


default search action
ICMC 2021: Shibpur, India
- Debasis Giri, Kim-Kwang Raymond Choo

, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 - Mohan Chintamani, Laba Sa:

A Blind Signature Scheme Based on Bilinear Pairings. 1-8 - Yasuhiko Ikematsu, Shuhei Nakamura:

Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System". 9-21 - Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:

CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. 23-38 - Yasuhiko Ikematsu:

A Study on Randomness Used in Signature Generation of UOV. 39-50 - Imad El Hanouti

, Hakim el Fadili, Fawad Ahmed, Jawad Ahmad:
On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation. 51-62 - Shramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury:

Image Encryption with Parallel Evolution of 2-D Cellular Automata. 63-78 - Satyam Omar, Sahadeo Padhye, Dhananjoy Dey:

A New Identity-Based Multivariate Signature Scheme. 79-91 - Ayan Ghosh

, Abhishek Raj
, Ayantika Chatterjee
:
Encrypted Operator Design with Domain Aware Practical Performance Improvement. 93-107 - Hitesh Narayan Soneji, Aniruddh Sajith Soman, Aniruddh Vyas, Shubha Puthran:

A Comprehensive Review of Fraudulent Email Detection Models. 109-127 - Ashidha Anil, T. A. Rufzal, Vipindev Adat Vasudevan:

DDoS Detection in Software-Defined Network Using Entropy Method. 129-139 - Emanuele Bellini, Alessandro De Piccoli

, Rusydi H. Makarim, Sergio Polese, Lorenzo Riva, Andrea Visconti
:
New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers. 141-151 - Francisco Vial-Prado, Aron Wussler:

OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges. 153-170 - Nanda Rani

, Sunita Vikrant Dhavale
, Amarjit Singh, Atul Mehra:
A Survey on Machine Learning-Based Ransomware Detection. 171-186 - Feng-Wei Lee

, Denis Chee-Keong Wong
, Bok-Min Goi
, Wai-Kong Lee
:
Variant of Niederreiter-Based Signature Scheme for Blockchain Technology. 187-200 - Jagannath Sethi

, Jaydeb Bhaumik, Ananda S. Chowdhury:
Chaos-Based Uncompressed Frame Level Video Encryption. 201-217 - Vishakh Rao, K. U. Hemanth, Bhawana Rudra:

Comparison of Algorithms for Style Transfer of Images Using Texture Synthesis. 219-236 - Huy Nguyen Quoc

, Vinh Truong Hoang
:
Ear Localization Based on YOLOv3 Detector. 237-242 - Vazhora Malayil Manikandan

:
A Novel Reversible Data Hiding in Encrypted Images by Controlled Swapping of Adjacent Pixels. 243-254 - Shahid Aziz

, Vinit Kumar
, Syed Shahnawazuddin:
Color Image Contrast Enhancement Through Hybrid PCA-Linear Image Fusion. 255-264 - Debashis Bhowmik

, Dipendu Maity, Ashish Kumar Upadhyay:
A New Class of Quantum Codes Associate with a Class of Maps. 265-273 - Salankara Mukherjee, Ishita De Ghosh, Debatree Mukherjee:

Big Five Personality Prediction from Handwritten Character Features and Word 'of' Using Multi-label Classification. 275-299 - U. Vamsi Krishna, B. Premjith, K. P. Soman:

A Comparative Study of Pre-trained Gene Embeddings for COVID-19 mRNA Vaccine Degradation Prediction. 301-308 - Ayushi Acharya, Hari Prasad, Vinod Kumar Singh, Ishu Gupta, Ashutosh Kumar Singh:

MACI: Malicious API Call Identifier Model to Secure the Host Platform. 309-320 - Mohit Kosuri, Cherry Tandu, Sobhan Sarkar, Jhareswar Maiti:

Multivariate Deep Learning Model with Ensemble Pruning for Time Series Forecasting. 321-334 - Soma Debnath, Molla Saroyar Hossain, Suvamoy Changder:

Deep Photo Classification Based on Geometrical Shape of Principal Object Presents in Photographs via VGG16 DCNN. 335-345 - Anupam Biswas, Angshuman Bora, Debashish Malakar, Subham Chakraborty, Suman Bera:

Multitask Deep Learning Model with Efficient Encoding Layer and Enhanced Parallel Convolution Block. 347-360 - Debojyoti Sarkar, Nilima Mishra, Anupam Biswas:

Genetic Algorithm-Based Deep Learning Models: A Design Perspective. 361-372 - Neha Sengar, Akriti Singh, Saumya Yadav, Malay Kishore Dutta:

Automated System for Face-Mask Detection Using Convolutional Neural Network. 373-380 - I. T. Anjusha, N. Saleena, K. A. Abdul Nazeer:

Using Protein Interactome Similarity to Improve Random Walk with Restart Model for Drug Repurposing. 381-394 - Kiran Purohit

, Abhishek Kesarwani
, Dakshina Ranjan Kisku
, Mamata Dalui:
COVID-19 Detection on Chest X-Ray and CT Scan Images Using Multi-image Augmented Deep Learning Model. 395-413 - Sourav Mandal

, Arif Ahmed Sekh
, Sudip Kumar Naskar
:
Identification of Relevant Quantities in Arithmetic Word Problems Using Siamese Neural Network. 415-426 - Amrita Datta, Mou Dasgupta:

Time Synchronization in Underwater Wireless Sensor Networks: A Survey. 427-437 - Konark Yadav, Milind Yadav, Sandeep Saini

:
Stock Market Predictions Using FastRNN-Based Model. 439-450 - Ajeet Singh

, Vikas Tiwari, Appala Naidu Tentu:
Ceiling Improvement on Breast Cancer Prediction Accuracy Using Unary KNN and Binary LightGBM Stacked Ensemble Learning. 451-471 - Sujit Bebortta

, Sumanta Kumar Singh:
An Opportunistic Ensemble Learning Framework for Network Traffic Classification in IoT Environments. 473-484 - Anjali Rao, Sobhan Sarkar, Anima Pramanik, Jhareswar Maiti:

Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach. 485-497 - Deepak Kumar, Rishu, Sangeetha Annam

:
Fog Computing Applications with Decentralized Computing Infrastructure - Systematic Review. 499-509 - Farhana Akter Sunny

, Md. Imran Khan
, Md. Shahriare Satu
, Mohammad Zoynul Abedin
:
Investigating External Audit Records to Detect Fraudulent Firms Employing Various Machine Learning Methods. 511-523 - Mohamed Fazil Mohamed Firdhous, Rahmat Budiarto:

An Enhanced Quality of Service-Based Trust Model for Cloud Computing. 525-538 - Marlar Tin, Ankita Panwar, Millie Pant:

DEA for Measuring the Performance of Higher Education Sector: A Case Study of Myanmar. 539-549 - Tomoyuki Yamakami, Eitatsu Mikami:

Synchronizing Words for Real-Time Deterministic Pushdown Automata - Extended Abstract. 551-562 - Debasis Dwibedy, Rakesh Mohanty:

A 2-Competitive Largest Job on Least Loaded Machine Online Algorithm Based on the Multi List Scheduling Model. 563-574 - Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud:

Hardware Implementation of Multiplication over Quartic Extension Fields. 575-589 - Subhasis Koley, Sasthi C. Ghosh:

Deriving Bounds on L(k1, k2) Labeling of Triangular Lattice by Exploring Underlined Graph Structures. 591-601 - Tjaart Jan B. Estrada

, Isagani B. Jos
:
The Spanning Maximal Planar Subgraph Problem for Some Classes of Complete 4-Partite Graphs. 603-614 - Aritra Dutta

, Rwitam Jana, Arup Kumar Das:
On Column Competent Matrices and Linear Complementarity Problem. 615-625 - Prachi Gupta, Prasanna Raghaw Mishra, Atul Gaur:

On Differential Uniformity and Nonlinearity of Permutations on $\mathbb {Z}_{n}$. 627-636 - Abdoulaye Maïga

, Damien Robert
:
Computing the 2-Adic Canonical Lift of Genus 2 Curves. 637-672 - Ashwini Kumar

, R. S. Raja Durai
:
Application of $\mathscr {T}$-Direct Codes in Multiple-Rate Codes. 673-687 - Priyanka Roy

, Geetanjali Panda:
Sufficient Optimality Criteria for Optimization Problem Involving Pseudoconvex Interval Objective Function. 689-698 - K. Z. Najiya

, Munnu Sonkar, Challa S. Sastry:
Sufficient Conditions for the Uniqueness of Solution of the Weighted Norm Minimization Problem. 699-710 - Ronald L. Aquino

, Jerico B. Bacani
:
On the Exponential Diophantine Equation px+qy=z3: Theorems and Conjectures. 711-723 - Meltem Kurt PehlIvanoõlu, Fatma Büyüksaraçoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli:

On the Construction of 4 ˟ 4 Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$. 725-736 - Lenin Kanagasabai:

Factual Power Loss Reduction by Meadow Fritillary Butterfly Optimization Algorithm. 737-742 - Cherry Tandu, Mohit Kosuri, Sobhan Sarkar, Jhareswar Maiti:

A Two-Fold Multi-objective Multi-verse Optimization-Based Time Series Forecasting. 743-754 - Shuvasree Karmakar, Mijanur Rahaman Seikh

:
A Novel Ranking-Based Non-linear Programming Approach to Solve Bi-matrix Games in Dense Fuzzy Environment. 755-767 - Ghurumuruhan Ganesan:

Real-Time Error Correction Codes for Deletable Errors. 769-788 - Debananda Basua, Jagan Mohan Jonnalagadda:

Lyapunov-Type Inequalities for Fractional Differential Operators with Non-singular Kernels. 789-800 - Bijaya Laxmi Panigrahi

, Jitendra Kumar Malik:
Chebyshev Spectral Projection Methods for Fredholm Integral Equations of the Second Kind. 801-814 - Ekrem Savas:

Some Sequence Spaces of Weight f. 815-820 - S. Naik, K. Rajbangshi:

Generalized Libera Operator on Mixed-Norm Spaces. 821-831 - Sarada Ghosh

, G. P. Samanta:
Improving the Monitoring of Mortality Surveillance by Analyzing Regression Approach. 833-843 - Yuri Menshikov

:
Motion Forecast of Dynamical Systems. 845-855 - Punam Kumari Prasad, Asit Saha:

Modeling of Nonlinear Wave Phenomena in Interstellar Superthermal Plasma. 857-868 - Jervin Zen Lobo

:
Application of Group Methods in Solving Wave Equations. 869-878 - Sidheswar Behera

, Jasvinder Singh Virdi:
Traveling Wave Solutions of Some Coupled Nonlinear Systems by Sine-Cosine Approach. 879-889 - Subin P. Joseph

:
Several Families of New Exact Solutions for Wave-Like Equations with Variable Coefficients. 891-902 - Barsha Pradhan

, Asit Saha
:
Coexistence of Chaotic, Quasiperiodic and Multiperiodic Features in Quantum Plasma. 903-914 - Subin P. Joseph

:
New Classes of Exact Solutions to Three-dimensional Schrodinger Equation. 915-925 - Satyajit Sarkar

, Ruchi Thapa, Asit Saha
, Kajal Kumar Mondal:
Dynamical Properties of Shock and Snoidal Waves in a Superthermal Multi-ion Dusty Plasma. 927-941 - Hidekazu Yoshioka

, Yumi Yoshioka:
A Simple Model on Streamflow Management with a Dynamic Risk Measure. 943-951 - Yuta Kambe, Yusuke Aikawa, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama:

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence. 953-966 - Sheetal Swain, Rakesh Mohanty, Debasis Dwibedy:

New Results on Competitive Analysis of Online SRPT Scheduling. 967-977 - T. Linga Raju, P. Satish:

Perturbation Technique on MHD Slip Flow of an Accelerated Plate with Hall Current. 979-994 - Satinder pal Kaur, Ajay Kumar Mittal, Vijay Kumar Kukreja

:
Simulation of Two-Dimensional Nonlinear Model for Washing of Pulp Fiber Bed Using Quintic Hermite Interpolation Polynomials. 995-1009 - Kushal Guha Bakshi:

Semi-Markov Decision Processes with Vector Pay-Offs. 1011-1027 - Pritam Paral

, Amitava Chatterjee
, Anjan Rakshit
:
Sonar Sensing-Based Human Leg Localization Using Gaussian Process Regression. 1029-1041 - Nilanjan Nandy

, Sourav Pradhan:
Steady-State Analysis of a Vacation Queue with Random Serving Capacity and Batch-Size-dependent Service. 1043-1060 - Ghurumuruhan Ganesan:

Computing Prices for Target Profits in Contracts. 1061-1074 - Ali Turab

, Wutiphol Sintunavarat:
On the Solution of Bush and Wilson's Stochastic Model for Two-Choice Behavior of the Paradise Fish Approached by the Fixed-Point Method. 1075-1084 - Pankaj Dadure

, Partha Pakray, Sivaji Bandyopadhyay:
A Fine-tuning Retrieval System for Mathematical Information. 1085-1100 - Shanku Mandal

, Sujit Kumar Dalui
, Soumya Bhattacharjya
:
Wind Response Evaluation of Limb-Shifted U-Shaped Building Using CFD. 1101-1113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














