default search action
Subir Kumar Sarkar
Person information
- affiliation: Jadavpur University, Kolkata, West Bengal, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j19]Subhrapratim Nath, Subir Kumar Sarkar:
Metaheuristics-based routing optimisation, balanced workload distribution and security strategy in IoT environment. Int. J. Adv. Intell. Paradigms 19(1): 101-117 (2021) - [j18]Sanjeev Narayan Bal, Manas Ranjan Nayak, Subir Kumar Sarkar:
On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J. King Saud Univ. Comput. Inf. Sci. 33(5): 552-561 (2021)
2010 – 2019
- 2019
- [j17]Disha Bhattacharjee, Bijoy Goswami, Dinesh Kumar Dash, Ayan Bhattacharya, Subir Kumar Sarkar:
Analytical modelling and simulation of drain doping engineered splitted drain structured TFET and its improved performance in subduing ambipolar effect. IET Circuits Devices Syst. 13(6): 888-895 (2019) - [j16]Dinesh Kumar Dash, Priyanka Saha, Subir Kumar Sarkar:
Analytical modelling of dielectric engineered strained dual-material double-gate-tunnelling field effect transistor. IET Circuits Devices Syst. 13(7): 1039-1048 (2019) - [c25]Bijoy Goswami, Ayan Bhattacharya, Komal Kumari, Priyadarshini Das, Wasim Reja, Subir Kumar Sarkar:
A Novel Double Source TFET for Low Power Application. ICIIS 2019: 215-219 - 2018
- [j15]Pritha Banerjee, Priyanka Saha, Subir Kumar Sarkar:
Analytical modelling and performance analysis of gate engineered TG silicon-on-nothing metal-oxide-semiconductor field-effect transistor. IET Circuits Devices Syst. 12(5): 557-562 (2018) - [j14]Amit Jain, Arpita Ghosh, Pranab Kishore Dutta, Nameirakpam Basanta Singh, Subir Kumar Sarkar:
Error probability independent delay analysis of single electronics circuits. Int. J. Circuit Theory Appl. 46(2): 290-298 (2018) - [j13]Sanjay Kumar Singh, Amit Kumar Singh, Basant Kumar, Subir Kumar Sarkar, Karm Veer Arya:
Guest Editorial: Multimedia for Predictive Analytics. Multim. Tools Appl. 77(7): 9189-9201 (2018) - 2017
- [j12]Pritha Banerjee, Anup Sarkar, Subir Kumar Sarkar:
Exploring the short channel characteristics and performance analysis of DMDG SON MOSFET. Microelectron. J. 67: 50-56 (2017) - [c24]Subhashis Roy, Bikram Biswas, Anup Dey, Bijoy Kantha, Subir Kumar Sarkar:
A Proposal for Detection Ethanol Leakage Using WO3 Thin Film Sensor with RFID Technology. CICBA (1) 2017: 431-439 - [c23]Subhrapratim Nath, Arnab Seal, Titir Banerjee, Subir Kumar Sarkar:
Optimization Using Swarm Intelligence and Dynamic Graph Partitioning in IoE Infrastructure: Fog Computing and Cloud Computing. CICBA (1) 2017: 440-452 - 2016
- [j11]Rashmi Ranjan Sahoo, Abdur Rahaman Sardar, Moutushi Singh, Sudhabindu Ray, Subir Kumar Sarkar:
A bio inspired and trust based approach for clustering in WSN. Nat. Comput. 15(3): 423-434 (2016) - [c22]Jayanta Gope, Sanjay Bhadra, S. Chanda, Subir Kumar Sarkar, S. Pal, A. Rai:
Modelling of single electron ternary flip-flop using SIMON. UEMCON 2016: 1-9 - 2015
- [j10]Joyashree Bag, Subhashis Roy, Bijoy Kantha, Subir Kumar Sarkar:
Advanced multi-step security scheme using PCA for RFID system and its FPGA implementation. Int. J. Radio Freq. Identif. Technol. Appl. 4(4): 325-341 (2015) - [j9]Manas Ranjan Nayak, Baidyanath Tudu, Abhishek Basu, Subir Kumar Sarkar:
On the Implementation of a Secured Digital Watermarking Framework. Inf. Secur. J. A Glob. Perspect. 24(4-6): 118-126 (2015) - [c21]Suvrajit Manna, Tyajodeep Chakrabarti, Udit Sharma, Subir Kumar Sarkar:
Efficient VLSI routing optimization employing discrete differential evolution technique. ReTIS 2015: 461-464 - 2014
- [j8]Saheli Sarkhel, Bibhas Manna, Subir Kumar Sarkar:
A Compact Two Dimensional Analytical Modeling of Nanoscale Fully Depleted Dual Material Gate Strained SOI/SON MOSFETs for Subdued SCEs. J. Low Power Electron. 10(3): 383-391 (2014) - [j7]Deepon Saha, Subir Kumar Sarkar:
High-speed reduced-leakage SRAM memory cell design techniques for low-power 65 nm FD-SOI/SON CMOS technology. Microelectron. J. 45(7): 848-856 (2014) - [c20]Abhishek Basu, Arindam Saha, Jeet Das, Sandipta Roy, Sushavan Mitra, Indranil Mal, Subir Kumar Sarkar:
On the Implementation of a Digital Watermarking Based on Phase Congruency. FICTA (2) 2014: 113-120 - [c19]Vinay Kumar, Mohammad Azharuddin Laskar, Yumnam Shantikumar Singh, Swanirbhar Majumder, Subir Kumar Sarkar:
ANN Based Adaptive Detection of ECG Features from Respiratory, Pleythsmographic and ABP Signals. FICTA (1) 2014: 359-365 - [c18]Moutushi Singh, Abdur Rahaman Sardar, Rashmi Ranjan Sahoo, Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar:
Lightweight Trust Model for Clustered WSN. FICTA (2) 2014: 765-773 - 2013
- [j6]Swanirbhar Majumder, Kharibam Jilenkumari Devi, Subir Kumar Sarkar:
Singular value decomposition and wavelet-based iris biometric watermarking. IET Biom. 2(1): 21-27 (2013) - [j5]Joyashree Bag, Rashmi Ranjan Sahoo, Pranab Kishore Dutta, Subir Kumar Sarkar:
Design and VLSI implementation of power efficient processor for object localisation in large WSN. Int. J. High Perform. Syst. Archit. 4(4): 204-217 (2013) - [j4]Joyashree Bag, Subir Kumar Sarkar:
Development and VLSI implementation of a data security scheme for RFID system using programmable cellular automata. Int. J. Radio Freq. Identif. Technol. Appl. 4(2): 197-211 (2013) - [j3]Abhishek Basu, Subir Kumar Sarkar:
On the Implementation of Robust Copyright Protection Scheme Using Visual Attention Model. Inf. Secur. J. A Glob. Perspect. 22(1): 10-20 (2013) - [j2]Anindya Jana, Nameirakpam Basanta Singh, J. K. Sing, Subir Kumar Sarkar:
Design and simulation of hybrid CMOS-SET circuits. Microelectron. Reliab. 53(4): 592-599 (2013) - [c17]Rashmi Ranjan Sahoo, Abdur Rahaman Sardar, Moutushi Singh, Sudhabindu Ray, Subir Kumar Sarkar:
Trust Based Secure and Energy Efficient Clustering in Wireless Sensor Network: A Bee Mating Approach. PReMI 2013: 100-107 - 2012
- [c16]Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar:
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR. ACITY (1) 2012: 797-806 - [i9]Tirtha Shankar Das, Ayan K. Sau, Vijay Harishchandra Mankar, Subir Kumar Sarkar:
Multimedia Steganographic Scheme using Multiresolution Analysis. CoRR abs/1207.2675 (2012) - [i8]Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar:
Performance Evaluation of Spread Spectrum Watermarking using Error Control Coding. CoRR abs/1207.2687 (2012) - [i7]Vijay Harishchandra Mankar, Tirtha Shankar Das, Subir Kumar Sarkar:
Discrete Chaotic Sequence based on Logistic Map in Digital Communications. CoRR abs/1207.2694 (2012) - [i6]Vijay Harishchandra Mankar, Tirtha Shankar Das, Subhojit Saha, Subir Kumar Sarkar:
Robust Image Watermarking Under Pixel Wise Masking Framework. CoRR abs/1207.2699 (2012) - [i5]Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar:
Spread Spectrum based Robust Image Watermark Authentication. CoRR abs/1207.2701 (2012) - 2011
- [j1]Sanjoy Deb, Nameirakpam Basanta Singh, Subir Kumar Sarkar:
Particle swarm approach for parameter optimization of quantum well nano structure. Expert Syst. Appl. 38(10): 12999-13004 (2011) - [c15]Abhishek Basu, Abhik Roy, Tirtha Shankar Das, Subir Kumar Sarkar:
On the implementation of QIM FPGA hardware. ReTIS 2011: 287-292 - [i4]Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar, Soumyasree Bera:
WiMAX Based 60 GHz Millimeter-Wave Communication for Intelligent Transport System Applications. CoRR abs/1105.0377 (2011) - 2010
- [c14]Swanirbhar Majumder, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar:
SVD and Neural Network Based Watermarking Scheme. BAIP 2010: 1-5 - [c13]Sudip Dogra, Subir Kumar Sarkar, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya:
A RFID based novel scheme for detection of Swine flu and managing the piggery in a cost effective way. ICWET 2010: 292-297 - [c12]Sanjoy Deb, Nameirakpam Basanta Singh, G. H. D, D. Das, Subir Kumar Sarkar:
Swarm approach towards better quantum well nanostructure modeling. ICWET 2010: 667-669 - [c11]Souvik Sarkar, Somnath Pal, Somnath Maiti, Subir Kumar Sarkar:
Development of a statistical algorithm for cost efficient RFID tag and reader connectivity. ICWET 2010: 1009 - [i3]Koushik Majumder, Subir Kumar Sarkar:
Hybrid Scenario Based Performance Analysis of DSDV and DSR. CoRR abs/1006.1183 (2010)
2000 – 2009
- 2009
- [c10]Nameirakpam Basanta Singh, Sanjoy Deb, Guru Prasad Mishra, Samir Kumar Sarkar, Subir Kumar Sarkar:
Application of Particle Swarm Optimization Algorithm for Better Nano-Devices. IC3 2009: 349-357 - [c9]Vijay Harishchandra Mankar, Tirtha Shankar Das, Subir Kumar Sarkar:
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions. IC3 2009: 400-410 - [c8]S. Gowrishankar, Subir Kumar Sarkar, T. G. Basavaraju:
Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET. NetCoM 2009: 408-413 - [i2]Rabindranath Bera, Sanjib Sil, Sourav Dhar, Subir Kumar Sarkar:
Wi-Fi, WiMax and WCDMA A comparative study based on Channel Impairments and Equalization method used. CoRR abs/0903.1506 (2009) - [i1]Sudip Dogra, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya, Subir Kumar Sarkar:
A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy. CoRR abs/0911.0402 (2009) - 2008
- [c7]Vijay Harishchandra Mankar, Tirtha Shankar Das, Subhojit Saha, Subir Kumar Sarkar:
Robust Image Watermarking Under Pixel Wise Masking Framework. ICETET 2008: 68-72 - [c6]A. R. Aswatha, T. G. Basavaraju, Subir Kumar Sarkar:
Fast and Efficient On-Chip Interconnection Delay Modeling for High Speed VLSI Systems. ICETET 2008: 414-417 - [c5]Ankush Ghosh, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar, Abhishek Basu, Debsis Samanta:
Single Spin Logic Realization of Robust Image Watermarking in Spatial Domain. ICIIS 2008: 1-6 - [c4]S. Gowrishankar, T. G. Basavaraju, Subir Kumar Sarkar:
Analysis of Overhead Control Mechanisms in Mobile AD HOC Networks. World Congress on Engineering (Selected Papers) 2008: 329-341 - 2007
- [c3]S. Gowrishankar, T. G. Basavaraju, C. Puttamadappa, Subir Kumar Sarkar:
Behavioral Study of MAODV Routing Protocol under Various Network Scenarios in MANET. IMECS 2007: 332-337 - 2006
- [c2]Swagatam Das, Ajith Abraham, Subir Kumar Sarkar:
A Hybrid Rough Set--Particle Swarm Algorithm for Image Pixel Classification. HIS 2006: 26 - [c1]Tirtha Shankar Das, Ayan K. Sau, Subir Kumar Sarkar:
Multimedia Data Hiding in Spatial and Transformed Domain. ICDCIT 2006: 447-456
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint