Accepted Papers
For ICMC
List of Accepted Papers for Proceedings
Paper ID Title of the paper Registered Author
2 The First and Second Kinds of Thabit Numbers Expressed as Sums, Differences or Products of Two Generalized Lucas Sequences Hunar Sherzad Taher
5 Characterization of exponential distribution with application in testing exponentiality Santosh Kumar Chaudhary
6 On improving the applicability of a Jarratt-type iterative method Muniyasamy M
7 Classifying into Several Normal Populations with a Common Mean and Order Restricted Variances Pushkal Kumar
8 Use of GJR-GARCH model for forecasting of financial risk Pankaj Kumar
11 Analytical Solution of Time Periodic Electroosmotic Flow Anirban Sengupta
12 ENERGY AMPLIFICATION APPROACH FOR ANALYZING LINEAR STABILITY OF ROTATING MICROCHANNEL FLOWS Suman Bera
14 Wave structure interaction problem on an immersed prolate spheroid in the presence of surface tension Anuradha Biswas
15 Solving Percentage-based Financial Word Problems Samarthita Sasmal
16 A Generic Method Based on Reptile Search Optimization to Automate the Selection of Tolerance Parameter in Willison’s Amplitude SIMI V.R.
20 Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold Babita Mehta
24 Deep Learning based Distinguisher of Stream Ciphers Shruti Rawal
25 A Real Time On Device-AI Tool To Detect Social Engineering Attacks Yash Gupta
27 Discretization of a Smoking Model: A Comparison of Euler and NSFD Schemes Tapan Sarkar
30 A Hybrid Improved Particle swarm optimization and Genetic algorithm for energy efficient task offloading in Industrial IoT B. Vijayaram
34 Cryptanalysis and Countermeasures on Multivariate Polynomial-based Group Signature Scheme Kuldeep Namdeo
36 Non-modal Linear Stability Analysis of Fluid Flow in a Rotating Channel Containing Porous Media Raju Haldar
43 Spectral Properties of the Compact Rhaly and Compact Generalised Cesàro Operators on Weighted c₀ Spaces Jyoti Rani
48 Malware Classification using Kolmogorov-Arnold Network Chandra Mohan Bhuma
52 6G-IoT Enabled Authentication Framework for Secure Waterborne Transportation Systems using Blockchain Swati Saha
53 A Robust Regression Estimation Technique Using Direct Weights Based on Median Greeshmagiri
65 AN UPPER BOUND ON CONDITION NUMBER OF THE MATRIX ARISING IN NUMERICAL SOLUTION OF PARABOLIC PDES Kuldip Singh Patel
69 Optimizing Authentication Path Computation time in the Merkle Signature Scheme for Post-Quantum Security Swarna Panthi
71 Analysis of Non-homogeneity in Hyperelastic Curved Waveguide System: Modelling and Simulation Md Hasanuzzaman
72 Cryptanalysis over Qiao et al.’s CLAS Technique for HWMSNs Anjali Bansal
75 ViT-RES: Attention Exploitation for Breast Cancer Image Classification Sudharson
82 Precision Pest Identification in Crops using EfficientNet Based Ensemble Model
83 Model Order Reduction in Miscible Interface Problems Tapan Kumar Hota
85 A Clustering Induced Opposition based Grasshopper Optimization Algorithm Sabari Pramanik
87 Deep Learning based Multiclass Classification of Pneumonia, COVID-19, and Tuberculosis from Chest X-ray Images Dr. Sudesh Rani
88 Game Theory-based Resource Allocation in Edge Environment M.Sophiya Sugantha Grace
89 On Restrained Domination in Hypergraphs Puran Dangal
90 A Blockchain-based Reversible Medical Image Watermarking Scheme using IWT Ashis Dey
94 𝑷3-Convex Domination Number of a Graph Anjan Gautam
95 InsurTech: An enhanced block-chain based framework for insurance process with bidding Yogesh Sonkar
99 Hybrid Chaotic Image Encryption with Non-Linear Feedback Shift Register and Key-Sensitive S-Box Biswarupa Murmu
101 Flight Path Constrained Last-mile Parcel Delivery Using Drone Preetam Kumar Sur
102 Ensuring Safety and Security in Blood Screening Systems Using Decentralized Ledger Based Technology Dipabali Nath
103 Investigating the Role of Initial Stress and Triangular Surface Irregularities in SH-Wave Propagation through Multilayer Anisotropic Media Suraj Sharma
105 Effect of interfacial imperfection on Love wave propagation in flexomagnetic composite Muhammed Murshid A K
106 A fusion 2D Logistic-cosine-sine Map based Secure Colour Image Communication Sujarani Rajendran
108 A Comprehensive Study of Glioma Brain Tumor Detection with Combined Deep Learning Models LSTM and Bi-LSTM BATCHU GNANA SAMPATH
115 AI-Optimized EV Battery Management with Solar and Swapping Dr. Mallikka Rajalingam
116 On some sufficient conditions of hyperbolic positive matrices R. Deb
117 An Adaptive Generic Improvement to Information Set Decoding Bhaskar Biswas
118 Ramanujan-Hardy-Littlewood Type Identity Involving Modified Bessel's Function Saurabh Rana
120 Real Paley-Wiener theorem for multi-dimensional quadratic phase Fourier transform Sarga Varghese
124 Effect of preservation and green technology investment on a sustainable inventory model with carbon tax policy under inflation Aastha Chauhan
127 An Intelligent Framework for Early Diagnosis of Multivariate Respiratory Diseases Using Lightweight Deep Neural Network Prakash Sahu
133 An Improved Collusion Resistant Certificateless Aggregate Signature Scheme for VANETs PUSHPENDRA KUMAR VASHISHTHA
137 Survey on the Bohr radius in higher dimension Shankey Kumar
138 Simplified High-Performance Approach for Optic Disk Segmentation from Fundus Images Dr. Jignyasa Gandhi
139 A Simplified Attribute-Based Signature Scheme Using RSA Algorithm Shivani Goel
140 CNN Based Response Adaptive Randomization for Treatment Allotment Using Biomarker Information Archit Harish
143 A Zero-Knowledge Proof Approach on IoT Sensor Readings for Improving Data Security in Smart Agriculture Amit Chakraborty
144 Deep Learning assisted Ring Artifact Corrections in X-ray MicroCT images Dhruvi Shah
145 Security Analysis of Chen et al.'s Multi-Gateway Authentication Scheme for WSNs Akash Sharma
146 Shadower-Shadowee Dynamics in Target Tracking: A Honey Bee Brain-Guided Control System Rayavarapu Sita Mounika
147 Square Difference Labeling and Co-Secure Domination in Middle Graph of certain Graphs II G. Sarmitha
148 Weighted-II least square algorithm and its consistency Denny K.D.
149 The Price of Anarchy in Queueing-Inventory Systems with Delay-Sensitive Customers Manikandan Rangaswamy
150 Adversarial Neural Cryptography: Security Challenges and Solutions Girish Mishra
152 Efficient algorithm for linear diophantine equations in two variables Mayank Deora
156 On a novel dynamical system for solving the quasi-variational inequality Sumit Gupta
158 Fractal generation via Multi-parameter Weakly Enriched Contraction HIMANSHU BARANWAL
160 RedactChain: A Redactable Blockchain-Driven Privacy Protected Personal Data Management Scheme Akhilesh Sharma
162 Group based Threshold Secrecy using Open Channel Tanisha Das
182 Trajectory Prediction in Ship Movement Using Geohash Embedding Ashutosh Kumar Singh
186 SCA-DU-Net: Spatial and Channel Attention with Dilation U-Net for Enhanced Skin Cancer Image Segmentation Debkumar Singha Roy
190 Towards Efficient Deployment of Compressed Neural Networks on MCU for EdgeAI Applications Ch Madhu Bhushan
191 ProTSF: IoT-Based Outdoor Air Pollution Forecasting Using Bayesian Optimization-based LSTM Ch Madhu Bhushan
193 Cryptanalysis of “Cross-domain Identity Authentication Scheme based on Blockchain and PKI System Shivani Saini
194 Hybrid NasNetMobile and Xception-Based Feature Extraction with Ensemble Learning for Efficient Oral Cancer Detection Dr. Jitesh Pradhan
196 Phishing Email Detection using Header Features Leveraging Large Language Models (LLMs) Chanchal Patra
206 Classifying Students in Flipped Learning Pedagogy Exploiting EEG Signals and Deep Learning Techniques Bidyut Kr. Patra
List of Accepted Papers for Presentation Only
Paper ID Title of the paper Registered Author
13 Modeling of blood flow through a deformable artery Biswarup Mandal
26 Efficient computational procedures for stationary probability vectors in a non-renewal input finite-buffer bulk-service queues Abhijit Datta Banik
68 New Iterative Method for Root Finding Using Cubic Curve Approximation Aman Kanshotia
109 Data Hiding Scheme Combining Coding Table With Encryption Debkumar Bera
161 Stability of triangular liberation points in the ER3BP for infinitesimal oblate and triaxial primaries with a Non-resonance case SHILPI DEWANGAN
185 Binarization of Deteriorated stone inscription images: Spatial index division with Adaptive Behaviour Bhagyashri Agasar
210 Construction of C2 Powell-Sabin B-Spline Aagna Pradhan