Abstract is missing.
- Enhancing Security in ROSGianluca Caiazza, Ruffin White, Agostino Cortesi. 3-15 [doi]
- Byte Label Malware Classification Using Image EntropyAyan Dey, Sukriti Bhattacharya, Nabendu Chaki. 17-29 [doi]
- Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR LayerPriyank Jain, Manasi Gyanchandani, Nilay Khare. 31-53 [doi]
- Ambient Monitoring in Smart Home for Independent LivingR. Kavitha, Sumitra Binu. 57-74 [doi]
- The Conceptual Approach of System for Automatic Vehicle Accident Detection and Searching for Life Signs of CasualtiesAnna Lupinska-Dubicka, Marek Tabedzki, Marcin Adamski, Mariusz Rybnik, Miroslaw Omieljanowicz, Andrzej Omieljanowicz, Maciej Szymkowski, Marek Gruszewski, Adam Klimowicz, Grzegorz Rubin, Khalid Saeed 0001. 75-91 [doi]
- Disaster Management System Using Vehicular Ad Hoc NetworksSuparna DasGupta, Sankhayan Choudhury, Rituparna Chaki. 93-107 [doi]
- A Computer-Aided Hybrid Framework for Early Diagnosis of Breast CancerSourav Pramanik, Debapriya Banik, Debotosh Bhattacharjee, Mita Nasipuri. 111-124 [doi]
- VQ/GMM-Based Speaker Identification with Emphasis on Language DependencyBidhan Barai, Debayan Das, Nibaran Das, Subhadip Basu, Mita Nasipuri. 125-141 [doi]
- Natural Language Processing: Speaker, Language, and Gender Identification with LSTMMohammad K. Nammous, Khalid Saeed 0001. 143-156 [doi]
- Heterogeneous Face Matching Using Robust Binary Pattern of Local Quotient: RBPLQHiranmoy Roy, Debotosh Bhattacharjee. 159-173 [doi]
- 3D Face Recognition Based on Volumetric Representation of Range ImageKoushik Dutta, Debotosh Bhattacharjee, Mita Nasipuri, Anik Poddar. 175-189 [doi]