author: paramartha dutta

Innovations in Data Analytics: Selected Papers of ICIDA 2022

... DHCP server, to provide network config- uration parameters to normal users ... process was complex to implement. Notwithstanding, the aforementioned ... (DORA) process necessitates the deployment of the DHCP Alert system. According to the ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

... dark webs. In-degree represents total number of direct links coming from other dark web, and out-degree represents total number of direct link going out from this website to other website. There exist many other algorithms which can ...

Cyber Intelligence and Information Retrieval: Proceedings of CIIR 2021

... tabula recta which is represented in Fig. 1. Both the sender and receiver share the same secret key, which contains one or more words. The steps include. Fig. 1 Tabula recta [3] 1. Identify the current plaintext letter in the top ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2022, Volume 3

... Blowfish algorithms for accuracy and performance evaluation. In the Blowfish algorithm, the precision of the iris is high and the precision of the face is low, for the new modified Blowfish algorithm. 4 Conclusion In these articles, we ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2022, Volume 2

... Analytics Vidhya Website. https://www.analyticsvidhya.com/blog/2021/05/bagging-25-questi ons-to-test-your-skills-on-random-forest-algorithm/. Last accessed 22 June 2021 14. Section Website. www.section.io. Last accessed 9 June 2021 15 ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1

... Bangla. ·. handwritten Deep learning recognition· Computer. ·. Convolutional vision. ·. Machine neural learning network. 1 ... alphabet incorporates the writing system for the Bangla language together with the Assamese alphabets. Bangla is ...

Quantum Inspired Computational Intelligence: Research and Applications

... solution for how to integrate different aspects of a client portfolio and their ... mechanics can be direct inspiration for business decision support systems ... Zettili, Quantum Mechanics: Concepts and Applications, Wiley, New York, 2009 ...

Human Emotion Recognition from Face Images

... CK 100 96.3 95.3 95.2 100 100 97.8 DST trio using NARX CK 97.2 96.3 95.3 98.8 97.2 100 97.4 DST trio using RBF CK 97.2 100 95.3 97.6 100 97.1 97.8 [5] CK+ 96.1 95.7 95.8 98.4 95.9 95.8 96.3 [6] CK+ 98.1 100 95.8 100 93.8 100 97.9 [7] ...

Computational Intelligence, Communications, and Business Analytics: First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I

... Twofish Algorithm Twofish is a 128-bit symmetric block cipher and it accepts variable-length key ranging up to 256 bits. Twofish is based on a Feistel network and it runs for 16 rounds. Function F is made up of four key-dependent 8 by 8 ...

Multi-Objective Optimization: Evolutionary to Hybrid Framework

... Oracle. We summarize these clues in the following points: 1. Researchers have repeatedly shown that the important role normalization plays especially in achieving better coverage of the Pareto front. Usually, the extreme points of the ...

Hybrid Intelligent Techniques for Pattern Analysis and Understanding

Siddhartha Bhattacharyya, Anirban Mukherjee, Indrajit Pan, Paramartha Dutta, Arup Kumar Bhaumik. In Chapter 7, the authors consider the important problem of face recognition and propose an improved optimal feature selection procedure for ...

Advanced Computational and Communication Paradigms: Proceedings of International Conference on ICACCP 2017, Volume 1

... MATLAB function 'fspecial' for Gaussian filter and then MATLAB quantization command 'quantize' is used to quantize the kernel as shown in Eq. 4 [1]. For convolution process each of the sub-image ... Gaussian and Average Filters on Xilinx ISE.

Algorithms in Machine Learning Paradigms

... Roy and Arindam Biswas Abstract The patients with diabetes for many years ... nilanjanaduttaroy@gmail.com A. Biswas Department of Information Technology, Indian Institute of Engineering ... Saranya KB, Mohideen SK (2012) A novel approach for.

Recent Trends in Computational Intelligence Enabled Research: Theoretical Foundations and Applications

... Banerjee, J. S., Chakraborty, A., & Chattopadhyay, A. (2018a). A novel best relay selection protocol for cooperative cognitive radio systems using fuzzy AHP. Journal of Mechanics of Continua and Mathematical Science, 13(2), 72À87. Banerjee ...

Intelligence Enabled Research: DoSIER 2020

... protocol in manet. In: 2015 2nd International conference on electronics and communication systems (ICECS). IEEE, pp 953– 957 7. Sufian A, Banerjee ... Banerjee A, Dutta P (2010) Fuzzy-controlled adaptive and intelligent route selection (fair) ...

Computational Intelligence in Communications and Business Analytics: 5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part I

... Uber Orbit in predicting future movements of CBOEVIX has appeared to be highly effective , as manifested by the estimated figures of the performance indicators . Uber Orbit's performance degrades heavily in the test segment , as ...

Computational Intelligence in Communications and Business Analytics: Third International Conference, CICBA 2021, Santiniketan, India, January 7–8, 2021, Revised Selected Papers

... body parts, viz., neck, trunk, lower back, leg, wrist, lower arm and upper arm are identified as the most discomfort ... worksheet corresponding to those discomfort prone body parts are presented in Table 1 and Table 2, respectively. The ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.