J. K. Mandal
Orcid: 0000-0001-9447-647XAffiliations:
- University of Kalyani, West Bengal, India
According to our database1,
J. K. Mandal
authored at least 98 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on jkmandal.com
On csauthors.net:
Bibliography
2024
Assessment of learning parameters for students' adaptability in online education using machine learning and explainable AI.
Educ. Inf. Technol., April, 2024
2023
Signal Image Video Process., 2023
2022
A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography.
Int. J. Softw. Innov., 2022
Proceedings of the Learning in the Age of Digital and Green Transition, 2022
Proceedings of the Learning in the Age of Digital and Green Transition, 2022
2021
Change Detection and Patch Analysis of Sundarban Forest During 1975-2018 Using Remote Sensing and GIS Data.
SN Comput. Sci., 2021
An enhanced block-based Compressed Sensing technique using orthogonal matching pursuit.
Signal Image Video Process., 2021
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection.
J. Inf. Secur. Appl., 2021
Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map.
Innov. Syst. Softw. Eng., 2021
Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society.
Innov. Syst. Softw. Eng., 2021
Detection and Prediction of Sundarban Reserve Forest using the CA-Markov Chain Model and Remote Sensing Data.
Earth Sci. Informatics, 2021
A New Approach to Enhance Security of Visual Cryptography Using Steganography (VisUS).
CoRR, 2021
Low back pain expert systems: Clinical resolution through probabilistic considerations and poset.
Artif. Intell. Medicine, 2021
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2021
Proceedings of the ACIT 2021: The 8th International Virtual Conference on Applied Computing & Information Technology, Kanazawa, Japan, June 20, 2021
2020
Proceedings of the Intelligent Computing Paradigm: Recent Trends, 2020
Studies in Computational Intelligence 901, Springer, ISBN: 978-981-15-4396-8, 2020
Medical expert system for low back pain management: design issues and conflict resolution with Bayesian network.
Medical Biol. Eng. Comput., 2020
Innov. Syst. Softw. Eng., 2020
Rough set based lattice structure for knowledge representation in medical expert systems: Low back pain management case study.
Expert Syst. Appl., 2020
2019
J. Inf. Secur. Appl., 2019
Innov. Syst. Softw. Eng., 2019
Addressing Design Issues in Medical Expert System for Low Back Pain Management: Knowledge Representation, Inference Mechanism, and Conflict Resolution Using Bayesian Network.
CoRR, 2019
Proceedings of the Impact of the 4th Industrial Revolution on Engineering Education - Proceedings of the 22nd International Conference on Interactive Collaborative Learning (ICL 2019), 2019
Proceedings of the Impact of the 4th Industrial Revolution on Engineering Education - Proceedings of the 22nd International Conference on Interactive Collaborative Learning (ICL 2019), 2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario.
Peer-to-Peer Netw. Appl., 2018
Multim. Tools Appl., 2018
Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
2017
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way.
Int. J. Inf. Comput. Secur., 2017
Proceedings of the IEEE 6th International Conference on Teaching, 2017
Proceedings of the IEEE 6th International Conference on Teaching, 2017
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
A Novel Automated Assessment Technique in e-Learning Using Short Answer Type Questions.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
2016
DirMove: direction of movement based routing in DTN architecture for post-disaster scenario.
Wirel. Networks, 2016
Proceedings of the IEEE International Conference on Teaching, 2016
2015
Int. J. Netw. Secur., 2015
Int. J. Comput. Intell. Stud., 2015
2014
J. Inf. Secur. Appl., 2014
Circuits Syst. Signal Process., 2014
Proceedings of the Eleventh International Conference on Wireless and Optical Communications Networks, 2014
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO).
Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Windowed Huffman Coding with Limited Distinct Symbols by Least Recently Used Symbol Removable.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
2013
CoRR, 2013
A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept
CoRR, 2013
Central Eur. J. Comput. Sci., 2013
Proceedings of the 2013 International Symposium on Electronic System Design, 2013
Double Layer Perceptron Synchronized Computational Intelligence Guided Fractal Triangle Based Cryptographic Technique for Secured Communication (DLPFT).
Proceedings of the 2013 International Symposium on Electronic System Design, 2013
2012
J. Signal Process. Syst., 2012
CoRR, 2012
A Novel Directional Weighted Minimum Deviation (DWMD) Based Filter for Removal of Random Valued Impulse Noise
CoRR, 2012
Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)
CoRR, 2012
A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)
CoRR, 2012
Space Efficient Cryptographic Protocol Using Recursive Bitwise & Pairs Of Bits Of Operation (RBPBO)
CoRR, 2012
CoRR, 2012
CoRR, 2012
Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP)
CoRR, 2012
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
CoRR, 2012
Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG)
CoRR, 2012
Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA)
CoRR, 2012
Image Filtering using All Neighbor Directional Weighted Pixels: Optimization using Particle Swarm Optimization
CoRR, 2012
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow
CoRR, 2012
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
CoRR, 2012
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC).
CoRR, 2012
A Delaunay Triangulation Preprocessing Based Fuzzy-Encroachment Graph Clustering for Large Scale GIS Data.
Proceedings of the International Symposium on Electronic System Design, 2012
Proceedings of the International Symposium on Electronic System Design, 2012
Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
An adaptive genetic key based neural encryption for online wireless communication (AGKNE).
Proceedings of the International Conference on Recent Trends in Information Systems, 2011
Proceedings of the International Conference on Recent Trends in Information Systems, 2011
Image Authentication Using Hough Transform Generated Self Signature in DCT Based Frequency Domain (IAHTSSDCT).
Proceedings of the International Symposium on Electronic System Design, 2011
A Novel Fuzzy-GIS Model Based on Delaunay Triangulation to Forecast Facility Locations (FGISFFL).
Proceedings of the International Symposium on Electronic System Design, 2011
A Message Embedded Authentication of Songs to Verify Intellectual Property Right (MEAS).
Proceedings of the International Symposium on Electronic System Design, 2011
A Novel Variable Mask Median Filter for Removal of Random Valued Impulses in Digital Images (VMM).
Proceedings of the International Symposium on Electronic System Design, 2011
Proceedings of the International Symposium on Electronic System Design, 2011
A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC).
Proceedings of the International Symposium on Electronic System Design, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2008
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES).
IACR Cryptol. ePrint Arch., 2008
2006
Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key.
Proceedings of the 9th International Conference in Information Technology, 2006
Proceedings of the 9th International Conference in Information Technology, 2006
2004
Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004