Abstract is missing.
- Mining Composite Fuzzy Association Rules Among Nutrients in Food RecipeRajkamal Sarma, Pankaj Kumar Deva Sarma. 1-10 [doi]
- Evaluation of Multiplier-Less DCT Transform Using In-Exact ComputingUppugunduru Anil Kumar, Nishant Jain, Sumit K. Chatterjee, Syed Ershad Ahmed. 11-23 [doi]
- Legal Amount Recognition in Bank Cheques Using Capsule NetworksNisarg Mistry, Maneesh Darisi, Rahul Singh, Meet Shah, Aditya Malshikhare. 24-37 [doi]
- Log Periodic Power Law Fitting on Indian Stock MarketNagaraj Naik, Biju R. Mohan. 38-43 [doi]
- An Automated Algorithm for Estimating Respiration Rate from PPG SignalsKinjarapu Manojkumar, Srinivas Boppu, M. Sabarimalai Manikandan. 44-57 [doi]
- Phonemes: An Explanatory Study Applied to Identify a SpeakerSaritha Kinkiri, Basel Barakat, Simeon Keates. 58-68 [doi]
- Nutritional Status Prediction in Neonate Using Machine Learning Techniques: A Comparative StudyZakir Hussain, Malaya Dutta Borah. 69-83 [doi]
- Handwritten Bengali Character Recognition Using Deep Convolution Neural NetworkSuprabhat Maity, Anirban Dey, Ankan Chowdhury, Abhijit Banerjee 0006. 84-92 [doi]
- Lexical Feature Based Feature Selection and Phishing URL Classification Using Machine Learning TechniquesBireswar Banik, Abhijit Sarma. 93-105 [doi]
- Feature Selection Using PSO: A Multi Objective ApproachJyoti Vashishtha, Vijay Hasan Puri, Mukesh. 106-119 [doi]
- An Empirical Study to Predict Myocardial Infarction Using K-Means and Hierarchical ClusteringMd. Minhazul Islam, Shah Ashisul Abed Nipun, Majharul Islam, Md. Abdur Rakib Rahat, Jonayet Miah, Salsavil Kayyum, Anwar Shadaab, Faiz Al Faisal. 120-130 [doi]
- A Robust Technique for End Point Detection Under Practical EnvironmentNirupam Shome, Rabul Hussain Laskar, Richik Kashyap, Sivaji Bandyopadhyay. 131-144 [doi]
- An Explainable Machine Learning Approach for Definition ExtractionPriyanshu Kumar, Aadarsh Singh, Pramod Kumar, Chiranjeev Kumar. 145-155 [doi]
- Steps of Pre-processing for English to Mizo SMT SystemChanambam Sveta Devi, Bipul Syam Purkayastha. 156-167 [doi]
- Efficient Human Feature Recognition Process Using ScleraRaghav Kachhawaha, Pragya Gupta, Tushar Kansal, Amitava Chaudhary, Tanmay Bhowmik. 168-181 [doi]
- Optimization of Local Ordering Technique for Nearest Neighbour CircuitsLalengmawia Chhangte, Alok Chakrabarty. 182-192 [doi]
- Attention-Based English to Mizo Neural Machine TranslationCandy Lalrempuii, Badal Soni. 193-203 [doi]
- In Depth Analysis of Lung Disease Prediction Using Machine Learning AlgorithmsIshan Sen, Md. Ikbal Hossain, Md. Faisal Hossan Shakib, Md. Asaduzzaman Imran, Faiz Al Faisal. 204-213 [doi]
- Improve the Accuracy of Heart Disease Predictions Using Machine Learning and Feature Selection TechniquesAbdelmegeid Amin Ali, Hassan Shaban Hassan, Eman M. Anwar. 214-228 [doi]
- Convolutional Neural Network Based Sound Recognition Methods for Detecting Presence of Amateur Drones in Unauthorized ZonesUngati Ganapathi, M. Sabarimalai Manikandan. 229-244 [doi]
- Comparison of Different Decision Tree Algorithms for Predicting the Heart DiseaseDeepak Saraswat, Preetvanti Singh. 245-255 [doi]
- Dynamic Speech Trajectory Based Parameters for Low Resource LanguagesParabattina Bhagath, Megha Jain, Pradip K. Das. 256-270 [doi]
- Identification and Prediction of Alzheimer Based on Biomarkers Using 'Machine Learning'Manash Sarma, Subarna Chatterjee. 271-284 [doi]
- Solving Quadratic Assignment Problem Using Crow Search Algorithm in Accelerated SystemsManoj Kumar, Pinaki Mitra. 285-295 [doi]
- Speech Signal Analysis for Language Identification Using TensorsShubham Jain, Bhagath Parabattina, Pradip Kumar Das. 296-309 [doi]
- Effective Removal of Baseline Wander from ECG Signals: A Comparative StudyDeepankar Nankani, Rashmi Dutta Baruah. 310-324 [doi]
- Face Recognition Based on Human Sketches Using Fuzzy Minimal Structure Oscillation in the SIFT DomainBibek Majumder, Sharmistha Bhattacharya Halder. 325-335 [doi]
- An Ensemble Model for Predicting Passenger Demand Using Taxi Data SetSantosh Rajak, Ujwala Baruah. 336-346 [doi]
- A Novel Approach to Synthesize Hinglish Text to English TextUjwala Baruah, N. Harini, Supraja Venkatesh, Khushbu Maloo, Rahul Debnath. 347-356 [doi]
- Comparative Analysis of Neural Models for Abstractive Text SummarizationHeena Kumari, Sunita Sarkar, Vikrant Rajput, Arindam Roy. 357-368 [doi]
- Fraud Detection in Credit Card Data Using Machine Learning TechniquesArun Kumar Rai, Rajendra Kumar Dwivedi. 369-382 [doi]
- Res-VGG: A Novel Model for Plant Disease Detection by Fusing VGG16 and ResNet ModelsAshish Kumar, Raied Razi, Anshul Singh, Himansu Das. 383-400 [doi]
- A Novel Algorithm for Salient Region DetectionRajesh Kumar Tripathi. 401-410 [doi]
- Exploiting Topic Modelling to Classify Sentiment from LyricsMaibam Debina Devi, Navanath Saharia. 411-423 [doi]
- Crucial Gene Identification for Esophageal Squamous Cell Carcinoma Using Differential Expression AnalysisPallabi Patowary, Dhruba K. Bhattacharyya. 424-436 [doi]
- HRV Signal Feature Estimation and Classification for Healthcare System Based on Machine LearningRanjeet Kumar, Agya Ram Verma, Manoj Kumar Panda, Papendra Kumar. 437-448 [doi]
- Securing Face Recognition System Using Blockchain TechnologySaumya Shankar, Jitendra Madarkar, Poonam Sharma. 449-460 [doi]
- A Hybrid Symmetric Key Cryptography Method to Provide Secure Data TransmissionPankaj Kumar Keserwani, Mahesh Chandra Govil. 461-474 [doi]
- Trust-Based Detection of Malicious Nodes for Wireless Mesh NetworksAmit Kumar Roy, Ajoy Kumar Khan, Hridoy Jyoti Mahanta. 475-485 [doi]
- Evidence Building for Ad Click or Web Access on CloudPankaj Kumar Keserwani, Mahesh Chandra Govil, Emmanuel Shubhakar Pilli. 486-500 [doi]
- Security Analysis of MITM Attack on SCADA NetworkDebasish Deb, Sagorika Raj Chakraborty, Lagineni Mahendra, Kirani Singh. 501-512 [doi]
- A Large-Scale Investigation to Identify the Pattern of App Component in Obfuscated Android MalwaresMd. Omar Faruque Khan Russel, Sheikh Shah Mohammad Motiur Rahman, Takia Islam. 513-526 [doi]
- An AHP-TOPSIS Based Framework for the Selection of Node Ranking Techniques in Complex NetworksKushal Kanwar, Sakshi Kaushal, Harish Kumar. 527-542 [doi]
- Security Enhancement of IoT Based Smart Home Using Hybrid TechniqueSaijshree Srivastava, Shiva Prakash. 543-558 [doi]
- Insider Threat Detection Based on User Behaviour AnalysisMalvika Singh, B. M. Mehtre, S. Sangeetha 0001. 559-574 [doi]
- Layer-2 Performance Analysis of LTE-A and HetNets for 5G NetworksKrishna Reddy, Irani Acharjamayum, Arup Bhattacharjee. 575-587 [doi]
- Placement Issues in Network Function VirtualizationKhem Prosad Sharma, Arup Bhattacharjee. 588-599 [doi]
- A Novel Graph Based Approach to Predict Man of the Match for CricketKaushik Ravichandran 0004, Lalit Gattani, Advithi Nair, Bhaskarjyoti Das. 600-611 [doi]
- Construction of Identity Based Signcryption Using Learning with RoundingDharminder Dharminder, Dheerendra Mishra. 612-626 [doi]
- Deep Detection of Anomalies in Static Attributed GraphPrakhyat G. Kulkarni, S. Y. Praneet, R. B. Raghav, Bhaskarjyoti Das. 627-640 [doi]