{"title":"Disaster Management System Using Vehicular Ad Hoc Networks","authors":"Suparna DasGupta, S. Choudhury, R. Chaki","doi":"10.1007/978-981-13-3702-4_6","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_6","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography","authors":"Nashreen Nesa, I. Banerjee","doi":"10.1007/978-981-13-8969-6_1","DOIUrl":"https://doi.org/10.1007/978-981-13-8969-6_1","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Sudoku Instance Generator","authors":"A. K. Maji, Sunanda Jana, R. Pal","doi":"10.1007/978-81-322-2653-6_15","DOIUrl":"https://doi.org/10.1007/978-81-322-2653-6_15","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Registration of Range Images Using a Novel Technique of Centroid Alignment","authors":"P. Bagchi, D. Bhattacharjee, M. Nasipuri","doi":"10.1007/978-81-322-2653-6_6","DOIUrl":"https://doi.org/10.1007/978-81-322-2653-6_6","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Cloud Architecture for Healthcare Applications","authors":"A. K. Mandal, A. Sarkar, N. Chaki","doi":"10.1007/978-81-322-1985-9_8","DOIUrl":"https://doi.org/10.1007/978-81-322-1985-9_8","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ranjan Mehera, A. Chakrabarty, Piyali Datta, R. Pal
{"title":"A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area","authors":"Ranjan Mehera, A. Chakrabarty, Piyali Datta, R. Pal","doi":"10.1007/978-81-322-1988-0_11","DOIUrl":"https://doi.org/10.1007/978-81-322-1988-0_11","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network","authors":"M. Saha, M. K. Naskar, B. N. Chatterji","doi":"10.1007/978-81-322-2650-5_7","DOIUrl":"https://doi.org/10.1007/978-81-322-2650-5_7","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Energy Estimation to Improve Power Efficiency of Embedded System","authors":"Nachiketa Chatterjee, S. Biswas, P. Das","doi":"10.1007/978-981-10-3391-9_5","DOIUrl":"https://doi.org/10.1007/978-981-10-3391-9_5","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Extracting Feature from Human Lips","authors":"Joanna Kosior, K. Saeed, M. Buczkowski","doi":"10.1007/978-81-322-1985-9_1","DOIUrl":"https://doi.org/10.1007/978-81-322-1985-9_1","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}