Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Tapan Kumar Hazra"'
Publikováno v:
Proceedings of International Ethical Hacking Conference 2019 ISBN: 9789811503603
We might be living in a Screen Age, almost everyday a new object with a bright touch screen is invented. A possible antidote to our screen addiction is voice interface. The available voice assistants are activated by keywords such as “hey Siri” o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::89a1ad0650765c19a35bb548c7507690
https://doi.org/10.1007/978-981-15-0361-0_2
https://doi.org/10.1007/978-981-15-0361-0_2
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
The security threats in the Internet-of-Things (IoT) environment are increasing exponentially with the growth of its applications in diverse disciplines. Due to the inherent nature of resource constrained attributes, IoT networks are susceptible to e
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Mobile Wireless Sensor Network (WSN) enables substantial elevation in network lifetime besides a better network coverage. Our work proposes an algorithm based on sink mobility in a Wireless Sensor Network. The network is partitioned into several clus
Autor:
M. Sumanth Kumar, Tapan Kumar Hazra, Kishlay Raj, Soummyo Priyo Chattopadhyay, Ajoy Kumar Chakraborty
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315435
A simple, fast, and dynamic image encryption scheme is proposed in this paper based on pixel shuffling. The primary idea applied for the purpose lies in designing of dynamic pseudorandom permutation map using simple divide and conquer method that wil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edef0b03d6cbda8203422def75941f02
https://doi.org/10.1007/978-981-13-1544-2_11
https://doi.org/10.1007/978-981-13-1544-2_11
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we would describe a vehicle detection technique that can be used for traffic surveillance systems. An intelligent traffic surveillance system, equipped with electronic devices, works by communicating with moving vehicles about traffic c
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a compu
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
It has been extremely important to know what the audience feels. With the growing technologies, people get to know what the majority thinks about a particular subject through review sites, people opinion voting sites, campaigns. Thus, it becomes nece
Autor:
Ajoy Kumar Chakraborty, Tapan Kumar Hazra, Nazim Uddin Sheikh, Hasina Rahman, Kanyasree Mustafi
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
Cryptography is used for secure communication over a media in presence of third party adversaries. If proper encryption algorithm is not used then it will be easy for third party hackers to decrypt the secret message very easily. This paper presents
Publikováno v:
2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON).
The aim is to develop an efficient method which uses a custom image to train the classifier. This OCR extract distinct features from the input image for classifying its contents as characters specifically letters and digits. Input to the system is di