Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Ratan Kumar Basak"'
Autor:
Sougata Roy Chowdhury, Suman Sengupta, Subir Biswas, Tridib Kumar Sinha, Ramkrishna Sen, Ratan Kumar Basak, Basudam Adhikari, Arindam Bhattacharyya
Publikováno v:
PLoS ONE, Vol 9, Iss 11, p e113663 (2014)
Continuous free radical assault upsets cellular homeostasis and dysregulates associated signaling pathways to promote stress-induced cell death. In spite of the continuous development and implementation of effective therapeutic strategies, limitation
Externí odkaz:
https://doaj.org/article/5ed91c49f7414c9c82e4674560afe4ce
Data security is considered as one of the prime concerns in digital communication era. Steganography and cryptography are two parallel approaches adopted for protecting such data. Steganography camouflages the secret data into a cover media while cry
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9cc45a7d4235fab1faf34947cdbd6a1c
https://doi.org/10.21203/rs.3.rs-1232791/v1
https://doi.org/10.21203/rs.3.rs-1232791/v1
Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret information. The effectiveness of any steg
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb4d2fba34f95b6461670dcf72e49b2d
https://doi.org/10.21203/rs.3.rs-193132/v1
https://doi.org/10.21203/rs.3.rs-193132/v1
Autor:
Debashis Das, Ratan Kumar Basak
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811521874
Image steganography is a frequently used method in digital data security in modern communication system. The two prime objectives of steganography lie in hiding capacity and security of hidden data. In this paper, we propose a data hiding scheme, foc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::05676ddaf3d74b250517a21e4f542b97
https://doi.org/10.1007/978-981-15-2188-1_39
https://doi.org/10.1007/978-981-15-2188-1_39
Publikováno v:
2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
In company with immense popularity of social network, modern business houses are using it extensively for branding and advertising of their products. One of the preferred media for the advertisement is the animated Graphics Interchanged Format (GIF).
Autor:
Basudam Adhikari, Tridib Kumar Sinha, Ratan Kumar Basak, Sougata Roy Chowdhury, Ramkrishna Sen, Suman Sengupta, Arindam Bhattacharyya, Subir Biswas
Publikováno v:
Molecular Carcinogenesis. 54:1636-1655
Reactive oxygen species (ROS), the key mediators of cellular oxidative stress and redox dysregulation involved in cancer initiation and progression, have recently emerged as promising targets for anticancer drug discovery. Continuous free radical ass
Autor:
Sarada Prasad Kundu, Basudam Adhikari, Aparna Roy, S. B. Majumder, Ratan Kumar Basak, Sumit Chakraborty
Publikováno v:
Construction and Building Materials. 38:776-784
We have demonstrated that the physical characteristics and mechanical properties of cement mortar are significantly improved by the jute fibre reinforcement. Three different processes methodologies were adopted to mix the jute fibre homogeneously in
Autor:
Souvik Chatterjee, Amrin Zaman, Sukalyan Goswami, Bipasha Mukhopadhyay, Shalini Guha, Abhriya Roy, Saptarshi De, Ratan Kumar Basak, Ronit Ray, Sucheta Nag
Publikováno v:
UEMCON
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level secu
Autor:
Abhriya Roy, Sucheta Nag, Ronit Ray, Shalini Guha, Saptarshi De, Souvik Chatterjee, Sukalyan Goswami, Bipasha Mukhopadhyay, Ratan Kumar Basak, Amrin Zaman
Publikováno v:
UEMCON
Presentation of a novel decision tree based method to improve the ability of hand written character recognition using mathematical morphology. For this paper, classification of hand written digits is done into two groups: one with blob and another wi
Autor:
Riddhi Dutta, Bipasha Mukhopadhyay, Ratan Kumar Basak, Shalini Guha, Sukalyan Goswami, Souvik Chatterjee, Amrin Zaman, Ronit Ray, Abhriya Roy, Saptarshi De
Publikováno v:
UEMCON
In this paper, a procedure for segmentation-based image compression is suggested. Two types of segmentation techniques are used, namely threshold and region growing algorithms, and JPEG is applied to obtain the final compressed result, which provides