J. K. Mandal

Orcid: 0000-0001-9447-647X

Affiliations:
  • University of Kalyani, West Bengal, India


According to our database1, J. K. Mandal authored at least 98 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Assessment of learning parameters for students' adaptability in online education using machine learning and explainable AI.
Educ. Inf. Technol., April, 2024

2023
A modified column block Toeplitz matrix for compressed sensing.
Signal Image Video Process., 2023

2022
A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography.
Int. J. Softw. Innov., 2022

Automated Assessment - An Application in Authentic Learning Using Bloom's Taxonomy.
Proceedings of the Learning in the Age of Digital and Green Transition, 2022

A Comprehensive Model for Augmented Confidence Based Learning (ACBL).
Proceedings of the Learning in the Age of Digital and Green Transition, 2022

2021
Change Detection and Patch Analysis of Sundarban Forest During 1975-2018 Using Remote Sensing and GIS Data.
SN Comput. Sci., 2021

An enhanced block-based Compressed Sensing technique using orthogonal matching pursuit.
Signal Image Video Process., 2021

A novel wide & deep transfer learning stacked GRU framework for network intrusion detection.
J. Inf. Secur. Appl., 2021

Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map.
Innov. Syst. Softw. Eng., 2021

Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society.
Innov. Syst. Softw. Eng., 2021

Detection and Prediction of Sundarban Reserve Forest using the CA-Markov Chain Model and Remote Sensing Data.
Earth Sci. Informatics, 2021

A New Approach to Enhance Security of Visual Cryptography Using Steganography (VisUS).
CoRR, 2021

A multi-scale agent-based model for avascular tumour growth.
Biosyst., 2021

Low back pain expert systems: Clinical resolution through probabilistic considerations and poset.
Artif. Intell. Medicine, 2021

Color Image Compressed Sensing Using Modified Stagewise Orthogonal Matching Pursuit.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2021

Materialized View Driven Architecture over Lattice of Cuboids in Data Warehouse.
Proceedings of the ACIT 2021: The 8th International Virtual Conference on Applied Computing & Information Technology, Kanazawa, Japan, June 20, 2021

2020
Forest Cover Change Analysis in Sundarban Delta Using Remote Sensing Data and GIS.
Proceedings of the Intelligent Computing Paradigm: Recent Trends, 2020

Reversible Steganography and Authentication via Transform Encoding
Studies in Computational Intelligence 901, Springer, ISBN: 978-981-15-4396-8, 2020

Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN.
Appl. Comput. Syst., 2020

Medical expert system for low back pain management: design issues and conflict resolution with Bayesian network.
Medical Biol. Eng. Comput., 2020

Special issue on software solutions for contemporary applications.
Innov. Syst. Softw. Eng., 2020

Rough set based lattice structure for knowledge representation in medical expert systems: Low back pain management case study.
Expert Syst. Appl., 2020

2019
On the use of the Stirling Transform in image steganography.
J. Inf. Secur. Appl., 2019

Editorial preface.
Innov. Syst. Softw. Eng., 2019

An approach for deployment of BRS in software-defined network.
Innov. Syst. Softw. Eng., 2019

Addressing Design Issues in Medical Expert System for Low Back Pain Management: Knowledge Representation, Inference Mechanism, and Conflict Resolution Using Bayesian Network.
CoRR, 2019

Intelligent Assessment Using Variable N-gram Technique.
Proceedings of the Impact of the 4th Industrial Revolution on Engineering Education - Proceedings of the 22nd International Conference on Interactive Collaborative Learning (ICL 2019), 2019

Managing Tasks in Confidence Based Learning Using K-ary Tree.
Proceedings of the Impact of the 4th Industrial Revolution on Engineering Education - Proceedings of the 22nd International Conference on Interactive Collaborative Learning (ICL 2019), 2019

Sensor node assisted DTN for a post-disaster scenario.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario.
Peer-to-Peer Netw. Appl., 2018

High payload image steganography based on Laplacian of Gaussian (LoG) edge detector.
Multim. Tools Appl., 2018

Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

Deep Convolutional Neural Network Based Facial Keypoints Detection.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

2017
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way.
Int. J. Inf. Comput. Secur., 2017

A comprehension based intelligent assessment architecture.
Proceedings of the IEEE 6th International Conference on Teaching, 2017

An intelligent mining technique for CBL.
Proceedings of the IEEE 6th International Conference on Teaching, 2017

A Hybrid PSO-Fuzzy Based Algorithm for Clustering Indian Stock Market Data.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

A Novel Automated Assessment Technique in e-Learning Using Short Answer Type Questions.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
DirMove: direction of movement based routing in DTN architecture for post-disaster scenario.
Wirel. Networks, 2016

Two dimensional assessment technique for CBL.
Proceedings of the IEEE International Conference on Teaching, 2016

2015
Cryptanalysis of Key Exchange method in Wireless Communication.
Int. J. Netw. Secur., 2015

Image denoising based on sub-image restoration through threshold optimisation.
Int. J. Comput. Intell. Stud., 2015

2014
Binomial transform based fragile watermarking for image authentication.
J. Inf. Secur. Appl., 2014

A Fuzzy Switching Median Filter of Impulses in Digital Imagery (FSMF).
Circuits Syst. Signal Process., 2014

Size Adaptive Region Based Huffman Compression Technique.
CoRR, 2014

Reliability computation of mobile Ad-Hoc network using logistic regression.
Proceedings of the Eleventh International Conference on Wireless and Optical Communications Networks, 2014

A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO).
Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications, 2014

KSOFM Network Based Neural Key Generation for Wireless Communication.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Neuro-key Generation Based on HEBB Network for Wireless Communication.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Windowed Huffman Coding with Limited Distinct Symbols by Least Recently Used Symbol Removable.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Image Clustering Based on Different Length Particle Swarm Optimization (DPSO).
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG).
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2013
Wavelet Based Authentication/Secret Transmission Through Image Resizing(WASTIR)
CoRR, 2013

A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept
CoRR, 2013

Denoising of digital images through PSO based pixel classification.
Central Eur. J. Comput. Sci., 2013

G-Let Based Authentication/Secret Message Transmission (GASMT).
Proceedings of the 2013 International Symposium on Electronic System Design, 2013

Double Layer Perceptron Synchronized Computational Intelligence Guided Fractal Triangle Based Cryptographic Technique for Secured Communication (DLPFT).
Proceedings of the 2013 International Symposium on Electronic System Design, 2013

2012
An Authentication Technique for Image/Legal Document (ATILD).
J. Signal Process. Syst., 2012

An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT)
CoRR, 2012

A Novel Directional Weighted Minimum Deviation (DWMD) Based Filter for Removal of Random Valued Impulse Noise
CoRR, 2012

Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)
CoRR, 2012

A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)
CoRR, 2012

Space Efficient Cryptographic Protocol Using Recursive Bitwise & Pairs Of Bits Of Operation (RBPBO)
CoRR, 2012

Self Authentication of color image through Wavelet Transformation Technique (SAWT)
CoRR, 2012

Self Authentication of image through Daubechies Transform technique (SADT)
CoRR, 2012

Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP)
CoRR, 2012

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
CoRR, 2012

Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG)
CoRR, 2012

Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA)
CoRR, 2012

Image Filtering using All Neighbor Directional Weighted Pixels: Optimization using Particle Swarm Optimization
CoRR, 2012

Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow
CoRR, 2012

Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
CoRR, 2012

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC).
CoRR, 2012

A Frequency Domain Steganography using Z Transform (FDSZT)
CoRR, 2012

A Delaunay Triangulation Preprocessing Based Fuzzy-Encroachment Graph Clustering for Large Scale GIS Data.
Proceedings of the International Symposium on Electronic System Design, 2012

Fractal Image Compression Using Fast Context Independent HV Partitioning Scheme.
Proceedings of the International Symposium on Electronic System Design, 2012

Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Invisible Image Watermarking Using Z Transforms (IIWZT).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
An adaptive genetic key based neural encryption for online wireless communication (AGKNE).
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

Edge preserving restoration of random valued impulse noises (EPRRVIN).
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

Image Authentication Using Hough Transform Generated Self Signature in DCT Based Frequency Domain (IAHTSSDCT).
Proceedings of the International Symposium on Electronic System Design, 2011

A Novel Fuzzy-GIS Model Based on Delaunay Triangulation to Forecast Facility Locations (FGISFFL).
Proceedings of the International Symposium on Electronic System Design, 2011

A Message Embedded Authentication of Songs to Verify Intellectual Property Right (MEAS).
Proceedings of the International Symposium on Electronic System Design, 2011

A Novel Variable Mask Median Filter for Removal of Random Valued Impulses in Digital Images (VMM).
Proceedings of the International Symposium on Electronic System Design, 2011

A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD).
Proceedings of the International Symposium on Electronic System Design, 2011

A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC).
Proceedings of the International Symposium on Electronic System Design, 2011

Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS).
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

GA Based Denoising of Impulses (GADI).
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Key based bit level genetic cryptographic technique (KBGCT).
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2008
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES).
IACR Cryptol. ePrint Arch., 2008

2006
Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key.
Proceedings of the 9th International Conference in Information Technology, 2006

A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT).
Proceedings of the 9th International Conference in Information Technology, 2006

2004
Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004


  Loading...