displayNone
Banner

Publications

Journal Article

  • Rashmit Patel, Yash Agrawal and Rutu Parekh Design of prominent SET-based high performance computing system IET Circuits, Devices and System svol. 14, no. 2 pp. 159-167 Mar. 2020. doi: 10.1049/iet-cds.2019.0166
  • Bhargav Dave, Jainisha Sankhavara, Rishi Dave Query specific graph-based query reformulation using UMLS for clinical information access Journal of Biomedical Informatics, vol. 108 Art. no. 103493. Aug. 2020 doi: 10.1016/j.jbi.2020.103493
  • Abhin Kakkad, Harsh Vasoya and Arnab K. Ray, Regularities in stock markets International Journal of Modern Physics C, vol. 31, no. 10 Art. no. 2050145. 2020 doi: 10.1142/S0129183120501454
  • Prasenjit Majumder and Daksh Patel, Sandip Modha, Thomas Mandl Tracking Hate in Social Media: Evaluation Challenges and Approaches SN Computer Science, vol. 1, no. 2 Art. no. 105. Mar. 2020 doi: 10.1007/s42979-020-0082-0
  • Prasenjit Majumder, Sandip Modha, Thomas Mandl and Chintak Mandalia Detecting and visualizing hate speech in social media: A cyber Watchdog for surveillance Expert Systems with Applications, vol. 161 Art. no. 113725. Dec. 2020 doi: 10.1016/j.eswa.2020.113725
  • Amit Sengupta, Ramesh Kumar, Sharvan Kumar An Experimental Analysis and Validation of Electrical Impedance Tomography Technique for Medical or ... Biomedical Engineering: Applications, Basis and Communications vol. 31, no. 2, 13 Mar. 2019, pp. 1950010-1-1950010-17. 10.4015/S1016237219500108
  • Sumukh Bansal Affine interpolation in a lie group framework ACM Transactions on Graphics vol. 28, no. 4, article 71, July 2019, pp. 1-16. 10.1145/3306346.3322997
  • Aditya Tatu, Nileshkumar Vaishnav Signal processing on graphs: structure preserving maps IET Signal Processing vol. 13, no. 1, Feb. 2019, pp. 77-85. 10.1049/iet-spr.2018.5147
  • Amishal Modi Self-Conscious Pleasure-Seeking: Equality Arun Kolatkar’s Poetry International Journal of Research and Analytical Reviews (IJRAR) vol. 6, no. 1, Jan-Mar. 2019.
  • Anish Mathuria, Naveen Kumar Comprehensive evaluation of key management hierarchies for outsourced data Cybersecurity vol. 2, no. 2, Dec. 2019, pp. 1-17, Springer. 10.1186/s42400-019-0026-y |
Back to Top