Abstract is missing.
- Managing 5G Networks - A Review of FSO Challenges and SolutionsPiyush Kulshreshtha, Amit Kumar Garg. 1-4 [doi]
- Application of Flipped Classroom For Online Education and Foreign Language AcquisitionShreya Jhamb, Sandhya Java. 1-7 [doi]
- Using Exploratory Data Analysis for Generating Inferences on the Correlation of COVID-19 casesJoanita DSouza, Senthil Velan S. 1-6 [doi]
- Ant Colony Optimization-based Dynamic Routing in Software Defined NetworksShreya T, Mohammed Moin Mulla, Sumedha Shinde, D. G. Narayan. 1-7 [doi]
- Detection of Phishing Websites by Using Machine Learning-Based URL AnalysisMehmet Korkmaz, Ozgur Koray Sahingoz, Banu Diri. 1-7 [doi]
- COVID-19 Diagnosis from Chest Radiography Images using Deep Residual NetworkOjas A. Ramwala, Himansh Mulchandani, Poojan Dalal, Mita C. Paunwala, Chirag N. Paunwala. 1-5 [doi]
- Theoretical Investigation of a Dispersion Compensating Photonic Crystal Fiber with Ultra-High Dispersion Coefficient and Extremely High NonlinearityJarina Akter, Md. Nur Uddin, Shovasis Kumar Biswas. 1-4 [doi]
- Bengali Question Answering System Using Seq2Seq Learning Based on General Knowledge DatasetMumenunnessa Keya, Abu Kaisar Mohammad Masum, Bhaskar Majumdar, Syed Akhter Hossain, Sheikh Abujar. 1-6 [doi]
- In-Vehicle Intrusion Detection System on Controller Area Network with Machine Learning ModelsSoner Can Kalkan, Ozgur Koray Sahingoz. 1-6 [doi]
- Financial Investment Recommendation and Decentralized Account ManagementHarsh Jain, Shreeyaa Agrawal, Harshita Khandelwal, Vinaya Sawant. 1-6 [doi]
- Intrusion classification using ECLAT and Fuzzy LogicAsif Ahamad P, Jeevaraj S. 1-7 [doi]
- Comparative Analysis of ENG, EFP and Drone camera and its Impact in Television ProductionSambhram Pattanayak, Vinod Kumar Shukla. 1-8 [doi]
- Modified Difference Squared Image Based Non Local Means FilterRayeesa Mehmood, Amandeep Kaur. 1-7 [doi]
- MR Image Enhancement using Stationary Wavelet Transform based ApproachPranaba K. Mishro, Sanjay Agrawal 0002, Rutuparna Panda, Ku. Tapaswini Hansdah. 1-6 [doi]
- Improved Attribute-Based Encryption Scheme in Fog Computing Environment for Healthcare SystemsBedatrayee Ghosh, Priyanka Parimi, Rashmi Ranjan Rout. 1-6 [doi]
- Alert Generation on Detection of Suspicious Activity Using Transfer LearningOm M. Rajpurkar, Siddesh S. Kamble, Jayram P. Nandagiri, Anant V. Nimkar. 1-7 [doi]
- CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detectionElakkiya E, S. Selvakumar, R. Leela Velusamy. 1-7 [doi]
- A Smart Ambulatory Cognitive State Taxonomy System Through EEG Signal AnalysisSumanto Dutta, Sumit Hazra, Anup Nandy. 1-7 [doi]
- A systematic way of collecting data of insomniac patients: an analytical surveyMd. Muhaiminul Islam, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain. 1-7 [doi]
- A Non-contact Framework for Shortness of Breath Recognition and effects on Health Parameters during HCISatyajit Nayak, Surya Teja, Aurobinda Routray, Monalisa Sarma. 1-7 [doi]
- Review on Deep Fake: A looming Technological ThreatS. M. Abrar Kabir Chowdhury, Jahanara Islam Lubna. 1-7 [doi]
- Social Network Analysis for efficient delivery of Agricultural Extension ServicesKalyanee Devi, Rohit Tripathi 0001. 1-6 [doi]
- Robust Text Extraction in Images for Personal Event PlannerLavanya Bhaskar, R. Ranjith. 1-4 [doi]
- AdCoCoA- Adaptive Congestion Control Algorithm for CoAPSneha R. Deshmukh, Vijay T. Raisinghani. 1-7 [doi]
- Statistical Features based Optimized Technique for Copy Move Forgery DetectionS. B. G. Tilak Babu, Ch. Srinivasa Rao. 1-6 [doi]
- Ascertaining the Fluctuation of Rice Price in Bangladesh Using Machine Learning ApproachMd. Mehedi Hasan, Muslima Tuz Zahara, Md. Mahamudunnobi Sykot, Arafat Ullah Nur, Mohd. Saifuzzaman, Rubaiya Hafiz. 1-5 [doi]
- A New Resource Allocation Approach for Swipt Enabled DF Relay-Based NOMA NetworkV. Narasimha Nayak, Kiran Kumar Gurrala. 1-7 [doi]
- PRS Generic Data Store ServiceRanjini R, Sanjay Srivatsa, K. S. Geetha. 1-6 [doi]
- Passive Copy-Move Forgery Detection using Localized Intensity FeatureShilpa Dua, Dhruv P. Shahi, Jyotsna Singh, Harish Parthasarathy. 1-7 [doi]
- Deep Learning for Sentiment Analysis Based on Customer ReviewsB. Seetharamulu, B. Naresh Kumar Reddy, K. Bramha Naidu. 1-5 [doi]
- Customer Analytics using Surveillance VideoEarnest Paul Ijjina, Aniruddha Srinivas Joshi, Goutham Kanahasabai, Keerthi Priyanka P. 1-7 [doi]
- Impact of Emotional Stability on Work Performance of Employees Working in Steel Fabrication CompaniesNourin Sathar, C. A. Nisha Bhandari, C. A. Mukund Jakhiya. 1-8 [doi]
- Integration of Fuzzy C-Means and Artificial Neural Network with Principle Component Analysis for Heart Disease PredictionRomana Rahman Ema, Pintu Chandra Shill. 1-6 [doi]
- Prediction of Age from Speech Features Using a Multi-Layer Perceptron ModelSriram Ravishankar, Prasanna Kumar M. K, Vinay Vasanth Patage, Sourabh Tiwari, Saksham Goyal. 1-6 [doi]
- Image Quality Assessment using Selective Contourlet CoefficientsAgnel Lazar Alappat, Vipin Kamble. 1-7 [doi]
- Airline tweets sentimental analysis using Adaptive rider optimization based support vector neural networkS. Sathish Kumar, Aruchamy Rajini. 1-10 [doi]
- Diabetes Mellitus Prediction using Different Ensemble Machine Learning ApproachesMd. Tanvir Islam, M. Raihan, Nasrin Aktar, Md. Shahabub Alam, Romana Rahman Ema, Tajul Islam. 1-7 [doi]
- Detection and Prevention Mechanisms for DDoS Attack in Cloud Computing EnvironmentSirisha Potluri, Monika Mangla, Suneeta Satpathy, Sachi Nandan Mohanty. 1-6 [doi]
- Analysis of the Effects of Different types of Noises and Wavelets used in Denoising of an Image using Wavelet TransformTanay Mehendale, Vishal Ramina, Soham Pinge, Sujata Kulkarni. 1-5 [doi]
- T3D-Y Codec: A Video Compression Framework using Temporal 3-D CNN Encoder and Y-Style CNN DecoderAbhishek Kumar Sinha, Deepak Mishra. 1-7 [doi]
- Segementation and Prediction from CT Images for Detecting Lung CancerChethan K. S, Vishwanath S, Rakshith V. Patil, Vijetha K. A. 1-6 [doi]
- Feature Selection from Microarray Data based on Deep Learning ApproachNabendu Bhui, Pintu Kumar Ram, Pratyay Kuila. 1-5 [doi]
- Classification of Brain MRI Images Using Convolution Neural Network and Transfer LearningN. Ambily, K. Suresh. 1-6 [doi]
- Smart Home Gardening Management System: A Cloud-Based Internet-of-Things (IoT) Application in VANETSachin Sharma, Abhinav Sharma, Tanya Goel, Rohan Deoli, Seshadri Mohan. 1-5 [doi]
- Designing of Cost-Effective Human Assistive Robot and Performance EnhancementMd. Fahad Hasan, Imteaz Rahaman, Md. Shaoran Sayem, Md. Mahbub Hasan, Borhanul Kabir Tamal, Md. Anisur Rahman Rubel. 1-5 [doi]
- Circularly Polarized Dipole Antenna with Pattern Reconfiguration for Wireless CommunicationsHemanth Madasu, Mohitha Kondapalli, Sulakshana Chilukuri, Y. Pandu Rangaiah. 1-5 [doi]
- Graph Based Keyword Extraction for Similarity Identification among Born-Digital News ContentsSusmita Das, Samya Muhuri, Susanta Chakraborty, Samit Biswas. 1-7 [doi]
- Low Power 32-bit Synchronous and Reconfigurable ALU Design using Chain StructureDeepali, Indu Saini, Mamta Khosla. 1-7 [doi]
- A Comprehensive Study of Machine Learning Approach on Cytological Data for Early Breast Cancer DetectionFaria Rahman, Tasnime Mehejabin, Soniya Yeasmin, Manika Sarkar. 1-6 [doi]
- How Can Machine Learning Impact on Wireless Network and IoT? - A SurveySwarnalina Laha, Nilanjan Chowdhury, Raja Karmakar. 1-7 [doi]
- Distance Estimation of Preceding Vehicle Based on Mono Vision Camera and Artificial Neural NetworksKarthika K, Adarsh S, K. I Ramachandran. 1-5 [doi]
- An Efficient Sorting Algorithm for binary dataBhavani Yerram, Jaya Krishna Bhonagiri. 1-4 [doi]
- Design of a High-Performance 2-bit Magnitude Comparator Using Hybrid Logic StyleAfran Sorwar, Elias Ahammad Sojib, Md. Ashik Zafar Dipto, Md. Mostak Tahmid Rangon, Md. Sabbir Alam Chowdhury, Abdul Hasib Siddique. 1-5 [doi]
- Noise Power Estimation for OFDM SystemBandi Narasimha Rao, M. V. Raghunadh, Reddy Sudheer. 1-6 [doi]
- Video Game DRM: Analysis and Paradigm SolutionJ. Karthik, P. P. Amritha, M. Sethumadhavan 0001. 1-4 [doi]
- Age Range Estimation Using MTCNN and VGG-Face ModelDipesh Gyawali, Prashanga Pokharel, Ashutosh Chauhan, Subodh Chandra Shakya. 1-6 [doi]
- Elastic Provisioning of Hadoop Clusters on OpenStack Private CloudNamrata Hosamani, Nageshwar Albur, Prajna Yaji, Mohammed Moin Mulla, Narayan D. G.. 1-7 [doi]
- WiFi based Indoor Positioning System using Machine Learning and Multi-Node Triangulation AlgorithmsSumit Jahagirdar, Aditya Ghatak, Abhiram Ajith Kumar. 1-6 [doi]
- Toward an Enhanced Bengali Text Classification Using Saint and Common FormNushrat Jahan Ria, Sharun Akter Khushbu, Mohammad Abu Yousuf, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain. 1-5 [doi]
- A Neuro Fuzzy System Based Inflation Prediction of Agricultural CommoditiesAbhishek Dutta, Abhisek Nayak, Aditya, Rama Ranjan Panda, Naresh Kumar Nagwani. 1-6 [doi]
- Time Series Forecasting using a Polynomial Controlled S-transformAnkush Gandhi, Satyasai Jagannath Nanda. 1-7 [doi]
- Control Console of Sewage Treatment Plant with Sensors as Application of IOTS. Ullas, Shreyansh Upadhyay, Vineeth Chandran, Pradeep S, T. M. Mohankumar. 1-7 [doi]
- Covert speech communication through audio steganography using DWT and SVDPraveen Kumar Kasetty, Aniruddha Kanhe. 1-5 [doi]
- A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor NetworksTejaskumar K, Ishaan R. Dharamdas, B. R. Chandavarkar. 1-6 [doi]
- Comparative Sentiment Analysis of App ReviewsSakshi Ranjan, Subhankar Mishra. 1-7 [doi]
- Unmanned Ground Vehicle for SurveillanceMaheswaran S, Murugesan G, Prakash Duraisamy, Vivek B, Selvapriya S, Vinith S, Vasantharajan V. 1-5 [doi]
- Effect on Reconstruction of Images by Applying Fractal Based Lossy Compression Followed by Symmetrical Encryption TechniquesNeetu Gupta, Ritu Vijay. 1-7 [doi]
- Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical AttributesS. Priya, S. Selvakumar, R. Leela Velusamy. 1-6 [doi]
- Unit Testing for USB Module Using Google Test FrameworkLavanya Bhaskar, Rahul B. Natak, R. Ranjith. 1-3 [doi]
- Classical Equivalent Quantum Based Efficient Data Preprocessing AlgorithmBarkha Soni, Nilay Khare, Kapil Kumar Soni, Akhtar Rasool. 1-7 [doi]
- Micro Loans for FarmersRushabh Khara, Deepika Pomendkar, Rishika Gupta, Ishwarlal Hingorani, Dhananjay Kalbande. 1-5 [doi]
- Investigation of Reduced Size Annular Ring Patch Antenna with EBG Structure for Wireless ApplicationsPallab Kumar Sarkar, Imteaz Rahaman, Mim Naz Rahman, Md. Fahad Hasan. 1-4 [doi]
- Heuristics for the Power Edge Set ProblemAnjeneya Swami Kare, Sreshta Valluru. 1-7 [doi]
- Majority Voting based Hybrid Ensemble Classification Approach for Predicting Parking Availability in Smart City based on IoTA. Sampathkumar, R. Maheswar, Pon Harshavardhanan, S. Murugan, P. Jayarajan, V. Sivasankaran. 1-8 [doi]
- Lane Departure Warning System using TDA3x_rvp BoardSuhas N. Bhargav, V. Akshatha Prasad. 1-6 [doi]
- Ammonia Gas Sensor using $In_{(1-x)}Ga_{(x)} As$ as Nanowire MaterialKhalid Amin, Shammy Kumar, Kartikey Solanki. 1-6 [doi]
- Coverage Aware Dynamic Scheduling Strategies for Wireless Video Sensor Nodes to Reduce Energy ConsumptionKishalay Bairagi, Sulata Mitra, Uma Bhattacharya. 1-7 [doi]
- Code-based Analysis Approach to Detect and Prevent SQL Injection AttacksAngshuman Jana, Dipendu Maity. 1-6 [doi]
- Methodologies and Techniques for Heart Disease Classification and PredictionPriyanka S. Sangle, R. M. Goudar, A. N. Bhute. 1-6 [doi]
- Activity Recognition and Fall Detection in Elderly PeopleRiya Dichwalkar, Shreya Oak, Tania Rajabally, Dhananjay Kalbande. 1-6 [doi]
- Agile Methodology for Project/Process Management IT System InfrastructureBekir Sarlak. 1-7 [doi]
- Modular Integrated Automated Substation SystemAntony Albert Anto, Robince P. O, Gautham Krishna, Jacob Joseanto, Christeen PG. 1-4 [doi]
- Comparative analysis of 16-tap FIR filter design using different addersUsha Maddipati, Shaik Ahemedali, Maddipati Sri Sai Ramya, M. D. Praneeth Reddy, K. N. J. Priya. 1-4 [doi]
- Avoidance of Replay attack in CAN protocol using Authenticated EncryptionSelvamani Chandrasekaran, K. I. Ramachandran, S. Adarsh, Ashish Kumar Puranik. 1-6 [doi]
- S2-GI: Intelligent Selection of Guard Interval in High Throughput WLANsRaja Karmakar, Soumalya De, Arindam Ghosh, Tinku Adhikari, Punit Jain. 1-7 [doi]
- A Comprehensive Analysis on Undergraduate Student Academic Performance using Feature Selection Techniques on Classification AlgorithmsMd. Rakib Ahmed, Sheikh Tariqul Islam Tahid, Nazneen Akter Mitu, Pipasha Kundu, Soniya Yeasmin. 1-6 [doi]
- 6G Wireless Communication: Its Vision, Viability, Application, Requirement, Technologies, Encounters and ResearchSatya Prakash Rout. 1-8 [doi]
- A study on Cloud enabled Applications and their Security IssuesVidhi Mody, Vrushti Mody, Soham Parekh. 1-8 [doi]
- Efficient design of $8\times 8\times 8$ LED Cube with Low Power consumption using Arduino UNON. Sri Sai, B. Naga Subrahmanyam, K. Yeshwanth Sai, A. Vara Durga Siva Sai, K. Pavan Kumar, S. Sai Harsha, U. Adi Lakshmi Satya Sri. 1-6 [doi]
- Automated versus Manual Approach of Web Application Penetration TestingNavneet Singh, Vishtasp Meherhomji, B. R. Chandavarkar. 1-6 [doi]
- Security Visualization and Active Querying for OT NetworkSankalp More, Imran Jamadar, Faruk Kazi. 1-6 [doi]
- Tracking Targets using Digital BeamformingAbhishek Singh J, Paramananda Jena, Veena Devi S. V. 1-5 [doi]
- VNE-NR: A Node-Ranking Method for Performing Topology-Aware and Resource-Driven Virtual Network EmbeddingAqsa Hashmi, C. P. Gupta. 1-6 [doi]
- Artificial Neural Network based Indian Sign Language Recognition using hand crafted featuresPurva Chaitanya Badhe, Vaishali Kulkarni. 1-6 [doi]
- Harmonic Analysis for Power Loss Minimization in Radial Distribution SystemM. Ravichandra Babu, Pulakesh Roy, Rajib Banerjee. 1-5 [doi]
- Identifying the Writing Style of Bangla Language Using Natural Language ProcessingSyeda Farjana Shetu, Mohd. Saifuzzaman, Masuma Parvin, Nazmun Nessa Moon, Ridwanullah Yousuf, Sharmin Sultana. 1-6 [doi]
- Assessing AI Readiness Across Organizations: The Case of UAEAnas Najdawi. 1-5 [doi]
- Implementation of Human Face and Spoofing Detection Using Deep Learning on Embedded HardwareSaankhya Mondal. 1-7 [doi]
- Cross-Platform Performance Prediction with Transfer Learning using Machine LearningRajat Kumar, Amit Mankodi, Amit Bhatt, Bhaskar Chaudhury, Aditya Amrutiya. 1-7 [doi]
- Machine Learning based Malware Detection in Cloud Environment using Clustering ApproachRahul Kumar, Kamalakanta Sethi, Nishant Prajapati, Rashmi Ranjan Rout, Padmalochan Bera. 1-7 [doi]
- Person Following Mobile Robot using Pedestrian Dead-Reckoning with Inertial data of SmartphonesAnirban Dam, Ashish Verma, Charan Tej Pangi, Raja Raviteja, Chandra Shekhar Prasad. 1-4 [doi]
- An Autonomous Food Wastage Control Warehouse: Distributed Ledger and Machine Learning based ApproachNikish Kumar S. V, Saiharsha Balasubramaniam, Sanjay Tharagesh R. S, Priyanka Kumar, Janavi B. 1-6 [doi]
- A Block-wise Histogram Shifting based Reversible Data Hiding Scheme with Overflow HandlingKandala Sree Rama Murthy, V. M. Manikandan. 1-6 [doi]
- Evaluation of Sub-Ghz Frequencies for IoT ApplicationsG. K. Nithya, Sethuraman N. Rao. 1-7 [doi]
- Non invasive assessment of Tissue oxygen using spectroscopyPriyanka Ashok Shedbale, R. P. Mudhalwadkar, Saheli Mandavkar. 1-5 [doi]
- An automatic siren detection algorithm using Fourier Decomposition Method and MFCCBinish Fatimah, Preethi A, Hrushikesh V, Akhilesh Singh B, Harshanikethan R. Kotion. 1-6 [doi]
- A Robust Deep Learning Segmentation and Identification Approach of Different Bangladeshi Plant Seeds Using CNNMumenunnessa Keya, Bhaskar Majumdar, Md. Sanzidul Islam. 1-6 [doi]
- Design and analysis of High speed wallace tree multiplier using parallel prefix adders for VLSI circuit designsYamini devi Ykuntam, Katta Pavani, Krishna Saladi. 1-6 [doi]
- Improved Analog Layout Productivity using Template-Driven Modgen Reuse MethodologySamiksha Maheshwari, Akshita Bansal, Shweta Meena. 1-5 [doi]
- Wideband CPW-fed U-Shaped Antenna array for WLAN and WiMAX applicationsBudhadeb Maity, Sisir Kumar Nayak. 1-4 [doi]
- Artificial Intelligence: Simulations in Audit EducationGanga Bhavani. 1-5 [doi]
- Comparative Analysis between Direct Torque Control and v/f Control for Electric VehiclesSanketh Saha, Nishanth M, Praveen T, Rajalekshmi N, Prabu T. 1-6 [doi]
- Experimental Demonstration of Free Space Quantum Key Distribution System based on the BB84 ProtocolAdarsh Jain, Abhishek Khanna, Jay Bhatt, Parthkumar V. Sakhiya, R. K. Bahl. 1-5 [doi]
- A Novel Framework for Decentralized C2C E-commerce using Smart ContractPankaj Joshi, Anoj Kumar. 1-5 [doi]
- QORAl: Q Learning based Delivery Optimization for PharmaciesAbhishek Revadekar, Rahul Soni, Anant V. Nimkar. 1-7 [doi]
- Robotic Path Planning Using Recurrent Neural NetworksRamya S. Nair, Supriya P. 1-5 [doi]
- Distributed Artificial Neural Network Model for Neutron Flux Mapping in Nuclear ReactorsS. K. Bahuguna, S. Mukhopadhyay, A. P. Tiwari. 1-7 [doi]
- A Secure Hybrid Routing Protocol for Mobile Ad-Hoc Networks (MANETs)Anindya Kumar Biswas, Mou Dasgupta. 1-7 [doi]
- A Machine Learning Approach to Performance and Dropout prediction in Computer Science: Bangladesh PerspectiveSheikh Arif Ahmed, Md. Aref Billah, Shahidul Islam Khan. 1-6 [doi]
- A Multilingual Framework of CNN and Bi-LSTM for Emotion ClassificationAshima Yadav, Dinesh Kumar Vishwakarma. 1-6 [doi]
- Mitigating Man-in-the-Middle Attack in Digital SignatureSajal Jain, Shivam Sharma, Beerappa R. Chandavarkar. 1-5 [doi]
- A Smart Approach of LPG Monitoring and Detection System Using IoTNagib Mahfuz, Shawan Karmokar, Md. Ismail Hossain Rana. 1-4 [doi]
- Logical Unit Design using Reversible HSG1 Gate and Its Application in ALU DesignHarsh Pallav Govind Rao, Shiva Dwivedi. 1-6 [doi]
- Smart Energy Meter and Digital Billing System for BangladeshNagib Mahfuz, Mehen Nigar, Nawshin Ulfat. 1-4 [doi]
- Temporal Pooling in Inflated 3DCNN for Weakly-supervised Video Anomaly DetectionSnehashis Majhi, Ratnakar Dash, Pankaj Kumar Sa. 1-6 [doi]
- CNN-LSTM based Electricity Theft Detector in Advanced Metering InfrastructureRutuja Umesh Madhure, Radha Raman, Sandeep Kumar Singh. 1-6 [doi]
- Investigating the Significance of Dynamic Mode Decomposition for Fast and Accurate Parameter Estimation in Power GridsIsha Indhu S, Kavya S. Kumar, U. Vamsi Krishna, Neethu Mohan, V. Sowmya, K. P. Soman. 1-5 [doi]
- Detection of lung agents through rectangular hollow-core photonic crystal fiberEtu Podder, Abdullah Al-Mamun Bulbul, Md. Bellal Hossain, Md. Ekhlasur Rahaman, Himadri Shekhar Mondal, M. Raihan, Sajib Kabiraj, Md. Mahmudul Hasan, Ahmed Saif Muntaseer. 1-5 [doi]
- A Computer Vision Technique To Detect Scab on Malabar NightshadeMayen Uddin Mojumdar, Narayan Ranjan Chakraborty. 1-4 [doi]
- Benchmarking Distributed Stream Processing Frameworks for Real Time Classical Machine Learning ApplicationsMerlin Sundar, Sriram Kailasam, Timothy A. Gonsalves. 1-7 [doi]
- Peer Consonance in Blockchain based Healthcare Application using AI-based Consensus MechanismNishant Kumar, C. Parangjothi, Sankarshan Guru, M. Kiran. 1-7 [doi]
- Real-Time Vehicle Classification Using CNNNusrat Jahan, Saiful Islam, Md. Ferdouse Ahmed Foysal. 1-6 [doi]
- Big Data Analytics for Sustainable Cities: Pune Tree Census Data Exploratory AnalysisAboli Marathe, Kapil Mirchandani, Kushal Chordiya, Kevin Stephen. 1-7 [doi]
- A Proficient Model to Classify Bangladeshi Bank Notes for Automatic Vending Machine Using a Tıny Dataset with One-Shot Learning & Siamese NetworksMd. Ekram Hossain, Arni Islam, Md. Sanzidul Islam. 1-4 [doi]
- Remote User Authentication and Issues: A SurveyRicha Mehra, Aditi Meshram, B. R. Chandavarkar. 1-6 [doi]
- Virtual Memory Management using Memory Ballooning in OpenStack Cloud PlatformPranjali P. Deshmukh, S. Y. Amdani. 1-5 [doi]
- Mitigation Technique for Black hole Attack in Mobile Ad hoc NetworkSharma Hitesh Omprakash, Margam K. Suthar. 1-5 [doi]
- Human Behavior Analysis using Association Rule Mining TechniquesM. Raihan, Md. Tanvir Islam, Promila Ghosh, Md. Mehedi Hassan, Jarif Huda Angon, Sajib Kabiraj. 1-5 [doi]
- Prototype of Aquaculture using IoT TechnologiesKumar Sai Sankar Javvaji, Md. Abbas Hussain. 1-4 [doi]
- An Overview of Rumour Detection based on Social MediaCharu Varshney, S. C. Jain, Vikash Tripathi. 1-6 [doi]
- Development of Web-based Application for Mobile Robot using IOT PlatformRavi Kant Jain, Baskar Joyti Saikia, Nitant Pilmo Rai, Partha Pratim Ray. 1-6 [doi]
- Security Assessment in Foggy Era through Analytical Hierarchy ProcessJasleen Kaur, Alka Agrawal, Raees Ahmad Khan. 1-6 [doi]
- Design and Analysis of AMC based Metasurface Loaded Slot Antenna for Low Radar Cross SectionJayati Monga, Jayaditya Upadhya, Abhendra Pal Singh Gurjar, Akanksha, Ankit Sharma. 1-7 [doi]
- BUDS: Balancing Utility and Differential Privacy by ShufflingPoushali Sengupta, Sudipta Paul 0004, Subhankar Mishra. 1-7 [doi]
- Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data SecurityV. Swathi, M. P. Vani. 1-6 [doi]
- CCSDS Based Spacecraft Telemetry System with Programmable Bit Rate and Turbo Encoding for India's Inter-planetary ExplorationAnil Kumar, Prathibha Hebbar, Arvind Handoo, V. Ravichandran, S. Sudhakar, Puneet Kumar Pandey. 1-6 [doi]
- Distributed Ledger Technology for Securing IoTSoumyashree S. Panda, Bhabendu Kumar Mohanta, Meenu Rani Dey, Utkalika Satapathy, Debasish Jena. 1-6 [doi]
- Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor NetworksB. R. Chandavarkar, Akhilraj V. Gadagkar. 1-5 [doi]
- GreenVANET: Greening Vehicular Ad-hoc Network by Scheduling Up-link ChannelBhabendu Kumar Mohanta, Meenu Rani Dey, Utkalika Satapathy, Soumyashree S. Panda, Debasish Jena. 1-5 [doi]
- A Deep Learning Based Assistive System to Classify COVID-19 Face Mask for Human Safety with YOLOv3Md. Rafiuzzaman Bhuiyan, Sharun Akter Khushbu, Md. Sanzidul Islam. 1-5 [doi]
- COVID-19 Pandemic Prediction using Time Series Forecasting ModelsNaresh Kumar, Seba Susan. 1-7 [doi]
- Analysis Of Bangladeshi People's Emotion During Covid-19 In Social Media Using Deep LearningMd. Sabbir Alam Pran, Md. Rafiuzzaman Bhuiyan, Syed Akhter Hossain, Sheikh Abujar. 1-6 [doi]
- Sentiment Analysis of Restaurant Reviews using Combined CNN-LSTMNaimul Hossain, Md. Rafiuzzaman Bhuiyan, Zerin Nasrin Tumpa, Syed Akhter Hossain. 1-5 [doi]
- An Improved and Reliable Sequential Decoding of Convolution CodesB. R. Chandavarkar, Amal Byju, Edwin Thomas. 1-7 [doi]
- s-Domain Stability Analysis of Boost DC-DC ConverterAnushk Misra, Neeraj Iyer M, Varun Dev, Melisa Miranda. 1-5 [doi]
- Recursive Block Based Keypoint Matching For Copy Move Image Forgery DetectionShibu S. Narayanan, Gopakumar G. 1-6 [doi]
- HR4.0: An Analytics Framework to redefine Employee Engagement in the Fourth Industrial RevolutionBhawna Gaur. 1-6 [doi]
- Electric Vehicle Charging Communication Test-bed following CHAdeMODevika Anil, Sivraj P.. 1-7 [doi]
- Effect of Reduced Dimensionality on Deep learning for Human Activity RecognitionGirja Kumari, Jayeeta Chakraborty, Anup Nandy. 1-7 [doi]
- Image encryption using a new 2D bit reversed logistic mapMadhu Sharma, Vishal Bharti. 1-6 [doi]
- Design, Analysis and Simulation of a Solar Powered DC Motor using MOSFET H-bridge ConverterSangita Das, Md. Moontasir Rashid, Jannatul Firdous, Md. Niaz Morshedul Haque. 1-7 [doi]
- Virtual Farmer: Real Time Crop Prediction and Automatic Irrigation SystemDev V. Savla, Amogh N. Parab, Kaustubh Y. Kekre, Jay P. Gala, S. Ramchandra, Pankaj A. Sonawane. 1-5 [doi]
- Design of a Two-Bit Magnitude Comparator Based on Pass Transistor, Transmission Gate and Conventional Static CMOS LogicSamiha Lubaba, K. M. Faisal, Moumita Sadia Islam, Mehedi Hasan. 1-5 [doi]
- Use Cases of Authentication Protocols in the Context of Digital Payment SystemGopikishan Thawre, Nitin Bahekar, B. R. Chandavarkar. 1-6 [doi]
- Comparative Analysis of Multi-Step Time-Series Forecasting for Network Load DatasetDebashis Sahoo, Naveksha Sood, Usha Rani, George Abraham, Varun Dutt, Dileep D.. 1-7 [doi]
- Miniaturization of a Conventional WLAN 2.45GHz Patch Antenna using Slot Insertion TechniqueJai Mangal, Gaurav Varshney, N. Anveshkumar. 1-7 [doi]
- Power Efficient Smart Home with Voice AssistantRahul Kumar, Garima Sarupria, Varshil Panwala, Smit Shah 0005, Nehal Shah. 1-5 [doi]
- nd stageRajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy. 1-5 [doi]
- Design Analysis of an Ultra-Wideband Antenna for RF Energy Harvesting in 1.71-12GHzG. Srinivasu, T. Gayatri, Manoj Kumar Meshram, V. K. Sharma. 1-6 [doi]
- IR-FF-GSO: Image Retrieval using Feature Fusion and Glowworm Swarm OptimizationVenkataravana Nayak K, Sharathkumar S. K, Arunalatha J. S, Venugopal K. R. 1-6 [doi]
- nd-Order Fully Differential Passive Sigma Delta Modulator for Low Power ADCK. Sarangam, N. Bheema Rao. 1-5 [doi]
- Neural Network Based Bengali News Headline Multi Classification System: Selection of Features describes Comparative PerformanceSharun Akter Khushbu, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain. 1-6 [doi]
- Techniques To Secure Address Resolution ProtocolSreenivas Selvarajan, Mahesh Mohan, B. R. Chandavarkar. 1-7 [doi]
- Analysis and Design of a Planar UWB Antenna for Spectrum Sensing in 3.1-10.6GHzT. Gayatri, G. Srinivasu, Manoj Kumar Meshram, V. K. Sharma. 1-6 [doi]
- Extracted Summary Based Recommendation System for Indian Legal DocumentsAashka Trivedi, Anya Trivedi, Sourabh Varshney, Vidhey Joshipura, Rupa Mehta, Jenish Dhanani. 1-6 [doi]
- Performance Analysis of Various LoRaWAN Frequencies For Optimal Data Transmission Of Water Quality Parameter MeasurementUtkarsh Alset, Atul Kulkarni, Hrishikesh Mehta. 1-6 [doi]
- Application of IoT and Machine Learning for Real-time Driver Monitoring and Assisting DevicePranay Sharma, Naveksha Sood. 1-7 [doi]
- Deep Approaches on Malicious URL ClassificationArijit Das, Ankita Das, Anisha Datta, Shukrity Si, Subhas Barman. 1-6 [doi]
- An Experimental Evaluation of SHA-512 for Different Modes of OperationHimanshu N. Bhonge, Monish K. Ambat, B. R. Chandavarkar. 1-6 [doi]
- Brain Magnetic Resonance Image Tumor Detection and Segmentation Using Edgeless Active ContourSa Bijay Kumar, Rutuparna Panda, Sanjay Agrawal 0002. 1-7 [doi]
- Performance Analysis of Voice over WLAN Intercom System and Optimized Implementation for Android UsersRiya Salian. 1-7 [doi]
- Digitally Reconstructed Radiograph Generation for Enabling AI/ML in Medical ImagingAnand P. Bora, Amit D. Joshi, Suraj T. Sawant. 1-6 [doi]
- Road Boundary Detection using 3D-to-2D Transformation of LIDAR Data and Conditional Generative Adversarial NetworksLeela Aishwarya T, Manoj Panda. 1-6 [doi]
- Open RnSIR model for Information Spread in Social NetworksSumith N.. 1-5 [doi]
- Area-Efficient D-Flip Flop and XOR in QCARaja Sekar Kumaresan, Marshal Raj, Gopalakrishnan Lakshminarayanan. 1-5 [doi]
- Multi-Attack Detection using Forensics and Neural Network based Prevention for Secure MANETsGurveen Vaseer. 1-6 [doi]
- AI for Accessibility: Virtual Assistant for Hearing ImpairedSaket Ozarkar, Raj Chetwani, Sugam Devare, Sumeet Haryani, Nupur Giri. 1-7 [doi]
- Deep Learning Based Approach for Multiple Myeloma DetectionM. T. Vyshnav, V. Sowmya, E. A. Gopalakrishnan, V. V. Sajith Variyar, Vijay Krishna Menon, K. P. Soman. 1-7 [doi]
- Corporate Social Responsibility as a tool for healthtech startups: Modelling enablers of healthcare and social support system to fight Coronavirus PandemicKuldeep Singh, Madhvendra Misra. 1-6 [doi]
- Optimal Bipolar Lead Placement in Electrooculography (EOG): A Comparative Study with an Emphasis on Prolonged BlinksRaj Anchan, Ashwin Pillay, Aditya Kale, Aniket Bhadricha, Sangeetha Prasanna Ram. 1-7 [doi]
- Parmanent Magnet Synchronous Motor Control Based on Model Reference Adaptive ApproachJitendra Kumar Mahawar, Anil Kumar Dahiya. 1-5 [doi]
- A Study on Dark Channel Prior based Image Enhancement TechniquesAnil Singh Parihar, Gokul Gupta. 1-7 [doi]
- A framework to establish a Rule-based specialized dropout prevention schemeSheikh Arif Ahmed, Md Aref Billah, Abdullah Al Noman, Ali Haider Doha, Shahidul Islam Khan. 1-6 [doi]
- Design of Intelligent IP Address Management System for Communication NetworksN. Sahana, Usha Rani K. R. 1-6 [doi]
- Retinal Lesions Detection for Screening of Diabetic RetinopathyAleena S. L, Prajith C. A. 1-6 [doi]
- An Efficient Authentication Scheme for Secure Communication between Industrial IoT DevicesBarnana Baruah, Subhasish Dhal. 1-7 [doi]
- AUASF: An Anonymous Users Authentication Scheme for Fog-IoT EnvironmentMd Whaiduzzaman, Khondokar Oliullah, Md. Julkar Nayeen Mahi, Alistair Barros. 1-7 [doi]
- Leveraging Computer Vision for Emergency Vehicle Detection-Implementation and AnalysisS. Kaushik, Abhishek Raman, K. V. S. Rajeswara Rao. 1-6 [doi]
- Language Detection using Convolutional Neural NetworkA. K. M. Shahariar Azad Rabby, Md. Majedul Islam, Nazmul Hasan, Jebun Nahar, Fuad Rahman. 1-5 [doi]
- A Framework to Figure Out Breast Cancer Cells Using Ultrasound ImagesBabe Sultana, Farzana Rahman, Hasib Ahmed Nesar, T. M. Shahriar Sazzad. 1-6 [doi]
- RBS: A New Comparative and Better Solution of Sorting Algorithm for ArrayMd. Hasan Imam Bijoy, Md Rakibul Hasan, Masud Rabbani. 1-5 [doi]
- Enhancement of Unsupervised Object Detection using Supervised MethodDebadri Basak, Dhruv Ramani, Ghanshyam Singh. 1-9 [doi]
- Design of An Intelligent Wheelchair for Handicap People Conducting by Body MovementMubdi-Ul Alam Sajid, Md Firoz Mahmud, Imteaz Rahaman, Saquib Shahriar, Mim Naz Rahman. 1-5 [doi]
- Emergence of Edge Computing: An Advancement over Cloud and FogAnuran Mitra, Soumita Biswas, Tinku Adhikari, Arindam Ghosh, Soumalya De, Raja Karmakar. 1-7 [doi]
- Analysis of Adversarial based Augmentation for Diabetic Retinopathy Disease GradingRamji Balasubramanian, V. Sowmya, E. A. Gopalakrishnan, Vijay Krishna Menon, V. V. Sajith Variyar, K. P. Soman. 1-5 [doi]
- Liquid Benzene Analyte Based Dual Core Surface Plasmon Resonance Sensor for Chemical SensingMd. Faiyaz Bin Hassan, Sanjida Sultana, M. Ifaz Ahmad Isti, Samiha Nuzhat, Shovasis Kumar Biswas, Hriteshwar Talukder. 1-6 [doi]
- Behavioural Analysis of Multi-Source Social Network Data Using Object-Centric Behavioural Constraints and Data Mining TechniquePriyam Das, Dhananjay R. Kalbande. 1-8 [doi]
- Plant Identification Using Leaf SpecimenGurdit Singh, Nitin Aggarwal, Kanika Gupta, Devendra Kumar Misra. 1-7 [doi]
- Comparative Study on Abstractive Text SummarizationMd. Ashraful Islam Talukder, Sheikh Abujar, Abu Kaisar Mohammad Masum, Sharmin Akter, Syed Akhter Hossain. 1-4 [doi]
- Are Coordinator Election Algorithms in Distributed Systems Vulnerable?Shital S. Supase, Rajesh B. Ingle. 1-5 [doi]
- A Robust Feature Based Approach for Bare-Hand Detection under Practical Non-Ideal ConditionsSonghita Misra, K. V. Paluri, Rabul Hussain Laskar. 1-8 [doi]
- HMM Based on Baum-Welch Algorithm for Predicting Critical Data Packets in IoT NetworkA. V. Anandhalekshmi, V. Srinivasa Rao, G. R. Kanagachidambaresan. 1-6 [doi]
- Optimum Waveguide and Pulse Shaping filter for GFDM SystemArchana Kumari, Neetu Sood. 1-7 [doi]
- Evaluation of Proof-of-Work Consensus Algorithm for Blockchain NetworksChandranshu Gupta, Asmita Mahajan. 1-7 [doi]
- Implementation and Performance Analysis of NB-IoT in LTESachin Kumar M. R, Shushrutha K. S. 1-4 [doi]
- Predicting Language Endangerment: A Machine Learning ApproachPankaj Dwivedi, C. Shraddha, Shreyas Mathews, Sudipta Majumder, R. Madhumathi, M. R. Vasundhara. 1-7 [doi]
- Smart Check-in Check-out System for Vehicles using Automatic Number Plate RecognitionSangay Tenzin, Pema Dorji, Bevek Subba, Thinley Tobgay. 1-6 [doi]
- Electromigration and Power Analysis of Digital Circuits at 10 nm Technology Node Before SignoffAkanksha Jat, Shweta Panwalkar, Shweta Meena. 1-5 [doi]
- Ranking of Countries Using World Development Indicators: A Computational ApproachArushi Gupta, Kapil Sharma. 1-4 [doi]
- Underwater Image Enhancement by Multiscale Fusion Technique and DehazingSujitha A. C, Prajith C. A. 1-6 [doi]
- Optimization of Memory Oriented Network-on-Chip for FPGARohini Shelke, Ranjit Sadakale. 1-6 [doi]
- Improving Skew Detection and Correction in Different Document Images Using a Deep Learning ApproachShaheera Saba Mohd Naseem Akhter, Priti P. Rege. 1-6 [doi]
- IoT based perceptive monitoring and controlling an automated irrigation systemHarshit Meena, Himanshu Nandanwar, Dushyant Pahl, Anamika Chauhan. 1-6 [doi]
- Best Fit Polygonal Approximation for Multiple ROI EstimationNiveditha Oruganti, Tripty Singh. 1-6 [doi]
- Estimation of Tree Volume Using Mask R-CNN based Deep LearningPiyush Juyal, Sachin Sharma. 1-6 [doi]
- Performance Improvement for OADM based DP-QPSK WDM Optical Networks with 37.5 GHz Channel SpacingNeeraj Sharma, Sunil Agrawal, Vinod Kapoor. 1-5 [doi]
- Performance Evaluation of 6T, 7T, 8T, and 9T SRAM cell Topologies at 90 nm Technology NodeDeepak Mittal, V. K. Tomar. 1-4 [doi]
- Event-Driven Data Pipeline for Network Management SystemsGanesan Ponnuswami, Sriram Kailasam, Dileep Aroor Dinesh. 1-6 [doi]
- Gain and Bandwidth Enhancement of 28 GHz Tapered Feed Antenna ArrayMohit Pant, Leeladhar Malviya, Vineeta Choudhary. 1-4 [doi]
- Sharpening of 3D Digital Objects using TriangulationSharmistha Mondal, Arindam Biswas 0002. 1-7 [doi]
- A Novel Highly Sensitive Photonic Crystal Fiber Sensor for Detecting PH Levels of Acetic Acid Aqueous Solution Based on Surface Plasmon ResonanceM. Hussayeen Khan Anik, Sakib Mahmud, M. Ifaz Ahmed Isti, Samiha Nuzhat, Shovasis Kumar Biswas, Hriteshwar Talukder. 1-5 [doi]
- An Experimental Evaluation on the Dependency between One-Way Hash Functions and SaltUrvesh Rathod, Meghna Sonkar, B. R. Chandavarkar. 1-7 [doi]
- Analysis of Microstructured Photonic Crystal Fiber: An Improved DesignJarina Akter, Md. Nur Uddin, Mohosinul Hasan, Bipash Kumar Biswas, Mohammad Mahmudul Alam Mia, Shovasis Kumar Biswas. 1-4 [doi]
- Fuzzy Interpretation of Word Polarity Scores for Unsupervised Sentiment AnalysisSrishti Vashishtha, Seba Susan. 1-6 [doi]
- Image Encryption Using Genetic Algorithm and Bit-Slice RotationNandini Av, Nilita Anil Kumar. 1-6 [doi]
- Identification of Most Relevant Breast Cancer miRNA using Machine Learning AlgorithmsTasnime Mehejabin, Faria Rahman, Soniya Yeasmin, Manika Sarkar. 1-6 [doi]
- Obstructive Sleep Apnea Detection Based on Sound Interval Frequency using Wearable DeviceSk. Al Mamun, Md. Mahadi Hassan, Md. Riadul Islam, M. Raihan. 1-4 [doi]
- Soil NPK and Moisture analysis using Wireless Sensor NetworksMadhumathi R, Arumuganathan T, Shruthi R. 1-6 [doi]
- Sensing Toxic Carbonyl Compounds in Cigarette Smoke by Photonic Crystal FiberMd. Ekhlasur Rahaman, Rayhan Habib Jibon, Md. Bellal Hossain, Himadri Shekhar Mondal, Abdullah Al-Mamun Bulbul, Avijit Saha, Md Mahmud Hassan. 1-5 [doi]
- Machine Learning Algorithms in Healthcare: A Literature SurveyMunira Ferdous, Jui Debnath, Narayan Ranjan Chakraborty. 1-6 [doi]
- A Fuzzy AHP Approach for Ranking Security Attributes in Fog-IoT EnvironmentRicha Verma, Shalini Chandra. 1-5 [doi]
- Secure Secret Sharing Using Homomorphic EncryptionNileshkumar Kakade, Utpalkumar Patel. 1-7 [doi]
- Simulation Based Performance Analysis of Proactive, Reactive and Hybrid Routing Protocols in Wireless Sensor NetworkRomana Rahman Ema, Abdullah Anik, Nurun Nahar, Md. Ashiqur Rahman, Khaleda Parven Eti, Tajul Islam. 1-6 [doi]
- A combination of FractalNet and CNN for Lung Nodule ClassificationAmrita Naik, Damodar Reddy Edla, Venkatanareshbabu Kuppili. 1-7 [doi]
- Optick - A Low Cost Wearable Head up Display for Search and Rescue OperationsAdhesh Shenoy, Mahathi Amencherla, Rahul Nagaraj, T. S. Chandar. 1-7 [doi]
- Numerical Study of Rectangular Air-Holes Based Highly Dispersion Compensating Octagonal Photonic Crystal Fiber: A Novel ApproachDelwar Hossain Himel, Md. Mostafa Faruk, Shovasis Kumar Biswas. 1-3 [doi]
- Detection of Customer Interested Garments in Surveillance Video using Computer VisionEarnest Paul Ijjina, Aniruddha Srinivas Joshi, Goutham Kanahasabai. 1-5 [doi]
- Integrating Machine Learning with Blockchain to Ensure Data PrivacySunil Samanta Singhar, Debasish Jena, Suraj Sharma. 1-6 [doi]
- Automatic Stress Detection Using Wearable Sensors and Machine Learning: A ReviewShruti Gedam, Sanchita Paul. 1-7 [doi]
- Statistical Proving of Enhanced Interaction and Augmentative Discourse for BYOD Supported ClassroomPooja Kumari, Suman Deb, Koustav De. 1-6 [doi]
- Analysis of ECG for biometric identificationBinish Fatimah, Priyanka G, Rehana Sultana, Rekha N. 1-5 [doi]
- Sentiment Analysis from Bengali Depression Dataset using Machine LearningMd. Rafidul Hasan Khan, Umme Sunzida Afroz, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain. 1-5 [doi]
- Prediction of Recurrence and Non-recurrence Events of Breast Cancer using Bagging AlgorithmSajib Kabiraj, Laboni Akter, M. Raihan, Nusrat Jahan Diba, Etu Podder, Md. Mehedi Hassan. 1-5 [doi]
- ExtraDet With Quad Feature Pyramid NetworksShivam Raj, Natasha Sebastian, Raj Bisht. 1-6 [doi]
- Machine Learning approach for the classification of EEG signals of multiple imagery tasksSmita Tiwari, Shivani Goel, Arpit Bhardwaj. 1-7 [doi]
- SANMAN-Management Software for Hyperscale SAN based storage systemUrvashi Karnani Gaur, D. D. Sonvane, Vaibhav Kumar, Rajesh Kalmady. 1-4 [doi]
- A novel fragmentation-aware and energy-efficient multipath routing and spectrum allocation for prioritized traffic in protected EONsSmita Paira, Joy Halder, Uma Bhattacharya, Monish Chatterjee. 1-6 [doi]
- A Quest to Detect Novelty Using Deep Neural NetsDipannyta Nandi, Rohini Basak. 1-7 [doi]
- Group Sparsity Assisted Synchrosqueezing Approach for Phonocardiogram Signal DenoisingNeethu Mohan, Sachin Kumar S, K. P. Soman. 1-5 [doi]
- Control or Autism - Classification using Convolutional Neural Networks on Functional MRISiddharth Shrivastava, Upasana Mishra, Nitisha Singh, Anjali Chandra, Shrish Verma. 1-6 [doi]
- Automatic detection of mental arithmetic task and its difficulty level using EEG signalsBinish Fatimah, Dipro Pramanick, Pranav Shivashankaran. 1-6 [doi]
- Multi UAV Based Traffic Control in Smart CitiesBehire Yesim Yilmaz, Sueda Nur Denizer. 1-7 [doi]
- Survey on Computational Entomology: Sensors based Approaches to Detect and Classify the Fruit FliesNithin Kumar, Nagarathna. 1-6 [doi]
- Malware Injection in Operational Technology NetworksMayuri Khadpe, Pranita Binnar, Faruk Kazi. 1-6 [doi]
- Vision-based Guidance and Navigation for Autonomous MAV in Indoor EnvironmentMahammad Irfan, Sagar Dalai, Kaushal Kishore, Samarth Singh, S. A. Akbar. 1-5 [doi]
- Emotion Detection of Twitter Post using Multinomial Naive BayesNazia Anjum Sharupa, Minhaz Rahman, Nasif Alvi, M. Raihan, Afsana Islam, Tanzil Raihan. 1-6 [doi]
- Intelligent Chatbot for Lab Security and AutomationV. Akshatha Prasad, R. Ranjith. 1-4 [doi]
- Development Of An Algorithm For a Target Platform-following Robot Using LoRa SignalsOjal Bhatnagar, Natasha Surendran, Md. Mahfooz Alam. 1-5 [doi]
- Context-Aware Computing for Balanced Agricultural Production using Machine LearningMd. Al-Hasan, Hasan Muhammad Kafi, Md. Arif Rizvee, Mohammad Hasan, Md. Mamunur Rashid. 1-6 [doi]
- MUDRAKSHARA - A Voice for Deaf/Dumb PeopleYeresime Suresh, J. Vaishnavi, M. Vindhya, Mohammed Sadiq Afreed Meeran, Supritha Vemala. 1-8 [doi]
- Detection of Glaucoma in Retinal Image using Image Processing and SVMVivek Raj K, Akshatha Patil, Roopashree N, Sanmati Gudaje, Kavya G. B. 1-6 [doi]
- Video Steganography using Curvelet Transform and Elliptic Curve CryptographySonali Rout, Ramesh Kumar Mohapatra. 1-7 [doi]
- EFUMS: Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud DataBhavya M, Pushpa C. N, Thriveni J, Venugopal K. R. 1-6 [doi]
- Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database ApplicationsAlekha Kumar Mishra, Arun Kumar. 1-5 [doi]
- A Machine Learning Approach for Predicting the Sunspot of Solar CycleThaharim Khan, Faisal Arafat, Mayen Uddin Mojumdar, Aditya Rajbongshi, Shah Md. Tanvir Siddiquee, Narayan Ranjan Chakraborty. 1-4 [doi]
- Toxic Chemicals Detection using Photonic Crystal Fiber in THz RegimeAbdullah Al-Mamun Bulbul, Rayhan Habib Jibon, Md. Abdul Awal, Etu Podder, Himadri Shekhar Mondal, Md. Salim Ahmed, Md. Bellal Hossain, Md. Mahmudul Hasan, Avijit Saha. 1-5 [doi]
- A Trust Computing Model for Future Generation NetworksProdipto Das, Somen Debnath. 1-4 [doi]
- Design of Intrusion Prevention System for OT Networks Using Deep Neural NetworksAkshay Rajapkar, Pranita Binnar, Faruk Kazi. 1-6 [doi]
- Preprocessing of Continuous Bengali Speech for Feature ExtractionMd. Mehedi Hasan, Hasmot Ali, Md. Fahad Hossain, Sheikh Abujar. 1-4 [doi]
- Suppression of SSN in High-Speed Circuits using 1-D EBG structureSayli Shinde, Manisha Bansode, Pramod P. Bhavarthe, Surendra S. Rathod. 1-4 [doi]
- Planar Yagi-Uda Antenna with Mirrored Ground Plane for WLANRavi K. Tanti, Saurabh Warathe, Nella Anveshkumar. 1-5 [doi]
- Legal Protection for Data Security: a Comparative Analysis of the Laws and Regulations of European Union, US, India and UAESagee Geetha Sethu. 1-5 [doi]
- Breast Cancer Detection and Classification using Global PoolingSagar Deep Deb, Mohammad Akhlaqur Rahman, Rajib Kumar Jha. 1-5 [doi]
- Real-Time Detection of Cyber Attacks on the IoT DevicesJalindar Karande, Sarang Joshi. 1-6 [doi]
- Design and Analysis of Incentive Mechanism for Ethereum-based Supply Chain Management SystemsPranesh S. A, Vignesh Kannan V, Viswanathan N, M. Vijayalakshmi. 1-6 [doi]
- Utilizing Exploratory Data Analysis for the Prediction of Campus Placement for Educational InstitutionsJumana Nagaria, Senthil Velan S. 1-7 [doi]
- AI Based Intrusion Detection System Using Self-Adaptive Energy Efficient BAT Algorithm for Software Defined IoT NetworksGeethu M. Suresh, Minu Lalitha Madhavu. 1-6 [doi]
- Detection of Deceit from Thermal Videos on Real Crime DatabaseSaswata Satpathi, Mohamed Ismail Yasar Arafath K, Aurobinda Routray, Partha Sarathi Satpathi. 1-6 [doi]
- Continuous Pulse Rate Monitoring from Facial Video Using rPPGKokila Bharti Jaiswal, T. Meenpal. 1-5 [doi]
- Image Segmentation Based Hybrid Watermarking Algorithm for Copyright ProtectionY. Bhavani, Sai Srikar Puppala, Spoorthy Shivani Pabba, Kavya Sri Kasarla, Kadipaka Anvitha. 1-6 [doi]
- Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization TechniqueRitesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi. 1-7 [doi]
- Experimental validation and control of Laboratory aerial system by IC741-IOPID and IC741-FOP $I^{\lambda}$ Controllers: An Analog approachSudarshan K. Valluru, Gaurav Kumar, Rajul Kumar, Ankit Lal Meena. 1-8 [doi]
- Chatbot: A Deep Neural Network Based Human to Machine Conversation ModelG. Krishna Vamsi, Akhtar Rasool, Gaurav Hajela. 1-7 [doi]
- Scale Invariant Fast PHT based Copy-Move Forgery DetectionAroof Aimen, Amandeep Kaur, Sahil Sidheekh. 1-7 [doi]
- CSTA-2P1D UNet: Consecutive Spatio-Temporal Attention for Multi-Scale 3D Pancreas SegmentationBharat Giddwani, Shruti Pandey, Hitesh Tekchandani, Shrish Verma. 1-7 [doi]
- Dual Core Surface Plasmon Resonance Based Photonic Crystal Fiber Sensor In IR-RangeSamiha Nuzhat, M. Ifaz Ahmad Isti, Hriteshwar Talukder, Shovasis Kumar Biswas. 1-4 [doi]
- Nuclei Segmentation and Detection using Deep Convolutional Neural NetworksRohan Pudipeddi, Parikshit Phukan, Aneesh Gunda. 1-5 [doi]
- Sahayantra - A Patient Assistance RobotB. S. Pranathi, Ananya Nair, C. S. Anushree, T. S. Chandar. 1-6 [doi]
- Decentranet - An Ethereum, Proxy Re-Encryption and IPFS Based Decentralized InternetKoushik Bhargav Muthe, Thiru Srinivasa Teja Vemuru, Khushboo Sharma, Nilofer Sultana Mohammad. 1-5 [doi]
- Pneumonia Detection: An Efficient Approach Using Deep LearningAyush Pant, Akshat Jain, Kiran C. Nayak, Daksh Gandhi, B. G. Prasad. 1-6 [doi]
- A Novel Feeder Protection System Using Fast Switching PhotoMOS RelayAkshay Kumar, Viranjay M. Srivastava. 1-4 [doi]
- Weather Forecasting for the North-Western region of Bangladesh: A Machine Learning ApproachMd. Arif Rizvee, Md. Ashfakur Rahman Arju, Md. Al-Hasan, Saifuddin Mohammad Tareque, Md. Zahid Hasan. 1-6 [doi]
- A survey on clustering in wireless sensor networkPankaj Kumar Mishra, Shashi Kant Verma. 1-5 [doi]
- A Survey on the Progression and Performance of Generative Adversarial NetworksBhaskar Ghosh, Indira Kalyan Dutta, Michael Totaro, Magdy A. Bayoumi. 1-8 [doi]
- Supervised Machine Learning Based Network Intrusion Detection System for Internet of ThingsDeepa Rani, Narottam Chand Kaushal. 1-7 [doi]
- A survey on 'Apache Storm performance optimization using tuning of parameters'Tanuja Pattanshetti, Subodh Kamble, Aditya Yalgude, Pranav Patil. 1-7 [doi]
- Driver Inattention Monitoring System Based on the Orientation of the Face Using Convolutional Neural NetworkManjula P. M, Adarsh S, K. I Ramachandran. 1-7 [doi]
- Road Accident Prediction and Feature Analysis By Using Deep LearningAradhana Behura, Ashutosh Behura. 1-7 [doi]
- Development of Quad Spacer Damper to suppress oscillation in 765 kV Transmission LineHarish Agarwal, Sushri Mukherjee, Sumana Chattaraj, Md. Irfan Khan, Dharmbir Prasad. 1-6 [doi]
- An Adaptive Image Steganographic Scheme Using Convolutional Neural Network and Dual-Tree Complex Wavelet TransformDheeraj Varma, Shikhar Mishra, Ankita Meenpal. 1-7 [doi]
- EduBlock: Securing Educational Documents using Blockchain TechnologyPavitra Haveri, Rashmi U. B, Narayan D. G., Nagaratna K., Shivaraj K.. 1-7 [doi]
- A Switching Capacitor Based Buck-Boost Converter and its AnalysisSuraj K, Melisa Miranda. 1-7 [doi]
- Deep Learning based approach to detect Customer Age, Gender and Expression in Surveillance VideoEarnest Paul Ijjina, Goutham Kanahasabai, Aniruddha Srinivas Joshi. 1-6 [doi]
- High resolution digital filter implementation and its data acquisition system augmentation with VECC DAQRam Kumar Paul, Ayan Banerjee, Partha Dhara, Pintu Maity. 1-5 [doi]
- Railway Emergency Detection and Response System using IoTShubhankar Lipare, Prasenjit Bhavathankar. 1-7 [doi]
- An Attention Based Approach for Sentiment Analysis of Food Review DatasetMd. Rafiuzzaman Bhuiyan, Mahmudul Hasan Mahedi, Naimul Hossain, Zerin Nasrin Tumpa, Syed Akhter Hossain. 1-6 [doi]
- A Machine Learning Approach to Identify the Correlation and Association among the Students' Drug Addict BehaviorMd. Mehedi Hassan, Zahrul Jannat Peya, Sadika Zaman, Jarif Huda Angon, Afrin Islam Keya, Asaf Ud Dulla. 1-5 [doi]
- QML Based Community Detection in the realm of Social Network AnalysisSana Akbar, Sri Khetwat Saritha. 1-7 [doi]
- Throughput Maximization in Wireless Powered Energy Harvesting Based Sensor NetworksAnupama Chennamadhava, Sudheesh Nagamalla, Mahesh Nirati, Y. Vijayalata, Dipen Bepari. 1-6 [doi]
- A Circularly Polarized Multiband Multimode SIW antenna: Multi-band and multi mode SIW AntennaPooja Garlapati, Hemalatha Chilaka, Manohar Rangu, Raju Chigula, Sulakshana Chilukuri. 1-5 [doi]
- Generation of Symmetric Key Using Randomness of Hash FunctionKamana Sai Charan, Harsha Vardhan Nakkina, B. R. Chandavarkar. 1-7 [doi]
- Analysis and Interpretation of Global Air QualitySachin Sharma, Rishabh Raj Mishra, Vikas Joshi, Kavleen Kour. 1-5 [doi]
- Hardcoded Credentials and Insecure Data Transfer in IoT: National and International StatusB. R. Chandavarkar. 1-7 [doi]
- A modified Miniaturized UWB Bi-Planar Yagi-Like MIMO Antenna SystemRinkesh Kumar Dubey, Rahul Yadav, Taimoor Alam, Nirbhay Kumar Singh, Ram Lal Yadava. 1-5 [doi]
- A Survey Report on Identifying Different Machine Learning Algorithms in Detecting Domain Generation Algorithms within Enterprise NetworkSameer Ajmera, T. R. Pattanshetti. 1-5 [doi]
- Sign Language to Speech TranslationAishwarya Sharma, Siba Panda, Saurav Verma. 1-8 [doi]
- A Comprehensive Study on Machine Learning Algorithms for Wireless Sensor Network SecurityFozilatoon Humaira, Md Sanju Islam, Fernaz Narin Nur, Kazi Anowar Hussain. 1-6 [doi]
- Routing protocol Analysis for Heterogeneous Nodes in a Dynamic and Sparse EnvironmentGopalakrishnan P, Sidhant Gupta, Rahul Krishnan, Dhruv Patel, Dhivvya J. P, Sruthy Anand, Dhanesh Raj. 1-7 [doi]
- Multiagent approach for resource management in Smart EnvironmentsAgostino Forestiero, Giuseppe Papuzzo, Rosaria de Simone, Francesco Forestiero, Francesca Giordano. 1-5 [doi]
- Histopathological Image and Lymphoma Image Classification using customized Deep Learning models and different optimization algorithmsAmbarish Ganguly, Rik Das, S. K. Setua. 1-7 [doi]
- Trust Management in Cyber Physical System using BlockchainBhabendu Kumar Mohanta, Utkalika Satapathy, Meenu Rani Dey, Soumyashree S. Panda, Debasish Jena. 1-5 [doi]
- IoT Based Street Lighting Using Dual Axis Solar Tracker and Effective Traffic Management System Using Deep Learning: Bangladesh ContextMohd. Saifuzzaman, Syeda Farjana Shetu, Nazmun Nessa Moon, Fernaz Narin Nur, Mohammad Hanif Ali. 1-5 [doi]
- IoT Based Cost Effective Home Automation and Security SystemKumar Sai Sankar Javvaji, Usha Rani Nelakuditi, Bhanu Prasad Dadi. 1-5 [doi]
- Secured Routing Paradigm for Intelligent Transportation SystemsHarish Krishnamoorthy, Basundhara Chakrabarty, S. Nandakumar. 1-7 [doi]
- A Comparative Study of Background Segmentation Approaches in Detection of Person with Gun under Adverse Weather ConditionsRajib Debnath, Anu Singha, Biswajit Saha, Mrinal Kanti Bhowmik. 1-7 [doi]
- Link Quality-based Routing Protocol for Underwater Acoustic Sensor NetworksPradeep Nazareth, B. R. Chandavarkar. 1-6 [doi]
- Breast Cancer Risk Prediction using XGBoost and Random Forest AlgorithmSajib Kabiraj, M. Raihan, Nasif Alvi, Marina Afrin, Laboni Akter, Shawmi Akhter Sohagi, Etu Podder. 1-4 [doi]
- Multi-trace Inversion with Selective Wedge to Increase Thin Layer Resolution in Horizontal LayerSupriyo Chakraborty, Aurobinda Routray. 1-5 [doi]
- Expansion of Regularized Kmeans Discretization Machine Learning Approach in Prognosis of Dementia ProgressionAfreen Khan, Swaleha Zubair. 1-6 [doi]
- Handwritten Polynomial Equation Recognition and Simplification Using Convolutional Neural NetworkShifat Nayme Shuvo, Fuad Hasan, Syed Akhter Hossain, Sheikh Abujar. 1-6 [doi]
- Gene Selection from High Dimensionality of Data Based on Quantum Inspired Genetic AlgorithmPintu Kumar Ram, Nabendu Bhui, Pratyay Kuila. 1-5 [doi]
- A comparative study of MVO and SSA optimized PID controller for LFC in EV integrated multi area networkGunjan Chorasiya, Sathans Suhag. 1-7 [doi]
- Computer Cursor Control Using Eye and Face GesturesAkshada Dongre, Rodney Pinto, Ameya Patkar, Minal Lopes. 1-6 [doi]
- Cross-Platform Remote Desktop Sharing with IP TunnelingSashank Sridhar, Sowmya Sanagavarapu, S. Chitrakala. 1-7 [doi]
- Optimal Design of Energy Efficient Survivable Routing & Spectrum Allocation in EONJoy Halder, Tamaghna Acharya, Monish Chatterjee, Uma Bhattacharya. 1-6 [doi]
- Implementation of Ship Motion Mobility Model in UnetStack for Underwater Sensor NetworksPrajval M, B. R. Chandavarkar. 1-6 [doi]
- Routing Protocol Based on Bacterial Foraging Optimization and Type-2 Fuzzy Logic for Wireless Sensor NetworksVeerendra Kumar Alla, Mallikarjuna M. 1-6 [doi]
- Life Automation: A Blessing of IoTAbdullah Al-Mamun Bulbul, Md. Bellal Hossain, Bappy Ray, Shaon Md. Foorkanul Islam, Etu Podder, Md. Aminul Kabir, Ahmed Saif Muntaseer, Md. Mahmudul Hasan. 1-7 [doi]
- An Efficient Approach to Accomplish Automatic Segmentation of Optic Cup Using Modified U-NetE. Sudheer Kumar, Chigarapalle Shoba Bindu. 1-5 [doi]
- An Approach for Bengali Automatic Question Answering System using Attention MechanismMd. Rafiuzzaman Bhuiyan, Abu Kaisar Mohammad Masum, Md. Abdullahil-Oaphy, Syed Akhter Hossain, Sheikh Abujar. 1-5 [doi]
- Internet of Things (IoT): Vulnerabilities, Security Concerns and Things to ConsiderEshtiak Ahmed, Ashraful Islam, Mohsena Ashraf, Atiqul Islam Chowdhury, Mohammad Masudur Rahman 0004. 1-6 [doi]
- A New State of Art Deep Learning Approach for Bangla Handwritten Digit Recognition using SVM ClassifierMd. Jahid Hasan, Md Ferdous Wahid, Md. Shahin Alom, Mohammad Mahmudul Alam Mia. 1-6 [doi]
- PHPIL: Fuzzing the PHP Interpreter with Custom BytecodeVignesh S. Rao, Tarunkant Gupta, Saastha Vasan, Deepthi L. R. 1-5 [doi]
- (Portable) Low-cost electroencephalogram (EEG) Recorder for Brain computer-interface (BCI)Mustafa Aljshamee, Ruaa Alsabah, Ayad Hameed Mousa, Ali Al-Sabbagh. 1-6 [doi]
- Analysis of Image Classification for Text Extraction from Bills and InvoicesYindumathi K. M, Shilpa Shashikant Chaudhari, Aparna R. 1-6 [doi]
- A Batman shaped Conformal Antenna for WiMAX ApplicationRatikanta Sahoo. 1-4 [doi]
- BanglaSenti: A Dataset of Bangla Words for Sentiment AnalysisHasmot Ali, Md. Fahad Hossain, Shaon Bhatta Shuvo, Ahmed Al Marouf. 1-4 [doi]
- Efficient Traffic Routing Method at Busy IntersectionsShubhro Shovan Roy, Samya Muhuri, Susanta Chakraborty. 1-7 [doi]
- Next Generation Network Coding Technique for IoTAkilandeswary G, J. Martin Leo Manickam. 1-6 [doi]
- A Review On The Techniques Of Brain Tumor: Segmentation, Feature Extraction And ClassificationG. Yogalakshmi, B. Sheela Rani. 1-6 [doi]
- Optimizing DG Parameters for Voltage Profile and Real Power Loss Improvement using Elephant Herd OptimizationShreya Mahajan, Yajvender Pal Verma. 1-6 [doi]
- Featureless approach for predicting Critical Temperature of SuperconductorsMadhava Gaikwad, Ashwini R. Doke. 1-5 [doi]
- Performance Improvement in Conventional 4-bit Static CMOS Carry Look-Ahead Adder by Modifying Carry-Generate and Propagate TermsMd. Ashik Zafar Dipto, Afran Sorwar, Elias Ahammad Sojib, Md. Mostak Tahmid Rangon. 1-5 [doi]
- Analysis of demagnetized BLDC Motor using MATLAB Simulink model and AWT analysisNeel Madhav, Ranjit Sadakale. 1-5 [doi]
- Design and Optimization of CNN for Lane DetectionAravind H, Sivraj P, K. I. Ramachandran. 1-6 [doi]
- Organizational Leadership: Igniting Creativity for Sustained Corporate SuccessVenkat Sankaran. 1-6 [doi]
- Fall Detection for Elderly People using Machine LearningSejal Badgujar, Anju S. Pillai. 1-4 [doi]
- Analysis of Post centric suicidal expressions and classification on the Social Media Post: TwitterC. Lalrinmawii, Vanlalhruaia, Somen Debnath. 1-5 [doi]
- Smart Crawler for Harvesting Deep web with Multi-ClassificationAjay Khare, Ashwini Dalvi, Faruk Kazi. 1-5 [doi]
- Improved Feature Generalization in Smaller Datasets with Early Feature Fusion of Handcrafted and Automated Features for Content Based Image ClassificationRik Das, Mohammad Arshad, P. K. Manjhi, Sudeep D. Thepade. 1-5 [doi]
- Movable Surveillance Camera using IoT and Raspberry PiBandi Narasimha Rao, Reddy Sudheer, Mohan Aditya Sadhanala, Veerababu Tibirisettti, Sairam Muggulla. 1-6 [doi]
- Performance Evaluation of Various Beamforming Techniques for Phased Array AntennasRohit H. R., Sachin B. S., Aditya P., Bhishm Tripathi, Premananda B. S.. 1-6 [doi]
- A Novel Joint Sum and Per Antenna Power Constraints Model based on a Comparative Approach of Optimal Transmission Strategies and Capacity of MIMO channelsDebojyoti Seth. 1-5 [doi]
- Prediction of chronic Insomnia using Machine Learning TechniquesMd. Muhaiminul Islam, Abu Kaisar Mohammad Masum, Sheikh Abujar, Syed Akhter Hossain. 1-7 [doi]
- A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS TechnologyRajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy. 1-4 [doi]
- Typical and Non-Typical Diabetes Disease Prediction using Random Forest AlgorithmMd. Tanvir Islam, M. Raihan, Fahmida Farzana, Nasrin Aktar, Promila Ghosh, Sajib Kabiraj. 1-6 [doi]
- A Comparative Study on Convolutional Neural Network Based Face RecognitionTanvir Ahmed, Prangon Das, Md. Firoj Ali, Md Firoz Mahmud. 1-5 [doi]
- Implementation of New Approach to Secure IoT Networks with Encryption and Decryption TechniquesAditya Sarin, Deveshi Thanawala, Saurav Verma, Chetana Prakash. 1-7 [doi]
- Job Shop Scheduling Problem and Solution Algorithms: A ReviewCeren Cebi, Enes Atac, Ozgur Koray Sahingoz. 1-7 [doi]
- Modified Hough Transformation for ROINiveditha Oruganti, Tripty Singh. 1-6 [doi]
- Implementation of composite DIMSE servicesVidyashree K. R, M. N. Dinesh. 1-7 [doi]
- An Interdependency between Symmetric Ciphers and Hash Functions: A SurveyPriyansh Kumar Dubey, Ajay Jangid, B. R. Chandavarkar. 1-5 [doi]
- Object Retrieval in an Indoor Environment Using Swarm IntelligenceManasa Sathyan, Manu Vimal, Akhil Siddharth, T. S. Chandar. 1-7 [doi]
- Centrality as a Friendship Selection Heuristic in Social Internet of ThingsNishu Malik, Sateesh Kumar Awasthi, Neetu Sood. 1-6 [doi]
- IOT Enabled Smart Drip Irrigation System Using Web/Android ApplicationsRavi Kant Jain, Bikash Gupta, Mustaq Ansari, Partha Pratim Ray. 1-6 [doi]
- Data Sequence Map Flooding in MPTCP Framework: Potential Challenges and Efficient CountermeasuresV. Anil Kumar, Debabrata Das. 1-7 [doi]
- Human Behaviour Impact to Use of Smartphones with the Python Implementation Using Naive BayesianIftakhar Mohammad Talha, Imrus Salehin, Susanta Chandra Debnath, Mohd. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur. 1-6 [doi]
- Undeniable Signature Scheme: A SurveyPrachi Kale, Pallabi Hazarika, B. R. Chandavarkar. 1-7 [doi]
- Semantic Segmentation of Spectral Images: a Comparative Study using FCN8s and U-NET on RIT-18 DatasetDarshik A. S, Aditya Dev, Bharath M, Bharath Ashok Nair, Gopakumar G. 1-6 [doi]
- Comparative Analysis on MultiplierNitesh Kumar Sharma, Deepesh Kumar Gautam, M. R. Khan. 1-5 [doi]
- A Comparative Analysis for Machine Learning based Software Defect Prediction SystemsMurat Cetiner, Ozgur Koray Sahingoz. 1-7 [doi]
- Real-Time Data Monitoring in Cold Supply Chain Through NB- IoTLeena Wanganoo, Vinod Kumar Shukla. 1-6 [doi]
- Risk Prediction Of Chronic Kidney Disease Using Machine Learning AlgorithmsShanila Yunus Yashfi, Md Ashikul Islam, Pritilata, Nazmus Sakib, Tanzila Islam, Mohammad Shahbaaz, Sadaf Salman Pantho. 1-5 [doi]
- Deep Neural Network Models for Detection of Arrhythmia based on Electrocardiogram ReportsSuyash Ghuge, Nishant Kumar, Tilak Shenoy, Sowmya Kamath S. 1-7 [doi]
- A Decision Support System of Selecting Groups (Science/ Business Studies/ Humanities) for Secondary School Students in BangladeshRifat Hasan, Md. Khairul Alam Ovy, Ifrat Zahan Nishi, Md. Azizul Hakim, Rubaiya Hafiz. 1-6 [doi]
- The Smart City: A Holistic ApproachUjjwal Singh, Anirudh Sharad. 1-7 [doi]
- "Algorithmic Comparative Classification Approach for Defect Detection of Pyrus MalusPooja Sainath Jadhav, Gargi S. Phadke. 1-6 [doi]
- A Survey on RealSense: in context of Research and ApplicationMasud Rabbani, Md. Jueal Mia, Thaharim Khan, Md Ishrak Islam Zarif. 1-6 [doi]
- State of art Research in Bengali Speech RecognitionS. M. Saiful Islam Badhon, Md. Habibur Rahaman, Farea Rehnuma Rupon, Sheikh Abujar. 1-6 [doi]
- In-Vehicle Occupancy Detection And Classification Using Machine LearningMalneedi Vamsi, K. P. Soman. 1-6 [doi]
- Imaging as a non-intrusive tool in quantifying the dynamics of liquid sheetsKizhakkelan Sudhakaran Siddharth. 1-6 [doi]
- Design & Implementation Of IoT Based Industrial Automation SysteTayeb Bin Lokman, Mohammad Touhidul Islam, Mouslah Uddin Apple. 1-6 [doi]
- Using Dtrace for Machine Learning Solutions in Malware DetectionAiswarya Mohan K. P, Saranya Chandran, Gilad Gressel, Arjun T. U, Vipin Pavithran. 1-7 [doi]
- Tracking Nostril Movement in Facial Video for Respiratory Rate EstimationArya Deo Mehta, Hemant Sharma. 1-6 [doi]
- Detection of Concrete Cracks Using Dual-channel Deep Convolutional NetworkBabloo Kumar, Sayantari Ghosh. 1-7 [doi]
- Standalone Portable Host for Unified Bootloader in PIC devices using CAN interfaceP. S. Priyanka, Manoraj Gnanadas, Supriya P. 1-4 [doi]
- A dynamic single-hop clustering algorithm (DSCA) in VANETAbhay Katiyar, Satyam Kumar Gupta, Dinesh Singh, Rama Shankar Yadav. 1-6 [doi]
- Automated Detection and Segmentation of Laser Marks in Retinal Fundus Images of Preterm InfantsK. L. Nisha, G. Sreelekha, P. S. Sathidevi 0001, Poornima Mohanachandran, Anand Vinekar. 1-7 [doi]
- Quantum based Support Vector Machine Identical to Classical ModelDisha Uke, Kapil Kumar Soni, Akhtar Rasool. 1-6 [doi]
- Channel Characteristics Comparison of Single-Relay and Two-Relay Two-Way PLC SystemsAngie A. G. Liong, Lenin Gopal, Filbert H. Juwono, Choo W. R. Chiong, Yue Rong. 1-6 [doi]
- Text Imbalance Handling and Classification for Cross- platform Cyber-crime Detection using Deep LearningMunipalle Sai Nikhila, Aman Bhalla, Pradeep Singh. 1-7 [doi]
- Similarity Analysis of Legal Documents using Content and Network Based ApproachSuyash Chavan, Janani Balasubramanian, Jai Puro, Meghana Naik, Anant V. Nimkar. 1-7 [doi]
- A Time Series Analysis of Trends With Twitter Hashtags Using LSTMMonjur Bin Shams, Md. Junaed Hossain, Sheak Rashid Haider Noori. 1-6 [doi]
- Employing Transfer-Learning based CNN architectures to Enhance the Generalizability of Deepfake DetectionShraddha Suratkar, Elvin Johnson, Karan Variyambat, Mihir Panchal, Faruk Kazi. 1-9 [doi]
- Highly Sensitive Photonic Crystal Fiber for Illegal Drugs Detection in THz RegimeAbdullah Al-Mamun Bulbul, Md. Abdul Awal, Md. Ekhlasur Rahaman, Farjana Imam, Etu Podder, Md. Salim Ahmed, Md. Bellal Hossain, Himadri Shekhar Mondal, Faysal Iqbal. 1-6 [doi]
- Numerical Studyof an Octagonal Photonic Crystal Fiber: An Improved DesignMohammad Mahmudul Alam Mia, Delowar Hossain Himel, Shovasis Kumar Biswas. 1-4 [doi]
- Hybrid-Flipped class room Approach for Fashion Design Students: Mitigating impacts to Learning Activities due to Emergence of COVID-19Richa Gupta. 1-6 [doi]
- Survey on Data Integrity and Verification for Cloud StorageSuchetha R. Pujar, Shilpa S. Chaudhari, Aparna R. 1-7 [doi]
- Content Based Unsupervised Video Summarization Using Birds Foraging SearchMd. Farhan Sadique, Md. Anisur Rahman, S. M. Rafizul Haque. 1-7 [doi]
- Low-Cost Vision System for Pick and Place application using camera and ABB Industrial RobotSaurabh Chakole, Neema Ukani. 1-6 [doi]