Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Designing an Iterative Adaptive Arithmetic Coding-Based Lossless Bio-signal Compression for Online Patient Monitoring System (IAALBC)

    Various new generation research works on real-time healthcare monitoring system are performing on to fulfill the demands of medical signal compression. In this paper, we proposed a state-of-the-art technique t...

    Uttam Kr. Mondal, Asish Debnath, N. Tabassum in Frontiers of ICT in Healthcare (2023)

  2. No Access

    Chapter and Conference Paper

    A Markovian Analysis of Low Back Pain on Jute Mill Workers

    Jute industry which employs around 3,50,000 labors, is a large contributor to India’s economy. With the prevalence of chronic low back pain among jute mill workers being 55%, the paper proposes a Markov model-...

    Debarpita Santra, J. K. Mandal, Subrata Goswami in Advanced Techniques for IoT Applications (2022)

  3. No Access

    Chapter and Conference Paper

    On Mono-Line Boolean Symmetry Detection

    detection of symmetries in a switching function is an NP-complete problem. In this paper, a single-line solution for detecting total symmetry has been proposed. The proposed method exploits the linearit...

    Subhajit Guha, J. K. Mandal in Proceedings of International Conference on… (2022)

  4. No Access

    Chapter and Conference Paper

    Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method

    Online recommendation system is a computer-based intelligent technique which has become popular in many e-commerce Web sites. It is used to recommend items to a user on the basis of some information like past ...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2022)

  5. No Access

    Chapter and Conference Paper

    Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning

    Presently the usage of Electronic Commerce has been growing at a rapid space and many customers choose the online shop** option available, to avoid waiting in a long queue. Before buying an item specially cl...

    Soma Bandyopadhyay, S. S. Thakur in Proceedings of International Conference on… (2021)

  6. No Access

    Article

    Secured hand sacking based two phase data concealing architecture in spectral domain

    The requirement of information confidentiality in digital world emanates different approaches to the criticality of secrecy. Steganographic methods hide the secret information into cover media. In this paper t...

    Sujit Das, J. K. Mandal in Microsystem Technologies (2020)

  7. No Access

    Chapter and Conference Paper

    Rotational Cryptographic Technique (RCT)

    A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream...

    Debajyoti Guha, Rajdeep Chakraborty in Intelligent Techniques and Applications in… (2020)

  8. No Access

    Chapter and Conference Paper

    Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images

    The present study deals with forest cover classification of Sundarban on the basis of fuzzy c-means algorithm using satellite images from 1975 to 2018. Four features are considered in this region such as dense...

    K. Kundu, P. Halder, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  9. No Access

    Chapter

    Deep Learning-Based Lossless Audio Encoder (DLLAE)

    Lossless audio compression is a crucial technique for reducing size of audio file with  preservation of audio data. In this current approach, a lossless audio encoder has been designed with the help of deep le...

    Uttam Kr. Mondal, Asish Debnath in Intelligent Computing: Image Processing Ba… (2020)

  10. No Access

    Chapter

    Lattice-Based Fuzzy Medical Expert System for Management of Low Back Pain: A Preliminary Design

    Low back pain (LBP) appears to be the foremost contributor to the years lived with disability globally, depriving many individuals across the nations of leading daily activities. Diagnosing LBP is quite challe...

    Debarpita Santra, S. K. Basu, J. K. Mandal in Intelligent Computing: Image Processing Ba… (2020)

  11. No Access

    Chapter and Conference Paper

    A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET

    In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and ...

    Khondekar Lutful Hassan, J. K. Mandal in Proceedings of the Global AI Congress 2019 (2020)

  12. No Access

    Chapter and Conference Paper

    Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP)

    Low back pain is a communal musculoskeletal ailment that deprives many individuals worldwide of doing their daily and normal activities. With the absence of external biomarkers, most of the symptoms of low bac...

    Debarpita Santra, J. K. Mandal, S. K. Basu in Proceedings of the Global AI Congress 2019 (2020)

  13. No Access

    Chapter

    Forest Cover Change Analysis in Sundarban Delta Using Remote Sensing Data and GIS

    The present study deals with change detection analysis of forest cover in Sundarban delta during 1975–2015 using remote sensing data and GIS. Supervised maximum likelihood classification techniques are needed ...

    K. Kundu, P. Halder, J. K. Mandal in Intelligent Computing Paradigm: Recent Trends (2020)

  14. No Access

    Article

    An FPGA based non-feistel block cipher through recursive substitutions of bits on prime-nonprime detection of sub-stream (RSBPNDS)

    A non-Feistel block cipher cryptosystem viz. recursive substitutions of bits on prime–nonprime detection of sub-stream (RSBPNDS) is proposed and its FPGA implementation is reported in this paper. RSBPNDS opera...

    Rajdeep Chakraborty, J. K. Mandal in Microsystem Technologies (2019)

  15. No Access

    Article

    An FPGA based cascaded CBC block cipher through RPSPNC and TE

    Security system can be enhanced by cascading approach where two or more cryptographic algorithms are applied serially or parallel. In this paper the plaintext is first divided into number of blocks and each bl...

    Rajdeep Chakraborty, J. K. Mandal in Microsystem Technologies (2019)

  16. Article

    Special issue on International Conference on Microelectronics, Circuits and Systems (Micro 2015), held in Kolkata, India, July, 11–12, 2015

    J. K. Mandal, Dulal Acharjee, B. Michel in Microsystem Technologies (2017)

  17. No Access

    Article

    Activity recognition system using inbuilt sensors of smart mobile phone and minimizing feature vectors

    Mobile phone is becoming a very popular tool due to having various user friendly applications with all flexible options. It is highly popular for its light weight, wearable and comfortable uses. Many extrinsic...

    Dulal Acharjee, Amitava Mukherjee, J. K. Mandal in Microsystem Technologies (2016)

  18. No Access

    Chapter and Conference Paper

    Clustering of Noisy Regions (CNR)—A GIS Anchored Technique for Clustering on Raster Map

    In this proposed work, a GIS anchored system has been approached, which initially takes as input, a digitized map, generally of a very large region, with the population of the common mass in different wards/ar...

    Anirban Chakraborty, J. K. Mandal in Proceedings of the Second International Co… (2016)

  19. No Access

    Chapter and Conference Paper

    Z Transformation-Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)

    In this paper, a Z transformation-based authentication technique has been proposed with higher Region of Convergence (ROC) value. Sequentially, five bits from the authenticating mask in row major order are con...

    J. K. Mandal, Suman Mahapatra in Proceedings of the Second International Co… (2016)

  20. No Access

    Chapter and Conference Paper

    Authentication of Audio Signals in Frequency Domain (AASF)

    In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be direct...

    Uttam Kr. Mondal, J. K. Mandal in Proceedings of the Second International Co… (2016)

previous disabled Page of 3