Banshidhar Majhi

According to our database1, Banshidhar Majhi authored at least 101 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Texture feature based classification on microscopic blood smear for acute lymphoblastic leukemia detection.
Biomed. Signal Proc. and Control, 2019

2018
An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment.
Wireless Personal Communications, 2018

Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol.
Wireless Personal Communications, 2018

Development of pathological brain detection system using Jaya optimized improved extreme learning machine and orthogonal ripplet-II transform.
Multimedia Tools Appl., 2018

Pathological brain detection using curvelet features and least squares SVM.
Multimedia Tools Appl., 2018

Multi-resolution extreme learning machine-based side information estimation in distributed video coding.
Multimedia Tools Appl., 2018

Decoder driven side information generation using ensemble of MLP networks for distributed video coding.
Multimedia Tools Appl., 2018

Iris recognition with tunable filter bank based feature.
Multimedia Tools Appl., 2018

Fast periocular authentication in handheld devices with reduced phase intensive local pattern.
Multimedia Tools Appl., 2018

An Improved Pathological Brain Detection System Based on Two-Dimensional PCA and Evolutionary Extreme Learning Machine.
J. Medical Systems, 2018

Discrete ripplet-II transform and modified PSO based improved evolutionary extreme learning machine for pathological brain detection.
Neurocomputing, 2018

Design of electronic payment system based on authenticated key exchange.
Electronic Commerce Research, 2018

Crow search based virtual machine placement strategy in cloud data centers with live migration.
Computers & Electrical Engineering, 2018

Combining extreme learning machine with modified sine cosine algorithm for detection of pathological brain.
Computers & Electrical Engineering, 2018

SCA-RELM: A New Regularized Extreme Learning Machine Based on Sine Cosine Algorithm for Automated Detection of Pathological Brain.
Proceedings of the 27th IEEE International Symposium on Robot and Human Interactive Communication, 2018

2017
CLB-ECC: Certificateless Blind Signature Using ECC.
JIPS, 2017

A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition.
JIPS, 2017

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN.
JIPS, 2017

Two-stage classification approach for the recognition of handwritten atomic Odia character.
IJAPR, 2017

Automated pathological brain detection system: A fast discrete curvelet transform and probabilistic neural network based approach.
Expert Syst. Appl., 2017

Gray level co-occurrence matrix and random forest based acute lymphoblastic leukemia detection.
Biomed. Signal Proc. and Control, 2017

A Neuromorphic Person Re-Identification Framework for Video Surveillance.
IEEE Access, 2017

A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

An ID-based Non-Interactive Deniable Authentication Protocol based on ECC.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
MVS: A multi-view video synopsis framework.
Sig. Proc.: Image Comm., 2016

Non-linear cellular automata based edge detector for optical character images.
Simulation, 2016

Incremental granular relevance vector machine: A case study in multimodal biometrics.
Pattern Recognition, 2016

Direction prediction for avoiding occlusion in visual surveillance.
ISSE, 2016

Brain MR image classification using two-dimensional discrete wavelet transform and AdaBoost with random forests.
Neurocomputing, 2016

Development of robust neighbor embedding based super-resolution scheme.
Neurocomputing, 2016

Shape descriptors-based generalised scheme for handwritten character recognition.
IJCVR, 2016

A delay and energy aware coordination mechanism for WSAN.
Int. J. Communication Systems, 2016

IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks.
Int. J. Communication Systems, 2016

BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications.
Computers, 2016

Direction Estimation for Pedestrian Monitoring System in Smart Cities: An HMM Based Approach.
IEEE Access, 2016

An Evaluation of Background Subtraction for Object Detection Vis-a-Vis Mitigating Challenging Scenarios.
IEEE Access, 2016

An effective side information generation scheme for Wyner-Ziv video coding.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

Microscopic Image Classification Using DCT for the Detection of Acute Lymphoblastic Leukemia (ALL).
Proceedings of International Conference on Computer Vision and Image Processing, 2016

Improved Feature Selection for Neighbor Embedding Super-Resolution Using Zernike Moments.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
Region-based feature extraction from non-cooperative iris images using CDF 9/7 filter bank.
ISSE, 2015

Comparative Analysis of Routing Protocols in Wireless Sensor-Actor Networks: A Review.
IJWIN, 2015

Mammogram classification using two dimensional discrete wavelet transform and gray-level co-occurrence matrix for detection of breast cancer.
Neurocomputing, 2015

An efficient event matching algorithm for publish/subscribe system in sensor cloud platform.
IJICT, 2015

Classification of handwritten Odia basic character using Stockwell transform.
IJAPR, 2015

Salient Keypoint Detection using Entropy Map for Iris Biometric.
Proceedings of the 2nd International Conference on Perception and Machine Intelligence, 2015

Automatic Characterization of Mammograms using Fractal Texture Analysis and Fast Correlation Based Filter Method.
Proceedings of the 2nd International Conference on Perception and Machine Intelligence, 2015

A multi-view video synopsis framework.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Scalable architecture for ubiquitous healthcare using sensor cloud platform.
IJICT, 2014

One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks.
IACR Cryptology ePrint Archive, 2014

Model based odia numeral recognition using fuzzy aggregated features.
Frontiers Comput. Sci., 2014

One-pass authenticated key establishment protocol on bilinear pairings for Wireless Sensor Networks.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2013
Intensity Range Based Background Subtraction for Effective Object Detection.
IEEE Signal Process. Lett., 2013

A secure electronic cash based on a certificateless group signcryption scheme.
Mathematical and Computer Modelling, 2013

Fast segmentation and adaptive SURF descriptor for iris recognition.
Mathematical and Computer Modelling, 2013

Parallel geometric hashing for robust iris indexing.
J. Real-Time Image Processing, 2013

Postmatch pruning of SIFT pairs for iris recognition.
IJBM, 2013

Local feature based retrieval approach for iris biometrics.
Frontiers Comput. Sci., 2013

Stratified SIFT Matching for Human Iris Recognition
CoRR, 2013

An Efficient Indexing Scheme for Iris Biometric Using K-d-b Trees.
Proceedings of the Intelligent Computing Theories and Technology, 2013

Sensor Cloud: The Scalable Architecture for Future Generation Computing.
Proceedings of the Intelligent Computing, 2013

A comparative analysis of image transformations for handwritten Odia numeral recognition.
Proceedings of the International Conference on Advances in Computing, 2013

Support vector regression based image restoration.
Proceedings of the FUZZ-IEEE 2013, 2013

Background subtraction and human detection in outdoor videos using fuzzy logic.
Proceedings of the FUZZ-IEEE 2013, 2013

A new optimal delay and energy efficient coordination algorithm for WSAN.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Adaptive threshold selection for impulsive noise detection in images using coefficient of variance.
Neural Computing and Applications, 2012

A Strong Designated Verifiable DL Based Signcryption Scheme.
JIPS, 2012

Particle Swarm Optimization Based Support Vector Regression for Blind Image Restoration.
J. Comput. Sci. Technol., 2012

A novel time-stamped signature scheme based upon DLP.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Occlusion prediction algorithms for multi-camera network.
Proceedings of the Sixth International Conference on Distributed Smart Cameras, 2012

Biometric match score fusion using RVM: A case study in multi-unit iris recognition.
Proceedings of the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2012

2011
Spatial variant motion deblurring of images.
IJCVR, 2011

Gender Classification Using Artificial Neural Networks through Independent Components.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

A new adaptive median filtering technique for removal of impulse noise from images.
Proceedings of the 2011 International Conference on Communication, 2011

Bitonic sort in shared SIMD array processor.
Proceedings of the 2011 International Conference on Communication, 2011

Gender classification by principal component analysis and support vector machine.
Proceedings of the 2011 International Conference on Communication, 2011

A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique.
Proceedings of the 2011 International Conference on Communication, 2011

Restoration of images corrupted with blur and impulse noise.
Proceedings of the 2011 International Conference on Communication, 2011

Real-time iris segmentation based on image morphology.
Proceedings of the 2011 International Conference on Communication, 2011

Genetic Algorithm techniques to solve Routing and Wavelength Assignment problem in Wavelength Division Multiplexing all-optical networks.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

A Convertible Designated Verifible Blind Multi-signcryption Scheme.
Proceedings of the Advances in Computing and Communications, 2011

Stratified SIFT Matching for Human Iris Recognition.
Proceedings of the Advances in Computing and Communications, 2011

Unconstrained iris recognition using F-SIFT.
Proceedings of the 8th International Conference on Information, 2011

2010
Robust iris indexing scheme using geometric hashing of SIFT keypoints.
J. Network and Computer Applications, 2010

A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm.
IACR Cryptology ePrint Archive, 2010

Feature Level Clustering of Large Biometric Database
CoRR, 2010

Genetic Algorithm Approaches to Solve RWA Problem in WDM Optical Networks.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010

2009
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP.
IACR Cryptology ePrint Archive, 2009

An Efficient Password Security of Key Exchange Protocol based on ECDLP.
IACR Cryptology ePrint Archive, 2009

Annular Iris Recognition Using SURF.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

Particle Swarm Optimization based Regularization for Image Restoration.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

Feature Level Clustering of Large Biometric Database.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2009), 2009

An efficient iris recognition using local feature descriptor.
Proceedings of the International Conference on Image Processing, 2009

Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands.
Proceedings of the Contemporary Computing - Second International Conference, 2009

An efficient dual stage approach for iris feature extraction using interest point pairing.
Proceedings of the 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, 2009

Approximation Algorithms for Optimizing Privacy and Utility.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Improved Enhancement Scheme Using a RBFN Detector for Impulse Noise.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature.
Proceedings of the 2008 International Conference on Information Technology, 2008

Improved offline signature verification scheme using feature point extraction method.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2007
Improved Adaptive Impulsive Noise Suppression.
Proceedings of the FUZZ-IEEE 2007, 2007

A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash.
Proceedings of the 10th International Conference on Information Technology, 2007

2006
ANN based Adaptive Thresholding for Impulse Detection.
Proceedings of the IASTED International Conference on Signal Processing, 2006


  Loading...