumar"}]},"title":"Analysis of Saturated Synchronous Machine considering d-q Axis Coupling Reactance.","venue":"RICE","pages":"329-334","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SinghCK17","doi":"10.15439/2017R60","ee":"https://doi.org/10.15439/2017R60","url":"https://dblp.org/rec/conf/rice/SinghCK17"}, "url":"URL#3007175" }, { "@score":"1", "@id":"3007176", "info":{"authors":{"author":[{"@pid":"256/0765","text":"Kuber Singh"},{"@pid":"99/3649","text":"R. K. Singh"},{"@pid":"256/0703","text":"Sanjeev Singh Bisht"},{"@pid":"256/0695","text":"Monika Bartwal"}]},"title":"Simulation & Performance Comparison between DSR, FSR & HSR Routing Protocols in MANET Using NS2.","venue":"RICE","pages":"83-88","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SinghSBB17","doi":"10.15439/2017R91","ee":"https://doi.org/10.15439/2017R91","url":"https://dblp.org/rec/conf/rice/SinghSBB17"}, "url":"URL#3007176" }, { "@score":"1", "@id":"3007177", "info":{"authors":{"author":[{"@pid":"256/0760","text":"Mahatim Singh"},{"@pid":"256/0758","text":"Rabi Shaw"},{"@pid":"237/0314","text":"Arpita Sarkar"},{"@pid":"246/5841","text":"Binod Kumar Singh"}]},"title":"Authentication scheme using novel chaff generation method in fuzzy vault.","venue":"RICE","pages":"89-92","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/SinghSSS17","doi":"10.15439/2017R55","ee":"https://doi.org/10.15439/2017R55","url":"https://dblp.org/rec/conf/rice/SinghSSS17"}, "url":"URL#3007177" }, { "@score":"1", "@id":"3007178", "info":{"authors":{"author":{"@pid":"256/0735","text":"Vijaya Kumar Sudeva"}},"title":"Symmetric Key Encryption With Many Secret Keys.","venue":"RICE","pages":"335-339","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/Sudeva17","doi":"10.15439/2017R48","ee":"https://doi.org/10.15439/2017R48","url":"https://dblp.org/rec/conf/rice/Sudeva17"}, "url":"URL#3007178" }, { "@score":"1", "@id":"3007179", "info":{"authors":{"author":[{"@pid":"256/0739","text":"Durga Devi TJB"},{"@pid":"202/8644","text":"A. Subramani"},{"@pid":"148/8621","text":"Vijender Kumar Solanki"}]},"title":"Smart City: IOT Based Prototype for Parking Monitoring and Management System Commanded by Mobile App.","venue":"RICE","pages":"341-343","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/TJBSS17","doi":"10.15439/2017R23","ee":"https://doi.org/10.15439/2017R23","url":"https://dblp.org/rec/conf/rice/TJBSS17"}, "url":"URL#3007179" }, { "@score":"1", "@id":"3007180", "info":{"authors":{"author":[{"@pid":"256/0689","text":"Trimi Neha Tete"},{"@pid":"256/0748","text":"Sushma Kamlu"}]},"title":"Plant Disease Detection Using Different Algorithms.","venue":"RICE","pages":"103-106","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/TeteK17","doi":"10.15439/2017R24","ee":"https://doi.org/10.15439/2017R24","url":"https://dblp.org/rec/conf/rice/TeteK17"}, "url":"URL#3007180" }, { "@score":"1", "@id":"3007181", "info":{"authors":{"author":[{"@pid":"256/0751","text":"Shardul Thapliyal"},{"@pid":"256/0734","text":"Yogendra Pratap Pundir"},{"@pid":"256/0728","text":"Arun Shekhar Bahuguna"},{"@pid":"189/7298","text":"Sunil Semwal"}]},"title":"Object Motion estimation using edge detection and background subtraction with block matching algorithm.","venue":"RICE","pages":"345-348","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/ThapliyalPBS17","doi":"10.15439/2017R71","ee":"https://doi.org/10.15439/2017R71","url":"https://dblp.org/rec/conf/rice/ThapliyalPBS17"}, "url":"URL#3007181" }, { "@score":"1", "@id":"3007182", "info":{"authors":{"author":[{"@pid":"256/0675","text":"Thangamuthu Thilagaraj"},{"@pid":"256/0749","text":"Nallasamy Sengottaiyan"}]},"title":"A Review of Educational Data Mining in Higher Education System.","venue":"RICE","pages":"349-358","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/ThilagarajS17","doi":"10.15439/2017R87","ee":"https://doi.org/10.15439/2017R87","url":"https://dblp.org/rec/conf/rice/ThilagarajS17"}, "url":"URL#3007182" }, { "@score":"1", "@id":"3007183", "info":{"authors":{"author":[{"@pid":"256/0686","text":"P. R. Vhansure"},{"@pid":"256/0741","text":"A. A. Phatak"},{"@pid":"256/0727","text":"A. S. Shimpi"}]},"title":"OFS Technique with DE Algorithm based on Correlation and Clustering method along with its Application.","venue":"RICE","pages":"359-364","year":"2017","type":"Conference and Workshop Papers","access":"open","key":"conf/rice/VhansurePS17","doi":"10.15439/2017R8","ee":"https://doi.org/10.15439/2017R8","url":"https://dblp.org/rec/conf/rice/VhansurePS17"}, "url":"URL#3007183" }, { "@score":"1", "@id":"3038051", "info":{"authors":{"author":[{"@pid":"148/8621","text":"Vijender Kumar Solanki"},{"@pid":"76/10044","text":"Vijay Bhaskar Semwal"},{"@pid":"41/2274","text":"Rubén González Crespo"},{"@pid":"143/8305","text":"Vishwanath Bijalwan"}]},"title":"Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering (RICE 2017), Gopeshwar, Uttrakhand, India, March 24-26, 2017.","venue":["RICE","Annals of Computer Science and Information Systems"],"volume":"10","year":"2017","type":"Editorship","access":"open","key":"conf/rice/2017","doi":"10.15439/978-83-65750-05-1","ee":"https://doi.org/10.15439/978-83-65750-05-1","url":"https://dblp.org/rec/conf/rice/2017"}, "url":"URL#3038051" } ] } } } )