Abstract is missing.
- A Blind Signature Scheme Based on Bilinear PairingsMohan Chintamani, Laba Sa. 1-8 [doi]
- Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System"Yasuhiko Ikematsu, Shuhei Nakamura. 9-21 [doi]
- CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-CurrenciesSouvik Sur, Abhijit Das 0004, Dipanwita Roy Chowdhury. 23-38 [doi]
- A Study on Randomness Used in Signature Generation of UOVYasuhiko Ikematsu. 39-50 [doi]
- On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space ModulationImad El Hanouti, Hakim el Fadili, Fawad Ahmed, Jawad Ahmad 0001. 51-62 [doi]
- Image Encryption with Parallel Evolution of 2-D Cellular AutomataShramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury. 63-78 [doi]
- A New Identity-Based Multivariate Signature SchemeSatyam Omar, Sahadeo Padhye, Dhananjoy Dey. 79-91 [doi]
- Encrypted Operator Design with Domain Aware Practical Performance ImprovementAyan Ghosh, Abhishek Raj, Ayantika Chatterjee. 93-107 [doi]
- A Comprehensive Review of Fraudulent Email Detection ModelsHitesh Narayan Soneji, Aniruddh Sajith Soman, Aniruddh Vyas, Shubha Puthran. 109-127 [doi]
- DDoS Detection in Software-Defined Network Using Entropy MethodAshidha Anil, T. A. Rufzal, Vipindev Adat Vasudevan. 129-139 [doi]
- New Records of Pre-image Search of Reduced SHA-1 Using SAT SolversEmanuele Bellini 0002, Alessandro De Piccoli, Rusydi H. Makarim, Sergio Polese, Lorenzo Riva, Andrea Visconti. 141-151 [doi]
- OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key ExchangesFrancisco Vial-Prado, Aron Wussler. 153-170 [doi]
- A Survey on Machine Learning-Based Ransomware DetectionNanda Rani, Sunita Vikrant Dhavale, Amarjit Singh, Atul Mehra. 171-186 [doi]
- Variant of Niederreiter-Based Signature Scheme for Blockchain TechnologyFeng-Wei Lee, Denis C. K. Wong, Bok-Min Goi, Wai-Kong Lee. 187-200 [doi]
- Chaos-Based Uncompressed Frame Level Video EncryptionJagannath Sethi, Jaydeb Bhaumik, Ananda S. Chowdhury. 201-217 [doi]
- Comparison of Algorithms for Style Transfer of Images Using Texture SynthesisVishakh Rao, K. U. Hemanth, Bhawana Rudra. 219-236 [doi]
- Ear Localization Based on YOLOv3 DetectorHuy Nguyen Quoc, Vinh Truong Hoang. 237-242 [doi]
- A Novel Reversible Data Hiding in Encrypted Images by Controlled Swapping of Adjacent PixelsV. M. Manikandan. 243-254 [doi]
- Color Image Contrast Enhancement Through Hybrid PCA-Linear Image FusionShahid Aziz, Vinit Kumar, Syed Shahnawazuddin. 255-264 [doi]
- A New Class of Quantum Codes Associate with a Class of MapsDebashis Bhowmik, Dipendu Maity, Ashish Kumar Upadhyay. 265-273 [doi]
- Big Five Personality Prediction from Handwritten Character Features and Word 'of' Using Multi-label ClassificationSalankara Mukherjee, Ishita De Ghosh, Debatree Mukherjee. 275-299 [doi]
- A Comparative Study of Pre-trained Gene Embeddings for COVID-19 mRNA Vaccine Degradation PredictionU. Vamsi Krishna, B. Premjith, K. P. Soman. 301-308 [doi]
- MACI: Malicious API Call Identifier Model to Secure the Host PlatformAyushi Acharya, Hari Prasad, Vinod Kumar Singh, Ishu Gupta, Ashutosh Kumar Singh. 309-320 [doi]
- Multivariate Deep Learning Model with Ensemble Pruning for Time Series ForecastingMohit Kosuri, Cherry Tandu, Sobhan Sarkar, Jhareswar Maiti. 321-334 [doi]
- Deep Photo Classification Based on Geometrical Shape of Principal Object Presents in Photographs via VGG16 DCNNSoma Debnath, Molla Saroyar Hossain, Suvamoy Changder. 335-345 [doi]
- Multitask Deep Learning Model with Efficient Encoding Layer and Enhanced Parallel Convolution BlockAnupam Biswas, Angshuman Bora, Debashish Malakar, Subham Chakraborty, Suman Bera. 347-360 [doi]
- Genetic Algorithm-Based Deep Learning Models: A Design PerspectiveDebojyoti Sarkar, Nilima Mishra, Anupam Biswas. 361-372 [doi]
- Automated System for Face-Mask Detection Using Convolutional Neural NetworkNeha Sengar, Akriti Singh, Saumya Yadav, Malay Kishore Dutta. 373-380 [doi]
- Using Protein Interactome Similarity to Improve Random Walk with Restart Model for Drug RepurposingI. T. Anjusha, N. Saleena, K. Abdul Nazeer. 381-394 [doi]
- COVID-19 Detection on Chest X-Ray and CT Scan Images Using Multi-image Augmented Deep Learning ModelKiran Purohit, Abhishek Kesarwani, Dakshina Ranjan Kisku, Mamata Dalui. 395-413 [doi]
- Identification of Relevant Quantities in Arithmetic Word Problems Using Siamese Neural NetworkSourav Mandal 0001, Arif Ahmed Sekh, Sudip Kumar Naskar. 415-426 [doi]
- Time Synchronization in Underwater Wireless Sensor Networks: A SurveyAmrita Datta, Mou Dasgupta. 427-437 [doi]
- Stock Market Predictions Using FastRNN-Based ModelKonark Yadav, Milind Yadav, Sandeep Saini. 439-450 [doi]
- Ceiling Improvement on Breast Cancer Prediction Accuracy Using Unary KNN and Binary LightGBM Stacked Ensemble LearningAjeet Singh, Vikas Tiwari, Appala Naidu Tentu. 451-471 [doi]
- An Opportunistic Ensemble Learning Framework for Network Traffic Classification in IoT EnvironmentsSujit Bebortta, Sumanta Kumar Singh. 473-484 [doi]
- Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based ApproachAnjali Rao, Sobhan Sarkar, Anima Pramanik, J. Maiti. 485-497 [doi]
- Fog Computing Applications with Decentralized Computing Infrastructure - Systematic ReviewDeepak Kumar, Rishu, Sangeetha Annam. 499-509 [doi]
- Investigating External Audit Records to Detect Fraudulent Firms Employing Various Machine Learning MethodsFarhana Akter Sunny, Md. Imran Khan, Md. Shahriare Satu, Mohammad Zoynul Abedin. 511-523 [doi]
- An Enhanced Quality of Service-Based Trust Model for Cloud ComputingMohamed Fazil Mohamed Firdhous, Rahmat Budiarto. 525-538 [doi]
- DEA for Measuring the Performance of Higher Education Sector: A Case Study of MyanmarMarlar Tin, Ankita Panwar, Millie Pant. 539-549 [doi]
- Synchronizing Words for Real-Time Deterministic Pushdown Automata - Extended AbstractTomoyuki Yamakami, Eitatsu Mikami. 551-562 [doi]
- A 2-Competitive Largest Job on Least Loaded Machine Online Algorithm Based on the Multi List Scheduling ModelDebasis Dwibedy, Rakesh Mohanty. 563-574 [doi]
- Hardware Implementation of Multiplication over Quartic Extension FieldsArthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud. 575-589 [doi]
- 2) Labeling of Triangular Lattice by Exploring Underlined Graph StructuresSubhasis Koley, Sasthi C. Ghosh 0001. 591-601 [doi]
- The Spanning Maximal Planar Subgraph Problem for Some Classes of Complete 4-Partite GraphsTjaart Jan B. Estrada, Isagani B. Jos. 603-614 [doi]
- On Column Competent Matrices and Linear Complementarity ProblemA. Dutta, R. Jana, A. K. Das. 615-625 [doi]
- On Differential Uniformity and Nonlinearity of Permutations on $\mathbb {Z}_{n}$Prachi Gupta, P. R. Mishra, Atul Gaur. 627-636 [doi]
- Computing the 2-Adic Canonical Lift of Genus 2 CurvesAbdoulaye Maïga, Damien Robert. 637-672 [doi]
- Application of $\mathscr {T}$-Direct Codes in Multiple-Rate CodesAshwini Kumar, R. S. Raja Durai. 673-687 [doi]
- Sufficient Optimality Criteria for Optimization Problem Involving Pseudoconvex Interval Objective FunctionPriyanka Roy, Geetanjali Panda. 689-698 [doi]
- Sufficient Conditions for the Uniqueness of Solution of the Weighted Norm Minimization ProblemK. Z. Najiya, Munnu Sonkar, Challa S. Sastry. 699-710 [doi]
- 3: Theorems and ConjecturesRonald L. Aquino, Jerico B. Bacani. 711-723 [doi]
- On the Construction of 4 ˟ 4 Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$Meltem Kurt Pehlivanoglu, Fatma Büyüksaraçoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli. 725-736 [doi]
- Factual Power Loss Reduction by Meadow Fritillary Butterfly Optimization AlgorithmLenin Kanagasabai. 737-742 [doi]
- A Two-Fold Multi-objective Multi-verse Optimization-Based Time Series ForecastingCherry Tandu, Mohit Kosuri, Sobhan Sarkar, Jhareswar Maiti. 743-754 [doi]
- A Novel Ranking-Based Non-linear Programming Approach to Solve Bi-matrix Games in Dense Fuzzy EnvironmentShuvasree Karmakar, Mijanur Rahaman Seikh. 755-767 [doi]
- Real-Time Error Correction Codes for Deletable ErrorsGhurumuruhan Ganesan. 769-788 [doi]
- Lyapunov-Type Inequalities for Fractional Differential Operators with Non-singular KernelsDebananda Basua, Jagan Mohan Jonnalagadda. 789-800 [doi]
- Chebyshev Spectral Projection Methods for Fredholm Integral Equations of the Second KindBijaya Laxmi Panigrahi, Jitendra Kumar Malik. 801-814 [doi]
- Some Sequence Spaces of Weight fEkrem Savas. 815-820 [doi]
- Generalized Libera Operator on Mixed-Norm SpacesS. Naik, K. Rajbangshi. 821-831 [doi]
- Improving the Monitoring of Mortality Surveillance by Analyzing Regression ApproachSarada Ghosh, G. P. Samanta. 833-843 [doi]
- Motion Forecast of Dynamical SystemsYuri Menshikov. 845-855 [doi]
- Modeling of Nonlinear Wave Phenomena in Interstellar Superthermal PlasmaPunam Kumari Prasad, Asit Saha. 857-868 [doi]
- Application of Group Methods in Solving Wave EquationsJervin Zen Lobo. 869-878 [doi]
- Traveling Wave Solutions of Some Coupled Nonlinear Systems by Sine-Cosine ApproachSidheswar Behera, Jasvinder Singh Virdi. 879-889 [doi]
- Several Families of New Exact Solutions for Wave-Like Equations with Variable CoefficientsSubin P. Joseph. 891-902 [doi]
- Coexistence of Chaotic, Quasiperiodic and Multiperiodic Features in Quantum PlasmaBarsha Pradhan, Asit Saha. 903-914 [doi]
- New Classes of Exact Solutions to Three-dimensional Schrodinger EquationSubin P. Joseph. 915-925 [doi]
- Dynamical Properties of Shock and Snoidal Waves in a Superthermal Multi-ion Dusty PlasmaSatyajit Sarkar, Ruchi Thapa, Asit Saha, Kajal Kumar Mondal. 927-941 [doi]
- A Simple Model on Streamflow Management with a Dynamic Risk MeasureHidekazu Yoshioka, Yumi Yoshioka. 943-951 [doi]
- Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring CorrespondenceYuta Kambe, Yusuke Aikawa, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama. 953-966 [doi]
- New Results on Competitive Analysis of Online SRPT SchedulingSheetal Swain, Rakesh Mohanty, Debasis Dwibedy. 967-977 [doi]
- Perturbation Technique on MHD Slip Flow of an Accelerated Plate with Hall CurrentT. Linga Raju, P. Satish. 979-994 [doi]
- Simulation of Two-Dimensional Nonlinear Model for Washing of Pulp Fiber Bed Using Quintic Hermite Interpolation PolynomialsSatinder pal Kaur, Ajay Kumar Mittal, Vijay Kumar Kukreja. 995-1009 [doi]
- Semi-Markov Decision Processes with Vector Pay-OffsKushal Guha Bakshi. 1011-1027 [doi]
- Sonar Sensing-Based Human Leg Localization Using Gaussian Process RegressionPritam Paral, Amitava Chatterjee, Anjan Rakshit. 1029-1041 [doi]
- Steady-State Analysis of a Vacation Queue with Random Serving Capacity and Batch-Size-dependent ServiceNilanjan Nandy, Sourav Pradhan. 1043-1060 [doi]
- Computing Prices for Target Profits in ContractsGhurumuruhan Ganesan. 1061-1074 [doi]
- On the Solution of Bush and Wilson's Stochastic Model for Two-Choice Behavior of the Paradise Fish Approached by the Fixed-Point MethodAli Turab, Wutiphol Sintunavarat. 1075-1084 [doi]
- A Fine-tuning Retrieval System for Mathematical InformationPankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay. 1085-1100 [doi]
- Wind Response Evaluation of Limb-Shifted U-Shaped Building Using CFDShanku Mandal, Sujit Kumar Dalui, Soumya Bhattacharjya. 1101-1113 [doi]