![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Designing an Iterative Adaptive Arithmetic Coding-Based Lossless Bio-signal Compression for Online Patient Monitoring System (IAALBC)
Various new generation research works on real-time healthcare monitoring system are performing on to fulfill the demands of medical signal compression. In this paper, we proposed a state-of-the-art technique t...
-
Chapter and Conference Paper
A Markovian Analysis of Low Back Pain on Jute Mill Workers
Jute industry which employs around 3,50,000 labors, is a large contributor to India’s economy. With the prevalence of chronic low back pain among jute mill workers being 55%, the paper proposes a Markov model-...
-
Chapter and Conference Paper
On Mono-Line Boolean Symmetry Detection
detection of symmetries in a switching function is an NP-complete problem. In this paper, a single-line solution for detecting total symmetry has been proposed. The proposed method exploits the linearit...
-
Chapter and Conference Paper
Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method
Online recommendation system is a computer-based intelligent technique which has become popular in many e-commerce Web sites. It is used to recommend items to a user on the basis of some information like past ...
-
Chapter and Conference Paper
Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning
Presently the usage of Electronic Commerce has been growing at a rapid space and many customers choose the online shop** option available, to avoid waiting in a long queue. Before buying an item specially cl...
-
Article
Secured hand sacking based two phase data concealing architecture in spectral domain
The requirement of information confidentiality in digital world emanates different approaches to the criticality of secrecy. Steganographic methods hide the secret information into cover media. In this paper t...
-
Chapter and Conference Paper
Rotational Cryptographic Technique (RCT)
A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream...
-
Chapter and Conference Paper
Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images
The present study deals with forest cover classification of Sundarban on the basis of fuzzy c-means algorithm using satellite images from 1975 to 2018. Four features are considered in this region such as dense...
-
Chapter
Deep Learning-Based Lossless Audio Encoder (DLLAE)
Lossless audio compression is a crucial technique for reducing size of audio file with preservation of audio data. In this current approach, a lossless audio encoder has been designed with the help of deep le...
-
Chapter
Lattice-Based Fuzzy Medical Expert System for Management of Low Back Pain: A Preliminary Design
Low back pain (LBP) appears to be the foremost contributor to the years lived with disability globally, depriving many individuals across the nations of leading daily activities. Diagnosing LBP is quite challe...
-
Chapter and Conference Paper
A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET
In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and ...
-
Chapter and Conference Paper
Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP)
Low back pain is a communal musculoskeletal ailment that deprives many individuals worldwide of doing their daily and normal activities. With the absence of external biomarkers, most of the symptoms of low bac...
-
Chapter
Forest Cover Change Analysis in Sundarban Delta Using Remote Sensing Data and GIS
The present study deals with change detection analysis of forest cover in Sundarban delta during 1975–2015 using remote sensing data and GIS. Supervised maximum likelihood classification techniques are needed ...
-
Article
An FPGA based non-feistel block cipher through recursive substitutions of bits on prime-nonprime detection of sub-stream (RSBPNDS)
A non-Feistel block cipher cryptosystem viz. recursive substitutions of bits on prime–nonprime detection of sub-stream (RSBPNDS) is proposed and its FPGA implementation is reported in this paper. RSBPNDS opera...
-
Article
An FPGA based cascaded CBC block cipher through RPSPNC and TE
Security system can be enhanced by cascading approach where two or more cryptographic algorithms are applied serially or parallel. In this paper the plaintext is first divided into number of blocks and each bl...
-
Article
Special issue on International Conference on Microelectronics, Circuits and Systems (Micro 2015), held in Kolkata, India, July, 11–12, 2015
-
Article
Activity recognition system using inbuilt sensors of smart mobile phone and minimizing feature vectors
Mobile phone is becoming a very popular tool due to having various user friendly applications with all flexible options. It is highly popular for its light weight, wearable and comfortable uses. Many extrinsic...
-
Chapter and Conference Paper
Clustering of Noisy Regions (CNR)—A GIS Anchored Technique for Clustering on Raster Map
In this proposed work, a GIS anchored system has been approached, which initially takes as input, a digitized map, generally of a very large region, with the population of the common mass in different wards/ar...
-
Chapter and Conference Paper
Z Transformation-Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)
In this paper, a Z transformation-based authentication technique has been proposed with higher Region of Convergence (ROC) value. Sequentially, five bits from the authenticating mask in row major order are con...
-
Chapter and Conference Paper
Authentication of Audio Signals in Frequency Domain (AASF)
In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be direct...