Skip to main content

previous disabled Page of 4
and
  1. Article

    Open Access

    An Ultrasonically Powered Implantable Microprobe for Electrolytic Ablation

    Electrolytic ablation (EA) is a promising nonthermal tumor ablation technique that destroys malignant cells through induction of a locoregional pH change. EA is typically performed by inserting needle electrod...

    A. Kim, S. K. Lee, T. Parupudi, R. Rahimi, S. H. Song, M. C. Park in Scientific Reports (2020)

  2. No Access

    Chapter and Conference Paper

    A Study on Legal Knowledge Base Creation Using Artificial Intelligence and Ontology

    Artificial Intelligence (AI) as an emerging technology, facilitates the map** of human intelligence with computerized mechanism. This capability of thinking like human being provides computer with boundless ...

    Tanaya Das, Abhishek Roy, A. K. Majumdar in Innovative Data Communication Technologies… (2020)

  3. No Access

    Article

    Estimation of FSO link availability using climatic data

    Free Space Optical (FSO) communication systems are being adapted increasingly to provide high speed data transmission. The transmission performance of a free space optical link could be severely degraded due t...

    A. J. Kshatriya, Y. B. Acharya, A. K. Aggarwal, A. K. Majumdar in Journal of Optics (2016)

  4. No Access

    Article

    Communication performance of free space optical link using wavelength diversity in strong atmospheric turbulence

    Atmospheric turbulence can be considered as one of the main problems facing FSO communication systems, which degrades the performance in terms of bit error rate. The objective of this paper is to examine the u...

    Anil J. Kshatriya, Y. B. Acharya, A. K. Aggarwal, A. K. Majumdar in Journal of Optics (2015)

  5. Article

    Apurba Kanta Choudhury (1938–2012)

    A. K. Majumdar, Chinmoy Pal in Journal of the Geological Society of India (2012)

  6. No Access

    Article

    Database intrusion detection using sequence alignment

    Information is considered to be the most valuable asset of any organization and hence, it should be securely maintained. However, rapid proliferation of the Internet and Web applications has increased the thre...

    Amlan Kundu, Shamik Sural, A. K. Majumdar in International Journal of Information Security (2010)

  7. No Access

    Article

    Structural Characterization of PLD-grown Nanometer Size Ferromagnetic NiFeMo films

    Thin films of 3 different thicknesses each of Ni83.2Fe3.3Mo13.5 and Nig83.1Fe6.0Mo10.9 alloys have been grown using Pulsed Laser Deposition (PLD) technique. Our motivation is to investigate the magnetic propertie...

    Mitali Banerjee, A. K. Majumdar, R. J. Choudhary in MRS Online Proceedings Library (2009)

  8. No Access

    Article

    Indigenous design and fabrication of a 6.5 T superconducting magnet and a magnetotransport measurement set-up

    A low-cost apparatus for measuring Hall effect and magnetoresistance is designed and built indigenously. This includes a 6.5 T superconducting magnet and a variable temperature sample holder assembly. A superi...

    P. Khatua, A. K. Majumdar in Pramana (2009)

  9. Chapter and Conference Paper

    Evaluation of Segmentation Techniques Using Region Size and Boundary Information

    Image segmentation quality evaluation is a key element when comparing segmentation algorithms. In computer vision, unsupervised segmentation algorithms, although of great interest, often suffer from lack of a ...

    D. P. Dogra, A. K. Majumdar, S. Sural in Pattern Recognition and Machine Intelligence (2009)

  10. No Access

    Chapter and Conference Paper

    Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks

    This paper introduces a framework for fraud detection in mobile communication networks based on the current as well as past behavioral pattern of subscribers. The proposed fraud detection system (FDS) consists...

    Suvasini Panigrahi, Amlan Kundu, Shamik Sural in Information Security and Privacy (2007)

  11. No Access

    Chapter and Conference Paper

    STARBAC: Spatiotemporal Role Based Access Control

    Role Based Access Control (RBAC) has emerged as an important access control paradigm in computer security. However, the access decisions that can be taken in a system implementing RBAC do not include many rele...

    Subhendu Aich, Shamik Sural, A. K. Majumdar in On the Move to Meaningful Internet Systems… (2007)

  12. No Access

    Chapter and Conference Paper

    Modeling of Echocardiogram Video Based on Views and States

    In this work we propose a hierarchical state-based model for representing an echocardiogram video using objects present and their dynamic behavior. The modeling is done on the basis of the different types of v...

    Aditi Roy, Shamik Sural, J. Mukherjee in Computer Vision, Graphics and Image Proces… (2006)

  13. No Access

    Chapter and Conference Paper

    Object Tracking Using Background Subtraction and Motion Estimation in MPEG Videos

    We present a fast and robust method for moving object tracking directly in the compressed domain using features available in MPEG videos. DCT domain background subtraction in Y plane is used to locate candidat...

    Ashwani Aggarwal, Susmit Biswas, Sandeep Singh, Shamik Sural in Computer Vision – ACCV 2006 (2006)

  14. No Access

    Chapter and Conference Paper

    Weighted Intra-transactional Rule Mining for Database Intrusion Detection

    Data mining is the non-trivial process of identifying novel, potentially useful and understandable patterns in data. With most of the organizations starting on-line operations, the threat of security breaches ...

    Abhinav Srivastava, Shamik Sural in Advances in Knowledge Discovery and Data M… (2006)

  15. No Access

    Chapter and Conference Paper

    Two-Stage Credit Card Fraud Detection Using Sequence Alignment

    A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems...

    Amlan Kundu, Shamik Sural, A. K. Majumdar in Information Systems Security (2006)

  16. Chapter and Conference Paper

    Integration of Keyword and Feature Based Search for Image Retrieval Applications

    The main obstacle in realizing semantic-based image retrieval is from the web that semantic description of an image is difficult to capture in low-level features. Text based keywords can be generated from web ...

    A. Vadivel, Shamik Sural, A. K. Majumdar in Pattern Recognition and Machine Intelligence (2005)

  17. No Access

    Chapter and Conference Paper

    A Game-Theoretic Approach to Credit Card Fraud Detection

    Intrusion prevention mechanisms are largely insufficient for protection of databases against Information Warfare attacks by authorized users and has drawn interest towards intrusion detection. We visualize the...

    Vishal Vatsa, Shamik Sural, A. K. Majumdar in Information Systems Security (2005)

  18. No Access

    Chapter and Conference Paper

    Segmentation Using Saturation Thresholding and Its Application in Content-Based Retrieval of Images

    We analyze some of the visual properties of the HSV (Hue, Saturation and Value) color space and develop an image segmentation technique using the results of our analysis. In our method, features are extracted ...

    A. Vadivel, M. Mohan, Shamik Sural, A. K. Majumdar in Image Analysis and Recognition (2004)

  19. No Access

    Article

    Semantic Based Concurrency Control of Open Nested Transactions in Active Object Oriented Database Management Systems

    Active object oriented database management systems (AODBMS) are finding increasing application in different application domains and especially for cooperative and long duration activity management. In this pap...

    Prithwish Kangsabanik, R. Mall, A.K. Majumdar in Distributed and Parallel Databases (2000)

  20. No Access

    Article

    Magnetic phase transitions in Fe80-xNixCr20 (14 ⩽ x ⩽ 30) alloy studied by using 57Fe Mössbauer spectroscopy

    This paper reports 57Fe Mössbauer spectroscopic studies of the polycrystalline samples of the substitutionally disordered, isostructural (fcc), ternary alloy system Fe80-xNixCr20 for x = 30, 26, 19 and 14 in the ...

    D. Bandyopadhyay, R.M. Singru, A.K. Majumdar in Hyperfine Interactions (1999)

previous disabled Page of 4