Search

Your search keyword '"Samrat Mondal"' showing total 59 results

Search Constraints

Start Over You searched for: Author "Samrat Mondal" Remove constraint Author: "Samrat Mondal" Topic computer science Remove constraint Topic: computer science
59 results on '"Samrat Mondal"'

Search Results

1. Optimal Sizing and Efficient Routing of Electric Vehicles for a Vehicle-on-Demand System

2. An Approach to Prevent Air Pollution and Generate Electricity Using Nanostructured Carbon Materials

3. Exploiting similarities across multiple dimensions for author name disambiguation

4. On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things

5. Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services

7. A divide-and-conquer based efficient non-dominated sorting approach

8. Dispersion Ratio based Decision Tree Model for Classification

9. An Intelligent and Smart Belt for the Blind People

10. Routing of Delivery Trucks in a Battery Swapping System with Partial Delivery Option

11. A Fast and Efficient Way to Obtain the Optimal Number of Ports in Electric Vehicle Charging Stations

12. Intelligent Scheduling of V2G, V2V, G2V Operations in a Smart Microgrid

13. Towards incorporating honeywords in n‐session recording attack resilient unaided authentication services

14. On Overcoming the Identified Limitations of a Usable PIN Entry Method

15. GBOS: Generalized Best Order Sort algorithm for non-dominated sorting

16. Efficient Scheduling of Nonpreemptive Appliances for Peak Load Optimization in Smart Grid

17. Intelligent Scheduling of Thermostatic Devices for Efficient Energy Management in Smart Grid

18. On designing a modified-UI based honeyword generation approach for overcoming the existing limitations

19. GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases

20. Scheduling Interdependent Smart Appliances with Mixed-Preemption Policy for Peak Load Minimization

21. Multiobjective Optimal Scheduling Framework for HVAC Devices in Energy-Efficient Buildings

22. Coordinated Scheduling of Residential Appliances and Heterogeneous Energy Sources in a Smart Microgrid

23. Towards Predicting Risk of Coronary Artery Disease from Semi-Structured Dataset

24. Intelligent charge scheduling and eco-routing mechanism for electric vehicles: A multi-objective heuristic approach

25. A multiobjective optimization based entity matching technique for bibliographic databases

26. Efficient Load Control Based Demand Side Management Schemes Towards a Smart Energy Grid System

27. Intelligent Scheduling of Smart Appliances in Energy Efficient Buildings: A Practical Approach

28. Work-in-Progress: Towards Optimal Scheduling of Thermal Comfortability and Smoothening of Load Profile in Energy Efficient Buildings

29. On Evaluation of Entity Matching Techniques for Bibliographic Database

30. On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness

31. Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles

32. MobSecure: A Shoulder Surfing Safe Login Approach Implemented on Mobile Device

33. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches

34. SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones

35. An unsupervised heuristic based approach for author name disambiguation

36. drPass: A Dynamic and Reusable Password Generator Protocol

37. Divide-and-conquer based non-dominated sorting with Reduced Comparisons

38. SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack

39. CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining

40. On Designing Leakage-Resilient Vibration Based Authentication Techniques

41. Divide and conquer based non-dominated sorting for parallel environment

42. An automatic framework for entity matching in bibliographic databases

43. Security analysis of GTRBAC and its variants using model checking

44. SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing

45. Few notes towards making honeyword system more secure and usable

46. Formulation of mobile agents for integration of supply chain using the KLAIM concept

47. Improved Solution to the Non-Domination Level Update Problem

48. On Validation of Clustering Techniques for Bibliographic Databases

49. Cluster validation techniques for Bibliographic databases

50. An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack

Catalog

Books, media, physical & digital resources