Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Designing an Iterative Adaptive Arithmetic Coding-Based Lossless Bio-signal Compression for Online Patient Monitoring System (IAALBC)

    Various new generation research works on real-time healthcare monitoring system are performing on to fulfill the demands of medical signal compression. In this paper, we proposed a state-of-the-art technique t...

    Uttam Kr. Mondal, Asish Debnath, N. Tabassum in Frontiers of ICT in Healthcare (2023)

  2. No Access

    Chapter and Conference Paper

    A Markovian Analysis of Low Back Pain on Jute Mill Workers

    Jute industry which employs around 3,50,000 labors, is a large contributor to India’s economy. With the prevalence of chronic low back pain among jute mill workers being 55%, the paper proposes a Markov model-...

    Debarpita Santra, J. K. Mandal, Subrata Goswami in Advanced Techniques for IoT Applications (2022)

  3. No Access

    Chapter and Conference Paper

    On Mono-Line Boolean Symmetry Detection

    detection of symmetries in a switching function is an NP-complete problem. In this paper, a single-line solution for detecting total symmetry has been proposed. The proposed method exploits the linearit...

    Subhajit Guha, J. K. Mandal in Proceedings of International Conference on… (2022)

  4. No Access

    Chapter and Conference Paper

    Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method

    Online recommendation system is a computer-based intelligent technique which has become popular in many e-commerce Web sites. It is used to recommend items to a user on the basis of some information like past ...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2022)

  5. No Access

    Chapter and Conference Paper

    Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning

    Presently the usage of Electronic Commerce has been growing at a rapid space and many customers choose the online shop** option available, to avoid waiting in a long queue. Before buying an item specially cl...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2021)

  6. No Access

    Chapter and Conference Paper

    Rotational Cryptographic Technique (RCT)

    A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream...

    Debajyoti Guha, Rajdeep Chakraborty in Intelligent Techniques and Applications in… (2020)

  7. No Access

    Chapter and Conference Paper

    Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images

    The present study deals with forest cover classification of Sundarban on the basis of fuzzy c-means algorithm using satellite images from 1975 to 2018. Four features are considered in this region such as dense...

    K. Kundu, P. Halder, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  8. No Access

    Chapter and Conference Paper

    A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET

    In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and ...

    Khondekar Lutful Hassan, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  9. No Access

    Chapter and Conference Paper

    Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP)

    Low back pain is a communal musculoskeletal ailment that deprives many individuals worldwide of doing their daily and normal activities. With the absence of external biomarkers, most of the symptoms of low bac...

    Debarpita Santra, J. K. Mandal, S. K. Basu in Proceedings of the Global AI Congress 2019 (2020)

  10. No Access

    Chapter and Conference Paper

    Product Recommendation for E-Commerce Data Using Association Rule and Apriori Algorithm

    As internet technology advances and its usage gets popular among people Electronic Commerce (E-Commerce) business increases at a rapid pace. But the problem lying here is that E-commerce sites provide their cu...

    Soma Bandyopadhyay, S. S. Thakur in Modelling and Simulation in Science, Techn… (2019)

  11. No Access

    Chapter and Conference Paper

    Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique

    The paper reports shared memory implementation of Recursive Positional Substitution Based on Prime-Nonprime (RPSP) algorithm using OpenMP application programming interface

    Gaurav Gambhir, J. K. Mandal in Computational Intelligence, Communications… (2019)

  12. No Access

    Chapter and Conference Paper

    High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE

    Security solutions in today’s data driven solutions have become an inevitable part. Through this privacy, confidentiality and trust can be achieved and this cascaded technique is proposed. Cryptography is mos...

    Rajdeep Chakraborty, Runa Seth, J. K. Mandal in Computational Intelligence, Communications… (2017)

  13. No Access

    Chapter and Conference Paper

    A Hybrid PSO-Fuzzy Based Algorithm for Clustering Indian Stock Market Data

    Partitioning data points into several homogeneous sets is known as clustering. This paper proposes a hybrid clustering algorithm based on Different Length Particle Swarm Optimization (DPSO) algorithm and is ap...

    Somnath Mukhopadhyay, Tamal Datta Chaudhuri in Computational Intelligence, Communications… (2017)

  14. No Access

    Chapter and Conference Paper

    Clustering of Noisy Regions (CNR)—A GIS Anchored Technique for Clustering on Raster Map

    In this proposed work, a GIS anchored system has been approached, which initially takes as input, a digitized map, generally of a very large region, with the population of the common mass in different wards/ar...

    Anirban Chakraborty, J. K. Mandal in Proceedings of the Second International Co… (2016)

  15. No Access

    Chapter and Conference Paper

    Z Transformation-Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)

    In this paper, a Z transformation-based authentication technique has been proposed with higher Region of Convergence (ROC) value. Sequentially, five bits from the authenticating mask in row major order are con...

    J. K. Mandal, Suman Mahapatra in Proceedings of the Second International Co… (2016)

  16. No Access

    Chapter and Conference Paper

    Authentication of Audio Signals in Frequency Domain (AASF)

    In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be direct...

    Uttam Kr. Mondal, J. K. Mandal in Proceedings of the Second International Co… (2016)

  17. No Access

    Chapter and Conference Paper

    A GIS Anchored System for Clustering Discrete Data Points – A Connected Graph Based Approach

    Clustering is considered as one of the most important unsupervised learning problem which groups a set of data objects, in such way, so that the data objects belongs to the same group (known as cluster) are ve...

    Anirban Chakraborty, J. K. Mandal in Emerging ICT for Bridging the Future - Pro… (2015)

  18. No Access

    Chapter and Conference Paper

    Directional Multi-scaled Fusion Based Median Filter for Removal of RVIN

    In this paper Directional Multi-scaled Fusion Based Median Filter for Removal of RVIN (DMFBMF) has been proposed to restore images corrupted with random valued impulse noises. This filter employs a technique o...

    Aparna Sarkar, Suvamoy Changder in Computational Intelligence in Data Mining … (2015)

  19. No Access

    Chapter and Conference Paper

    Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)

    In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence

    Suman Mahapatra, J. K. Mandal in Information Systems Design and Intelligent… (2015)

  20. No Access

    Chapter and Conference Paper

    Neuro-key Generation Based on HEBB Network for Wireless Communication

    In this paper a key generation technique for encryption/decryption, based on a single-layer perceptron network (Hebb Network), for wireless communication of information or data has been proposed. Two HEBB Neur...

    Arindam Sarkar, J. K. Mandal, Pritha Mondal in Proceedings of the 3rd International Confe… (2015)

previous disabled Page of 3