<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Workshop on Advances in Computational Intelligence (ACI-2023) co-located with the 2nd International Conference on Artificial Intelligence and Data Science (ICAIDS-2023)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Prateek Agrawal</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ashwani Kumar</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vishu Madaan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladislav Kashansky</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pawan Kumar Verma</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eteronix GmbH</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lovely Professional University</institution>
          ,
          <addr-line>Punjab</addr-line>
          ,
          <country country="IN">INDIA</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Sharda University</institution>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Shreyas Institute of Engineering and Technology</institution>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Sreyas Institute of Engineering and Technology</institution>
          ,
          <addr-line>Hyderabad, Telangana</addr-line>
          ,
          <country country="IN">India</country>
          ,
          <addr-line>29th-30th</addr-line>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Sustainable Computing</institution>
          ,
          <addr-line>Cloud Computing, Data Security</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Proceedings</p>
    </sec>
    <sec id="sec-2">
      <title>1Lovely Professional University, Punjab, INDIA</title>
    </sec>
    <sec id="sec-3">
      <title>2Shreyas Institute of Engineering and Technology, INDIA</title>
    </sec>
    <sec id="sec-4">
      <title>3Lovely Professional University, Punjab, INDIA</title>
    </sec>
    <sec id="sec-5">
      <title>4Eteronix GmbH, AUSTRIA</title>
    </sec>
    <sec id="sec-6">
      <title>5Sharda University, INDIA</title>
      <p>Prateek Agrawal1, Ashwani Kumar2, Vishu Madaan3, Vladislav Kashansky4 and
The ACI-2023 has been held in Dec 2023 as a special workshop under the umbrella of the 2nd International
Conference on Artificial Intelligence and Data Science (ICAIDS-2023). 100+ experts from more than 20
countries were the part of ICAIDS-2023 conference and workshop committees. The workshop broadly
focused on two thematic areas: i) Machine learning and deep learning approaches in trans-disciplinary
applications, ii) Cloud Computing, Security and IOT. The rigorous and peer review selection process
ensured that only high quality manuscripts in the above mentioned themes are accepted for final
publication. We received a total number of 56 submissions in ACI-2023 with 24 papers finding their place
in the final workshop proceedings.
Preface
Computational Intelligence (CI) spans a broad spectrum of approaches and methodologies, incorporating
theories, theorems, proofs, axioms, applications, and comparative analyses of computationally driven
paradigms. It ofers computational resolutions to multifaceted challenges across various domains, ranging
from databases to exa-scale systems, homogeneity to heterogeneity, volume to velocity, and variety to
veracity in datasets. In today’s landscape, where Exabytes of data are generated daily, there’s a pressing
need for intelligent methodologies and tools that are robust and adaptable enough to sift through this
vast sea of data, extracting meaningful insights to aid users in making swift and informed decisions.</p>
      <p>Given these imperatives, CI, with its conceptual frameworks, practical applications, and meta-heuristic
approaches, holds significant relevance in addressing real-world problems. This workshop aims to
document and disseminate the contributions of researchers, academics, and industry experts in the field
of CI. It serves as a pivotal platform for the exchange of information, fostering tangible advancements in
scientific output. Specifically, it will delve into key areas such as cloud computing, IoT, security, machine
learning, deep learning, and AI in healthcare, showcasing how CI methodologies can be leveraged to
tackle challenges and drive innovation in these domains.</p>
      <p>ACI’23: Workshop on Advances in Computational Intelligence at ICAIDS 2023, December 29-30, 2023, Hyderabad, India
nEvelop-O
LGOBE
rOcid
dr.agrawal.prateek@gmail.com (P. Agrawal); dr.vishumadaan@gmail.com (V. Madaan)
https://www.drprateekagrawal.com/ (P. Agrawal)
0000-0001-6861-0698 (P. Agrawal); 0000-0002-2100-900X (A. Kumar); 0000-0002-9127-4490 (V. Madaan);</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>1 Development of a Knowledge-Based System for Diagnosis and Treatment of Obesity</article-title>
          . Abebaw Agegne, Ayodeji Olalekan Salau, Ayalew Belay, Anupam Singh, Nigus Wereta Asnake and
          <string-name>
            <surname>Sepiribo Lucky Braide . . . . . . . . . . .</surname>
          </string-name>
          <volume>6</volume>
          -
          <fpage>23</fpage>
          . . . . .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>2 Real-Time Hand Gesture Recognition System</article-title>
          . Aarti, Swathi Gowroju, Raju Pal, Vaddhiraju Swathi,
          <source>Shirisha Yerraboina 24-34</source>
          <string-name>
            <surname>. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>3 Enhanced Detection of Epileptic Seizure Using Supervised and Unsupervised Algorithms</article-title>
          . Ananthakrishnan Gopalakrishnan, Sharon Priya Surendran, Aisha Banu Wahab, Aarthi Gopalakrishnan,
          <string-name>
            <surname>Yogesh Kumar Balaji . . . . . . . . . .</surname>
          </string-name>
          <volume>35</volume>
          -
          <fpage>46</fpage>
          . . . .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>4 An Anomaly-based Network Intrusion Detection System Using Ensemble Feature Integration with Deep Learning Techniques</article-title>
          . Srinivas Akkepalli,
          <string-name>
            <surname>Sagar Kadapa . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>47</volume>
          -
          <fpage>57</fpage>
          . . . . . . . . .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>5 Advancements in Text-to-Image Generation: A Comparative Study of Model Architectures, Datasets and Performance Metrics</article-title>
          . Tejas Goyal, Kaveesh Khattar, Kubtoor Patel Dhruv, Aditya Hombal,
          <string-name>
            <surname>Mamatha Hosalli Ramappa . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>58</volume>
          -
          <fpage>77</fpage>
          <string-name>
            <surname>. . . . . . . . . . . .</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>6 Survey of Early Melanoma Symptoms in Medical Dermoscopy Using Deep Learning Methods</article-title>
          . Gururaj Nase,
          <string-name>
            <surname>Arun Arthanareeswaran . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>78</volume>
          -
          <fpage>90</fpage>
          . . . . . . . .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>7 A Survey on Underwater Image Segmentation and Image quality Enhancements using Deep Learning Models</article-title>
          . Veeresh,
          <string-name>
            <surname>Thillaigovindan Senthil Kumar . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>91</volume>
          -
          <fpage>102</fpage>
          . . . . . . .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8
          <string-name>
            <given-names>Advancing</given-names>
            <surname>Legal</surname>
          </string-name>
          <string-name>
            <surname>NLP</surname>
          </string-name>
          :
          <article-title>A Comparative Study of Transformer-Based Models for Ambiguous Clause Detection in Legal Documents</article-title>
          . Vrishani
          <string-name>
            <surname>Shah . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>103</volume>
          -
          <fpage>112</fpage>
          <string-name>
            <surname>. . . . . . . . . . . . . .</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9
          <string-name>
            <given-names>Deepfake</given-names>
            <surname>Image</surname>
          </string-name>
          <string-name>
            <surname>Detection</surname>
          </string-name>
          &amp;
          <article-title>Classification using Conv2D Neural Networks</article-title>
          .
          <source>Debasish Samal</source>
          , Prateek Agrawal,
          <string-name>
            <surname>Vishu Madaan . . . . . . . . .</surname>
          </string-name>
          <volume>113</volume>
          -
          <fpage>128</fpage>
          . . . .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10
          <string-name>
            <surname>DFDA</surname>
          </string-name>
          :
          <article-title>An Analysis of Deep Learning Models to Detect Deepfake Videos</article-title>
          . Muleef Bhat, Prateek Agrawal,
          <string-name>
            <surname>Charu Gupta . . . . . . . . . . .</surname>
          </string-name>
          <volume>129</volume>
          -
          <fpage>140</fpage>
          . . . . .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11
          <string-name>
            <given-names>Integrating</given-names>
            <surname>Language</surname>
          </string-name>
          <article-title>Models and Machine Learning for Crop Disease Detection for Farmer Guidance</article-title>
          . Vishu Madaan, Gagan Bindal, Sandeep Singh, Shiv Kumar Yadav, Ankur Singh,
          <string-name>
            <surname>Piyush Sinha</surname>
          </string-name>
          ,
          <string-name>
            <surname>Dimple Nagpal . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>141</volume>
          -
          <fpage>154</fpage>
          . . . . . .
          <source>. . 5 5</source>
          <volume>5 5 5 5 5 5 5 5 5</volume>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <article-title>12 Systematic Analysis of Object Detection for Security Camera Using Machine Learning</article-title>
          .
          <source>Shubham Swarup Pradhan</source>
          , Ghanshyam Kumar Yadav, Dibyajyoti Dhall, Raju Kumar Singh,
          <string-name>
            <surname>Dharmveer Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Vishal Rai</surname>
          </string-name>
          , Gagandeep Kaur,
          <string-name>
            <surname>Anshu Vashisth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>155</volume>
          -
          <fpage>164</fpage>
          <string-name>
            <surname>. . . . . . . . . . . . . . . 5</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13
          <string-name>
            <given-names>Biometric</given-names>
            <surname>Authentication</surname>
          </string-name>
          <article-title>System for Access Control</article-title>
          .
          <source>Jaimit Patel</source>
          , Anubhav, Ayush Kumar Singh, Rachit Kumar Tiwari, Abhi Singh,
          <string-name>
            <surname>Bhupinder Kaur . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>165</volume>
          -
          <fpage>176</fpage>
          . . . . . . . . . . . 5
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14
          <string-name>
            <given-names>Smart</given-names>
            <surname>City</surname>
          </string-name>
          <article-title>Web Application for Business, Healthcare &amp; Education</article-title>
          . Sourjadip Pramanik, Vaibhav Kadam,
          <string-name>
            <surname>Vrinda Parkhi . . . . . . .</surname>
          </string-name>
          <volume>177</volume>
          -
          <fpage>189</fpage>
          . . . 5
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <article-title>15 Intelligent and Secured Cloud Service Management Using Smart Data Hashing Algorithm</article-title>
          . Keturu Madan Mohan, Ponaganti Srinivasa Rao, SriRamakavacham Prudhvi Raj,
          <string-name>
            <surname>Chennuri Nagendra Sai . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>190</volume>
          -
          <fpage>199</fpage>
          . . . . . . . . . . 5
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16
          <string-name>
            <given-names>Evaluating</given-names>
            <surname>Mental</surname>
          </string-name>
          <article-title>Well-being through Wearable Sensors Utilizing Machine Learning</article-title>
          . Aarti, Swathi Gowroju, Raju Pal,
          <source>Pushpendra Kumar Rajput . . . 200-298</source>
          .
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <article-title>17 Impact of Internet of Things Applications in Smart Villages</article-title>
          . Prashant Kumar Sinha, Muhammad Amir Khusru Akhtar,
          <source>Ashwani Kumar 210-222</source>
          <string-name>
            <surname>. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <article-title>18 Malware Detection in IoT Enabled Multimedia Environment Using the Feline Cad-based Deep CNN</article-title>
          . Seelam Sai Satyanarayana Reddy, Harikrishna Bommala . . . . . .
          <volume>223</volume>
          -
          <fpage>233</fpage>
          . . 5
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19
          <string-name>
            <given-names>Smart</given-names>
            <surname>Trafic</surname>
          </string-name>
          <article-title>Signal Management for Urban Eficiency and Safety: Leveraging Vehicle Density</article-title>
          and
          <string-name>
            <given-names>Emergency</given-names>
            <surname>Prioritization</surname>
          </string-name>
          . Subrata Paul, Anirban Mitra, Anupam Singh,
          <string-name>
            <surname>Shivnath Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Pronaya Bhattacharya . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>234</volume>
          -
          <fpage>246</fpage>
          <string-name>
            <surname>. . . . . . . . . . . . . . 5</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20
          <string-name>
            <given-names>Smart</given-names>
            <surname>Hospital</surname>
          </string-name>
          <article-title>Setups with IoT-Enabled Connectivity of Artificial Intelligence System</article-title>
          . Vella Satyanarayana, Mahesh Kumar Singh,
          <source>Robin Varghese . . . . 247-257</source>
          .
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21
          <string-name>
            <given-names>Seamless</given-names>
            <surname>Smart</surname>
          </string-name>
          <article-title>Home Control Using Mobile App with Voice and Auto Modes</article-title>
          . Athifa Shaik, Chilamakuru Veera Sai Mahidhar, Pitla Rishitha, Sai Dinesh Lankipalli, Satyasai Kilaru, Chennur Krishna Prasad,
          <source>Bhupinder Kaur 258-269 5</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <article-title>22 Sub-threshold Leakage Current Diferential Age Sensor for Identifying Reused Integrated Circuits</article-title>
          .
          <source>Mahesh Kumar Singh, Palaka Uma Maheswara Rao, Vella Satyanarayana 270-281</source>
          <string-name>
            <surname>. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23
          <string-name>
            <given-names>An</given-names>
            <surname>Innovative</surname>
          </string-name>
          <article-title>Crypto-Stego Technique for Secure and Privacy-Preserving on Reliable Transmission Data</article-title>
          . Harikrishna Bommala, Seelam Sai Satyanarayana Reddy . . . . . .
          <volume>282</volume>
          -
          <fpage>290</fpage>
          . . 5
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <article-title>24 Safeguarded DNA-based Information Storage Framework for Eco-friendly Data Centers</article-title>
          . Pronaya Bhattacharya, Sudip Chatterjee,
          <string-name>
            <surname>Anupam Singh . . . . .</surname>
          </string-name>
          <volume>291</volume>
          -
          <fpage>302</fpage>
          . .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>