Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Designing an Iterative Adaptive Arithmetic Coding-Based Lossless Bio-signal Compression for Online Patient Monitoring System (IAALBC)

    Various new generation research works on real-time healthcare monitoring system are performing on to fulfill the demands of medical signal compression. In this paper, we proposed a state-of-the-art technique t...

    Uttam Kr. Mondal, Asish Debnath, N. Tabassum in Frontiers of ICT in Healthcare (2023)

  2. No Access

    Article

    View materialization using fuzzy MAX–MIN composition with association rule mining (VMFCA)

    Materialized view creation is an intrinsic requirement for the relational model to speed up the query processing majorly for large data centric applications. Different queries are generated by the system, and ...

    Partha Ghosh, Takaaki Goto, J. K. Mandal in Innovations in Systems and Software Engine… (2022)

  3. No Access

    Article

    Emotion detection for online recommender system using deep learning: a proposed method

    Presently, a majority of businesses are carried out online, and there is a trend of creating a virtual environment during online shop**. The recent advancements in the fields of e-commerce and business have ...

    Soma Bandyopadhyay, S. S. Thakur in Innovations in Systems and Software Engine… (2022)

  4. No Access

    Chapter and Conference Paper

    A Markovian Analysis of Low Back Pain on Jute Mill Workers

    Jute industry which employs around 3,50,000 labors, is a large contributor to India’s economy. With the prevalence of chronic low back pain among jute mill workers being 55%, the paper proposes a Markov model-...

    Debarpita Santra, J. K. Mandal, Subrata Goswami in Advanced Techniques for IoT Applications (2022)

  5. No Access

    Chapter and Conference Paper

    On Mono-Line Boolean Symmetry Detection

    detection of symmetries in a switching function is an NP-complete problem. In this paper, a single-line solution for detecting total symmetry has been proposed. The proposed method exploits the linearit...

    Subhajit Guha, J. K. Mandal in Proceedings of International Conference on… (2022)

  6. No Access

    Chapter and Conference Paper

    Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method

    Online recommendation system is a computer-based intelligent technique which has become popular in many e-commerce Web sites. It is used to recommend items to a user on the basis of some information like past ...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2022)

  7. No Access

    Article

    Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society

    Recommender system is a computer-based intelligent technique which facilitates the customers to fulfill their purchase requirements. In addition to this, it also helps retailers to manage the supply chain of t...

    Soma Bandyopadhyay, S. S. Thakur in Innovations in Systems and Software Engine… (2021)

  8. No Access

    Chapter and Conference Paper

    Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning

    Presently the usage of Electronic Commerce has been growing at a rapid space and many customers choose the online shop** option available, to avoid waiting in a long queue. Before buying an item specially cl...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2021)

  9. No Access

    Article

    Urban Change Detection Analysis during 1978–2017 at Kolkata, India, using Multi-temporal Satellite Data

    This paper focused on urban change detection and growth pattern analysis for the period of 1978–2017 at Kolkata using remote sensing data and GIS. The supervised Maximum Likelihood Classification technique is ...

    K. Kundu, P. Halder, J. K. Mandal in Journal of the Indian Society of Remote Sensing (2020)

  10. No Access

    Article

    Secured hand sacking based two phase data concealing architecture in spectral domain

    The requirement of information confidentiality in digital world emanates different approaches to the criticality of secrecy. Steganographic methods hide the secret information into cover media. In this paper t...

    Sujit Das, J. K. Mandal in Microsystem Technologies (2020)

  11. No Access

    Chapter and Conference Paper

    Rotational Cryptographic Technique (RCT)

    A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream...

    Debajyoti Guha, Rajdeep Chakraborty in Intelligent Techniques and Applications in… (2020)

  12. No Access

    Chapter and Conference Paper

    Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images

    The present study deals with forest cover classification of Sundarban on the basis of fuzzy c-means algorithm using satellite images from 1975 to 2018. Four features are considered in this region such as dense...

    K. Kundu, P. Halder, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  13. No Access

    Chapter

    Deep Learning-Based Lossless Audio Encoder (DLLAE)

    Lossless audio compression is a crucial technique for reducing size of audio file with  preservation of audio data. In this current approach, a lossless audio encoder has been designed with the help of deep le...

    Uttam Kr. Mondal, Asish Debnath in Intelligent Computing: Image Processing Ba… (2020)

  14. No Access

    Chapter

    Lattice-Based Fuzzy Medical Expert System for Management of Low Back Pain: A Preliminary Design

    Low back pain (LBP) appears to be the foremost contributor to the years lived with disability globally, depriving many individuals across the nations of leading daily activities. Diagnosing LBP is quite challe...

    Debarpita Santra, S. K. Basu, J. K. Mandal in Intelligent Computing: Image Processing Ba… (2020)

  15. No Access

    Chapter and Conference Paper

    A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET

    In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and ...

    Khondekar Lutful Hassan, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  16. No Access

    Chapter and Conference Paper

    Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP)

    Low back pain is a communal musculoskeletal ailment that deprives many individuals worldwide of doing their daily and normal activities. With the absence of external biomarkers, most of the symptoms of low bac...

    Debarpita Santra, J. K. Mandal, S. K. Basu in Proceedings of the Global AI Congress 2019 (2020)

  17. No Access

    Chapter

    Forest Cover Change Analysis in Sundarban Delta Using Remote Sensing Data and GIS

    The present study deals with change detection analysis of forest cover in Sundarban delta during 1975–2015 using remote sensing data and GIS. Supervised maximum likelihood classification techniques are needed ...

    K. Kundu, P. Halder, J. K. Mandal in Intelligent Computing Paradigm: Recent Trends (2020)

  18. No Access

    Article

    An FPGA based non-feistel block cipher through recursive substitutions of bits on prime-nonprime detection of sub-stream (RSBPNDS)

    A non-Feistel block cipher cryptosystem viz. recursive substitutions of bits on prime–nonprime detection of sub-stream (RSBPNDS) is proposed and its FPGA implementation is reported in this paper. RSBPNDS opera...

    Rajdeep Chakraborty, J. K. Mandal in Microsystem Technologies (2019)

  19. No Access

    Article

    An FPGA based cascaded CBC block cipher through RPSPNC and TE

    Security system can be enhanced by cascading approach where two or more cryptographic algorithms are applied serially or parallel. In this paper the plaintext is first divided into number of blocks and each bl...

    Rajdeep Chakraborty, J. K. Mandal in Microsystem Technologies (2019)

  20. No Access

    Chapter and Conference Paper

    Product Recommendation for E-Commerce Data Using Association Rule and Apriori Algorithm

    As internet technology advances and its usage gets popular among people Electronic Commerce (E-Commerce) business increases at a rapid pace. But the problem lying here is that E-commerce sites provide their cu...

    Soma Bandyopadhyay, S. S. Thakur in Modelling and Simulation in Science, Techn… (2019)

previous disabled Page of 4