Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Soummyo Priyo Chattopadhyay"'
Autor:
M. Sumanth Kumar, Tapan Kumar Hazra, Kishlay Raj, Soummyo Priyo Chattopadhyay, Ajoy Kumar Chakraborty
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315435
A simple, fast, and dynamic image encryption scheme is proposed in this paper based on pixel shuffling. The primary idea applied for the purpose lies in designing of dynamic pseudorandom permutation map using simple divide and conquer method that wil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edef0b03d6cbda8203422def75941f02
https://doi.org/10.1007/978-981-13-1544-2_11
https://doi.org/10.1007/978-981-13-1544-2_11
Autor:
Sachet Sircar, Himadri Nath Saha, Jayeeta Saha, Arnab Saha, Soummyo Priyo Chattopadhyay, Subhojit Dutta, Radhika Ray
Publikováno v:
CCWC
Unmanned Aerial Vehicles are becoming more and more popular to meet the demands of increased population and agriculture. Drones equipped with appropriate cameras, sensors and integrating modules will help in achieving easy, efficient, precision agric
Autor:
Soummyo Priyo Chattopadhyay, Himadri Nath Saha, Sachet Sircar, Anwesha Mitra, Souvik Dutta, Priyasha Chatterjee, Aiswarya Chatterjee, Arnab Saha
Publikováno v:
CCWC
In recent day scenario, the incessant increase in air and sound pollution prove to be an alarming problem. It has become mandatory to control and appropriately monitor the situation so that the required steps to curb the situation can be undertaken.
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we would describe a vehicle detection technique that can be used for traffic surveillance systems. An intelligent traffic surveillance system, equipped with electronic devices, works by communicating with moving vehicles about traffic c
Publikováno v:
2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Providing Authentication to any system leads to provide more security to that system. There are many authentication techniques are available, such as textual password, biometric etc. Almost all securities are covered with textual password, still it h
Publikováno v:
2015 International Conference and Workshop on Computing and Communication (IEMCON).
Cuckoo search is one of the recent metaheuristic optimization algorithm which was first developed by Xin-She Yang and Saush Deb in 2009. This paper is based on Cuckoo Search or Cuckoo Algorithm- an algorithm based on the destructive reproductive stra
Publikováno v:
2015 International Conference and Workshop on Computing and Communication (IEMCON).
Global routing in VLSI (very large scale integration) design is one of the most challenging discrete optimization problems in computational theory. In this review paper of ours, we have presented a polynomial time algorithm for the global routing pro
Publikováno v:
2016 IEEE 7th Annual Information Technology, Electronics & Mobile Communication Conference (IEMCON); 2016, p1-7, 7p
Publikováno v:
2015 International Conference & Workshop on Computing & Communication (IEMCON); 2015, p1-8, 8p
Publikováno v:
2015 International Conference & Workshop on Computing & Communication (IEMCON); 2015, p1-5, 5p