Zobrazeno 1 - 10
of 259
pro vyhledávání: '"Paramartha Dutta"'
Publikováno v:
Sensors, Vol 22, Iss 23, p 9067 (2022)
The global population is aging due to many factors, including longer life expectancy through better healthcare, changing diet, physical activity, etc. We are also witnessing various frequent epidemics as well as pandemics. The existing healthcare sys
Externí odkaz:
https://doaj.org/article/d286e17d1831438288aa3f66b4fca93f
Publikováno v:
Egyptian Informatics Journal, Vol 16, Iss 1, Pp 103-111 (2015)
Mobile Ad-hoc network (MANET) is infra-structure less collection of mobile nodes which can communicate with each other through single hop or multi-hop technique. The hop count also known as path length plays a crucial role in packet delivery, routing
Externí odkaz:
https://doaj.org/article/e9ebdb5a68e346b5a7c851eded8f35cd
Publikováno v:
Egyptian Informatics Journal, Vol 15, Iss 2, Pp 105-114 (2014)
Several parameters like routing protocol, mobility pattern, average speed of mobile nodes, path length from source to destination, previous delay, etc., affect the end-to-end packet delay in mobile ad hoc network. But the nature of relationship betwe
Externí odkaz:
https://doaj.org/article/a0ccc53d4d6f4db390096670ffe5cdbf
Publikováno v:
Multimedia Tools and Applications. 80:31993-32022
The present article proposes a geometry-based fuzzy relational technique for capturing gradual change in human emotion over time available from relevant face image sequences. As associated features, we make use of fuzzy membership arising out of five
Autor:
Asit Barman, Paramartha Dutta
Publikováno v:
Pattern Recognition Letters. 145:254-261
Distance and Shape signature features in human faces offer formidable significance in recognizing facial expressions. Identifying appropriate landmarks is a crucial as well as challenging issue in the field of expression recognition of human faces. A
Data security is considered as one of the prime concerns in digital communication era. Steganography and cryptography are two parallel approaches adopted for protecting such data. Steganography camouflages the secret data into a cover media while cry
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9cc45a7d4235fab1faf34947cdbd6a1c
https://doi.org/10.21203/rs.3.rs-1232791/v1
https://doi.org/10.21203/rs.3.rs-1232791/v1
Publikováno v:
2022 IEEE Region 10 Symposium (TENSYMP).
Publikováno v:
Sustainable Computing: Informatics and Systems. 38:100852
Publikováno v:
Applied Soft Computing. 134:109971