Search Results - "Nag, Amitava"
-
1
Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT
Published in Computers & electrical engineering (01-07-2021)“…The proliferation of Internet of Things (IoT)-enabled applications such as smart cities, e-healthcare, industrial automation, etc., has resulted in a…”
Get full text
Journal Article -
2
An efficient Boolean based multi-secret image sharing scheme
Published in Multimedia tools and applications (01-06-2020)“…The purpose of this paper is to develop an algorithm for sharing k secret images to n participants in such a way that each participant gets a single share…”
Get full text
Journal Article -
3
A verifiable multi-secret image sharing scheme using XOR operation and hash function
Published in Multimedia tools and applications (01-11-2021)“…In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them…”
Get full text
Journal Article -
4
A novel framework for COVID-19 case prediction through piecewise regression in India
Published in International journal of information technology (Singapore. Online) (2021)“…Outbreak of COVID-19, created a disastrous situation in more than 200 countries around the world. Thus the prediction of the future trend of the disease in…”
Get full text
Journal Article -
5
An Efficient Computational Risk Prediction Model of Heart Diseases Based on Dual-Stage Stacked Machine Learning Approaches
Published in IEEE access (2024)“…Cardiovascular diseases (CVDs) continue to be a prominent cause of global mortality, necessitating the development of effective risk prediction models to…”
Get full text
Journal Article -
6
Brain stroke prediction model based on boosting and stacking ensemble approach
Published in International journal of information technology (Singapore. Online) (2024)“…The concern of brain stroke increases rapidly in young age groups daily. The leading causes of death from stroke globally will rise to 6.7 million yearly if…”
Get full text
Journal Article -
7
NTRU and Secret Sharing Based Secure Group Communication for IoT Applications
Published in IEEE access (01-01-2023)“…In the technology driven era, automation and communication have attained new heights, which paved the way for an improved human lifestyle. The Internet of…”
Get full text
Journal Article -
8
Favorite Book Prediction System Using Machine Learning Algorithms
Published in Journal of Applied Engineering and Technological Science (Online) (05-06-2023)“…Recent years have seen the rapid deployment of Artificial Intelligence (AI) which allows systems to take intelligent decisions. AI breakthroughs could…”
Get full text
Journal Article -
9
An IoT-Based Deep Learning Framework for Real-Time Detection of COVID-19 through Chest X-ray Images
Published in Computers (Basel) (01-01-2023)“…Over the next decade, Internet of Things (IoT) and the high-speed 5G network will be crucial in enabling remote access to the healthcare system for easy and…”
Get full text
Journal Article -
10
Secret Image Sharing Schemes: A Comprehensive Survey
Published in IEEE access (01-01-2023)“…The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid…”
Get full text
Journal Article -
11
Secret Image Sharing Scheme Based on a Boolean Operation
Published in Cybernetics and information technologies : CIT (01-01-2014)“…Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is…”
Get full text
Journal Article -
12
A new (k,n) verifiable secret image sharing scheme (VSISS)
Published in Egyptian informatics journal (01-11-2014)“…In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public…”
Get full text
Journal Article -
13
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments
Published in Ad hoc networks (01-02-2021)“…The primary issue in Wireless Sensor Network (WSN) based monitoring applications is the preservation of the sensing coverage under the harsh physical…”
Get full text
Journal Article -
14
Lattice-based device-to-device authentication and key exchange protocol for IoT system
Published in International journal of information technology (Singapore. Online) (01-10-2024)“…Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices continues to…”
Get full text
Journal Article -
15
Mobile app-based tomato disease identification with fine-tuned convolutional neural networks
Published in Computers & electrical engineering (01-12-2023)“…Rapid detection and diagnosis of plant diseases is crucial for healthy crop growth and maintaining harvest quality. Many diseases, such as bacterial spot, late…”
Get full text
Journal Article -
16
Question classification task based on deep learning models with self-attention mechanism
Published in Multimedia tools and applications (26-04-2024)Get full text
Journal Article -
17
Fuzzy-logic-based IoMT framework for COVID19 patient monitoring
Published in Computers & industrial engineering (01-02-2023)“…Smart healthcare is an integral part of a smart city, which provides real time and intelligent remote monitoring and tracking services to patients and elderly…”
Get full text
Journal Article -
18
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network
Published in Journal of network and computer applications (15-07-2021)“…Recent studies have revealed that the energy hole problem caused by multi-hop data collection in a static data collector based wireless sensor network(WSN) is…”
Get full text
Journal Article -
19
Secure data authentication and access control protocol for industrial healthcare system
Published in Journal of ambient intelligence and humanized computing (01-05-2023)“…Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical…”
Get full text
Journal Article -
20
Secret sharing: A comprehensive survey, taxonomy and applications
Published in Computer science review (01-02-2024)“…The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology…”
Get full text
Journal Article