default search action
ICMC 2021: Shibpur, India
- Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 - Mohan Chintamani, Laba Sa:
A Blind Signature Scheme Based on Bilinear Pairings. 1-8 - Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System". 9-21 - Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:
CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. 23-38 - Yasuhiko Ikematsu:
A Study on Randomness Used in Signature Generation of UOV. 39-50 - Imad El Hanouti, Hakim el Fadili, Fawad Ahmed, Jawad Ahmad:
On the Inadequacy of Multimodal Maps for Cryptographic Hash Applications with Phase-Space Modulation. 51-62 - Shramona Chakraborty, Soma Kundu, Dipanwita Roy Chowdhury:
Image Encryption with Parallel Evolution of 2-D Cellular Automata. 63-78 - Satyam Omar, Sahadeo Padhye, Dhananjoy Dey:
A New Identity-Based Multivariate Signature Scheme. 79-91 - Ayan Ghosh, Abhishek Raj, Ayantika Chatterjee:
Encrypted Operator Design with Domain Aware Practical Performance Improvement. 93-107 - Hitesh Narayan Soneji, Aniruddh Sajith Soman, Aniruddh Vyas, Shubha Puthran:
A Comprehensive Review of Fraudulent Email Detection Models. 109-127 - Ashidha Anil, T. A. Rufzal, Vipindev Adat Vasudevan:
DDoS Detection in Software-Defined Network Using Entropy Method. 129-139 - Emanuele Bellini, Alessandro De Piccoli, Rusydi H. Makarim, Sergio Polese, Lorenzo Riva, Andrea Visconti:
New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers. 141-151 - Francisco Vial-Prado, Aron Wussler:
OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges. 153-170 - Nanda Rani, Sunita Vikrant Dhavale, Amarjit Singh, Atul Mehra:
A Survey on Machine Learning-Based Ransomware Detection. 171-186 - Feng-Wei Lee, Denis Chee-Keong Wong, Bok-Min Goi, Wai-Kong Lee:
Variant of Niederreiter-Based Signature Scheme for Blockchain Technology. 187-200 - Jagannath Sethi, Jaydeb Bhaumik, Ananda S. Chowdhury:
Chaos-Based Uncompressed Frame Level Video Encryption. 201-217 - Vishakh Rao, K. U. Hemanth, Bhawana Rudra:
Comparison of Algorithms for Style Transfer of Images Using Texture Synthesis. 219-236 - Huy Nguyen Quoc, Vinh Truong Hoang:
Ear Localization Based on YOLOv3 Detector. 237-242 - Vazhora Malayil Manikandan:
A Novel Reversible Data Hiding in Encrypted Images by Controlled Swapping of Adjacent Pixels. 243-254 - Shahid Aziz, Vinit Kumar, Syed Shahnawazuddin:
Color Image Contrast Enhancement Through Hybrid PCA-Linear Image Fusion. 255-264 - Debashis Bhowmik, Dipendu Maity, Ashish Kumar Upadhyay:
A New Class of Quantum Codes Associate with a Class of Maps. 265-273 - Salankara Mukherjee, Ishita De Ghosh, Debatree Mukherjee:
Big Five Personality Prediction from Handwritten Character Features and Word 'of' Using Multi-label Classification. 275-299 - U. Vamsi Krishna, B. Premjith, K. P. Soman:
A Comparative Study of Pre-trained Gene Embeddings for COVID-19 mRNA Vaccine Degradation Prediction. 301-308 - Ayushi Acharya, Hari Prasad, Vinod Kumar Singh, Ishu Gupta, Ashutosh Kumar Singh:
MACI: Malicious API Call Identifier Model to Secure the Host Platform. 309-320 - Mohit Kosuri, Cherry Tandu, Sobhan Sarkar, Jhareswar Maiti:
Multivariate Deep Learning Model with Ensemble Pruning for Time Series Forecasting. 321-334 - Soma Debnath, Molla Saroyar Hossain, Suvamoy Changder:
Deep Photo Classification Based on Geometrical Shape of Principal Object Presents in Photographs via VGG16 DCNN. 335-345 - Anupam Biswas, Angshuman Bora, Debashish Malakar, Subham Chakraborty, Suman Bera:
Multitask Deep Learning Model with Efficient Encoding Layer and Enhanced Parallel Convolution Block. 347-360 - Debojyoti Sarkar, Nilima Mishra, Anupam Biswas:
Genetic Algorithm-Based Deep Learning Models: A Design Perspective. 361-372 - Neha Sengar, Akriti Singh, Saumya Yadav, Malay Kishore Dutta:
Automated System for Face-Mask Detection Using Convolutional Neural Network. 373-380 - I. T. Anjusha, N. Saleena, K. Abdul Nazeer:
Using Protein Interactome Similarity to Improve Random Walk with Restart Model for Drug Repurposing. 381-394 - Kiran Purohit, Abhishek Kesarwani, Dakshina Ranjan Kisku, Mamata Dalui:
COVID-19 Detection on Chest X-Ray and CT Scan Images Using Multi-image Augmented Deep Learning Model. 395-413 - Sourav Mandal, Arif Ahmed Sekh, Sudip Kumar Naskar:
Identification of Relevant Quantities in Arithmetic Word Problems Using Siamese Neural Network. 415-426 - Amrita Datta, Mou Dasgupta:
Time Synchronization in Underwater Wireless Sensor Networks: A Survey. 427-437 - Konark Yadav, Milind Yadav, Sandeep Saini:
Stock Market Predictions Using FastRNN-Based Model. 439-450 - Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu:
Ceiling Improvement on Breast Cancer Prediction Accuracy Using Unary KNN and Binary LightGBM Stacked Ensemble Learning. 451-471 - Sujit Bebortta, Sumanta Kumar Singh:
An Opportunistic Ensemble Learning Framework for Network Traffic Classification in IoT Environments. 473-484 - Anjali Rao, Sobhan Sarkar, Anima Pramanik, Jhareswar Maiti:
Predicting and Analysing Pedestrian Injury Severity: A Machine Learning-Based Approach. 485-497 - Deepak Kumar, Rishu, Sangeetha Annam:
Fog Computing Applications with Decentralized Computing Infrastructure - Systematic Review. 499-509 - Farhana Akter Sunny, Md. Imran Khan, Md. Shahriare Satu, Mohammad Zoynul Abedin:
Investigating External Audit Records to Detect Fraudulent Firms Employing Various Machine Learning Methods. 511-523 - Mohamed Fazil Mohamed Firdhous, Rahmat Budiarto:
An Enhanced Quality of Service-Based Trust Model for Cloud Computing. 525-538 - Marlar Tin, Ankita Panwar, Millie Pant:
DEA for Measuring the Performance of Higher Education Sector: A Case Study of Myanmar. 539-549 - Tomoyuki Yamakami, Eitatsu Mikami:
Synchronizing Words for Real-Time Deterministic Pushdown Automata - Extended Abstract. 551-562 - Debasis Dwibedy, Rakesh Mohanty:
A 2-Competitive Largest Job on Least Loaded Machine Online Algorithm Based on the Multi List Scheduling Model. 563-574 - Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud:
Hardware Implementation of Multiplication over Quartic Extension Fields. 575-589 - Subhasis Koley, Sasthi C. Ghosh:
Deriving Bounds on L(k1, k2) Labeling of Triangular Lattice by Exploring Underlined Graph Structures. 591-601 - Tjaart Jan B. Estrada, Isagani B. Jos:
The Spanning Maximal Planar Subgraph Problem for Some Classes of Complete 4-Partite Graphs. 603-614 - Aritra Dutta, Rwitam Jana, Arup Kumar Das:
On Column Competent Matrices and Linear Complementarity Problem. 615-625 - Prachi Gupta, Prasanna Raghaw Mishra, Atul Gaur:
On Differential Uniformity and Nonlinearity of Permutations on $\mathbb {Z}_{n}$. 627-636 - Abdoulaye Maïga, Damien Robert:
Computing the 2-Adic Canonical Lift of Genus 2 Curves. 637-672 - Ashwini Kumar, R. S. Raja Durai:
Application of $\mathscr {T}$-Direct Codes in Multiple-Rate Codes. 673-687 - Priyanka Roy, Geetanjali Panda:
Sufficient Optimality Criteria for Optimization Problem Involving Pseudoconvex Interval Objective Function. 689-698 - K. Z. Najiya, Munnu Sonkar, Challa S. Sastry:
Sufficient Conditions for the Uniqueness of Solution of the Weighted Norm Minimization Problem. 699-710 - Ronald L. Aquino, Jerico B. Bacani:
On the Exponential Diophantine Equation px+qy=z3: Theorems and Conjectures. 711-723 - Meltem Kurt PehlIvanoõlu, Fatma Büyüksaraçoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli:
On the Construction of 4 ˟ 4 Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$. 725-736 - Lenin Kanagasabai:
Factual Power Loss Reduction by Meadow Fritillary Butterfly Optimization Algorithm. 737-742 - Cherry Tandu, Mohit Kosuri, Sobhan Sarkar, Jhareswar Maiti:
A Two-Fold Multi-objective Multi-verse Optimization-Based Time Series Forecasting. 743-754 - Shuvasree Karmakar, Mijanur Rahaman Seikh:
A Novel Ranking-Based Non-linear Programming Approach to Solve Bi-matrix Games in Dense Fuzzy Environment. 755-767 - Ghurumuruhan Ganesan:
Real-Time Error Correction Codes for Deletable Errors. 769-788 - Debananda Basua, Jagan Mohan Jonnalagadda:
Lyapunov-Type Inequalities for Fractional Differential Operators with Non-singular Kernels. 789-800 - Bijaya Laxmi Panigrahi, Jitendra Kumar Malik:
Chebyshev Spectral Projection Methods for Fredholm Integral Equations of the Second Kind. 801-814 - Ekrem Savas:
Some Sequence Spaces of Weight f. 815-820 - S. Naik, K. Rajbangshi:
Generalized Libera Operator on Mixed-Norm Spaces. 821-831 - Sarada Ghosh, G. P. Samanta:
Improving the Monitoring of Mortality Surveillance by Analyzing Regression Approach. 833-843 - Yuri Menshikov:
Motion Forecast of Dynamical Systems. 845-855 - Punam Kumari Prasad, Asit Saha:
Modeling of Nonlinear Wave Phenomena in Interstellar Superthermal Plasma. 857-868 - Jervin Zen Lobo:
Application of Group Methods in Solving Wave Equations. 869-878 - Sidheswar Behera, Jasvinder Singh Virdi:
Traveling Wave Solutions of Some Coupled Nonlinear Systems by Sine-Cosine Approach. 879-889 - Subin P. Joseph:
Several Families of New Exact Solutions for Wave-Like Equations with Variable Coefficients. 891-902 - Barsha Pradhan, Asit Saha:
Coexistence of Chaotic, Quasiperiodic and Multiperiodic Features in Quantum Plasma. 903-914 - Subin P. Joseph:
New Classes of Exact Solutions to Three-dimensional Schrodinger Equation. 915-925 - Satyajit Sarkar, Ruchi Thapa, Asit Saha, Kajal Kumar Mondal:
Dynamical Properties of Shock and Snoidal Waves in a Superthermal Multi-ion Dusty Plasma. 927-941 - Hidekazu Yoshioka, Yumi Yoshioka:
A Simple Model on Streamflow Management with a Dynamic Risk Measure. 943-951 - Yuta Kambe, Yusuke Aikawa, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama:
Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence. 953-966 - Sheetal Swain, Rakesh Mohanty, Debasis Dwibedy:
New Results on Competitive Analysis of Online SRPT Scheduling. 967-977 - T. Linga Raju, P. Satish:
Perturbation Technique on MHD Slip Flow of an Accelerated Plate with Hall Current. 979-994 - Satinder pal Kaur, Ajay Kumar Mittal, Vijay Kumar Kukreja:
Simulation of Two-Dimensional Nonlinear Model for Washing of Pulp Fiber Bed Using Quintic Hermite Interpolation Polynomials. 995-1009 - Kushal Guha Bakshi:
Semi-Markov Decision Processes with Vector Pay-Offs. 1011-1027 - Pritam Paral, Amitava Chatterjee, Anjan Rakshit:
Sonar Sensing-Based Human Leg Localization Using Gaussian Process Regression. 1029-1041 - Nilanjan Nandy, Sourav Pradhan:
Steady-State Analysis of a Vacation Queue with Random Serving Capacity and Batch-Size-dependent Service. 1043-1060 - Ghurumuruhan Ganesan:
Computing Prices for Target Profits in Contracts. 1061-1074 - Ali Turab, Wutiphol Sintunavarat:
On the Solution of Bush and Wilson's Stochastic Model for Two-Choice Behavior of the Paradise Fish Approached by the Fixed-Point Method. 1075-1084 - Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay:
A Fine-tuning Retrieval System for Mathematical Information. 1085-1100 - Shanku Mandal, Sujit Kumar Dalui, Soumya Bhattacharjya:
Wind Response Evaluation of Limb-Shifted U-Shaped Building Using CFD. 1101-1113
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.