Poulami Das

Affiliations:
  • Heritage Institute of Technology, Kolkata, India


According to our database1, Poulami Das authored at least 13 papers between 2006 and 2009.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. Univers. Comput. Sci., 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
Int. J. Commun. Netw. Syst. Sci., 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
A Secure Scheme for Image Transformation.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Handwritten Signature Authentication Using Statistical Estimation.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Flexible ANN System for Handwritten Signature Identification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Handwritten Signature Verification System using Morphological Image Analysis.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Mosquito attack optimization.
Ubiquity, 2006


  Loading...