564 results on '"M. Alim"'
Search Results
102. Polygot: An approach towards reliable translation by name identification and memory optimization using semantic analysis.
103. Keystroke/mouse usage based emotion detection and user identification.
104. Devising a novel visible light based low-cost ultra-low-power gesture recognition system.
105. Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics.
106. Salty Secret: Let us secretly salt the secret.
107. Low-cost finger gesture recognition system for disabled and elderly people.
108. Secure processing-aware media storage (SPMS).
109. Can You Get into the Middle of Near Field Communication?
110. Propagation Loss Aware Routing in Wireless Nanosensor Networks Having Directional Nano-Antennas.
111. FLight: A Low-Cost Reading and Writing System for Economically Less-Privileged Visually-Impaired People Exploiting Ink-based Braille System.
112. Towards Devising a Low-cost and Easy-to-use Arithmetic Learning Framework for Economically Less-privileged Visually Impaired Children.
113. Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles
114. Let's Vibrate with Vibration: Augmenting Structural Engineering with Low-Cost Vibration Sensing.
115. An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh.
116. To Lane or Not to Lane? Comparing On-Road Experiences in Developing and Developed Countries using a New Simulator 'RoadBird'.
117. The Past, Present, and Future of COVID-19: A Data-Driven Perspective.
118. Enhancing security in specialized use of mobile IP.
119. Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate.
120. Securing app distribution process of iOS exploiting the notion of authentic update.
121. AWZone: Ad hoc WiFi Zonification in Post-Disaster Settings.
122. Towards Making an Anonymous and One-Stop Online Reporting System for Third-World Countries.
123. Sporshohin: A Tale of Devising Visible Light Based Low-Cost Robust Touchless Input Device.
124. Polygot: Going Beyond Database Driven and Syntax-based Translation.
125. EyePen: Ease of Reading for Less-Privileged Visually-Impaired People.
126. Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks.
127. What We Breathe As We Commute: From the Perspective of a Developing Country.
128. Focusing on the Unfocused: Corresponding Perspectives on Connectivity among Small-Scale Non-Profit Organizations Working for Street Children in Bangladesh and Their Donors
129. Towards defending eavesdropping on NFC.
130. Intelligent dynamic spectrum access using hybrid genetic operators.
131. Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories.
132. Digging the innate reliability of wireless networked systems.
133. Towards empirical study based mathematical modeling for throughput of MANETs.
134. A study on combining power management and power control for wireless sensor networks.
135. Q-Nerve: Propagating signal of a damaged nerve using quantum networking.
136. User identification through usage analysis of electronic devices.
137. Enhancing reliability of real-time traffic via cooperative scheduling in cognitive radio networks.
138. General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics.
139. Towards exploiting a synergy between cognitive and multi-radio networking.
140. Strategizing secured image storing and efficient image retrieval through a new cloud framework.
141. A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities.
142. As You Are, So Shall You Move Your Head: A System-Level Analysis between Head Movements and Corresponding Traits and Emotions.
143. Uncovering local aggregated air quality index with smartphone captured images leveraging efficient deep convolutional neural network
144. An Enhanced RBMT: When RBMT Outperforms Modern Data-Driven Translators
145. The Effects of Nasal Surgery on Pulmonary Function: A Systematic Review and Meta‐Analysis
146. Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey.
147. Interference Aware Reliable Cooperative Cognitive Networks for Real-Time Applications.
148. A Cross-Layer Analytical Model to Estimate the Capacity of a WiMAX Network.
149. Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
150. Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.