default search action
J. K. Mandal 0001
Person information
- affiliation: University of Kalyani, West Bengal, India
Other persons with the same name
- J. K. Mandal 0002 — Indian Institute of Technology Kharagpur, Department of Electrical Engineering, India
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Sadhu Prasad Kar, Amit Kumar Das, Rajeev Chatterjee, Jyotsna Kumar Mandal:
Assessment of learning parameters for students' adaptability in online education using machine learning and explainable AI. Educ. Inf. Technol. 29(6): 7553-7568 (2024) - [j29]Soma Bandyopadhyay, S. S. Thakur, J. K. Mandal:
Emotion detection for online recommender system using deep learning: a proposed method. Innov. Syst. Softw. Eng. 20(4): 719-726 (2024) - [j28]Partha Ghosh, Takaaki Goto, J. K. Mandal, Soumya Sen:
View materialization using fuzzy MAX-MIN composition with association rule mining (VMFCA). Innov. Syst. Softw. Eng. 20(4): 851-867 (2024) - [e13]Kousik Dasgupta, Somnath Mukhopadhyay, Jyotsna Kumar Mandal, Paramartha Dutta:
Computational Intelligence in Communications and Business Analytics - 5th International Conference, CICBA 2023, Kalyani, India, January 27-28, 2023, Revised Selected Papers, Part I. Communications in Computer and Information Science 1955, Springer 2024, ISBN 978-3-031-48875-7 [contents] - [e12]Kousik Dasgupta, Somnath Mukhopadhyay, Jyotsna Kumar Mandal, Paramartha Dutta:
Computational Intelligence in Communications and Business Analytics - 5th International Conference, CICBA 2023, Kalyani, India, January 27-28, 2023, Revised Selected Papers, Part II. Communications in Computer and Information Science 1956, Springer 2024, ISBN 978-3-031-48878-8 [contents] - 2023
- [j27]Sujit Das, Jyotsna Kumar Mandal:
A modified column block Toeplitz matrix for compressed sensing. Signal Image Video Process. 17(6): 3083-3090 (2023) - 2022
- [j26]Gaurav Gambhir, Monika Gambhir, Jyotsna Kumar Mandal:
A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography. Int. J. Softw. Innov. 10(1): 1-14 (2022) - [c46]Rajeev Chatterjee, Jyotsna Kumar Mandal, Sadhu Prasad Kar:
A Comprehensive Model for Augmented Confidence Based Learning (ACBL). ICL (2) 2022: 55-66 - [c45]Sadhu Prasad Kar, Rajeev Chatterjee, Jyotsna Kumar Mandal:
Automated Assessment - An Application in Authentic Learning Using Bloom's Taxonomy. ICL (2) 2022: 747-756 - [e11]Somnath Mukhopadhyay, Sunita Sarkar, Paramartha Dutta, Jyotsna Kumar Mandal, Sudipta Roy:
Computational Intelligence in Communications and Business Analytics - 4th International Conference, CICBA 2022, Silchar, India, January 7-8, 2022, Revised Selected Papers. Communications in Computer and Information Science 1579, Springer 2022, ISBN 978-3-031-10765-8 [contents] - 2021
- [j25]Debarpita Santra, Subrata Goswami, Jyotsna Kumar Mandal, Swapan Kumar Basu:
Low back pain expert systems: Clinical resolution through probabilistic considerations and poset. Artif. Intell. Medicine 120: 102163 (2021) - [j24]Sounak Sadhukhan, P. K. Mishra, Swapan Kumar Basu, J. K. Mandal:
A multi-scale agent-based model for avascular tumour growth. Biosyst. 206: 104450 (2021) - [j23]Krishan Kundu, Prasun Halder, Jyotsna Kumar Mandal:
Detection and Prediction of Sundarban Reserve Forest using the CA-Markov Chain Model and Remote Sensing Data. Earth Sci. Informatics 14(3): 1503-1520 (2021) - [j22]Soma Bandyopadhyay, S. S. Thakur, J. K. Mandal:
Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society. Innov. Syst. Softw. Eng. 17(1): 45-52 (2021) - [j21]Gaurav Gambhir, Jyotsna Kumar Mandal:
Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map. Innov. Syst. Softw. Eng. 17(4): 333-342 (2021) - [j20]Nongmeikapam Brajabidhu Singh, Moirangthem Marjit Singh, Arindam Sarkar, Jyotsna Kumar Mandal:
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection. J. Inf. Secur. Appl. 61: 102899 (2021) - [j19]Sujit Das, Jyotsna Kumar Mandal:
An enhanced block-based Compressed Sensing technique using orthogonal matching pursuit. Signal Image Video Process. 15(3): 563-570 (2021) - [j18]Krishan Kundu, Prasun Halder, Jyotsna Kumar Mandal:
Change Detection and Patch Analysis of Sundarban Forest During 1975-2018 Using Remote Sensing and GIS Data. SN Comput. Sci. 2(5): 364 (2021) - [c44]Partha Ghosh, Takaaki Goto, Jyotsna Kumar Mandal, Soumya Sen:
Materialized View Driven Architecture over Lattice of Cuboids in Data Warehouse. ACIT 2021: 27-31 - [c43]Sujit Das, Jyotsna Kumar Mandal:
Color Image Compressed Sensing Using Modified Stagewise Orthogonal Matching Pursuit. CICBA 2021: 20-28 - [e10]Paramartha Dutta, Jyotsna Kumar Mandal, Somnath Mukhopadhyay:
Computational Intelligence in Communications and Business Analytics - Third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, Revised Selected Papers. Communications in Computer and Information Science 1406, Springer 2021, ISBN 978-3-030-75528-7 [contents] - [i23]Uttam Kr. Mondal, Shamayita Pal, AmitRanjan Dutta, J. K. Mandal:
A New Approach to Enhance Security of Visual Cryptography Using Steganography (VisUS). CoRR abs/2103.09477 (2021) - 2020
- [b1]Jyotsna Kumar Mandal:
Reversible Steganography and Authentication via Transform Encoding. Studies in Computational Intelligence 901, Springer 2020, ISBN 978-981-15-4396-8, pp. 1-317 - [j17]Debarpita Santra, Swapan Kumar Basu, Jyotsna Kumar Mandal, Subrata Goswami:
Rough set based lattice structure for knowledge representation in medical expert systems: Low back pain management case study. Expert Syst. Appl. 145: 113084 (2020) - [j16]Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta:
Special issue on software solutions for contemporary applications. Innov. Syst. Softw. Eng. 16(1): 1 (2020) - [j15]Debarpita Santra, Jyotsna Kumar Mandal, Swapan Kumar Basu, Subrata Goswami:
Medical expert system for low back pain management: design issues and conflict resolution with Bayesian network. Medical Biol. Eng. Comput. 58(11): 2737-2756 (2020) - [j14]Shawni Dutta, Jyotsna Kumar Mandal, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN. Appl. Comput. Syst. 25(2): 163-171 (2020) - [p1]Krishan Kundu, Prasun Halder, J. K. Mandal:
Forest Cover Change Analysis in Sundarban Delta Using Remote Sensing Data and GIS. Intelligent Computing Paradigm 2020: 85-101 - [e9]J. K. Mandal, Devadutta Sinha:
Intelligent Computing Paradigm: Recent Trends. Studies in Computational Intelligence 784, Springer 2020, ISBN 978-981-13-7333-6 [contents]
2010 – 2019
- 2019
- [j13]Jyotsna Kumar Mandal, Somnath Mukhopadhyay:
Editorial preface. Innov. Syst. Softw. Eng. 15(1): 1 (2019) - [j12]Parinita Dutta, Rajeev Chatterjee, Jyotsna Kumar Mandal:
An approach for deployment of BRS in software-defined network. Innov. Syst. Softw. Eng. 15(3-4): 355-361 (2019) - [j11]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
On the use of the Stirling Transform in image steganography. J. Inf. Secur. Appl. 46: 320-330 (2019) - [c42]Moirangthem Marjit Singh, Jyotsna Kumar Mandal:
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric. ICCCS 2019: 565-569 - [c41]Amit Kumar Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya:
Sensor node assisted DTN for a post-disaster scenario. ICDCN 2019: 401-404 - [c40]Rajeev Chatterjee, Sadhu Prasad Kar, Jyotsna Kumar Mandal:
Managing Tasks in Confidence Based Learning Using K-ary Tree. ICL (2) 2019: 12-20 - [c39]Sadhu Prasad Kar, Rajeev Chatterjee, Jyotsna Kumar Mandal:
Intelligent Assessment Using Variable N-gram Technique. ICL (2) 2019: 30-37 - [e8]Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta:
Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science 1030, Springer 2019, ISBN 978-981-13-8577-3 [contents] - [e7]Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta:
Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II. Communications in Computer and Information Science 1031, Springer 2019, ISBN 978-981-13-8580-3 [contents] - [i22]Debarpita Santra, Jyotsna Kumar Mandal, Swapan Kumar Basu, Subrata Goswami:
Addressing Design Issues in Medical Expert System for Low Back Pain Management: Knowledge Representation, Inference Mechanism, and Conflict Resolution Using Bayesian Network. CoRR abs/1909.03987 (2019) - 2018
- [j10]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal, Ram Sarkar:
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multim. Tools Appl. 77(23): 30403-30418 (2018) - [j9]Amit Kumar Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya, Tamal Mondal, Sourav Sanu Shaw:
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario. Peer-to-Peer Netw. Appl. 11(1): 162-180 (2018) - [c38]Madhuchhanda Dasgupta, Jyotsna Kumar Mandal:
Deep Convolutional Neural Network Based Facial Keypoints Detection. CICBA (1) 2018: 47-56 - [c37]Gaurav Gambhir, J. K. Mandal:
Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique. CICBA (2) 2018: 441-449 - [e6]Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta:
Multi-Objective Optimization - Evolutionary to Hybrid Framework. Springer 2018, ISBN 978-981-13-1470-4 [contents] - [i21]Debarpita Santra, Swapan Kumar Basu, Jyotsna Kumar Mandal, Subrata Goswami:
Rough set based lattice structure for knowledge representation in medical expert systems: low back pain management case study. CoRR abs/1810.01560 (2018) - 2017
- [j8]Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya:
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. Int. J. Inf. Comput. Secur. 9(1/2): 130-155 (2017) - [c36]Sadhu Prasad Kar, Rajeev Chatterjee, Jyotsna Kumar Mandal:
A Novel Automated Assessment Technique in e-Learning Using Short Answer Type Questions. CICBA (1) 2017: 141-149 - [c35]Somnath Mukhopadhyay, Tamal Datta Chaudhuri, J. K. Mandal:
A Hybrid PSO-Fuzzy Based Algorithm for Clustering Indian Stock Market Data. CICBA (2) 2017: 475-487 - [c34]Rajdeep Chakraborty, Runa Seth, J. K. Mandal:
High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE. CICBA (1) 2017: 485-494 - [c33]Rajeev Chatterjee, Sadhu Prasad Kar, Jyotsna Kumar Mandal:
An intelligent mining technique for CBL. TALE 2017: 303-306 - [c32]Sadhu Prasad Kar, Jyotsna Kumar Mandal, Rajeev Chatterjee:
A comprehension based intelligent assessment architecture. TALE 2017: 368-371 - [e5]Jyotsna Kumar Mandal, Paramartha Dutta, Somnath Mukhopadhyay:
Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part I. Communications in Computer and Information Science 775, Springer 2017, ISBN 978-981-10-6426-5 [contents] - [e4]Jyotsna Kumar Mandal, Paramartha Dutta, Somnath Mukhopadhyay:
Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part II. Communications in Computer and Information Science 776, Springer 2017, ISBN 978-981-10-6429-6 [contents] - 2016
- [j7]Amit Kumar Gupta, Indrajit Bhattacharya, Parthasarathi Banerjee, Jyotsna Kumar Mandal, Animesh Mukherjee:
DirMove: direction of movement based routing in DTN architecture for post-disaster scenario. Wirel. Networks 22(3): 723-740 (2016) - [c31]Rajeev Chatterjee, Jyotsna Kumar Mandal:
Two dimensional assessment technique for CBL. TALE 2016: 40-43 - [e3]Swagatam Das, Tandra Pal, Samarjit Kar, Suresh Chandra Satapathy, Jyotsna Kumar Mandal:
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2015, Durgapur, India, 16-18 November 2015. Advances in Intelligent Systems and Computing 404, Springer 2016, ISBN 978-81-322-2693-2 [contents] - 2015
- [j6]Somnath Mukhopadhyay, J. K. Mandal:
Image denoising based on sub-image restoration through threshold optimisation. Int. J. Comput. Intell. Stud. 4(3/4): 288-312 (2015) - [j5]Arindam Sarkar, Jyotsna Kumar Mandal:
Cryptanalysis of Key Exchange method in Wireless Communication. Int. J. Netw. Secur. 17(4): 484-493 (2015) - [e2]Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal:
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 1, Bhubaneswar, Odisa, India, 14-15 November 2014. Advances in Intelligent Systems and Computing 327, Springer 2015, ISBN 978-3-319-11932-8 [contents] - [e1]Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal:
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 2, Bhubaneswar, Odisa, India, 14-15 November 2014. Advances in Intelligent Systems and Computing 328, Springer 2015, ISBN 978-3-319-12011-9 [contents] - 2014
- [j4]Somnath Mukhopadhyay, J. K. Mandal:
A Fuzzy Switching Median Filter of Impulses in Digital Imagery (FSMF). Circuits Syst. Signal Process. 33(7): 2193-2216 (2014) - [j3]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
Binomial transform based fragile watermarking for image authentication. J. Inf. Secur. Appl. 19(4-5): 272-281 (2014) - [c30]Arindam Sarkar, J. K. Mandal, Pritha Mondal:
Neuro-key Generation Based on HEBB Network for Wireless Communication. FICTA (2) 2014: 197-205 - [c29]Madhumita Sengupta, J. K. Mandal, Arindam Sarkar, Tamal Bhattacharjee:
KSOFM Network Based Neural Key Generation for Wireless Communication. FICTA (2) 2014: 207-215 - [c28]J. K. Mandal, Debdyuti Datta, Arindam Sarkar:
Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG). FICTA (2) 2014: 217-224 - [c27]Utpal Nandi, Jyotsna Kumar Mandal:
Windowed Huffman Coding with Limited Distinct Symbols by Least Recently Used Symbol Removable. FICTA (1) 2014: 489-494 - [c26]Somnath Mukhopadhyay, Pragati Mandal, Tandra Pal, Jyotsna Kumar Mandal:
Image Clustering Based on Different Length Particle Swarm Optimization (DPSO). FICTA (1) 2014: 711-718 - [c25]Debiprasad Bandyopadhyay, Kousik Dasgupta, J. K. Mandal, Paramartha Dutta, Varun Kumar Ojha, Václav Snásel:
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO). IBICA 2014: 271-280 - [c24]Moirangthem Marjit Singh, Mriganka Baruah, Jyotsna Kumar Mandal:
Reliability computation of mobile Ad-Hoc network using logistic regression. WOCN 2014: 1-5 - [i20]Utpal Nandi, Jyotsna Kumar Mandal:
Size Adaptive Region Based Huffman Compression Technique. CoRR abs/1403.0153 (2014) - 2013
- [j2]Somnath Mukhopadhyay, Jyotsna Kumar Mandal:
Denoising of digital images through PSO based pixel classification. Central Eur. J. Comput. Sci. 3(4): 158-172 (2013) - [c23]Madhumita Sengupta, J. K. Mandal, Jimson Mathew:
G-Let Based Authentication/Secret Message Transmission (GASMT). ISED 2013: 186-190 - [c22]Arindam Sarkar, J. K. Mandal, Priyadarsan Patra:
Double Layer Perceptron Synchronized Computational Intelligence Guided Fractal Triangle Based Cryptographic Technique for Secured Communication (DLPFT). ISED 2013: 191-195 - [i19]Manas Paul, Jyotsna Kumar Mandal:
A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept. CoRR abs/1305.0807 (2013) - [i18]Madhumita Sengupta, J. K. Mandal:
Wavelet Based Authentication/Secret Transmission Through Image Resizing(WASTIR). CoRR abs/1305.3753 (2013) - 2012
- [j1]Nabin Ghoshal, J. K. Mandal, Amrita Khamrui:
An Authentication Technique for Image/Legal Document (ATILD). J. Signal Process. Syst. 67(2): 187-199 (2012) - [c21]Uttam Kr. Mondal, Jyotsna Kumar Mandal:
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). ACITY (1) 2012: 199-208 - [c20]Utpal Nandi, Jyotsna Kumar Mandal:
Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging. ACITY (1) 2012: 739-748 - [c19]Jyotsna Kumar Mandal, Sudipta Kumar Ghosal:
Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA). ACITY (2) 2012: 767-776 - [c18]J. K. Mandal, Rakesh Kanji:
Invisible Image Watermarking Using Z Transforms (IIWZT). ACITY (2) 2012: 797-804 - [c17]J. K. Mandal, Amrita Khamrui, S. Chakraborty, P. Sur, S. K. Datta, I. RoyChoudhury:
A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT). ACITY (2) 2012: 885-893 - [c16]Parthajit Roy, J. K. Mandal:
A Delaunay Triangulation Preprocessing Based Fuzzy-Encroachment Graph Clustering for Large Scale GIS Data. ISED 2012: 300-305 - [c15]Utpal Nandi, J. K. Mandal:
Fractal Image Compression Using Fast Context Independent HV Partitioning Scheme. ISED 2012: 306-308 - [i17]J. K. Mandal:
A Frequency Domain Steganography using Z Transform (FDSZT). CoRR abs/1202.4245 (2012) - [i16]Uttam Kr. Mondal, J. K. Mandal:
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC). CoRR abs/1202.5194 (2012) - [i15]Arindam Sarkar, Sunil Karforma, J. K. Mandal:
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG). CoRR abs/1204.1797 (2012) - [i14]J. K. Mandal, Debashis Das:
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow. CoRR abs/1205.6775 (2012) - [i13]J. K. Mandal, Somnath Mukhopadhyay:
Image Filtering using All Neighbor Directional Weighted Pixels: Optimization using Particle Swarm Optimization. CoRR abs/1206.0285 (2012) - [i12]Arindam Sarkar, J. K. Mandal:
Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA). CoRR abs/1208.2333 (2012) - [i11]Arindam Sarkar, J. K. Mandal:
Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG). CoRR abs/1208.2334 (2012) - [i10]Arindam Sarkar, J. K. Mandal:
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC). CoRR abs/1211.2087 (2012) - [i9]Arindam Sarkar, J. K. Mandal:
Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP). CoRR abs/1211.4723 (2012) - [i8]Madhumita Sengupta, J. K. Mandal:
Self Authentication of image through Daubechies Transform technique (SADT). CoRR abs/1212.1863 (2012) - [i7]Madhumita Sengupta, J. K. Mandal:
Self Authentication of color image through Wavelet Transformation Technique (SAWT). CoRR abs/1212.2582 (2012) - [i6]Pawan Kumar Jha, Jyotsna Kumar Mandal:
Space Efficient Cryptographic Protocol Using Recursive Bitwise & Pairs Of Bits Of Operation (RBPBO). CoRR abs/1212.3368 (2012) - [i5]J. K. Mandal, Subhankar Ghatak:
A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP). CoRR abs/1212.3370 (2012) - [i4]Nabin Ghoshal, J. K. Mandal:
Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT). CoRR abs/1212.3371 (2012) - [i3]J. K. Mandal, Somnath Mukhopadhyay:
A Novel Directional Weighted Minimum Deviation (DWMD) Based Filter for Removal of Random Valued Impulse Noise. CoRR abs/1212.3373 (2012) - [i2]Madhumita Sengupta, J. K. Mandal, Nabin Ghoshal:
An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT). CoRR abs/1212.3719 (2012) - 2011
- [c14]Subhranil Som, Niladri Shekhar Chatergee, J. K. Mandal:
Key based bit level genetic cryptographic technique (KBGCT). IAS 2011: 240-245 - [c13]Jyotsna Kumar Mandal, Somnath Mukhopadhyay:
GA Based Denoising of Impulses (GADI). CISIM 2011: 212-220 - [c12]Uttam Kr. Mondal, Jyotsna Kumar Mandal:
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). CISIM 2011: 305-313 - [c11]J. K. Mandal, Somnath Mukhopadhyay:
A Novel Variable Mask Median Filter for Removal of Random Valued Impulses in Digital Images (VMM). ISED 2011: 302-306 - [c10]Uttam Kr. Mondal, J. K. Mandal:
A Message Embedded Authentication of Songs to Verify Intellectual Property Right (MEAS). ISED 2011: 313-317 - [c9]Madhumita Sengupta, J. K. Mandal:
Image Authentication Using Hough Transform Generated Self Signature in DCT Based Frequency Domain (IAHTSSDCT). ISED 2011: 324-328 - [c8]J. K. Mandal, Subhankar Ghatak:
A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC). ISED 2011: 329-334 - [c7]Parthajit Roy, J. K. Mandal:
A Novel Fuzzy-GIS Model Based on Delaunay Triangulation to Forecast Facility Locations (FGISFFL). ISED 2011: 341-346 - [c6]J. K. Mandal, Amrita Khamrui:
A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD). ISED 2011: 347-351 - [c5]J. K. Mandal, Arindam Sarkar:
An adaptive genetic key based neural encryption for online wireless communication (AGKNE). ReTIS 2011: 62-67 - [c4]J. K. Mandal, Somnath Mukhopadhyay:
Edge preserving restoration of random valued impulse noises (EPRRVIN). ReTIS 2011: 309-314
2000 – 2009
- 2008
- [i1]Saurabh Dutta, Jyotsna Kumar Mandal:
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES). IACR Cryptol. ePrint Arch. 2008: 360 (2008) - 2006
- [c3]Rajdeep Chakraborty, J. K. Mandal:
A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT). ICIT 2006: 155-159 - [c2]Pawan Kumar Jha, Jyotsna Kumar Mandal:
Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key. ICIT 2006: 176-177 - 2004
- [c1]Saurabh Dutta, J. K. Mandal:
Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions. AACC 2004: 324-332
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint