default search action
Goutam Sanyal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Kumar M. Santhosh, M. Prabhakar, Goutam Sanyal:
Hierarchical Clustering Architecture for Metaverse Applications. CCGridW 2023: 272-274 - 2022
- [j24]Subhajit Roy, Jaydeep Howlader, Goutam Sanyal:
A novel approach of data hiding in video using region selection and PCA. Multim. Tools Appl. 81(10): 14553-14571 (2022) - 2021
- [j23]Soumya Ranjan Mishra, Tusar Kanti Mishra, Anirban Sarkar, Goutam Sanyal:
PSO based combined kernel learning framework for recognition of first-person activity in a video. Evol. Intell. 14(2): 273-279 (2021) - [j22]Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal, Nishu Gupta:
Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks. Wirel. Pers. Commun. 116(3): 2525-2548 (2021) - 2020
- [j21]Srilekha Mukherjee, Goutam Sanyal:
Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique. Int. J. Inf. Comput. Secur. 12(2/3): 130-146 (2020) - [j20]Srilekha Mukherjee, Goutam Sanyal:
Image steganography with N-puzzle encryption. Multim. Tools Appl. 79(39-40): 29951-29975 (2020) - [j19]Soumya Ranjan Mishra, Tusar Kanti Mishra, Goutam Sanyal, Anirban Sarkar, Suresh Chandra Satapathy:
Real time human action recognition using triggered frame extraction and a typical CNN heuristic. Pattern Recognit. Lett. 135: 329-336 (2020) - [j18]Ravi Kant Kumar, Jogendra Garain, Dakshina Ranjan Kisku, Goutam Sanyal:
Constraint saliency based intelligent camera for enhancing viewers attention towards intended face. Pattern Recognit. Lett. 139: 69-78 (2020)
2010 – 2019
- 2019
- [j17]Rudra Pratap Ojha, Kavita Sharma, Pramod Kumar Srivastava, Goutam Sanyal:
An epidemic model for security and performance of wireless sensor networks. Int. J. Adv. Intell. Paradigms 13(1/2): 113-129 (2019) - [j16]Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal:
Security model against worms attack in wireless sensor network. Int. J. Adv. Intell. Paradigms 13(1/2): 178-192 (2019) - [j15]Monalisha Ghosh, Goutam Sanyal:
Analysing sentiments based on multi feature combination with supervised learning. Int. J. Data Min. Model. Manag. 11(4): 391-416 (2019) - [j14]Srilekha Mukherjee, Goutam Sanyal:
Edge based image steganography with variable threshold. Multim. Tools Appl. 78(12): 16363-16388 (2019) - [j13]Srilekha Mukherjee, Goutam Sanyal:
A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. Multim. Tools Appl. 78(13): 17607-17622 (2019) - [j12]Jogendra Garain, Ravi Kant Kumar, Dakshina Ranjan Kisku, Goutam Sanyal:
Addressing facial dynamics using k-medoids cohort selection algorithm for face recognition. Multim. Tools Appl. 78(13): 18443-18474 (2019) - [j11]Srilekha Mukherjee, Goutam Sanyal:
A physical equation based image steganography with electro-magnetic embedding. Multim. Tools Appl. 78(13): 18571-18593 (2019) - [c14]Srilekha Mukherjee, Goutam Sanyal:
Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. ICDCIT 2019: 364-379 - 2018
- [j10]Monalisa Ghosh, Goutam Sanyal:
Performance Assessment of Multiple Classifiers Based on Ensemble Feature Selection Scheme for Sentiment Analysis. Appl. Comput. Intell. Soft Comput. 2018: 8909357:1-8909357:12 (2018) - [j9]Mousumi Paul, Goutam Sanyal, Debabrata Samanta, Gia Nhu Nguyen, Dac-Nhuong Le:
Admission control algorithm based on the effective bandwidth in vehicle-to-infrastructure communication. IET Commun. 12(6): 704-711 (2018) - [j8]Binod Kumar Prasad, Goutam Sanyal:
Multiple Hidden Markov Model Post Processed with Support Vector Machine to Recognize English Handwritten Numerals. Int. J. Artif. Intell. Tools 27(5): 1850019:1-1850019:18 (2018) - [j7]Asim Kumar Mahadani, Goutam Sanyal, Pradosh Mahadani, Partha Bhattacharjee:
Modified evolutionary model with insertion and deletion (Indel) for phylogenetic tree construction. Int. J. Data Min. Bioinform. 21(1): 43-69 (2018) - [j6]Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal:
Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks. Int. J. Inf. Syst. Model. Des. 9(1): 1-20 (2018) - [j5]Monalisa Ghosh, Goutam Sanyal:
An ensemble approach to stabilize the features for multi-domain sentiment analysis using supervised machine learning. J. Big Data 5: 44 (2018) - [j4]Binod Kumar Prasad, Goutam Sanyal:
Novel features and a cascaded classifier based Arabic numerals recognition system. Multidimens. Syst. Signal Process. 29(1): 321-338 (2018) - [j3]Srilekha Mukherjee, Goutam Sanyal:
A chaos based image steganographic system. Multim. Tools Appl. 77(21): 27851-27876 (2018) - [c13]Ravi Kant Kumar, Jogendra Garain, Dakshina Ranjan Kisku, Goutam Sanyal:
Estimating Attention of Faces Due to Its Growing Level of Emotions. CVPR Workshops 2018: 1952-1960 - [c12]Jogendra Garain, Dakshina Ranjan Kisku, Ravi Kant Kumar, Goutam Sanyal:
A Bezier Curve Cohort Selection Strategy for Face Pair Matching. ICDSP 2018: 52-56 - [c11]Subhajit Roy, Srilekha Mukherjee, Goutam Sanyal:
Video Steganography Using Karhunen-Loève Transform. ICDSP 2018: 142-146 - [c10]Monalisa Ghosh, Goutam Sanyal:
Document Modeling with Hierarchical Deep Learning Approach for Sentiment Classification. ICDSP 2018: 181-185 - 2017
- [j2]Rudra Pratap Ojha, Goutam Sanyal, Pramod Kumar Srivastava, Kavita Sharma:
Design and Analysis of Modified SIQRS Model for Performance Study of Wireless Sensor Network. Scalable Comput. Pract. Exp. 18(3): 229-242 (2017) - [j1]Sandeep Saxena, Goutam Sanyal, Shashank Srivastava, Ruhul Amin:
Preventing from Cross-VM Side-Channel Attack Using New Replacement Method. Wirel. Pers. Commun. 97(3): 4827-4854 (2017) - [c9]Shrija Mishra, Geeta Ramani Bala Prasada, Ravi Kant Kumar, Goutam Sanyal:
Emotion Recognition Through Facial Gestures - A Deep Learning Approach. MIKE 2017: 11-21 - 2016
- [c8]Jogendra Garain, Adarsh Shah, Ravi Kant Kumar, Dakshina Ranjan Kisku, Goutam Sanyal:
BCP-BCS: Best-Fit Cascaded Matching Paradigm with Cohort Selection Using Bezier Curve for Individual Recognition. ACCV Workshops (3) 2016: 377-390 - [c7]Jogendra Garain, Ravi Kant Kumar, Dakshina Ranjan Kisku, Goutam Sanyal:
Selection of User-Dependent Cohorts Using Bezier Curve for Person Identification. ICIAR 2016: 566-572 - [c6]Akanksha Das, Ravi Kant Kumar, Dakshina Ranjan Kisku, Goutam Sanyal:
Attention Identification via Relative Saliency of Localized Crowd Faces. INFOS 2016: 101-106 - 2010
- [c5]Souvik Bhattacharyya, Goutam Sanyal:
Hiding Data in Images Using Pixel Mapping Method (PMM). Security and Management 2010: 683-689 - [c4]Souvik Bhattacharyya, Indradip Banerjee, Goutam Sanyal:
Design and implementation of a Secure Text Based Steganography Model. Security and Management 2010: 690-696 - [c3]Raj Kumar Samanta, Partha Bhattacharya, Goutam Sanyal:
Novel Approach for Channel Reservation to Improve QoS in Cellular Wireless Networks. ICWN 2010: 605-610
2000 – 2009
- 2008
- [c2]Partha Bhattacharjee, Goutam Sanyal:
New admission control algorithm based on effective bandwidth for a multi-class network. ICON 2008: 1-6 - [c1]Partha Bhattacharjee, Goutam Sanyal:
Mathematical Modelling for the Design of an Edge Router. SNPD 2008: 212-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint