


default search action
11th ICCCNT 2020: Kharagpur, India
- 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020, Kharagpur, India, July 1-3, 2020. IEEE 2020, ISBN 978-1-7281-6851-7

- Om M. Rajpurkar, Siddesh S. Kamble, Jayram P. Nandagiri, Anant V. Nimkar

:
Alert Generation on Detection of Suspicious Activity Using Transfer Learning. 1-7 - Md. Rafiuzzaman Bhuiyan, Abu Kaisar Mohammad Masum

, Md. Abdullahil-Oaphy, Syed Akhter Hossain, Sheikh Abujar:
An Approach for Bengali Automatic Question Answering System using Attention Mechanism. 1-5 - Pavitra Haveri, Rashmi U. B, D. G. Narayan

, Nagaratna K., Shivaraj K.:
EduBlock: Securing Educational Documents using Blockchain Technology. 1-7 - Adhesh Shenoy, Mahathi Amencherla, Rahul Nagaraj, T. S. Chandar:

Optick - A Low Cost Wearable Head up Display for Search and Rescue Operations. 1-7 - Merlin Sundar, Sriram Kailasam, Timothy A. Gonsalves:

Benchmarking Distributed Stream Processing Frameworks for Real Time Classical Machine Learning Applications. 1-7 - Leela Aishwarya T, Manoj Panda:

Road Boundary Detection using 3D-to-2D Transformation of LIDAR Data and Conditional Generative Adversarial Networks. 1-6 - M. Hussayeen Khan Anik

, Sakib Mahmud
, M. Ifaz Ahmed Isti, Samiha Nuzhat
, Shovasis Kumar Biswas, Hriteshwar Talukder
:
A Novel Highly Sensitive Photonic Crystal Fiber Sensor for Detecting PH Levels of Acetic Acid Aqueous Solution Based on Surface Plasmon Resonance. 1-5 - Anuran Mitra, Soumita Biswas, Tinku Adhikari, Arindam Ghosh, Soumalya De, Raja Karmakar:

Emergence of Edge Computing: An Advancement over Cloud and Fog. 1-7 - Sana Akbar, Sri Khetwat Saritha

:
QML Based Community Detection in the realm of Social Network Analysis. 1-7 - Bhabendu Kumar Mohanta

, Utkalika Satapathy, Meenu Rani Dey, Soumyashree S. Panda, Debasish Jena
:
Trust Management in Cyber Physical System using Blockchain. 1-5 - Suraj K, Melisa Miranda:

A Switching Capacitor Based Buck-Boost Converter and its Analysis. 1-7 - Kalyanee Devi, Rohit Tripathi

:
Social Network Analysis for efficient delivery of Agricultural Extension Services. 1-6 - Sankalp More, Imran Jamadar, Faruk Kazi:

Security Visualization and Active Querying for OT Network. 1-6 - Aroof Aimen

, Amandeep Kaur, Sahil Sidheekh:
Scale Invariant Fast PHT based Copy-Move Forgery Detection. 1-7 - Namrata Hosamani, Nageshwar Albur, Prajna Yaji, Mohammed Moin Mulla, D. G. Narayan

:
Elastic Provisioning of Hadoop Clusters on OpenStack Private Cloud. 1-7 - Ravi Kumar Tanti, Saurabh Ramesh Warathe, Nella Anveshkumar

:
Planar Yagi-Uda Antenna with Mirrored Ground Plane for WLAN. 1-5 - Aditya Sarin, Deveshi Thanawala, Saurav Verma

, Chetana Prakash:
Implementation of New Approach to Secure IoT Networks with Encryption and Decryption Techniques. 1-7 - Kamana Sai Charan, Harsha Vardhan Nakkina, B. R. Chandavarkar:

Generation of Symmetric Key Using Randomness of Hash Function. 1-7 - Rajat Kumar, Amit Mankodi, Amit Bhatt, Bhaskar Chaudhury

, Aditya Amrutiya:
Cross-Platform Performance Prediction with Transfer Learning using Machine Learning. 1-7 - Saswata Satpathi

, Mohamed Ismail Yasar Arafath K, Aurobinda Routray, Partha Sarathi Satpathi:
Detection of Deceit from Thermal Videos on Real Crime Database. 1-6 - Eshtiak Ahmed

, Ashraful Islam, Mohsena Ashraf, Atiqul Islam Chowdhury
, Mohammad Masudur Rahman
:
Internet of Things (IoT): Vulnerabilities, Security Concerns and Things to Consider. 1-6 - Rayeesa Mehmood

, Amandeep Kaur:
Modified Difference Squared Image Based Non Local Means Filter. 1-7 - Abhay Katiyar, Satyam Kumar Gupta, Dinesh Singh, Rama Shankar Yadav

:
A dynamic single-hop clustering algorithm (DSCA) in VANET. 1-6 - Md. Al-Hasan

, Hasan Muhammad Kafi
, Md. Arif Rizvee, Mohammad Hasan
, Md. Mamunur Rashid:
Context-Aware Computing for Balanced Agricultural Production using Machine Learning. 1-6 - Shreya T, Mohammed Moin Mulla, Sumedha Shinde, D. G. Narayan

:
Ant Colony Optimization-based Dynamic Routing in Software Defined Networks. 1-7 - Sajal Jain, Shivam Sharma, Beerappa R. Chandavarkar:

Mitigating Man-in-the-Middle Attack in Digital Signature. 1-5 - Pradeep Nazareth

, B. R. Chandavarkar:
Link Quality-based Routing Protocol for Underwater Acoustic Sensor Networks. 1-6 - Aashka Trivedi, Anya Trivedi, Sourabh Varshney, Vidhey Joshipura, Rupa G. Mehta

, Jenish Dhanani:
Extracted Summary Based Recommendation System for Indian Legal Documents. 1-6 - Smita Tiwari, Shivani Goel, Arpit Bhardwaj:

Machine Learning approach for the classification of EEG signals of multiple imagery tasks. 1-7 - Anirban Dam, Ashish Verma, Charan Tej Pangi, Raja Raviteja, Chandra Shekhar Prasad

:
Person Following Mobile Robot using Pedestrian Dead-Reckoning with Inertial data of Smartphones. 1-4 - Nagib Mahfuz

, Shawan Karmokar, Md. Ismail Hossain Rana:
A Smart Approach of LPG Monitoring and Detection System Using IoT. 1-4 - Purva Chaitanya Badhe, Vaishali Kulkarni

:
Artificial Neural Network based Indian Sign Language Recognition using hand crafted features. 1-6 - N. Sahana, Usha Rani K. R:

Design of Intelligent IP Address Management System for Communication Networks. 1-6 - Sa Bijay Kumar

, Rutuparna Panda, Sanjay Agrawal
:
Brain Magnetic Resonance Image Tumor Detection and Segmentation Using Edgeless Active Contour. 1-7 - Samiha Nuzhat

, M. Ifaz Ahmad Isti, Hriteshwar Talukder
, Shovasis Kumar Biswas:
Dual Core Surface Plasmon Resonance Based Photonic Crystal Fiber Sensor In IR-Range. 1-4 - S. Sathish Kumar, Aruchamy Rajini:

Airline tweets sentimental analysis using Adaptive rider optimization based support vector neural network. 1-10 - Jasleen Kaur

, Alka Agrawal, Raees Ahmad Khan:
Security Assessment in Foggy Era through Analytical Hierarchy Process. 1-6 - S. K. Bahuguna, S. Mukhopadhyay, A. P. Tiwari:

Distributed Artificial Neural Network Model for Neutron Flux Mapping in Nuclear Reactors. 1-7 - Earnest Paul Ijjina, Aniruddha Srinivas Joshi, Goutham Kanahasabai, Keerthi Priyanka P:

Customer Analytics using Surveillance Video. 1-7 - Akshada Dongre, Rodney Pinto, Ameya Patkar, Minal Lopes:

Computer Cursor Control Using Eye and Face Gestures. 1-6 - Nandini Av, Nilita Anil Kumar:

Image Encryption Using Genetic Algorithm and Bit-Slice Rotation. 1-6 - S. Maheswaran, Govindasamy Murugesan, Prakash Duraisamy, Balasubramaniam Vivek, Selvapriya S, Vinith S, Vasantharajan V:

Unmanned Ground Vehicle for Surveillance. 1-5 - Akilandeswary G, J. Martin Leo Manickam:

Next Generation Network Coding Technique for IoT. 1-6 - Sneha R. Deshmukh, Vijay T. Raisinghani

:
AdCoCoA- Adaptive Congestion Control Algorithm for CoAP. 1-7 - Sumith N.:

Open RnSIR model for Information Spread in Social Networks. 1-5 - Adarsh Jain, Abhishek Khanna, Jay Bhatt, Parthkumar V. Sakhiya, Rajesh Kumar Bahl:

Experimental Demonstration of Free Space Quantum Key Distribution System based on the BB84 Protocol. 1-5 - Debadri Basak, Dhruv Ramani, Ghanshyam Singh:

Enhancement of Unsupervised Object Detection using Supervised Method. 1-9 - Naresh Kumar, Seba Susan

:
COVID-19 Pandemic Prediction using Time Series Forecasting Models. 1-7 - Neethu Mohan

, S. Sachin Kumar
, K. P. Soman:
Group Sparsity Assisted Synchrosqueezing Approach for Phonocardiogram Signal Denoising. 1-5 - Elakkiya E

, S. Selvakumar
, R. Leela Velusamy:
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection. 1-7 - Raja Karmakar, Soumalya De, Arindam Ghosh, Tinku Adhikari, Punit Jain:

S2-GI: Intelligent Selection of Guard Interval in High Throughput WLANs. 1-7 - Priyam Das, Dhananjay R. Kalbande

:
Behavioural Analysis of Multi-Source Social Network Data Using Object-Centric Behavioural Constraints and Data Mining Technique. 1-8 - Alekha Kumar Mishra, Arun Kumar:

Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications. 1-5 - Nileshkumar Kakade, Utpalkumar Patel:

Secure Secret Sharing Using Homomorphic Encryption. 1-7 - Harsh Jain, Shreeyaa Agrawal, Harshita Khandelwal, Vinaya Sawant

:
Financial Investment Recommendation and Decentralized Account Management. 1-6 - Shital S. Supase

, Rajesh B. Ingle
:
Are Coordinator Election Algorithms in Distributed Systems Vulnerable? 1-5 - Naimul Hossain, Md. Rafiuzzaman Bhuiyan, Zerin Nasrin Tumpa, Syed Akhter Hossain:

Sentiment Analysis of Restaurant Reviews using Combined CNN-LSTM. 1-5 - Shilpa Dua, Dhruv P. Shahi, Jyotsna Singh, Harish Parthasarathy:

Passive Copy-Move Forgery Detection using Localized Intensity Feature. 1-7 - Bhabendu Kumar Mohanta

, Meenu Rani Dey, Utkalika Satapathy
, Soumyashree S. Panda, Debasish Jena
:
GreenVANET: Greening Vehicular Ad-hoc Network by Scheduling Up-link Channel. 1-5 - S. Kaushik, Abhishek Raman, K. V. S. Rajeswara Rao

:
Leveraging Computer Vision for Emergency Vehicle Detection-Implementation and Analysis. 1-6 - N. Sri Sai, B. Naga Subrahmanyam, K. Yeshwanth Sai, A. Vara Durga Siva Sai, K. Pavan Kumar, S. Sai Harsha, U. Adi Lakshmi Satya Sri:

Efficient design of $8\times 8\times 8$ LED Cube with Low Power consumption using Arduino UNO. 1-6 - Soumyashree S. Panda, Bhabendu Kumar Mohanta

, Meenu Rani Dey, Utkalika Satapathy, Debasish Jena
:
Distributed Ledger Technology for Securing IoT. 1-6 - Satyajit Nayak, Surya Teja, Aurobinda Routray, Monalisa Sarma:

A Non-contact Framework for Shortness of Breath Recognition and effects on Health Parameters during HCI. 1-7 - Madhu Sharma

, Vishal Bharti
:
Image encryption using a new 2D bit reversed logistic map. 1-6 - Aradhana Behura, Ashutosh Behura:

Road Accident Prediction and Feature Analysis By Using Deep Learning. 1-7 - Pooja Sainath Jadhav, Gargi S. Phadke

:
"Algorithmic Comparative Classification Approach for Defect Detection of Pyrus Malus. 1-6 - Arijit Das, Ankita Das, Anisha Datta, Shukrity Si, Subhas Barman

:
Deep Approaches on Malicious URL Classification. 1-6 - Akshay Rajapkar, Pranita Binnar, Faruk Kazi:

Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks. 1-6 - Deepa Rani

, Narottam Chand Kaushal:
Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. 1-7 - Md. Rakib Ahmed, Sheikh Tariqul Islam Tahid, Nazneen Akter Mitu, Pipasha Kundu, Soniya Yeasmin:

A Comprehensive Analysis on Undergraduate Student Academic Performance using Feature Selection Techniques on Classification Algorithms. 1-6 - Sunil Samanta Singhar

, Debasish Jena
, Suraj Sharma
:
Integrating Machine Learning with Blockchain to Ensure Data Privacy. 1-6 - A. V. Anandhalekshmi

, V. Srinivasa Rao, G. R. Kanagachidambaresan:
HMM Based on Baum-Welch Algorithm for Predicting Critical Data Packets in IoT Network. 1-6 - Ganesan Ponnuswami, Sriram Kailasam, Dileep Aroor Dinesh:

Event-Driven Data Pipeline for Network Management Systems. 1-6 - Ravi Kant Jain

, Bikash Gupta, Mustaq Ansari, Partha Pratim Ray
:
IOT Enabled Smart Drip Irrigation System Using Web/Android Applications. 1-6 - Agostino Forestiero

, Giuseppe Papuzzo
, Rosaria de Simone, Francesco Forestiero, Francesca Giordano:
Multiagent approach for resource management in Smart Environments. 1-5 - Tejaskumar K, Ishaan R. Dharamdas, B. R. Chandavarkar:

A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor Networks. 1-6 - Sakshi Ranjan

, Subhankar Mishra
:
Comparative Sentiment Analysis of App Reviews. 1-7 - Monjur Bin Shams, Md. Junaed Hossain, Sheak Rashid Haider Noori:

A Time Series Analysis of Trends With Twitter Hashtags Using LSTM. 1-6 - Sumit Jahagirdar, Aditya Ghatak

, Abhiram Ajith Kumar:
WiFi based Indoor Positioning System using Machine Learning and Multi-Node Triangulation Algorithms. 1-6 - Debojyoti Seth

:
A Novel Joint Sum and Per Antenna Power Constraints Model based on a Comparative Approach of Optimal Transmission Strategies and Capacity of MIMO channels. 1-5 - Murat Cetiner, Ozgur Koray Sahingoz

:
A Comparative Analysis for Machine Learning based Software Defect Prediction Systems. 1-7 - Nabendu Bhui

, Pintu Kumar Ram
, Pratyay Kuila
:
Feature Selection from Microarray Data based on Deep Learning Approach. 1-5 - Gopalakrishnan P, Sidhant Gupta, Rahul Krishnan, Dhruv Patel, Dhivvya J. P, Sruthy Anand, Dhanesh Raj:

Routing protocol Analysis for Heterogeneous Nodes in a Dynamic and Sparse Environment. 1-7 - Md. Mehedi Hassan

, Zahrul Jannat Peya, Sadika Zaman
, Jarif Huda Angon, Afrin Islam Keya, Asaf Ud Dulla:
A Machine Learning Approach to Identify the Correlation and Association among the Students' Drug Addict Behavior. 1-5 - Sheikh Arif Ahmed, Md. Aref Billah, Shahidul Islam Khan:

A Machine Learning Approach to Performance and Dropout prediction in Computer Science: Bangladesh Perspective. 1-6 - Sameer Ajmera, T. R. Pattanshetti:

A Survey Report on Identifying Different Machine Learning Algorithms in Detecting Domain Generation Algorithms within Enterprise Network. 1-5 - Nushrat Jahan Ria

, Sharun Akter Khushbu, Mohammad Abu Yousuf
, Abu Kaisar Mohammad Masum
, Sheikh Abujar, Syed Akhter Hossain:
Toward an Enhanced Bengali Text Classification Using Saint and Common Form. 1-5 - Rinkesh Kumar Dubey, Rahul Yadav, Taimoor Alam, Nirbhay Kumar Singh, Ram Lal Yadava:

A modified Miniaturized UWB Bi-Planar Yagi-Like MIMO Antenna System. 1-5 - Leena Wanganoo

, Vinod Kumar Shukla:
Real-Time Data Monitoring in Cold Supply Chain Through NB- IoT. 1-6 - Binish Fatimah

, Priyanka G, Rehana Sultana, Rekha N:
Analysis of ECG for biometric identification. 1-5 - Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy

:
A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS Technology. 1-4 - Nagib Mahfuz

, Mehen Nigar, Nawshin Ulfat
:
Smart Energy Meter and Digital Billing System for Bangladesh. 1-4 - Niveditha Oruganti, Tripty Singh

:
Best Fit Polygonal Approximation for Multiple ROI Estimation. 1-6 - Amrita Naik

, Damodar Reddy Edla, Venkatanareshbabu Kuppili:
A combination of FractalNet and CNN for Lung Nodule Classification. 1-7 - Romana Rahman Ema, Pintu Chandra Shill:

Integration of Fuzzy C-Means and Artificial Neural Network with Principle Component Analysis for Heart Disease Prediction. 1-6 - Md. Jahid Hasan, Md Ferdous Wahid, Md. Shahin Alom

, Mohammad Mahmudul Alam Mia
:
A New State of Art Deep Learning Approach for Bangla Handwritten Digit Recognition using SVM Classifier. 1-6 - Hemanth Madasu, Mohitha Kondapalli, Sulakshana Chilukuri

, Y. Pandu Rangaiah
:
Circularly Polarized Dipole Antenna with Pattern Reconfiguration for Wireless Communications. 1-5 - Ajay Khare, Ashwini Dalvi

, Faruk Kazi:
Smart Crawler for Harvesting Deep web with Multi-Classification. 1-5 - Harish Krishnamoorthy, Basundhara Chakrabarty, S. Nandakumar

:
Secured Routing Paradigm for Intelligent Transportation Systems. 1-7 - Kokila Bharti Jaiswal

, Toshanlal Meenpal:
Continuous Pulse Rate Monitoring from Facial Video Using rPPG. 1-5 - Raja Sekar Kumaresan

, Marshal Raj
, Gopalakrishnan Lakshminarayanan
:
Area-Efficient D-Flip Flop and XOR in QCA. 1-5 - Abdullah Al-Mamun Bulbul

, Md. Abdul Awal, Md. Ekhlasur Rahaman, Farjana Imam, Etu Podder, Md. Salim Ahmed, Md. Bellal Hossain
, Himadri Shekhar Mondal, Faysal Iqbal:
Highly Sensitive Photonic Crystal Fiber for Illegal Drugs Detection in THz Regime. 1-6 - Abhishek Singh J, Paramananda Jena, Veena Devi S. V:

Tracking Targets using Digital Beamforming. 1-5 - Sagar Deep Deb

, Mohammad Akhlaqur Rahman
, Rajib Kumar Jha:
Breast Cancer Detection and Classification using Global Pooling. 1-5 - Susmita Das

, Samya Muhuri, Susanta Chakraborty, Samit Biswas
:
Graph Based Keyword Extraction for Similarity Identification among Born-Digital News Contents. 1-7 - Pankaj Joshi, Anoj Kumar:

A Novel Framework for Decentralized C2C E-commerce using Smart Contract. 1-5 - Snehashis Majhi

, Ratnakar Dash, Pankaj Kumar Sa:
Temporal Pooling in Inflated 3DCNN for Weakly-supervised Video Anomaly Detection. 1-6 - Shivam Raj, Natasha Sebastian

, Raj Bisht:
ExtraDet With Quad Feature Pyramid Networks. 1-6 - Sambhram Pattanayak

, Vinod Kumar Shukla:
Comparative Analysis of ENG, EFP and Drone camera and its Impact in Television Production. 1-8 - Sharma Hitesh Omprakash, Margam K. Suthar:

Mitigation Technique for Black hole Attack in Mobile Ad hoc Network. 1-5 - Mayuri Khadpe, Pranita Binnar, Faruk Kazi:

Malware Injection in Operational Technology Networks. 1-6 - Akshay Kumar, Viranjay M. Srivastava

:
A Novel Feeder Protection System Using Fast Switching PhotoMOS Relay. 1-4 - Md. Rafiuzzaman Bhuiyan, Sharun Akter Khushbu, Md. Sanzidul Islam

:
A Deep Learning Based Assistive System to Classify COVID-19 Face Mask for Human Safety with YOLOv3. 1-5 - Navneet Singh, Vishtasp Meherhomji, B. R. Chandavarkar:

Automated versus Manual Approach of Web Application Penetration Testing. 1-6 - Anas Najdawi:

Assessing AI Readiness Across Organizations: The Case of UAE. 1-5 - Pranay Sharma, Naveksha Sood:

Application of IoT and Machine Learning for Real-time Driver Monitoring and Assisting Device. 1-7 - Tayeb Bin Lokman, Mohammad Touhidul Islam, Mouslah Uddin Apple:

Design & Implementation Of IoT Based Industrial Automation Syste. 1-6 - Md. Arif Rizvee, Md. Ashfakur Rahman Arju, Md. Al-Hasan, Saifuddin Mohammad Tareque, Md. Zahid Hasan

:
Weather Forecasting for the North-Western region of Bangladesh: A Machine Learning Approach. 1-6 - Sriram Ravishankar, Prasanna Kumar M. K, Vinay Vasanth Patage

, Sourabh Tiwari
, Saksham Goyal:
Prediction of Age from Speech Features Using a Multi-Layer Perceptron Model. 1-6 - Babloo Kumar, Sayantari Ghosh:

Detection of Concrete Cracks Using Dual-channel Deep Convolutional Network. 1-7 - Saket Ozarkar, Raj Chetwani, Sugam Devare, Sumeet Haryani, Nupur Giri:

AI for Accessibility: Virtual Assistant for Hearing Impaired. 1-7 - Archana Kumari, Neetu Sood:

Optimum Waveguide and Pulse Shaping filter for GFDM System. 1-7 - Harish Agarwal, Sushri Mukherjee, Sumana Chattaraj, Md. Irfan Khan, Dharmbir Prasad

:
Development of Quad Spacer Damper to suppress oscillation in 765 kV Transmission Line. 1-6 - G. Krishna Vamsi, Akhtar Rasool, Gaurav Hajela:

Chatbot: A Deep Neural Network Based Human to Machine Conversation Model. 1-7 - Sirisha Potluri

, Monika Mangla
, Suneeta Satpathy
, Sachi Nandan Mohanty
:
Detection and Prevention Mechanisms for DDoS Attack in Cloud Computing Environment. 1-6 - Afreen Khan

, Swaleha Zubair:
Expansion of Regularized Kmeans Discretization Machine Learning Approach in Prognosis of Dementia Progression. 1-6 - Mahammad Irfan, Sagar Dalai

, Kaushal Kishore, Samarth Singh, Shaik Ali Akbar:
Vision-based Guidance and Navigation for Autonomous MAV in Indoor Environment. 1-5 - Praveen Kumar Kasetty

, Aniruddha Kanhe
:
Covert speech communication through audio steganography using DWT and SVD. 1-5 - Shraddha Suratkar, Elvin Johnson, Karan Variyambat, Mihir Panchal, Faruk Kazi:

Employing Transfer-Learning based CNN architectures to Enhance the Generalizability of Deepfake Detection. 1-9 - Mohammad Mahmudul Alam Mia

, Delowar Hossain Himel, Shovasis Kumar Biswas:
Numerical Studyof an Octagonal Photonic Crystal Fiber: An Improved Design. 1-4 - Munipalle Sai Nikhila, Aman Bhalla, Pradeep Singh

:
Text Imbalance Handling and Classification for Cross- platform Cyber-crime Detection using Deep Learning. 1-7 - Arushi Gupta, Kapil Sharma

:
Ranking of Countries Using World Development Indicators: A Computational Approach. 1-4 - Yamini devi Ykuntam, Katta Pavani, Krishna Saladi

:
Design and analysis of High speed wallace tree multiplier using parallel prefix adders for VLSI circuit designs. 1-6 - Md. Ekram Hossain

, Arni Islam, Md. Sanzidul Islam
:
A Proficient Model to Classify Bangladeshi Bank Notes for Automatic Vending Machine Using a Tıny Dataset with One-Shot Learning & Siamese Networks. 1-4 - Karthika K, S. Adarsh, K. I. Ramachandran:

Distance Estimation of Preceding Vehicle Based on Mono Vision Camera and Artificial Neural Networks. 1-5 - Suhas N. Bhargav, V. Akshatha Prasad:

Lane Departure Warning System using TDA3x_rvp Board. 1-6 - Rajib Debnath

, Anu Singha
, Biswajit Saha, Mrinal Kanti Bhowmik:
A Comparative Study of Background Segmentation Approaches in Detection of Person with Gun under Adverse Weather Conditions. 1-7 - Richa Mehra, Aditi Meshram, B. R. Chandavarkar:

Remote User Authentication and Issues: A Survey. 1-6 - Rifat Hasan, Md. Khairul Alam Ovy, Ifrat Zahan Nishi, Md. Azizul Hakim

, Rubaiya Hafiz
:
A Decision Support System of Selecting Groups (Science/ Business Studies/ Humanities) for Secondary School Students in Bangladesh. 1-6 - Priyansh Kumar Dubey, Ajay Jangid, B. R. Chandavarkar:

An Interdependency between Symmetric Ciphers and Hash Functions: A Survey. 1-5 - Sreenivas Selvarajan, Mahesh Mohan, B. R. Chandavarkar:

Techniques To Secure Address Resolution Protocol. 1-7 - Binish Fatimah

, Preethi A
, Hrushikesh V, Akhilesh Singh B, Harshanikethan R. Kotion:
An automatic siren detection algorithm using Fourier Decomposition Method and MFCC. 1-6 - Geethu M. Suresh, Minu Lalitha Madhavu

:
AI Based Intrusion Detection System Using Self-Adaptive Energy Efficient BAT Algorithm for Software Defined IoT Networks. 1-6 - Anushk Misra, Neeraj Iyer M, Varun Dev, Melisa Miranda:

s-Domain Stability Analysis of Boost DC-DC Converter. 1-5 - Lavanya Bhaskar, R. Ranjith

:
Robust Text Extraction in Images for Personal Event Planner. 1-4 - Shubhro Shovan Roy, Samya Muhuri, Susanta Chakraborty:

Efficient Traffic Routing Method at Busy Intersections. 1-7 - Girja Kumari, Jayeeta Chakraborty

, Anup Nandy:
Effect of Reduced Dimensionality on Deep learning for Human Activity Recognition. 1-7 - Pankaj Kumar Mishra, Shashi Kant Verma:

A survey on clustering in wireless sensor network. 1-5 - Sujitha A. C, Prajith C. A:

Underwater Image Enhancement by Multiscale Fusion Technique and Dehazing. 1-6 - Aishwarya Sharma, Siba Panda, Saurav Verma

:
Sign Language to Speech Translation. 1-8 - G. Srinivasu

, T. Gayatri, Manoj Kumar Meshram, V. K. Sharma:
Design Analysis of an Ultra-Wideband Antenna for RF Energy Harvesting in 1.71-12GHz. 1-6 - Md. Farhan Sadique, Md. Anisur Rahman, S. M. Rafizul Haque:

Content Based Unsupervised Video Summarization Using Birds Foraging Search. 1-7 - Abdullah Al-Mamun Bulbul

, Md. Bellal Hossain, Bappy Ray, Shaon Md. Foorkanul Islam, Etu Podder, Md. Aminul Kabir, Ahmed Saif Muntaseer, Md. Mahmudul Hasan:
Life Automation: A Blessing of IoT. 1-7 - S. B. G. Tilak Babu

, Ch. Srinivasa Rao:
Statistical Features based Optimized Technique for Copy Move Forgery Detection. 1-6 - Thaharim Khan, Faisal Arafat, Mayen Uddin Mojumdar

, Aditya Rajbongshi, Shah Md. Tanvir Siddiquee, Narayan Ranjan Chakraborty
:
A Machine Learning Approach for Predicting the Sunspot of Solar Cycle. 1-4 - Gopikishan Thawre, Nitin Bahekar, B. R. Chandavarkar:

Use Cases of Authentication Protocols in the Context of Digital Payment System. 1-6 - Md Tanvir Islam

, M. Raihan
, Fahmida Farzana, Nasrin Aktar, Promila Ghosh
, Sajib Kabiraj:
Typical and Non-Typical Diabetes Disease Prediction using Random Forest Algorithm. 1-6 - B. R. Chandavarkar, Akhilraj V. Gadagkar:

Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks. 1-5 - Nazia Anjum Sharupa, Minhaz Rahman, Nasif Alvi, M. Raihan

, Afsana Islam, Tanzil Raihan:
Emotion Detection of Twitter Post using Multinomial Naive Bayes. 1-6 - Shreya Jhamb, Sandhya Java:

Application of Flipped Classroom For Online Education and Foreign Language Acquisition. 1-7 - Shubhankar Lipare, Prasenjit Bhavathankar:

Railway Emergency Detection and Response System using IoT. 1-7 - Pranjali P. Deshmukh, S. Y. Amdani:

Virtual Memory Management using Memory Ballooning in OpenStack Cloud Platform. 1-5 - Veerendra Kumar Alla, Mallikarjuna M

:
Routing Protocol Based on Bacterial Foraging Optimization and Type-2 Fuzzy Logic for Wireless Sensor Networks. 1-6 - Sashank Sridhar

, Sowmya Sanagavarapu, S. Chitrakala
:
Cross-Platform Remote Desktop Sharing with IP Tunneling. 1-7 - K. L. Nisha

, G. Sreelekha, P. S. Sathidevi, Poornima Mohanachandran, Anand Vinekar:
Automated Detection and Segmentation of Laser Marks in Retinal Fundus Images of Preterm Infants. 1-7 - Rik Das, Mohammad Arshad, P. K. Manjhi

, Sudeep D. Thepade
:
Improved Feature Generalization in Smaller Datasets with Early Feature Fusion of Handcrafted and Automated Features for Content Based Image Classification. 1-5 - Sajib Kabiraj, Laboni Akter

, M. Raihan
, Nusrat Jahan Diba, Etu Podder, Md. Mehedi Hassan
:
Prediction of Recurrence and Non-recurrence Events of Breast Cancer using Bagging Algorithm. 1-5 - Jumana Nagaria, Senthil Velan S

:
Utilizing Exploratory Data Analysis for the Prediction of Campus Placement for Educational Institutions. 1-7 - Soner Can Kalkan, Ozgur Koray Sahingoz

:
In-Vehicle Intrusion Detection System on Controller Area Network with Machine Learning Models. 1-6 - Dipesh Gyawali, Prashanga Pokharel, Ashutosh Chauhan, Subodh Chandra Shakya:

Age Range Estimation Using MTCNN and VGG-Face Model. 1-6 - B. S. Pranathi, Ananya Nair, C. S. Anushree, T. S. Chandar:

Sahayantra - A Patient Assistance Robot. 1-6 - Tanuja Pattanshetti, Subodh Kamble, Aditya Yalgude, Pranav Patil:

A survey on 'Apache Storm performance optimization using tuning of parameters'. 1-7 - Madhava Gaikwad, Ashwini Ramchandra Doke:

Featureless approach for predicting Critical Temperature of Superconductors. 1-5 - Faria Rahman

, Tasnime Mehejabin, Soniya Yeasmin, Manika Sarkar:
A Comprehensive Study of Machine Learning Approach on Cytological Data for Early Breast Cancer Detection. 1-6 - Debashis Sahoo

, Naveksha Sood, Usha Rani, George Abraham, Varun Dutt
, Dileep D.:
Comparative Analysis of Multi-Step Time-Series Forecasting for Network Load Dataset. 1-7 - Sk. Al Mamun, Md. Mahadi Hassan, Md. Riadul Islam, M. Raihan

:
Obstructive Sleep Apnea Detection Based on Sound Interval Frequency using Wearable Device. 1-4 - Sajib Kabiraj, M. Raihan

, Nasif Alvi, Marina Afrin, Laboni Akter
, Shawmi Akhter Sohagi, Etu Podder:
Breast Cancer Risk Prediction using XGBoost and Random Forest Algorithm. 1-4 - Supriyo Chakraborty

, Aurobinda Routray:
Multi-trace Inversion with Selective Wedge to Increase Thin Layer Resolution in Horizontal Layer. 1-5 - Abhishek Dutta, Abhisek Nayak, Aditya, Rama Ranjan Panda, Naresh Kumar Nagwani:

A Neuro Fuzzy System Based Inflation Prediction of Agricultural Commodities. 1-6 - Gunjan Chorasiya

, Sathans Suhag:
A comparative study of MVO and SSA optimized PID controller for LFC in EV integrated multi area network. 1-7 - Harshit Meena, Himanshu Nandanwar

, Dushyant Pahl, Anamika Chauhan:
IoT based perceptive monitoring and controlling an automated irrigation system. 1-6 - Bhawna Gaur:

HR4.0: An Analytics Framework to redefine Employee Engagement in the Fourth Industrial Revolution. 1-6 - Smita Paira, Joy Halder, Uma Bhattacharya, Monish Chatterjee:

A novel fragmentation-aware and energy-efficient multipath routing and spectrum allocation for prioritized traffic in protected EONs. 1-6 - S. Ullas

, Shreyansh Upadhyay, Vineeth Chandran, Pradeep S, T. M. Mohankumar:
Control Console of Sewage Treatment Plant with Sensors as Application of IOT. 1-7 - Earnest Paul Ijjina, Goutham Kanahasabai, Aniruddha Srinivas Joshi:

Deep Learning based approach to detect Customer Age, Gender and Expression in Surveillance Video. 1-6 - Sudarshan K. Valluru

, Gaurav Kumar, Rajul Kumar, Ankit Lal Meena:
Experimental validation and control of Laboratory aerial system by IC741-IOPID and IC741-FOP $I^{\lambda}$ Controllers: An Analog approach. 1-8 - Darshik A. S, Aditya Dev, Bharath M, Bharath Ashok Nair, G. Gopakumar:

Semantic Segmentation of Spectral Images: a Comparative Study using FCN8s and U-NET on RIT-18 Dataset. 1-6 - Prodipto Das

, Somen Debnath
:
A Trust Computing Model for Future Generation Networks. 1-4 - Samiksha Maheshwari, Akshita Bansal, Shweta Meena

:
Improved Analog Layout Productivity using Template-Driven Modgen Reuse Methodology. 1-5 - Arya Deo Mehta

, Hemant Sharma
:
Tracking Nostril Movement in Facial Video for Respiratory Rate Estimation. 1-6 - Anand P. Bora, Amit D. Joshi

, Suraj T. Sawant
:
Digitally Reconstructed Radiograph Generation for Enabling AI/ML in Medical Imaging. 1-6 - Riya Salian:

Performance Analysis of Voice over WLAN Intercom System and Optimized Implementation for Android Users. 1-7 - Ravi Kant Jain

, Baskar Joyti Saikia, Nitant Pilmo Rai, Partha Pratim Ray
:
Development of Web-based Application for Mobile Robot using IOT Platform. 1-6 - Md. Mehedi Hasan

, Muslima Tuz Zahara, Md. Mahamudunnobi Sykot, Arafat Ullah Nur, Mohd. Saifuzzaman
, Rubaiya Hafiz:
Ascertaining the Fluctuation of Rice Price in Bangladesh Using Machine Learning Approach. 1-5 - Md. Mehedi Hasan

, Hasmot Ali
, Md. Fahad Hossain
, Sheikh Abujar:
Preprocessing of Continuous Bengali Speech for Feature Extraction. 1-4 - Poushali Sengupta, Sudipta Paul, Subhankar Mishra:

BUDS: Balancing Utility and Differential Privacy by Shuffling. 1-7 - Gurveen Vaseer

:
Multi-Attack Detection using Forensics and Neural Network based Prevention for Secure MANETs. 1-6 - G. Yogalakshmi, B. Sheela Rani:

A Review On The Techniques Of Brain Tumor: Segmentation, Feature Extraction And Classification. 1-6 - Barkha Soni

, Nilay Khare, Kapil Kumar Soni, Akhtar Rasool:
Classical Equivalent Quantum Based Efficient Data Preprocessing Algorithm. 1-7 - Anindya Kumar Biswas

, Mou Dasgupta
:
A Secure Hybrid Routing Protocol for Mobile Ad-Hoc Networks (MANETs). 1-7 - Jayati Monga, Jayaditya Upadhya, Abhendra Pal Singh Gurjar, Akanksha, Ankit Sharma:

Design and Analysis of AMC based Metasurface Loaded Slot Antenna for Low Radar Cross Section. 1-7 - Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi

:
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique. 1-7 - Asif Ahamad P, S. Jeevaraj

:
Intrusion classification using ECLAT and Fuzzy Logic. 1-7 - Rohan Pudipeddi, Parikshit Phukan, Aneesh Gunda:

Nuclei Segmentation and Detection using Deep Convolutional Neural Networks. 1-5 - Ramya S. Nair, Supriya P:

Robotic Path Planning Using Recurrent Neural Networks. 1-5 - B. R. Chandavarkar, Amal Byju, Edwin Thomas:

An Improved and Reliable Sequential Decoding of Convolution Codes. 1-7 - V. Swathi, M. P. Vani

:
Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data Security. 1-6 - Prachi Kale, Pallabi Hazarika, B. R. Chandavarkar:

Undeniable Signature Scheme: A Survey. 1-7 - Koushik Bhargav Muthe, Thiru Srinivasa Teja Vemuru, Khushboo Sharma, Nilofer Sultana Mohammad:

Decentranet - An Ethereum, Proxy Re-Encryption and IPFS Based Decentralized Internet. 1-5 - Neeraj Sharma

, Sunil Agrawal
, Vinod Kapoor:
Performance Improvement for OADM based DP-QPSK WDM Optical Networks with 37.5 GHz Channel Spacing. 1-5 - Md. Muhaiminul Islam, Abu Kaisar Mohammad Masum

, Sheikh Abujar, Syed Akhter Hossain:
A systematic way of collecting data of insomniac patients: an analytical survey. 1-7 - Chethan K. S, Vishwanath S, Rakshith V. Patil, Vijetha K. A:

Segementation and Prediction from CT Images for Detecting Lung Cancer. 1-6 - Jalindar Karande

, Sarang Joshi
:
Real-Time Detection of Cyber Attacks on the IoT Devices. 1-6 - Sagee Geetha Sethu:

Legal Protection for Data Security: a Comparative Analysis of the Laws and Regulations of European Union, US, India and UAE. 1-5 - Ujjwal Singh, Anirudh Sharad:

The Smart City: A Holistic Approach. 1-7 - V. Narasimha Nayak, Kiran Kumar Gurrala:

A New Resource Allocation Approach for Swipt Enabled DF Relay-Based NOMA Network. 1-7 - Bandi Narasimha Rao, Reddy Sudheer, Mohan Aditya Sadhanala, Veerababu Tibirisettti, Sairam Muggulla:

Movable Surveillance Camera using IoT and Raspberry Pi. 1-6 - Vidhi Mody, Vrushti Mody, Soham Parekh:

A study on Cloud enabled Applications and their Security Issues. 1-8 - Venkataravana Nayak K., S. K. Sharathkumar, J. S. Arunalatha, Venugopal K. R.:

IR-FF-GSO: Image Retrieval using Feature Fusion and Glowworm Swarm Optimization. 1-6 - Sejal Badgujar, Anju S. Pillai

:
Fall Detection for Elderly People using Machine Learning. 1-4 - Saankhya Mondal:

Implementation of Human Face and Spoofing Detection Using Deep Learning on Embedded Hardware. 1-7 - Neel Madhav, Ranjit Sadakale:

Analysis of demagnetized BLDC Motor using MATLAB Simulink model and AWT analysis. 1-5 - Nitesh Kumar Sharma, Deepesh Kumar Gautam, M. R. Khan

:
Comparative Analysis on Multiplier. 1-5 - Ranjini R, Sanjay Srivatsa, K. S. Geetha:

PRS Generic Data Store Service. 1-6 - Mayen Uddin Mojumdar

, Narayan Ranjan Chakraborty
:
A Computer Vision Technique To Detect Scab on Malabar Nightshade. 1-4 - Md. Sabbir Alam Pran, Md. Rafiuzzaman Bhuiyan, Syed Akhter Hossain, Sheikh Abujar:

Analysis Of Bangladeshi People's Emotion During Covid-19 In Social Media Using Deep Learning. 1-6 - Samiha Lubaba, K. M. Faisal

, Moumita Sadia Islam, Mehedi Hasan:
Design of a Two-Bit Magnitude Comparator Based on Pass Transistor, Transmission Gate and Conventional Static CMOS Logic. 1-5 - Mohit Pant, Leeladhar Malviya

, Vineeta Choudhary:
Gain and Bandwidth Enhancement of 28 GHz Tapered Feed Antenna Array. 1-4 - Urvesh Rathod, Meghna Sonkar, B. R. Chandavarkar:

An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt. 1-7 - N. Ambily, K. Suresh:

Classification of Brain MRI Images Using Convolution Neural Network and Transfer Learning. 1-6 - Md. Faiyaz Bin Hassan

, Sanjida Sultana, M. Ifaz Ahmad Isti, Samiha Nuzhat
, Shovasis Kumar Biswas, Hriteshwar Talukder
:
Liquid Benzene Analyte Based Dual Core Surface Plasmon Resonance Sensor for Chemical Sensing. 1-6 - Siddharth Shrivastava, Upasana Mishra, Nitisha Singh, Anjali Chandra, Shrish Verma:

Control or Autism - Classification using Convolutional Neural Networks on Functional MRI. 1-6 - Sharmistha Mondal, Arindam Biswas:

Sharpening of 3D Digital Objects using Triangulation. 1-7 - Sachin Kumar M. R, Shushrutha K. S:

Implementation and Performance Analysis of NB-IoT in LTE. 1-4 - Piyush Juyal, Sachin Sharma

:
Estimation of Tree Volume Using Mask R-CNN based Deep Learning. 1-6 - Bhaskar Ghosh, Indira Kalyan Dutta, Michael W. Totaro, Magdy A. Bayoumi:

A Survey on the Progression and Performance of Generative Adversarial Networks. 1-8 - Md. Rafidul Hasan Khan

, Umme Sunzida Afroz, Abu Kaisar Mohammad Masum
, Sheikh Abujar, Syed Akhter Hossain:
Sentiment Analysis from Bengali Depression Dataset using Machine Learning. 1-5 - Pintu Kumar Ram

, Nabendu Bhui
, Pratyay Kuila
:
Gene Selection from High Dimensionality of Data Based on Quantum Inspired Genetic Algorithm. 1-5 - Richa Verma

, Shalini Chandra
:
A Fuzzy AHP Approach for Ranking Security Attributes in Fog-IoT Environment. 1-5 - Akanksha Jat, Shweta Panwalkar, Shweta Meena

:
Electromigration and Power Analysis of Digital Circuits at 10 nm Technology Node Before Signoff. 1-5 - Priyanka Ashok Shedbale, Rohini P. Mudhalwadkar, Saheli Mandavkar:

Non invasive assessment of Tissue oxygen using spectroscopy. 1-5 - Kishalay Bairagi

, Sulata Mitra, Uma Bhattacharya:
Coverage Aware Dynamic Scheduling Strategies for Wireless Video Sensor Nodes to Reduce Energy Consumption. 1-7 - Pooja Kumari

, Suman Deb
, Koustav De:
Statistical Proving of Enhanced Interaction and Augmentative Discourse for BYOD Supported Classroom. 1-6 - Bhavani Yerram

, Jaya Krishna Bhonagiri:
An Efficient Sorting Algorithm for binary data. 1-4 - Kumar Sai Sankar Javvaji, Md. Abbas Hussain:

Prototype of Aquaculture using IoT Technologies. 1-4 - B. R. Chandavarkar:

Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status. 1-7 - Ojas A. Ramwala, Himansh Mulchandani

, Poojan Dalal, Mita C. Paunwala
, Chirag N. Paunwala
:
COVID-19 Diagnosis from Chest Radiography Images using Deep Residual Network. 1-5 - Saurabh Chakole, Neema Ukani:

Low-Cost Vision System for Pick and Place application using camera and ABB Industrial Robot. 1-6 - Ganga Bhavani

:
Artificial Intelligence: Simulations in Audit Education. 1-5 - Afran Sorwar, Elias Ahammad Sojib, Md. Ashik Zafar Dipto, Md. Mostak Tahmid Rangon, Md. Sabbir Alam Chowdhury, Abdul Hasib Siddique:

Design of a High-Performance 2-bit Magnitude Comparator Using Hybrid Logic Style. 1-5 - Nikish Kumar S. V, Saiharsha Balasubramaniam, Sanjay Tharagesh R. S, Priyanka Kumar, Janavi B:

An Autonomous Food Wastage Control Warehouse: Distributed Ledger and Machine Learning based Approach. 1-6 - M. Ravichandra Babu, Pulakesh Roy, Rajib Banerjee:

Harmonic Analysis for Power Loss Minimization in Radial Distribution System. 1-5 - Prajval M, B. R. Chandavarkar:

Implementation of Ship Motion Mobility Model in UnetStack for Underwater Sensor Networks. 1-6 - Lavanya Bhaskar, Rahul B. Natak, R. Ranjith

:
Unit Testing for USB Module Using Google Test Framework. 1-3 - Selvamani Chandrasekaran

, K. I. Ramachandran, S. Adarsh, Ashish Kumar Puranik:
Avoidance of Replay attack in CAN protocol using Authenticated Encryption. 1-6 - Aboli Marathe

, Kapil Mirchandani, Kushal Chordiya, Kevin Stephen:
Big Data Analytics for Sustainable Cities: Pune Tree Census Data Exploratory Analysis. 1-7 - Pallab Kumar Sarkar, Imteaz Rahaman, Mim Naz Rahman, Md. Fahad Hasan:

Investigation of Reduced Size Annular Ring Patch Antenna with EBG Structure for Wireless Applications. 1-4 - Sachin Sharma

, Rishabh Raj Mishra, Vikas Joshi, Kavleen Kour:
Analysis and Interpretation of Global Air Quality. 1-5 - Aqsa Hashmi, C. P. Gupta:

VNE-NR: A Node-Ranking Method for Performing Topology-Aware and Resource-Driven Virtual Network Embedding. 1-6 - Suyash Ghuge, Nishant Kumar

, Tilak Shenoy, Sowmya Kamath S.
:
Deep Neural Network Models for Detection of Arrhythmia based on Electrocardiogram Reports. 1-7 - Pranaba K. Mishro

, Sanjay Agrawal
, Rutuparna Panda, Ku. Tapaswini Hansdah:
MR Image Enhancement using Stationary Wavelet Transform based Approach. 1-6 - Sayli Shinde, Manisha Bansode, Pramod P. Bhavarthe

, Surendra S. Rathod
:
Suppression of SSN in High-Speed Circuits using 1-D EBG structure. 1-4 - E. Sudheer Kumar

, Chigarapalle Shoba Bindu
:
An Efficient Approach to Accomplish Automatic Segmentation of Optic Cup Using Modified U-Net. 1-5 - Shreya Mahajan

, Yajvender Pal Verma:
Optimizing DG Parameters for Voltage Profile and Real Power Loss Improvement using Elephant Herd Optimization. 1-6 - Bandi Narasimha Rao, M. V. Raghunadh, Reddy Sudheer:

Noise Power Estimation for OFDM System. 1-6 - Nishu Malik, Sateesh Kumar Awasthi, Neetu Sood:

Centrality as a Friendship Selection Heuristic in Social Internet of Things. 1-6 - Sanketh Saha, Nishanth M, Praveen T, Rajalekshmi N, Prabu T:

Comparative Analysis between Direct Torque Control and v/f Control for Electric Vehicles. 1-6 - G. K. Nithya, Sethuraman N. Rao:

Evaluation of Sub-Ghz Frequencies for IoT Applications. 1-7 - Ayush Pant, Akshat Jain, Kiran C. Nayak, Daksh Gandhi, B. G. Prasad

:
Pneumonia Detection: An Efficient Approach Using Deep Learning. 1-6 - Abdullah Al-Mamun Bulbul

, Rayhan Habib Jibon
, Md. Abdul Awal, Etu Podder, Himadri Shekhar Mondal, Md. Salim Ahmed, Md. Bellal Hossain
, Md. Mahmudul Hasan, Avijit Saha:
Toxic Chemicals Detection using Photonic Crystal Fiber in THz Regime. 1-5 - Jitendra Kumar Mahawar, Anil Kumar Dahiya:

Parmanent Magnet Synchronous Motor Control Based on Model Reference Adaptive Approach. 1-5 - Bharat Giddwani, Shruti Pandey, Hitesh Tekchandani, Shrish Verma:

CSTA-2P1D UNet: Consecutive Spatio-Temporal Attention for Multi-Scale 3D Pancreas Segmentation. 1-7 - Ramasamy Madhumathi

, Arumuganathan T, Shruthi R:
Soil NPK and Moisture analysis using Wireless Sensor Networks. 1-6 - Shanila Yunus Yashfi, Md Ashikul Islam, Pritilata, Nazmus Sakib, Tanzila Islam, Mohammad Shahbaaz, Sadaf Salman Pantho:

Risk Prediction Of Chronic Kidney Disease Using Machine Learning Algorithms. 1-5 - S. Priya, S. Selvakumar

, R. Leela Velusamy:
Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes. 1-6 - Nishant Kumar

, C. Parangjothi, Sankarshan Guru, M. Kiran:
Peer Consonance in Blockchain based Healthcare Application using AI-based Consensus Mechanism. 1-7 - Md Tanvir Islam

, M. Raihan
, Nasrin Aktar, Md. Shahabub Alam
, Romana Rahman Ema, Tajul Islam:
Diabetes Mellitus Prediction using Different Ensemble Machine Learning Approaches. 1-7 - Kandala Sree Rama Murthy, Vazhora Malayil Manikandan:

A Block-wise Histogram Shifting based Reversible Data Hiding Scheme with Overflow Handling. 1-6 - T. Gayatri

, G. Srinivasu, Manoj Kumar Meshram, V. K. Sharma:
Analysis and Design of a Planar UWB Antenna for Spectrum Sensing in 3.1-10.6GHz. 1-6 - Deepak Mittal

, V. K. Tomar:
Performance Evaluation of 6T, 7T, 8T, and 9T SRAM cell Topologies at 90 nm Technology Node. 1-4 - Sangay Tenzin

, Pema Dorji
, Bevek Subba
, Thinley Tobgay
:
Smart Check-in Check-out System for Vehicles using Automatic Number Plate Recognition. 1-6 - Deepali, Indu Saini, Mamta Khosla

:
Low Power 32-bit Synchronous and Reconfigurable ALU Design using Chain Structure. 1-7 - Kumar Sai Sankar Javvaji, Usha Rani Nelakuditi, Bhanu Prasad Dadi:

IoT Based Cost Effective Home Automation and Security System. 1-5 - Masud Rabbani

, Md. Jueal Mia
, Thaharim Khan, Md Ishrak Islam Zarif:
A Survey on RealSense: in context of Research and Application. 1-6 - Himanshu N. Bhonge, Monish K. Ambat, B. R. Chandavarkar:

An Experimental Evaluation of SHA-512 for Different Modes of Operation. 1-6 - J. Karthik, P. P. Amritha, M. Sethumadhavan:

Video Game DRM: Analysis and Paradigm Solution. 1-4 - Mehmet Korkmaz

, Ozgur Koray Sahingoz
, Banu Diri:
Detection of Phishing Websites by Using Machine Learning-Based URL Analysis. 1-7 - Budhadeb Maity, Sisir Kumar Nayak:

Wideband CPW-fed U-Shaped Antenna array for WLAN and WiMAX applications. 1-4 - Niveditha Oruganti, Tripty Singh

:
Modified Hough Transformation for ROI. 1-6 - Yindumathi K. M, Shilpa Shashikant Chaudhari, Aparna R

:
Analysis of Image Classification for Text Extraction from Bills and Invoices. 1-6 - Hasmot Ali

, Md. Fahad Hossain
, Shaon Bhatta Shuvo
, Ahmed Al Marouf:
BanglaSenti: A Dataset of Bangla Words for Sentiment Analysis. 1-4 - Aravind H

, Sivraj P
, K. I. Ramachandran:
Design and Optimization of CNN for Lane Detection. 1-6 - Charu Varshney, S. C. Jain, Vikash Tripathi:

An Overview of Rumour Detection based on Social Media. 1-6 - Anil Kumar, Prathibha Hebbar, Arvind Handoo, V. Ravichandran, S. Sudhakar, Puneet Kumar Pandey:

CCSDS Based Spacecraft Telemetry System with Programmable Bit Rate and Turbo Encoding for India's Inter-planetary Exploration. 1-6 - Rohit H. R., Sachin B. S., Aditya P., Bhishm Tripathi, Premananda B. S.

:
Performance Evaluation of Various Beamforming Techniques for Phased Array Antennas. 1-6 - Md. Muhaiminul Islam, Abu Kaisar Mohammad Masum

, Sheikh Abujar, Syed Akhter Hossain:
Prediction of chronic Insomnia using Machine Learning Techniques. 1-7 - Earnest Paul Ijjina, Aniruddha Srinivas Joshi, Goutham Kanahasabai:

Detection of Customer Interested Garments in Surveillance Video using Computer Vision. 1-5 - Rutuja Umesh Madhure, Radha Raman, Sandeep Kumar Singh

:
CNN-LSTM based Electricity Theft Detector in Advanced Metering Infrastructure. 1-6 - Sachin Sharma

, Abhinav Sharma, Tanya Goel, Rohan Deoli, Seshadri Mohan:
Smart Home Gardening Management System: A Cloud-Based Internet-of-Things (IoT) Application in VANET. 1-5 - P. S. Priyanka, Manoraj Gnanadas, Supriya P:

Standalone Portable Host for Unified Bootloader in PIC devices using CAN interface. 1-4 - Angshuman Jana, Dipendu Maity:

Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks. 1-6 - Pankaj Dwivedi

, C. Shraddha
, Shreyas Mathews, Sudipta Majumder, R. Madhumathi, M. R. Vasundhara:
Predicting Language Endangerment: A Machine Learning Approach. 1-7 - Rushabh Khara, Deepika Pomendkar, Rishika Gupta

, Ishwarlal Hingorani, Dhananjay R. Kalbande
:
Micro Loans for Farmers. 1-5 - Vignesh S. Rao, Tarunkant Gupta, Saastha Vasan, Deepthi L. R

:
PHPIL: Fuzzing the PHP Interpreter with Custom Bytecode. 1-5 - Isha Indhu S, Kavya S. Kumar, U. Vamsi Krishna, Neethu Mohan

, V. Sowmya
, K. P. Soman:
Investigating the Significance of Dynamic Mode Decomposition for Fast and Accurate Parameter Estimation in Power Grids. 1-5 - Abhishek Kumar Sinha, Deepak Mishra

:
T3D-Y Codec: A Video Compression Framework using Temporal 3-D CNN Encoder and Y-Style CNN Decoder. 1-7 - Ceren Cebi, Enes Atac, Ozgur Koray Sahingoz

:
Job Shop Scheduling Problem and Solution Algorithms: A Review. 1-7 - Nithin Kumar

, Nagarathna
:
Survey on Computational Entomology: Sensors based Approaches to Detect and Classify the Fruit Flies. 1-6 - Sangita Das, Md. Moontasir Rashid

, Jannatul Firdous, Md. Niaz Morshedul Haque:
Design, Analysis and Simulation of a Solar Powered DC Motor using MOSFET H-bridge Converter. 1-7 - Agnel Lazar Alappat, Vipin Milind Kamble:

Image Quality Assessment using Selective Contourlet Coefficients. 1-7 - Vivek Raj K

, Akshatha Patil, Roopashree N, Sanmati Gudaje, Kavya G. B:
Detection of Glaucoma in Retinal Image using Image Processing and SVM. 1-6 - Suyash Chavan, Janani Balasubramanian, Jai Puro, Meghana Naik, Anant V. Nimkar

:
Similarity Analysis of Legal Documents using Content and Network Based Approach. 1-7 - Shifat Nayme Shuvo, Fuad Hasan, Syed Akhter Hossain, Sheikh Abujar:

Handwritten Polynomial Equation Recognition and Simplification Using Convolutional Neural Network. 1-6 - Dipannyta Nandi, Rohini Basak:

A Quest to Detect Novelty Using Deep Neural Nets. 1-7 - Abhishek Revadekar, Rahul Soni, Anant V. Nimkar

:
QORAl: Q Learning based Delivery Optimization for Pharmacies. 1-7 - Mohd. Saifuzzaman

, Syeda Farjana Shetu
, Nazmun Nessa Moon, Fernaz Narin Nur
, Mohammad Hanif Ali:
IoT Based Street Lighting Using Dual Axis Solar Tracker and Effective Traffic Management System Using Deep Learning: Bangladesh Context. 1-5 - Piyush Kulshreshtha

, Amit Kumar Garg:
Managing 5G Networks - A Review of FSO Challenges and Solutions. 1-4 - Mustafa Aljshamee

, Ruaa Alsabah
, Ayad Hameed Mousa, Ali Al-Sabbagh:
(Portable) Low-cost electroencephalogram (EEG) Recorder for Brain computer-interface (BCI). 1-6 - Bekir Sarlak:

Agile Methodology for Project/Process Management IT System Infrastructure. 1-7 - Suchetha R. Pujar, Shilpa Shashikant Chaudhari, Aparna R

:
Survey on Data Integrity and Verification for Cloud Storage. 1-7 - Khalid Amin, Shammy Kumar, Kartikey Solanki:

Ammonia Gas Sensor using $In_{(1-x)}Ga_{(x)} As$ as Nanowire Material. 1-6 - Anjeneya Swami Kare

, Sreshta Valluru:
Heuristics for the Power Edge Set Problem. 1-7 - Urvashi Karnani Gaur, D. D. Sonvane, Vaibhav Kumar, Rajesh Kalmady:

SANMAN-Management Software for Hyperscale SAN based storage system. 1-4 - Md. Fahad Hasan, Imteaz Rahaman, Md. Shaoran Sayem, Md. Mahbub Hasan

, Borhanul Kabir Tamal, Md. Anisur Rahman Rubel:
Designing of Cost-Effective Human Assistive Robot and Performance Enhancement. 1-5 - Manjula P. M, S. Adarsh, K. I. Ramachandran:

Driver Inattention Monitoring System Based on the Orientation of the Face Using Convolutional Neural Network. 1-7 - Neetu Gupta

, Ritu Vijay:
Effect on Reconstruction of Images by Applying Fractal Based Lossy Compression Followed by Symmetrical Encryption Techniques. 1-7 - Pranesh S. A, Vignesh Kannan V, Viswanathan N, M. Vijayalakshmi

:
Design and Analysis of Incentive Mechanism for Ethereum-based Supply Chain Management Systems. 1-6 - Sheikh Arif Ahmed, Md. Aref Billah, Abdullah Al Noman, Ali Haider Doha, Shahidul Islam Khan:

A framework to establish a Rule-based specialized dropout prevention scheme. 1-6 - Venkat Sankaran:

Organizational Leadership: Igniting Creativity for Sustained Corporate Success. 1-6 - Mumenunnessa Keya, Abu Kaisar Mohammad Masum

, Bhaskar Majumdar, Syed Akhter Hossain, Sheikh Abujar:
Bengali Question Answering System Using Seq2Seq Learning Based on General Knowledge Dataset. 1-6 - Bedatrayee Ghosh, Priyanka Parimi

, Rashmi Ranjan Rout:
Improved Attribute-Based Encryption Scheme in Fog Computing Environment for Healthcare Systems. 1-6 - Md. Ekhlasur Rahaman

, Rayhan Habib Jibon
, Md. Bellal Hossain
, Himadri Shekhar Mondal, Abdullah Al-Mamun Bulbul
, Avijit Saha, Md Mahmud Hassan:
Sensing Toxic Carbonyl Compounds in Cigarette Smoke by Photonic Crystal Fiber. 1-5 - Kizhakkelan Sudhakaran Siddharth

:
Imaging as a non-intrusive tool in quantifying the dynamics of liquid sheets. 1-6 - Raj Anchan, Ashwin Pillay, Aditya Kale, Aniket Bhadricha, Sangeetha Prasanna Ram:

Optimal Bipolar Lead Placement in Electrooculography (EOG): A Comparative Study with an Emphasis on Prolonged Blinks. 1-7 - A. K. M. Shahariar Azad Rabby

, Md. Majedul Islam, Nazmul Hasan, Jebun Nahar, Fuad Rahman
:
Language Detection using Convolutional Neural Network. 1-5 - Sharun Akter Khushbu, Abu Kaisar Mohammad Masum

, Sheikh Abujar, Syed Akhter Hossain:
Neural Network Based Bengali News Headline Multi Classification System: Selection of Features describes Comparative Performance. 1-6 - Rahul Kumar, Garima Sarupria, Varshil Panwala, Smit Shah, Nehal Shah:

Power Efficient Smart Home with Voice Assistant. 1-5 - Pooja Garlapati, Hemalatha Chilaka, Manohar Rangu, Raju Chigula, Sulakshana Chilukuri

:
A Circularly Polarized Multiband Multimode SIW antenna: Multi-band and multi mode SIW Antenna. 1-5 - Ashima Yadav, Dinesh Kumar Vishwakarma:

A Multilingual Framework of CNN and Bi-LSTM for Emotion Classification. 1-6 - Utkarsh Alset

, Atul Kulkarni, Hrishikesh Mehta
:
Performance Analysis of Various LoRaWAN Frequencies For Optimal Data Transmission Of Water Quality Parameter Measurement. 1-6 - Ambarish Ganguly, Rik Das, S. K. Setua:

Histopathological Image and Lymphoma Image Classification using customized Deep Learning models and different optimization algorithms. 1-7 - Aleena S. L, Prajith C. A:

Retinal Lesions Detection for Screening of Diabetic Retinopathy. 1-6 - Antony Albert Anto, Robince P. O, Gautham Krishna, Jacob Joseanto, Christeen PG:

Modular Integrated Automated Substation System. 1-4 - Shaheera Saba Mohd Naseem Akhter, Priti P. Rege

:
Improving Skew Detection and Correction in Different Document Images Using a Deep Learning Approach. 1-6 - Iftakhar Mohammad Talha

, Imrus Salehin
, Susanta Chandra Debnath, Mohd. Saifuzzaman
, Nazmun Nessa Moon, Fernaz Narin Nur
:
Human Behaviour Impact to Use of Smartphones with the Python Implementation Using Naive Bayesian. 1-6 - Joanita DSouza, Senthil Velan S

:
Using Exploratory Data Analysis for Generating Inferences on the Correlation of COVID-19 cases. 1-6 - Behire Yesim Yilmaz, Sueda Nur Denizer:

Multi UAV Based Traffic Control in Smart Cities. 1-7 - Nusrat Jahan

, Saiful Islam, Md. Ferdouse Ahmed Foysal:
Real-Time Vehicle Classification Using CNN. 1-6 - Tasnime Mehejabin, Faria Rahman

, Soniya Yeasmin, Manika Sarkar:
Identification of Most Relevant Breast Cancer miRNA using Machine Learning Algorithms. 1-6 - Devika Anil, Sivraj P.

:
Electric Vehicle Charging Communication Test-bed following CHAdeMO. 1-7 - Ankush Gandhi, Satyasai Jagannath Nanda

:
Time Series Forecasting using a Polynomial Controlled S-transform. 1-7 - Rahul Kumar, Kamalakanta Sethi, Nishant Prajapati, Rashmi Ranjan Rout, Padmalochan Bera:

Machine Learning based Malware Detection in Cloud Environment using Clustering Approach. 1-7 - A. Sampathkumar, R. Maheswar, Pon Harshavardhanan

, S. Murugan, P. Jayarajan, V. Sivasankaran:
Majority Voting based Hybrid Ensemble Classification Approach for Predicting Parking Availability in Smart City based on IoT. 1-8 - Tanay Mehendale, Vishal Ramina, Soham Pinge

, Sujata Kulkarni:
Analysis of the Effects of Different types of Noises and Wavelets used in Denoising of an Image using Wavelet Transform. 1-5 - S. M. Abrar Kabir Chowdhury, Jahanara Islam Lubna:

Review on Deep Fake: A looming Technological Threat. 1-7 - Harsh Pallav Govind Rao, Shiva Dwivedi:

Logical Unit Design using Reversible HSG1 Gate and Its Application in ALU Design. 1-6 - Md Whaiduzzaman

, Khondokar Oliullah
, Md. Julkar Nayeen Mahi
, Alistair Barros:
AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment. 1-7 - Aiswarya Mohan K. P, Saranya Chandran, Gilad Gressel

, Arjun T. U, Vipin Pavithran:
Using Dtrace for Machine Learning Solutions in Malware Detection. 1-7 - Disha Uke, Kapil Kumar Soni, Akhtar Rasool:

Quantum based Support Vector Machine Identical to Classical Model. 1-6 - K. Sarangam, N. Bheema Rao:

A FinFET based 2nd-Order Fully Differential Passive Sigma Delta Modulator for Low Power ADC. 1-5 - Jarina Akter, Md. Nur Uddin, Mohosinul Hasan, Bipash Kumar Biswas, Mohammad Mahmudul Alam Mia

, Shovasis Kumar Biswas:
Analysis of Microstructured Photonic Crystal Fiber: An Improved Design. 1-4 - Md. Rafiuzzaman Bhuiyan, Mahmudul Hasan Mahedi, Naimul Hossain, Zerin Nasrin Tumpa, Syed Akhter Hossain:

An Attention Based Approach for Sentiment Analysis of Food Review Dataset. 1-6 - C. Lalrinmawii, Vanlalhruaia

, Somen Debnath
:
Analysis of Post centric suicidal expressions and classification on the Social Media Post: Twitter. 1-5 - Riya Dichwalkar, Shreya Oak, Tania Rajabally, Dhananjay R. Kalbande

:
Activity Recognition and Fall Detection in Elderly People. 1-6 - Babe Sultana, Farzana Rahman, Hasib Ahmed Nesar, T. M. Shahriar Sazzad:

A Framework to Figure Out Breast Cancer Cells Using Ultrasound Images. 1-6 - V. Akshatha Prasad, R. Ranjith

:
Intelligent Chatbot for Lab Security and Automation. 1-4 - Munira Ferdous, Jui Debnath, Narayan Ranjan Chakraborty

:
Machine Learning Algorithms in Healthcare: A Literature Survey. 1-6 - Rohini Shelke, Ranjit Sadakale:

Optimization of Memory Oriented Network-on-Chip for FPGA. 1-6 - Barnana Baruah

, Subhasish Dhal:
An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices. 1-7 - Sonali Rout, Ramesh Kumar Mohapatra:

Video Steganography using Curvelet Transform and Elliptic Curve Cryptography. 1-7 - Srishti Vashishtha, Seba Susan

:
Fuzzy Interpretation of Word Polarity Scores for Unsupervised Sentiment Analysis. 1-6 - Binish Fatimah

, Dipro Pramanick, Pranav Shivashankaran:
Automatic detection of mental arithmetic task and its difficulty level using EEG signals. 1-6 - Dheeraj Varma, Shikhar Mishra, Ankita Meenpal:

An Adaptive Image Steganographic Scheme Using Convolutional Neural Network and Dual-Tree Complex Wavelet Transform. 1-7 - Anupama Chennamadhava, Sudheesh Nagamalla, Mahesh Nirati, Y. Vijayalata, Dipen Bepari:

Throughput Maximization in Wireless Powered Energy Harvesting Based Sensor Networks. 1-6 - S. M. Saiful Islam Badhon

, Md. Habibur Rahaman, Farea Rehnuma Rupon
, Sheikh Abujar:
State of art Research in Bengali Speech Recognition. 1-6 - Swarnalina Laha, Nilanjan Chowdhury, Raja Karmakar:

How Can Machine Learning Impact on Wireless Network and IoT? - A Survey. 1-7 - M. Bhavya, Pushpa C. N

, J. Thriveni
, Venugopal K. R.:
EFUMS: Efficient File Upload and Mutli-Keyword Search over Encrypted Cloud Data. 1-6 - Jarina Akter, Md. Nur Uddin, Shovasis Kumar Biswas:

Theoretical Investigation of a Dispersion Compensating Photonic Crystal Fiber with Ultra-High Dispersion Coefficient and Extremely High Nonlinearity. 1-4 - Delwar Hossain Himel, Md. Mostafa Faruk, Shovasis Kumar Biswas:

Numerical Study of Rectangular Air-Holes Based Highly Dispersion Compensating Octagonal Photonic Crystal Fiber: A Novel Approach. 1-3 - Yeresime Suresh

, J. Vaishnavi, M. Vindhya, Mohammed Sadiq Afreed Meeran, Supritha Vemala:
MUDRAKSHARA - A Voice for Deaf/Dumb People. 1-8 - Md. Ashraful Islam Talukder, Sheikh Abujar, Abu Kaisar Mohammad Masum

, Sharmin Akter, Syed Akhter Hossain:
Comparative Study on Abstractive Text Summarization. 1-4 - Shibu S. Narayanan, G. Gopakumar:

Recursive Block Based Keypoint Matching For Copy Move Image Forgery Detection. 1-6 - Fozilatoon Humaira, Md Sanju Islam, Fernaz Narin Nur

, Kazi Anowar Hussain:
A Comprehensive Study on Machine Learning Algorithms for Wireless Sensor Network Security. 1-6 - Sumanto Dutta, Sumit Hazra

, Anup Nandy:
A Smart Ambulatory Cognitive State Taxonomy System Through EEG Signal Analysis. 1-7 - Malneedi Vamsi, K. P. Soman:

In-Vehicle Occupancy Detection And Classification Using Machine Learning. 1-6 - M. Raihan

, Md Tanvir Islam
, Promila Ghosh
, Md. Mehedi Hassan
, Jarif Huda Angon, Sajib Kabiraj:
Human Behavior Analysis using Association Rule Mining Techniques. 1-5 - Mubdi-Ul Alam Sajid, Md Firoz Mahmud, Imteaz Rahaman, Saquib Shahriar, Mim Naz Rahman:

Design of An Intelligent Wheelchair for Handicap People Conducting by Body Movement. 1-5 - Jai Mangal, Gaurav Varshney

, N. Anveshkumar:
Miniaturization of a Conventional WLAN 2.45GHz Patch Antenna using Slot Insertion Technique. 1-7 - B. Seetharamulu, B. Naresh Kumar Reddy

, K. Bramha Naidu:
Deep Learning for Sentiment Analysis Based on Customer Reviews. 1-5 - Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy

:
A two-stage opamp frequency Compensation technique by splitting the 2nd stage. 1-5 - Md. Ashik Zafar Dipto, Afran Sorwar, Elias Ahammad Sojib, Md. Mostak Tahmid Rangon:

Performance Improvement in Conventional 4-bit Static CMOS Carry Look-Ahead Adder by Modifying Carry-Generate and Propagate Terms. 1-5 - Bhavani Yerram

, Sai Srikar Puppala, Spoorthy Shivani Pabba, Kavya Sri Kasarla, Kadipaka Anvitha:
Image Segmentation Based Hybrid Watermarking Algorithm for Copyright Protection. 1-6 - Richa Gupta:

Hybrid-Flipped class room Approach for Fashion Design Students: Mitigating impacts to Learning Activities due to Emergence of COVID-19. 1-6 - Syeda Farjana Shetu

, Mohd. Saifuzzaman
, Masuma Parvin
, Nazmun Nessa Moon, Ridwanullah Yousuf, Sharmin Sultana:
Identifying the Writing Style of Bangla Language Using Natural Language Processing. 1-6 - Anil Singh Parihar, Gokul Gupta:

A Study on Dark Channel Prior based Image Enhancement Techniques. 1-7 - Romana Rahman Ema, Abdullah Anik, Nurun Nahar, Md. Ashiqur Rahman, Khaleda Parven Eti, Tajul Islam:

Simulation Based Performance Analysis of Proactive, Reactive and Hybrid Routing Protocols in Wireless Sensor Network. 1-6 - Priyanka S. Sangle, R. M. Goudar, A. N. Bhute:

Methodologies and Techniques for Heart Disease Classification and Prediction. 1-6 - Etu Podder, Abdullah Al-Mamun Bulbul

, Md. Bellal Hossain
, Md. Ekhlasur Rahaman
, Himadri Shekhar Mondal, M. Raihan
, Sajib Kabiraj, Md. Mahmudul Hasan, Ahmed Saif Muntaseer:
Detection of lung agents through rectangular hollow-core photonic crystal fiber. 1-5 - Joy Halder, Tamaghna Acharya, Monish Chatterjee, Uma Bhattacharya:

Optimal Design of Energy Efficient Survivable Routing & Spectrum Allocation in EON. 1-6 - Chandranshu Gupta

, Asmita Mahajan
:
Evaluation of Proof-of-Work Consensus Algorithm for Blockchain Networks. 1-7 - Mumenunnessa Keya, Bhaskar Majumdar, Md. Sanzidul Islam

:
A Robust Deep Learning Segmentation and Identification Approach of Different Bangladeshi Plant Seeds Using CNN. 1-6 - Ram Kumar Paul, Ayan Banerjee, Partha Dhara, Pintu Maity:

High resolution digital filter implementation and its data acquisition system augmentation with VECC DAQ. 1-5 - Ojal Bhatnagar, Natasha Surendran, Md. Mahfooz Alam:

Development Of An Algorithm For a Target Platform-following Robot Using LoRa Signals. 1-5 - (Withdrawn) 6G Wireless Communication: Its Vision, Viability, Application, Requirement, Technologies, Encounters and Research. 1-8

- Ratikanta Sahoo

:
A Batman shaped Conformal Antenna for WiMAX Application. 1-4 - Vidyashree K. R, M. N. Dinesh

:
Implementation of composite DIMSE services. 1-7 - Gurdit Singh, Nitin Aggarwal, Kanika Gupta, Devendra Kumar Misra:

Plant Identification Using Leaf Specimen. 1-7 - Ramji Balasubramanian, V. Sowmya

, E. A. Gopalakrishnan, Vijay Krishna Menon
, V. V. Sajith Variyar
, K. P. Soman:
Analysis of Adversarial based Augmentation for Diabetic Retinopathy Disease Grading. 1-5 - Md. Hasan Imam Bijoy

, Md. Rakibul Hasan, Masud Rabbani
:
RBS: A New Comparative and Better Solution of Sorting Algorithm for Array. 1-5 - Dev V. Savla, Amogh N. Parab, Kaustubh Y. Kekre, Jay P. Gala, S. Ramchandra, Pankaj A. Sonawane:

Virtual Farmer: Real Time Crop Prediction and Automatic Irrigation System. 1-5 - Kuldeep Singh

, Madhvendra Misra
:
Corporate Social Responsibility as a tool for healthtech startups: Modelling enablers of healthcare and social support system to fight Coronavirus Pandemic. 1-6 - Tanvir Ahmed, Prangon Das

, Md. Firoj Ali, Md-Firoz Mahmud:
A Comparative Study on Convolutional Neural Network Based Face Recognition. 1-5 - Angie A. G. Liong, Lenin Gopal, Filbert H. Juwono

, Choo W. R. Chiong
, Yue Rong:
Channel Characteristics Comparison of Single-Relay and Two-Relay Two-Way PLC Systems. 1-6 - V. Anil Kumar, Debabrata Das

:
Data Sequence Map Flooding in MPTCP Framework: Potential Challenges and Efficient Countermeasures. 1-7 - Usha Maddipati, Shaik Ahemedali, Maddipati Sri Sai Ramya, M. D. Praneeth Reddy, K. N. J. Priya:

Comparative analysis of 16-tap FIR filter design using different adders. 1-4 - Shruti Gedam, Sanchita Paul:

Automatic Stress Detection Using Wearable Sensors and Machine Learning: A Review. 1-7 - Manasa Sathyan, Manu Vimal, Akhil Siddharth, T. S. Chandar:

Object Retrieval in an Indoor Environment Using Swarm Intelligence. 1-7 - Songhita Misra, K. V. Paluri, Rabul Hussain Laskar:

A Robust Feature Based Approach for Bare-Hand Detection under Practical Non-Ideal Conditions. 1-8 - Nourin Sathar, C. A. Nisha Bhandari, C. A. Mukund Jakhiya:

Impact of Emotional Stability on Work Performance of Employees Working in Steel Fabrication Companies. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














