Papers published on a yearly basis
Papers
More filters
••
01 Jan 2021
TL;DR: In this paper, the existence of a post-disaster opportunistic network framework is discussed, which comprises two entities, such as opportunistic networks architecture and energy-efficient routing protocols.
Abstract: In order to offer the post-disaster management services discussed in the last two chapters, the existence of a post-disaster opportunistic network framework becomes crucial. A post-disaster opportunistic network framework comprises two entities, such as opportunistic network architecture and energy-efficient post-disaster routing protocols. The post-disaster opportunistic network architecture typically includes suitable network architecture and node deployment plans which are elaborated in this chapter.
1 citations
••
17 Mar 2021TL;DR: In this paper, a deep neural network based architecture is proposed to identify the source of Facebook and whatsApp images using InceptionV3 model, which is a 48-layers deep.
Abstract: Source Identification is the forensic problem of source device detection of digital images/videos/audio. In this paper, we deal with the problem of Source Camera Identification (SCI) of digital images. The existing forensic techniques of image source identification fail in source identification of images taken from Social Networking platforms, mainly due to the inherent compression characteristics induced in to those images. In this work, deep neural network based architecture is proposed to identify the source of Facebook and whatsApp images. We used InceptionV3 model, which is a 48-layers deep. It surpasses the state-of-the-art performance in terms of online source networks (OSN) image source identification accuracy. We considered smart phone devices in this work for our experiments, and present our results on the recently published VISION dataset.
1 citations
••
01 Jan 2014
TL;DR: A deft method for image– secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function is proposed, resulting in a highly secure, reliable L.B.S. substitution.
Abstract: We have explored a new dimension in image steganography and propose a deft method for image– secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function. The keen association of the image, secret data and steg key, varied with a pixel dependant embedding results in a highly secure, reliable L.S.B. substitution. Meticulous statistical analyses have been provided to emphasize the strong immunity of the algorithm to the various steganalysis methods in the later sections of the paper.
1 citations
••
01 Jan 2015
TL;DR: This chapter presents some emerging purification and isolation techniques, such as, magnetic fishing, aqueous two-phase system, and ion-exchange membrane chromatography, which are described in detail in this chapter.
Abstract: Being the fourth step of the 5-Stage Universal Recovery Process, isolation and purification of target compounds become more compact, environmental friendly, and cost effective, producing pure end-products. This chapter presents some emerging purification and isolation techniques, such as, magnetic fishing, aqueous two-phase system, and ion-exchange membrane chromatography. In the presence of magnetic particles, solutes are separated due to their selective affinity and recovered by suitable buffer. On the other hand, the aqueous two-phase system is a liquid/liquid partitioning technique, comprising two types of phase-forming components. Finally, Ion-exchange membrane chromatography is a technique where biomolecules (mostly protein) are separated due to their ionic charge (adsorbtion and elusion by pH of buffer). The features of these technologies are dsecribed in detail in this chapter.
1 citations
••
01 Dec 2012TL;DR: In this paper, electrical impedance tomography (EIT) is applied to determine the shape, size and position of unwanted growth within a specified area, which is used to identify the presence of such objects within a particular area and also figure out the shape of the same.
Abstract: In this paper, electrical impedance tomography (EIT), a method of imaging the interior permittivity distribution of an object by measuring current and voltage at the surface is applied for determining the shape, size and position of unwanted growth within a specified area. The model, we have developed, is used to identify the presence of such objects within the particular area and can also figure out the shape of the same. Here, small objects having different shapes and with different material permittivity are designed inside a closed region. Then a potential difference on the boundaries of the box gives rise to a surface charge density that varies depending on the permittivity distribution inside the box. By investigating at the surface charge density the shape of the different materials inside the box is determined. The overall designing and study was carried out using FEM based simulation platform.
1 citations
Authors
Showing all 581 results
Name | H-index | Papers | Citations |
---|---|---|---|
Debnath Bhattacharyya | 39 | 578 | 6867 |
Samiran Mitra | 38 | 198 | 5108 |
Dipankar Chakravorty | 35 | 369 | 5288 |
S. Saha Ray | 34 | 217 | 3888 |
Tai-hoon Kim | 33 | 526 | 4974 |
Anindya Sen | 29 | 109 | 3472 |
Ujjal Debnath | 29 | 335 | 3828 |
Anirban Mukhopadhyay | 29 | 169 | 3200 |
Avijit Ghosh | 28 | 121 | 2639 |
Mrinal K. Ghosh | 26 | 64 | 2243 |
Biswanath Bhunia | 23 | 75 | 1466 |
Jayati Datta | 23 | 55 | 1520 |
Nabarun Bhattacharyya | 23 | 136 | 1960 |
Pinaki Bhattacharya | 19 | 114 | 1193 |
Dwaipayan Sen | 18 | 71 | 1086 |