Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    QoS-Aware Task Offloading Using Self-organized Distributed Cloudlet for Mobile Cloud Computing

    Edge-cloud has drawn a significant attention of the IT industries, cloud operators as well as the network service providers and mobile users. To meet the user requirements the service providers have been able ...

    Deepsubhra Guha Roy, Ahona Ghosh in Computational Intelligence, Communications… (2019)

  2. No Access

    Chapter and Conference Paper

    Performance Analysis of DYMO, ZRP and AODV Routing Protocols in a Multi Hop Grid Based Underwater Wireless Sensor Network

    Underwater Wireless Sensor Network (UWSN), attractive research zone due to suspicious nature of ocean. A numeral sensor nodes and vehicles that collaborate UWSN to gather information and perform cooperative t...

    Kamalika Bhattacharjya, Sahabul Alam in Computational Intelligence, Communications… (2019)

  3. No Access

    Chapter and Conference Paper

    Reckoning of Music Rhythm Density and Complexity through Mathematical Measures

    The paper introduces an intelligent method to find the density and complexity of music rhythm in the context of Indian Music. Musical rhythm is a piece of unit that consists of a set of the musical beats and i...

    Sudipta Chakrabarty, Gobinda Karmakar in Advanced Computational and Communication P… (2018)

  4. No Access

    Chapter and Conference Paper

    Secure and Dynamic IP Address Configuration Scheme in MANET

    Mobile ad hoc network (MANET) is an infrastructure-less network having dynamic topology and volatile nodes connected by wireless communication. Secure communication in MANET demands unique IP address assignmen...

    Poulami Choudhury, Koushik Majumder in Intelligent Computing, Communication and D… (2015)

  5. No Access

    Chapter and Conference Paper

    A Novel Distributed Dynamic IP Configuration Scheme for MANET

    In mobile ad hoc network (MANET), unique address allocation is a major task in order to ensure proper routing. Most of the address configuration schemes are based on duplicate address detection (DAD) which req...

    Pritam Bag, Koushik Majumder, Debashis De in Intelligent Computing, Communication and D… (2015)

  6. No Access

    Chapter and Conference Paper

    A Framework of Musical Pattern Recognition Using Petri Nets

    Petri Nets are modeling tools that are used in an enormous number of real-world simulations and scientific problems. The primary objective of this paper is establishing that Petri Net is one important tool tha...

    Samarjit Roy, Sudipta Chakrabarty in Emerging Trends in Computing and Communica… (2014)

  7. No Access

    Chapter and Conference Paper

    Re-Programmable Logic Array for Logic Design and Its Reliability Analysis in QCA

    Quantum dot cellular automaton is now considered as a strong alternative of Complementary Metal Oxide Semiconductor (CMOS) technology. In this paper, we demonstrate an empirical work for implementing Quantum d...

    Kunal Das, Debashis De, Sayantan Ghatak in Emerging Trends in Computing and Communica… (2014)

  8. No Access

    Chapter and Conference Paper

    Online Testable Conservative Adder Design in Quantum Dot Cellular Automata

    Garbage count minimization and low power, lossless conservative full adder design and its online testing in Quantum dot Cellular Automata is prime research interest of this work. Parity preserving reversible l...

    Arijit Dey, Kunal Das, Debashis De in Emerging Trends in Computing and Communica… (2014)

  9. No Access

    Chapter and Conference Paper

    Realization of Bi-Quinary Coded Decimal Adder in Quantum Dot Cellular Automata

    Bi-quinary coded parallel adder design with Quantum Cellular Automata is presented in this brief contribution. The nano-electronic computer architecture using QCA technology is in infancy stage. It requires mo...

    Dipannita Podder, Kunal Das, Debashis De in Emerging Trends in Computing and Communica… (2014)

  10. No Access

    Chapter and Conference Paper

    Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques

    Mobile wallet is very useful for day to day money transaction. It is an essential requirement to build utmost level of security. NFC technology introduces a new gateway to enable secure mobile wallet money tra...

    Riti Chowdhury, Debashis De in Computer Information Systems – Analysis and Technologies (2011)