Search Results - "Nag, Amitava"

Refine Results
  1. 1

    Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT by Mazumdar, Nabajyoti, Nag, Amitava, Singh, Jyoti Prakash

    Published in Computers & electrical engineering (01-07-2021)
    “…The proliferation of Internet of Things (IoT)-enabled applications such as smart cities, e-healthcare, industrial automation, etc., has resulted in a…”
    Get full text
    Journal Article
  2. 2

    An efficient Boolean based multi-secret image sharing scheme by Nag, Amitava, Singh, Jyoti Prakash, Singh, Amit Kumar

    Published in Multimedia tools and applications (01-06-2020)
    “…The purpose of this paper is to develop an algorithm for sharing k secret images to n participants in such a way that each participant gets a single share…”
    Get full text
    Journal Article
  3. 3

    A verifiable multi-secret image sharing scheme using XOR operation and hash function by Chattopadhyay, Arup Kumar, Nag, Amitava, Singh, Jyoti Prakash, Singh, Amit Kumar

    Published in Multimedia tools and applications (01-11-2021)
    “…In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party) encodes a secret image into some share images and distributes them…”
    Get full text
    Journal Article
  4. 4

    A novel framework for COVID-19 case prediction through piecewise regression in India by Senapati, Apurbalal, Nag, Amitava, Mondal, Arunendu, Maji, Soumen

    “…Outbreak of COVID-19, created a disastrous situation in more than 200 countries around the world. Thus the prediction of the future trend of the disease in…”
    Get full text
    Journal Article
  5. 5

    An Efficient Computational Risk Prediction Model of Heart Diseases Based on Dual-Stage Stacked Machine Learning Approaches by Mondal, Subhash, Maity, Ranjan, Omo, Yachang, Ghosh, Soumadip, Nag, Amitava

    Published in IEEE access (2024)
    “…Cardiovascular diseases (CVDs) continue to be a prominent cause of global mortality, necessitating the development of effective risk prediction models to…”
    Get full text
    Journal Article
  6. 6

    Brain stroke prediction model based on boosting and stacking ensemble approach by Mondal, Subhash, Ghosh, Soumadip, Nag, Amitava

    “…The concern of brain stroke increases rapidly in young age groups daily. The leading causes of death from stroke globally will rise to 6.7 million yearly if…”
    Get full text
    Journal Article
  7. 7

    NTRU and Secret Sharing Based Secure Group Communication for IoT Applications by Saha, Sanchita, Hota, Ashlesha, Choudhury, Bikramjit, Nag, Amitava, Nandi, Sukumar

    Published in IEEE access (01-01-2023)
    “…In the technology driven era, automation and communication have attained new heights, which paved the way for an improved human lifestyle. The Internet of…”
    Get full text
    Journal Article
  8. 8

    Favorite Book Prediction System Using Machine Learning Algorithms by Daimari, Dersin, Mondal, Subhash, Brahma, Bihung, Nag, Amitava

    “…Recent years have seen the rapid deployment of Artificial Intelligence (AI) which allows systems to take intelligent decisions. AI breakthroughs could…”
    Get full text
    Journal Article
  9. 9

    An IoT-Based Deep Learning Framework for Real-Time Detection of COVID-19 through Chest X-ray Images by Karmakar, Mithun, Choudhury, Bikramjit, Patowary, Ranjan, Nag, Amitava

    Published in Computers (Basel) (01-01-2023)
    “…Over the next decade, Internet of Things (IoT) and the high-speed 5G network will be crucial in enabling remote access to the healthcare system for easy and…”
    Get full text
    Journal Article
  10. 10

    Secret Image Sharing Schemes: A Comprehensive Survey by Saha, Sanchita, Chattopadhyay, Arup Kumar, Barman, Anup Kumar, Nag, Amitava, Nandi, Sukumar

    Published in IEEE access (01-01-2023)
    “…The safeguarding of digitized data against unwanted access and modification has become an issue of utmost importance as a direct result of the rapid…”
    Get full text
    Journal Article
  11. 11

    Secret Image Sharing Scheme Based on a Boolean Operation by Nag, Amitava, Biswas, Sushanta, Sarkar, Debasree, Sarka, Partha Pratim

    “…Traditionally extensive researches have been done on secret image sharing which support the fault tolerance property. But their reconstruction complexity is…”
    Get full text
    Journal Article
  12. 12

    A new (k,n) verifiable secret image sharing scheme (VSISS) by Nag, Amitava, Biswas, Sushanta, Sarkar, Debasree, Sarkar, Partha Pratim

    Published in Egyptian informatics journal (01-11-2014)
    “…In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public…”
    Get full text
    Journal Article
  13. 13

    HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments by Mazumdar, Nabajyoti, Nag, Amitava, Nandi, Sukumar

    Published in Ad hoc networks (01-02-2021)
    “…The primary issue in Wireless Sensor Network (WSN) based monitoring applications is the preservation of the sensing coverage under the harsh physical…”
    Get full text
    Journal Article
  14. 14

    Lattice-based device-to-device authentication and key exchange protocol for IoT system by Sarkar, Puja, Nag, Amitava

    “…Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices continues to…”
    Get full text
    Journal Article
  15. 15

    Mobile app-based tomato disease identification with fine-tuned convolutional neural networks by Nag, Amitava, Chanda, Priya Raj, Nandi, Sukumar

    Published in Computers & electrical engineering (01-12-2023)
    “…Rapid detection and diagnosis of plant diseases is crucial for healthy crop growth and maintaining harvest quality. Many diseases, such as bacterial spot, late…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Fuzzy-logic-based IoMT framework for COVID19 patient monitoring by Panja, Subir, Chattopadhyay, Arup Kumar, Nag, Amitava, Singh, Jyoti Prakash

    Published in Computers & industrial engineering (01-02-2023)
    “…Smart healthcare is an integral part of a smart city, which provides real time and intelligent remote monitoring and tracking services to patients and elderly…”
    Get full text
    Journal Article
  18. 18

    An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network by Mazumdar, Nabajyoti, Roy, Saugata, Nag, Amitava, Nandi, Sukumar

    “…Recent studies have revealed that the energy hole problem caused by multi-hop data collection in a static data collector based wireless sensor network(WSN) is…”
    Get full text
    Journal Article
  19. 19

    Secure data authentication and access control protocol for industrial healthcare system by Gupta, Daya Sagar, Mazumdar, Nabajyoti, Nag, Amitava, Singh, Jyoti Prakash

    “…Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical…”
    Get full text
    Journal Article
  20. 20

    Secret sharing: A comprehensive survey, taxonomy and applications by Chattopadhyay, Arup Kumar, Saha, Sanchita, Nag, Amitava, Nandi, Sukumar

    Published in Computer science review (01-02-2024)
    “…The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology…”
    Get full text
    Journal Article