2 |
The First and Second Kinds of Thabit Numbers Expressed as Sums, Differences or Products of Two Generalized Lucas Sequences |
Hunar Sherzad Taher |
5 |
Characterization of exponential distribution with application in testing exponentiality |
Santosh Kumar Chaudhary |
6 |
On improving the applicability of a Jarratt-type iterative method |
Muniyasamy M |
7 |
Classifying into Several Normal Populations with a Common Mean and Order Restricted Variances |
Pushkal Kumar |
8 |
Use of GJR-GARCH model for forecasting of financial risk |
Pankaj Kumar |
11 |
Analytical Solution of Time Periodic Electroosmotic Flow |
Anirban Sengupta |
12 |
ENERGY AMPLIFICATION APPROACH FOR ANALYZING LINEAR STABILITY OF ROTATING MICROCHANNEL FLOWS |
Suman Bera |
14 |
Wave structure interaction problem on an immersed prolate spheroid in the presence of surface tension |
Anuradha Biswas |
15 |
Solving Percentage-based Financial Word Problems |
Samarthita Sasmal |
16 |
A Generic Method Based on Reptile Search Optimization to Automate the Selection of Tolerance Parameter in Willison’s Amplitude |
SIMI V.R. |
20 |
Local convergence analysis of a family of third order iterative methods using majorant function in Riemannian Manifold |
Babita Mehta |
24 |
Deep Learning based Distinguisher of Stream Ciphers |
Shruti Rawal |
25 |
A Real Time On Device-AI Tool To Detect Social Engineering Attacks |
Yash Gupta |
27 |
Discretization of a Smoking Model: A Comparison of Euler and NSFD Schemes |
Tapan Sarkar |
30 |
A Hybrid Improved Particle swarm optimization and Genetic algorithm for energy efficient task offloading in Industrial IoT |
B. Vijayaram |
34 |
Cryptanalysis and Countermeasures on Multivariate Polynomial-based Group Signature Scheme |
Kuldeep Namdeo |
36 |
Non-modal Linear Stability Analysis of Fluid Flow in a Rotating Channel Containing Porous Media |
Raju Haldar |
43 |
Spectral Properties of the Compact Rhaly and Compact Generalised Cesàro Operators on Weighted c₀ Spaces |
Jyoti Rani |
48 |
Malware Classification using Kolmogorov-Arnold Network |
Chandra Mohan Bhuma |
52 |
6G-IoT Enabled Authentication Framework for Secure Waterborne Transportation Systems using Blockchain |
Swati Saha |
53 |
A Robust Regression Estimation Technique Using Direct Weights Based on Median |
Greeshmagiri |
65 |
AN UPPER BOUND ON CONDITION NUMBER OF THE MATRIX ARISING IN NUMERICAL SOLUTION OF PARABOLIC PDES |
Kuldip Singh Patel |
69 |
Optimizing Authentication Path Computation time in the Merkle Signature Scheme for Post-Quantum Security |
Swarna Panthi |
71 |
Analysis of Non-homogeneity in Hyperelastic Curved Waveguide System: Modelling and Simulation |
Md Hasanuzzaman |
72 |
Cryptanalysis over Qiao et al.’s CLAS Technique for HWMSNs |
Anjali Bansal |
75 |
ViT-RES: Attention Exploitation for Breast Cancer Image Classification |
Sudharson |
82 |
Precision Pest Identification in Crops using EfficientNet Based Ensemble Model |
|
83 |
Model Order Reduction in Miscible Interface Problems |
Tapan Kumar Hota |
85 |
A Clustering Induced Opposition based Grasshopper Optimization Algorithm |
Sabari Pramanik |
87 |
Deep Learning based Multiclass Classification of Pneumonia, COVID-19, and Tuberculosis from Chest X-ray Images |
Dr. Sudesh Rani |
88 |
Game Theory-based Resource Allocation in Edge Environment |
M.Sophiya Sugantha Grace |
89 |
On Restrained Domination in Hypergraphs |
Puran Dangal |
90 |
A Blockchain-based Reversible Medical Image Watermarking Scheme using IWT |
Ashis Dey |
94 |
𝑷3-Convex Domination Number of a Graph |
Anjan Gautam |
95 |
InsurTech: An enhanced block-chain based framework for insurance process with bidding |
Yogesh Sonkar |
99 |
Hybrid Chaotic Image Encryption with Non-Linear Feedback Shift Register and Key-Sensitive S-Box |
Biswarupa Murmu |
101 |
Flight Path Constrained Last-mile Parcel Delivery Using Drone |
Preetam Kumar Sur |
102 |
Ensuring Safety and Security in Blood Screening Systems Using Decentralized Ledger Based Technology |
Dipabali Nath |
103 |
Investigating the Role of Initial Stress and Triangular Surface Irregularities in SH-Wave Propagation through Multilayer Anisotropic Media |
Suraj Sharma |
105 |
Effect of interfacial imperfection on Love wave propagation in flexomagnetic composite |
Muhammed Murshid A K |
106 |
A fusion 2D Logistic-cosine-sine Map based Secure Colour Image Communication |
Sujarani Rajendran |
108 |
A Comprehensive Study of Glioma Brain Tumor Detection with Combined Deep Learning Models LSTM and Bi-LSTM |
BATCHU GNANA SAMPATH |
115 |
AI-Optimized EV Battery Management with Solar and Swapping |
Dr. Mallikka Rajalingam |
116 |
On some sufficient conditions of hyperbolic positive matrices |
R. Deb |
117 |
An Adaptive Generic Improvement to Information Set Decoding |
Bhaskar Biswas |
118 |
Ramanujan-Hardy-Littlewood Type Identity Involving Modified Bessel's Function |
Saurabh Rana |
120 |
Real Paley-Wiener theorem for multi-dimensional quadratic phase Fourier transform |
Sarga Varghese |
124 |
Effect of preservation and green technology investment on a sustainable inventory model with carbon tax policy under inflation |
Aastha Chauhan |
127 |
An Intelligent Framework for Early Diagnosis of Multivariate Respiratory Diseases Using Lightweight Deep Neural Network |
Prakash Sahu |
133 |
An Improved Collusion Resistant Certificateless Aggregate Signature Scheme for VANETs |
PUSHPENDRA KUMAR VASHISHTHA |
137 |
Survey on the Bohr radius in higher dimension |
Shankey Kumar |
138 |
Simplified High-Performance Approach for Optic Disk Segmentation from Fundus Images |
Dr. Jignyasa Gandhi |
139 |
A Simplified Attribute-Based Signature Scheme Using RSA Algorithm |
Shivani Goel |
140 |
CNN Based Response Adaptive Randomization for Treatment Allotment Using Biomarker Information |
Archit Harish |
143 |
A Zero-Knowledge Proof Approach on IoT Sensor Readings for Improving Data Security in Smart Agriculture |
Amit Chakraborty |
144 |
Deep Learning assisted Ring Artifact Corrections in X-ray MicroCT images |
Dhruvi Shah |
145 |
Security Analysis of Chen et al.'s Multi-Gateway Authentication Scheme for WSNs |
Akash Sharma |
146 |
Shadower-Shadowee Dynamics in Target Tracking: A Honey Bee Brain-Guided Control System |
Rayavarapu Sita Mounika |
147 |
Square Difference Labeling and Co-Secure Domination in Middle Graph of certain Graphs II |
G. Sarmitha |
148 |
Weighted-II least square algorithm and its consistency |
Denny K.D. |
149 |
The Price of Anarchy in Queueing-Inventory Systems with Delay-Sensitive Customers |
Manikandan Rangaswamy |
150 |
Adversarial Neural Cryptography: Security Challenges and Solutions |
Girish Mishra |
152 |
Efficient algorithm for linear diophantine equations in two variables |
Mayank Deora |
156 |
On a novel dynamical system for solving the quasi-variational inequality |
Sumit Gupta |
158 |
Fractal generation via Multi-parameter Weakly Enriched Contraction |
HIMANSHU BARANWAL |
160 |
RedactChain: A Redactable Blockchain-Driven Privacy Protected Personal Data Management Scheme |
Akhilesh Sharma |
162 |
Group based Threshold Secrecy using Open Channel |
Tanisha Das |
182 |
Trajectory Prediction in Ship Movement Using Geohash Embedding |
Ashutosh Kumar Singh |
186 |
SCA-DU-Net: Spatial and Channel Attention with Dilation U-Net for Enhanced Skin Cancer Image Segmentation |
Debkumar Singha Roy |
190 |
Towards Efficient Deployment of Compressed Neural Networks on MCU for EdgeAI Applications |
Ch Madhu Bhushan |
191 |
ProTSF: IoT-Based Outdoor Air Pollution Forecasting Using Bayesian Optimization-based LSTM |
Ch Madhu Bhushan |
193 |
Cryptanalysis of “Cross-domain Identity Authentication Scheme based on Blockchain and PKI System |
Shivani Saini |
194 |
Hybrid NasNetMobile and Xception-Based Feature Extraction with Ensemble Learning for Efficient Oral Cancer Detection |
Dr. Jitesh Pradhan |
196 |
Phishing Email Detection using Header Features Leveraging Large Language Models (LLMs) |
Chanchal Patra |
206 |
Classifying Students in Flipped Learning Pedagogy Exploiting EEG Signals and Deep Learning Techniques |
Bidyut Kr. Patra |