Search

Your search keyword '"Das, Debashis"' showing total 288 results

Search Constraints

Start Over You searched for: Author "Das, Debashis" Remove constraint Author: "Das, Debashis"
288 results on '"Das, Debashis"'

Search Results

1. MDFIDNet: Multi-domain Feature Integration Denoising Network

2. Use of Federated Learning and Blockchain towards Securing Financial Services

4. Synthetic Fingerprint Generation: Bridging the Gap Between Privacy and Security with Variational Auto-Encoders

6. Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network

7. Blockchain-Enabled IoV Framework for Establishing Automated Communication Using Smart Contract

8. Federated Edge-Cloud Framework for Heart Disease Risk Prediction Using Blockchain

9. EHR Security and Privacy Aspects: A Systematic Review

13. Higher energy modes of Fractional quantum Hall Effect

17. Federated Learning Assisted Covid-19 Detection Model

18. Gender and Hand Identification Based on Dactyloscopy Using Deep Convolutional Neural Network

19. A Blockchain Enabled Trusted Public Distribution Management System Using Smart Contract

20. Design of a Secure Blockchain-Based Toll-Tax Collection System

21. A Combined Experimental/Finite Element Model Analysis on Compressive Behavior of Tamarind Pod Shell Filler Reinforced Composites

23. Study of partially polarized fractional quantum Hall states

24. Roton minimum at $\nu=1/2$ filled fractional quantum Hall effect of Bose particles

29. Outbreak of COVID-19: A Detailed Overview and Its Consequences

33. An international genome-wide meta-analysis of primary biliary cholangitis: Novel risk loci and candidate drugs

38. Rank Based Pixel-Value-Differencing: A Secure Steganographic Approach

39. A Minutia Detection Approach from Direct Gray-Scale Fingerprint Image Using Hit-or-Miss Transformation

40. Comparison of gastric emptying time between breast‐fed and formula milk‐fed infants less than 6 months old, using gastric ultrasound—An observational study

45. An Approach Towards Analyzing Various VM Allocation Policies in the Domain of Cloud Computing

47. Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow

48. Digital Twins and Blockchain Fusion for Security in Metaverse-Driven Consumer Supply Chains

Catalog

Books, media, physical & digital resources