Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Tapan A. Hazra"'
Autor:
Mukesh Kumar Singh, Chiranjib Das, Dwaipayan Mukherjee, Aniruddha Majumder, Tapan Kanti Hazra
Publikováno v:
Bengal Journal of Otolaryngology and Head Neck Surgery, Vol 23, Iss 2, Pp 63-66 (2015)
Introduction Epistaxis is one of the commonest emergencies in Otorhinolaryngology. The management of intractable posterior epistaxis sometime becomes challenging to ENT surgeons. Over the last decade endoscopic cauterization of sphenopalatine artery
Externí odkaz:
https://doaj.org/article/741ddcd48e70442f9d2506161ac000ad
Publikováno v:
Bengal Journal of Otolaryngology and Head Neck Surgery, Vol 22, Iss 1, Pp 11-12 (2014)
Abstract During the 1800s, the mortality rate from thyroid surgery was approximately 40%. Sterile surgical arenas , general anaesthesia, and improved surgical techniques have made death from thyroid surgery extremely rare today. By developing a thor
Externí odkaz:
https://doaj.org/article/618f1124f9ec4da4a3e4de7fa67c6d2d
Autor:
Chiranjib Das, Tapan Kanti Hazra
Publikováno v:
Indian J Otolaryngol Head Neck Surg
Canal wall down (CWD) mastoidectomy is the operation of choice for unsafe variety of chronic otitis media. But open mastoid cavity poses many problems. The solution of these problems is obliteration of mastoid cavity that is self-cleaning and easily
Publikováno v:
Proceedings of International Ethical Hacking Conference 2019 ISBN: 9789811503603
We might be living in a Screen Age, almost everyday a new object with a bright touch screen is invented. A possible antidote to our screen addiction is voice interface. The available voice assistants are activated by keywords such as “hey Siri” o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::89a1ad0650765c19a35bb548c7507690
https://doi.org/10.1007/978-981-15-0361-0_2
https://doi.org/10.1007/978-981-15-0361-0_2
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Mobile Wireless Sensor Network (WSN) enables substantial elevation in network lifetime besides a better network coverage. Our work proposes an algorithm based on sink mobility in a Wireless Sensor Network. The network is partitioned into several clus
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
The security threats in the Internet-of-Things (IoT) environment are increasing exponentially with the growth of its applications in diverse disciplines. Due to the inherent nature of resource constrained attributes, IoT networks are susceptible to e
Autor:
M. Sumanth Kumar, Tapan Kumar Hazra, Kishlay Raj, Soummyo Priyo Chattopadhyay, Ajoy Kumar Chakraborty
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315435
A simple, fast, and dynamic image encryption scheme is proposed in this paper based on pixel shuffling. The primary idea applied for the purpose lies in designing of dynamic pseudorandom permutation map using simple divide and conquer method that wil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edef0b03d6cbda8203422def75941f02
https://doi.org/10.1007/978-981-13-1544-2_11
https://doi.org/10.1007/978-981-13-1544-2_11
Autor:
Ajoy Kumar Chakraborty, Tapan Kumar Hazra, Nazim Uddin Sheikh, Hasina Rahman, Kanyasree Mustafi
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we would describe a vehicle detection technique that can be used for traffic surveillance systems. An intelligent traffic surveillance system, equipped with electronic devices, works by communicating with moving vehicles about traffic c
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a compu