Scientific results reported by the researchers in reputed venues
Submissions from 2022
Impact of Predator Signals on the Stability of a Predator–Prey System: A Z-Control Approach, Sk Shahid Nadim, Sudip Samanta, Nikhil Pal, Ibrahim M. ELmojtaba, Indranil Mukhopadhyay, and Joydev Chattopadhyay
A Theoretical Analysis of Granulometry-Based Roughness Measures on Cartosat DEMs, Kannan Nagajothi, Sravan Danda, Aditya Challa, and B. S.Daya Sagar
Extreme events in dynamical systems and random walkers: A review, Sayantan Nag Chowdhury, Arnob Ray, Syamal K. Dana, and Dibakar Ghosh
Asymptotic mean value property for eigenfunctions of the Laplace–Beltrami operator on Damek–Ricci spaces, Muna Naik and Rudra P. Sarkar
Semi-global triangular centrality measure for identifying the influential spreaders from undirected complex networks, Amrita Namtirtha, Biswanath Dutta, and Animesh Dutta
A New Deep Wavefront Based Model for Text Localization in 3D Video, Lokesh Nandanwar, Palaiahnakote Shivakumara, Raghavendra Ramachandra, Tong Lu, Umapada Pal, Apostolos Antonacopoulos, and Yue Lu
Optimal replacement policy under cumulative damage model and strength degradation with applications, Phalguni Nanda, Prajamitra Bhuyan, and Anup Dewanji
Efficient fully cca-secure predicate encryptions from pair encodings, Mridul Nandi and Tapas Pandit
Estimation of parameters of two-dimensional random amplitude chirp signal in additive noise, Swagata Nandi, Rhythm Grover, and Debasis Kundu
Estimating Parameters in Multichannel Sinusoidal Model, Swagata Nandi and Debasis Kundu
Robust inference for skewed data in health sciences, Amarnath Nandy, Ayanendranath Basu, and Abhik Ghosh
Generic 3-point statistics with tensor modes in light of Swampland and Trans-Planckian Censorship Conjecture, Abhishek Naskar and Supratik Pal
Efficient 4-Way Vectorizations of the Montgomery Ladder, Kaushik Nath and Palash Sarkar
EFFICIENT ARITHMETIC IN (PSEUDO-)MERSENNE PRIME ORDER FIELDS, Kaushik Nath and Palash Sarkar
Kummer versus Montgomery Face-off over Prime Order Fields, Kaushik Nath and Palash Sarkar
Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels, Kaushik Nath and Palash Sarkar
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection, Janmenjoy Nayak, Saroj K. Meher, Alireza Souri, Bighnaraj Naik, and S. Vimal
A CONCEPTUAL APPROACH TOWARDS UNDERSTANDING MATRIX COMMUTATORS, Soumyashant Nayak
Caste biases in school textbooks: a case study from Odisha, India, Subhadarshee Nayak and Aardra Surendran
Preface: Business analytics and operations research, S. K. Neogy, R. B. Bapat, K. Manjunatha Prasad, and Asha Kamath
Widespread azendohsaurids (Archosauromorpha, Allokotosauria) from the Late Triassic of western USA and India, Sterling J. Nesbitt, Michelle R. Stocker, Martín D. Ezcurra, Nicholas C. Fraser, Andrew B. Heckert, William G. Parker, Bill Mueller, Saradee Sengupta, Saswati Bandyopadhyay, Adam C. Pritchard, and Adam D. Marsh
Application of Lean Six Sigma in conservative dentistry: an action research at an Indian dental college, Ajay Noronha, Shreeranga Bhat, E. V. Gijo, Jiju Antony, and Suma Bhat
John–Nirenberg space on LCA groups, Md Nurul Molla
Thermoelectric phenomena of the molecular structure of a Thiolated Arylethynylene with a 9,10-Dihydroanthracene (AH) core, Judith Helena Ojeda Silva, David Laroze, and Santanu K. Maiti
Sub-tree counts on hyperbolic random geometric graphs, Takashi Owada and D. Yogeshwaran