Papers published on a yearly basis
Papers
More filters
••
01 Jan 2017TL;DR: In this article, the free vibration characteristics of a composite hypar shell in the presence of cutout were considered following a generalized finite element formulation using eight-noded curved quadratic isoparametric element for shell with a threenoded beam element for stiffener, and the results were analyzed to achieve guidelines for the selection of optimum size and position of the cutout with respect to shell center considering different practical constraints.
Abstract: Free vibration characteristics of stiffened composite hypar shell (hyperbolic paraboloidal shells bounded by straight edges) in the presence of cutout are considered following a generalized finite element formulation using eight-noded curved quadratic isoparametric element for shell with a three-noded beam element for stiffener. The size of the cutouts and their positions with respect to the shell centre for different edge constraints are varied to obtain the results in the form of figures and tables. The results are analysed to achieve guidelines for the selection of optimum size and position of the cutout with respect to shell centre considering different practical constraints.
••
01 Oct 2007TL;DR: This work is focused on hiding Handwritten Signature during transmission over untrusted network and could be applied for ownership protection, copy control, annotation and authentication of digital media.
Abstract: In this paper, we propose hiding and extraction algorithms for Handwritten Signature. Handwritten Signature Image can be transmitted from source to target securely over untrusted network by using this proposed Data Hiding Algorithm. In this algorithm, size of the carrier image must be double or more the size of source image. If necessary then additional bytes or noise needed to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). There are numerous Data Hiding and Extraction algorithms are already proposed. In this paper, we propose a novel and new alternative. Entire work divides into - a. security on transmission; and b. Extraction. This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media. This work is focused on hiding Handwritten Signature during transmission over untrusted network.
••
01 Jan 2018TL;DR: Experimental results show that the proposed MS-BPSO based method performs significantly better and the improved multi swarm concept generates a good subset of pathway markers which provides more effective insight to the gene-disease association with high accuracy and reliability.
Abstract: Pathway information for cancer detection helps to find co-regulated gene groups whose collective expression is strongly associated with cancer development. In this paper, a collaborative multi-swarm binary particle swarm optimization (MS-BPSO) based gene selection technique is proposed that outperforms to identify the pathway marker genes. We have compared our proposed method with various statistical and pathway based gene selection techniques for different popular cancer datasets as well as a detailed comparative study is illustrated using different meta-heuristic algorithms like binary coded particle swarm optimization (BPSO), binary coded differential evolution (BDE), binary coded artificial bee colony (BABC) and genetic algorithm (GA). Experimental results show that the proposed MS-BPSO based method performs significantly better and the improved multi swarm concept generates a good subset of pathway markers which provides more effective insight to the gene-disease association with high accuracy and reliability.
••
17 Dec 2018TL;DR: A Reputation based Trust Management Model using Friendship vector (RTMF) is proposed and implemented and it has been observed that RTMF has successfully reduced the negative effect of the presence of malicious nodes and improved the performance of the network.
Abstract: One of the major security issues common in any trust and reputation management mechanism is Bad mouthing in which malicious participants victimize nodes with high reputations by giving lower or negative feedbacks in order to undermine them. Opportunistic Networks are more vulnerable to this type of attacks as there is no pre defined path between the source and the destination. Hence it is important to ensure the trustworthiness or reliability of the next-hop nodes as the nodes communicates by forwarding the message to the next hop using opportunistic connectivity due to node proximity. Otherwise there is the risk of malicious nodes interrupting secure transmission, thus affecting the performance of the network. To deal with this issue of Bad mouthing due to the presence of malicious nodes in the network, we have proposed and implemented a Reputation based Trust Management Model using Friendship vector (RTMF). We have compared the performance of our algorithm with an existing Trust management system based on Ontology and it has been observed that RTMF has successfully reduced the negative effect of the presence of malicious nodes and improved the performance of the network.
••
TL;DR: In this paper, the y-axis nomenclature of Fig. 3 is corrected and the corrected figure is presented here, where the corrected nomencature is shown in Figure 1.
Abstract: In the above titled paper (ibid., vol. 9, pp. 627-630, 2010), the y-axis nomenclature of Fig. 3 is incorrect. The corrected figure is presented here.
Authors
Showing all 581 results
Name | H-index | Papers | Citations |
---|---|---|---|
Debnath Bhattacharyya | 39 | 578 | 6867 |
Samiran Mitra | 38 | 198 | 5108 |
Dipankar Chakravorty | 35 | 369 | 5288 |
S. Saha Ray | 34 | 217 | 3888 |
Tai-hoon Kim | 33 | 526 | 4974 |
Anindya Sen | 29 | 109 | 3472 |
Ujjal Debnath | 29 | 335 | 3828 |
Anirban Mukhopadhyay | 29 | 169 | 3200 |
Avijit Ghosh | 28 | 121 | 2639 |
Mrinal K. Ghosh | 26 | 64 | 2243 |
Biswanath Bhunia | 23 | 75 | 1466 |
Jayati Datta | 23 | 55 | 1520 |
Nabarun Bhattacharyya | 23 | 136 | 1960 |
Pinaki Bhattacharya | 19 | 114 | 1193 |
Dwaipayan Sen | 18 | 71 | 1086 |