


default search action
Samir Kumar Bandyopadhyay
Publications
- 2020
- [j16]Shawni Dutta
, Jyotsna Kumar Mandal
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN. Appl. Comput. Syst. 25(2): 163-171 (2020) - 2017
- [j11]Raj R. Parmar, Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions. IEEE Access 5: 7156-7163 (2017) - [j10]Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI. Comput. Methods Programs Biomed. 140: 307-320 (2017) - [j9]Sudipta Roy
, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction. Frontiers Comput. Sci. 11(4): 717-727 (2017) - 2011
- [j6]Tai-Hoon Kim, Debnath Bhattacharyya
, Samir Kumar Bandyopadhyay
:
Supervised chromosome clustering and image classification. Future Gener. Comput. Syst. 27(4): 372-376 (2011) - 2010
- [c20]Debnath Bhattacharyya
, Rosslin John Robles
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Feature Extraction and Analysis of Breast Cancer Specimen. ACN 2010: 30-41 - [c18]Subhra Pramanik, Samir Kumar Bandyopadhyay
, Debnath Bhattacharyya
, Tai-Hoon Kim:
Identification of Plant Using Leaf Image Analysis. FGIT-SIP/MulGraB 2010: 291-303 - [c17]Shilpi Saha, Seung-Hwan Jeon, Rosslin John Robles
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Model Based User's Access Requirement Analysis of E-Governance Systems. SUComS 2010: 466-471 - [c16]Samit Biswas, Debnath Bhattacharyya
, Tai-Hoon Kim, Samir Kumar Bandyopadhyay
:
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. SUComS 2010: 493-503 - [e1]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao:
Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0 [contents] - 2009
- [j4]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation. Int. J. Commun. Netw. Syst. Sci. 2(5): 363-370 (2009) - [j3]Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. J. Univers. Comput. Sci. 15(5): 1081-1089 (2009) - [c15]Debnath Bhattacharyya
, Jhuma Dutta, Poulami Das, Rathit Bandyopadhyay, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Discrete Fourier Transformation based Image Authentication technique. IEEE ICCI 2009: 196-200 - [c14]Debnath Bhattacharyya
, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Refine Crude Corpus for Opinion Mining. CICSyN 2009: 17-22 - [c13]Debnath Bhattacharyya
, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme. CICSyN 2009: 374-379 - [c12]Debnath Bhattacharyya
, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. FGIT-SecTech 2009: 43-50 - [c11]Debnath Bhattacharyya
, Poulami Das, Samir Kumar Bandyopadhyay
, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. FGIT-SecTech 2009: 64-71

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-02 18:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint