default search action
Debnath Bhattacharyya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]Bhanu Prakash Doppala, Debnath Bhattacharyya, Midhun Chakkravarthy, Tai-Hoon Kim:
A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset. Distributed Parallel Databases 41(1-2): 1-20 (2023) - [j26]R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim:
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Pers. Ubiquitous Comput. 27(3): 889-906 (2023) - [j25]R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim:
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Pers. Ubiquitous Comput. 27(3): 907 (2023) - [j24]Debnath Bhattacharyya, Thirupathi Rao N., Eali Stephen Neal Joshua, Yu-Chen Hu:
A bi-directional deep learning architecture for lung nodule semantic segmentation. Vis. Comput. 39(11): 5245-5261 (2023) - [d1]Ravi Kumar Lanke, Debnath Bhattacharyya, Karthick Raghunath K. M.:
ShrimpView: A Versatile Dataset for Shrimp Detection and Recognition. IEEE DataPort, 2023 - 2022
- [j23]Kalaipriyan Thirugnanasambandam, M. Rajeswari, Debnath Bhattacharyya, Jung-yoon Kim:
Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems. Autom. Softw. Eng. 29(1): 13 (2022) - [j22]K. V. Satyanarayana, Thirupathi Rao N., Debnath Bhattacharyya, Yu-Chen Hu:
Identifying the presence of bacteria on digital images by using asymmetric distribution with k-means clustering algorithm. Multidimens. Syst. Signal Process. 33(2): 301-326 (2022) - [j21]Thirupathi Rao N., Debnath Bhattacharyya, Meeravali Sk, Seung-phil Hong:
Performance evaluation of a distributed energy model with compound Poisson arrivals on an improvised forked network: A detailed analysis. Sustain. Comput. Informatics Syst. 33: 100626 (2022) - 2021
- [j20]Sk. Meeravali, Debnath Bhattacharyya, Thirupathi Rao N., Yu-Chen Hu:
Performance analysis of an improved forked communication network model. Connect. Sci. 33(3): 645-673 (2021) - [j19]Sudipta Roy, Bhavya Patel, Debnath Bhattacharyya, Kushal Dhayal, Tai-Hoon Kim, Mamta Mittal:
Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing. Int. J. Reason. based Intell. Syst. 13(2): 41-49 (2021) - [j18]Mohan Mahanty, Debnath Bhattacharyya, Divya Midhunchakkaravarthy:
SRGAN Assisted Encoder-Decoder Deep Neural Network for Colorectal Polyp Semantic Segmentation. Rev. d'Intelligence Artif. 35(5): 395-401 (2021) - [j17]Eali Stephen Neal Joshua, Debnath Bhattacharyya, Midhun Chakkravarthy, Hye-Jin Kim:
Lung Cancer Classification Using Squeeze and Excitation Convolutional Neural Networks with Grad Cam++ Class Activation Function. Traitement du Signal 38(4): 1103-1112 (2021) - [j16]Vamsi Bandi, Debnath Bhattacharyya, Divya Midhunchakkravarthy, Jung-yoon Kim:
Early Detection of Hemorrhagic Stroke Using a Lightweight Deep Learning Neural Network Model. Traitement du Signal 38(6): 1727-1736 (2021) - [j15]S. NagaMallik Raj, Debnath Bhattacharyya, Divya Midhunchakkaravarthy, Tai-Hoon Kim:
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks. Wirel. Pers. Commun. 117(4): 3381-3395 (2021) - 2020
- [j14]Eali Stephen Neal Joshua, Midhun Chakkravarthy, Debnath Bhattacharyya:
An Extensive Review on Lung Cancer Detection Using Machine Learning Techniques: A Systematic Study. Rev. d'Intelligence Artif. 34(3): 351-359 (2020) - [j13]Bhanu Prakash Doppala, Debnath Bhattacharyya, Midhun Chakkravarthy:
Stratification of Cardiovascular Diseases Using Deep Learning. Rev. d'Intelligence Artif. 34(4): 377-385 (2020) - [j12]Vamsi Bandi, Debnath Bhattacharyya, Divya Midhunchakkravarthy:
Prediction of Brain Stroke Severity Using Machine Learning. Rev. d'Intelligence Artif. 34(6): 753-761 (2020)
2010 – 2019
- 2017
- [j11]Raj R. Parmar, Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions. IEEE Access 5: 7156-7163 (2017) - [j10]Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI. Comput. Methods Programs Biomed. 140: 307-320 (2017) - [j9]Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction. Frontiers Comput. Sci. 11(4): 717-727 (2017) - 2015
- [c32]Bhanu Prakash Battula, Debnath Bhattacharyya, C. V. P. R. Prasad, Tai-Hoon Kim:
A Novel Prototype Decision Tree Method Using Sampling Strategy. ICCSA (1) 2015: 90-97 - 2013
- [j8]Debnath Bhattacharyya, Anindya Jyoti Pal, Tai-Hoon Kim:
Cell-graph coloring for cancerous tissue modelling and classification. Multim. Tools Appl. 66(2): 229-245 (2013) - [j7]Krishna Bhowal, Debnath Bhattacharyya, Anindya Jyoti Pal, Tai-Hoon Kim:
A GA based audio steganography with enhanced security. Telecommun. Syst. 52(4): 2197-2204 (2013) - 2011
- [j6]Tai-Hoon Kim, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay:
Supervised chromosome clustering and image classification. Future Gener. Comput. Syst. 27(4): 372-376 (2011) - [c31]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee:
Leaf Image Analysis towards Plant Identification. FGIT-SIP 2011: 113-125 - [c30]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee:
Watermarking Using Multiresolution Cosine Transformation: A Review. FGIT-SIP 2011: 126-139 - [c29]Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee:
Use of Artificial Neural Network in Bengali Character Recognition. FGIT-SIP 2011: 140-152 - [c28]Rajib Ghosh, Debnath Bhattacharyya, Tai-Hoon Kim, Gang-soo Lee:
New Algorithm for Skewing Detection of Handwritten Bangla Words. FGIT-SIP 2011: 153-159 - [c27]Nabanita Mukherjee (Ganguly), Imon Mukherjee, Debnath Bhattacharyya, Tai-Hoon Kim:
Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion. FGIT-SIP 2011: 204-214 - [c26]Debnath Bhattacharyya, Tai-Hoon Kim:
Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis. UCMA (2) 2011: 299-306 - [c25]Debnath Bhattacharyya, Tai-Hoon Kim:
Brain Tumor Detection Using MRI Image Analysis. UCMA (2) 2011: 307-314 - [c24]Debnath Bhattacharyya, Tai-Hoon Kim:
Image Data Hiding Technique Using Discrete Fourier Transformation. UCMA (2) 2011: 315-323 - 2010
- [j5]Debnath Bhattacharyya, Tai-Hoon Kim, Subhajit Pal:
A Comparative Study of Wireless Sensor Networks and Their Routing Protocols. Sensors 10(12): 10506-10523 (2010) - [c23]Debnath Bhattacharyya, Poulami Dutta, Maricel O. Balitanas, Tai-Hoon Kim, Purnendu Das:
Hiding Data in Audio Signal. ACN 2010: 23-29 - [c22]Debnath Bhattacharyya, Rosslin John Robles, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Feature Extraction and Analysis of Breast Cancer Specimen. ACN 2010: 30-41 - [c21]Rituparna Samaddar, Sandip Samaddar, Tai-Hoon Kim, Debnath Bhattacharyya:
Hierarchical Data Structures for Accessing Spatial Data. FGIT-SIP/MulGraB 2010: 267-274 - [c20]Shilpi Saha, Debnath Bhattacharyya, Tai-Hoon Kim:
OSI Layer Wise Security Analysis of Wireless Sensor Network. FGIT-SIP/MulGraB 2010: 275-282 - [c19]Subhra Pramanik, Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Tai-Hoon Kim:
Identification of Plant Using Leaf Image Analysis. FGIT-SIP/MulGraB 2010: 291-303 - [c18]Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim:
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. AST/UCMA/ISA/ACN 2010: 61-69 - [c17]Debnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-Hun Lee, Tai-Hoon Kim:
Lane Design for Speed Optimization. ISA 2010: 97-107 - [c16]Debnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim:
Biometric Authentication Using Infrared Imaging of Hand Vein Patterns. ISA 2010: 108-115 - [c15]Subhajit Pal, Debnath Bhattacharyya, Tai-Hoon Kim:
Chain Based Hierarchical Routing Protocol for Wireless Sensor Networks. SUComS 2010: 482-492 - [c14]Samit Biswas, Debnath Bhattacharyya, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. SUComS 2010: 493-503 - [c13]Sumana Barman, Debnath Bhattacharyya, Seung-Whan Jeon, Tai-Hoon Kim, Haeng-Kon Kim:
A New Experiment on Bengali Character Recognition. UCMA 2010: 20-28
2000 – 2009
- 2009
- [j4]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation. Int. J. Commun. Netw. Syst. Sci. 2(5): 363-370 (2009) - [j3]Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. J. Univers. Comput. Sci. 15(5): 1081-1089 (2009) - [c12]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Rathit Bandyopadhyay, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Discrete Fourier Transformation based Image Authentication technique. IEEE ICCI 2009: 196-200 - [c11]Debnath Bhattacharyya, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Refine Crude Corpus for Opinion Mining. CICSyN 2009: 17-22 - [c10]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme. CICSyN 2009: 374-379 - [c9]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. FGIT-SecTech 2009: 43-50 - [c8]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. FGIT-SecTech 2009: 64-71 - [c7]Debnath Bhattacharyya, Debasri Chakraborty, Tai-Hoon Kim:
Effective GIS Mobile Query System. FGIT 2009: 129-137 - 2008
- [c6]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Deepsikha Debnath:
Handwritten Signature Authentication Using Statistical Estimation. MUE 2008: 77-82 - [c5]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das:
A Secure Scheme for Image Transformation. SNPD 2008: 490-493 - 2007
- [c4]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Handwritten Signature Verification System using Morphological Image Analysis. CATA 2007: 112-117 - [c3]Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Deepsikha Choudhury:
Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images. ICCSA Workshops 2007: 72-77 - [c2]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
A Flexible ANN System for Handwritten Signature Identification. IMECS 2007: 1883-1887 - [c1]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover. MUE 2007: 987-991 - 2006
- [j2]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Mosquito attack optimization. Ubiquity 2006(August): 9:1-9:14 (2006) - [j1]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Anindya Jyoti Pal:
Secure delivery of handwritten signature. Ubiquity 2006(October) (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint