Debnath Bhattacharyya

Orcid: 0000-0003-0140-9644

According to our database1, Debnath Bhattacharyya authored at least 60 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A bi-directional deep learning architecture for lung nodule semantic segmentation.
Vis. Comput., November, 2023

ShrimpView: A Versatile Dataset for Shrimp Detection and Recognition.
Dataset, September, 2023

A hybrid machine learning approach to identify coronary diseases using feature selection mechanism on heart disease dataset.
Distributed Parallel Databases, June, 2023

Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023

A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
Pers. Ubiquitous Comput., 2023

2022
Performance evaluation of a distributed energy model with compound Poisson arrivals on an improvised forked network: A detailed analysis.
Sustain. Comput. Informatics Syst., 2022

Identifying the presence of bacteria on digital images by using asymmetric distribution with k-means clustering algorithm.
Multidimens. Syst. Signal Process., 2022

Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems.
Autom. Softw. Eng., 2022

2021
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

Lung Cancer Classification Using Squeeze and Excitation Convolutional Neural Networks with Grad Cam++ Class Activation Function.
Traitement du Signal, 2021

Early Detection of Hemorrhagic Stroke Using a Lightweight Deep Learning Neural Network Model.
Traitement du Signal, 2021

SRGAN Assisted Encoder-Decoder Deep Neural Network for Colorectal Polyp Semantic Segmentation.
Rev. d'Intelligence Artif., 2021

Demographical gender prediction of Twitter users using big data analytics: an application of decision marketing.
Int. J. Reason. based Intell. Syst., 2021

Performance analysis of an improved forked communication network model.
Connect. Sci., 2021

2020
An Extensive Review on Lung Cancer Detection Using Machine Learning Techniques: A Systematic Study.
Rev. d'Intelligence Artif., 2020

Stratification of Cardiovascular Diseases Using Deep Learning.
Rev. d'Intelligence Artif., 2020

Prediction of Brain Stroke Severity Using Machine Learning.
Rev. d'Intelligence Artif., 2020

2017
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers Comput. Sci., 2017

An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Comput. Methods Programs Biomed., 2017

Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions.
IEEE Access, 2017

2015
A Novel Prototype Decision Tree Method Using Sampling Strategy.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2013
A GA based audio steganography with enhanced security.
Telecommun. Syst., 2013

Cell-graph coloring for cancerous tissue modelling and classification.
Multim. Tools Appl., 2013

2011
Supervised chromosome clustering and image classification.
Future Gener. Comput. Syst., 2011

Image Data Hiding Technique Using Discrete Fourier Transformation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Brain Tumor Detection Using MRI Image Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

New Algorithm for Skewing Detection of Handwritten Bangla Words.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Use of Artificial Neural Network in Bengali Character Recognition.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Watermarking Using Multiresolution Cosine Transformation: A Review.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Leaf Image Analysis towards Plant Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

2010
A Comparative Study of Wireless Sensor Networks and Their Routing Protocols.
Sensors, 2010

A New Experiment on Bengali Character Recognition.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Chain Based Hierarchical Routing Protocol for Wireless Sensor Networks.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Lane Design for Speed Optimization.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Hierarchical Data Structures for Accessing Spatial Data.
Proceedings of the Signal Processing and Multimedia, 2010

OSI Layer Wise Security Analysis of Wireless Sensor Network.
Proceedings of the Signal Processing and Multimedia, 2010

Identification of Plant Using Leaf Image Analysis.
Proceedings of the Signal Processing and Multimedia, 2010

Feature Extraction and Analysis of Breast Cancer Specimen.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

Hiding Data in Audio Signal.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. Univers. Comput. Sci., 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
Int. J. Commun. Netw. Syst. Sci., 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Effective GIS Mobile Query System.
Proceedings of the Future Generation Information Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
A Secure Scheme for Image Transformation.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Handwritten Signature Authentication Using Statistical Estimation.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Flexible ANN System for Handwritten Signature Identification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Handwritten Signature Verification System using Morphological Image Analysis.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Secure delivery of handwritten signature.
Ubiquity, 2006

Mosquito attack optimization.
Ubiquity, 2006


  Loading...