S. K. Ghosh

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2021
Partial Feedback Linearizing Backstepping Excitation Controller for a Synchronous Generator in a Simple Power System to Improve the Transient Stability.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

A Robust Linear Optimal State Feedback Controller Design for Excitation Systems of Synchronous Generators in Single Machine Power Systems with Parametric Uncertainties.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

2018
Spectral indices based object oriented classification for change detection using satellite data.
Int. J. Syst. Assur. Eng. Manag., 2018

2017
Classification of Optimal Group-Invariant Solutions: Cylindrical Korteweg-de Vries Equation.
J. Optim. Theory Appl., 2017

2015
Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks, 2015

Spectral Indices Based Change Detection in an Urban Area Using Landsat Data.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2013
Moist deciduous forest identification using temporal MODIS data - A comparative study using fuzzy based classifiers.
Ecol. Informatics, 2013

2012
Analytical framework for measuring network security using exploit dependency graph.
IET Inf. Secur., 2012

Estimation of Uncertainty Using Entropy on Noise Based Soft Classifiers.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Policy Based ACL Configuration Synthesis in Enterprise Networks: A Formal Approach.
Proceedings of the International Symposium on Electronic System Design, 2012

2010
A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information.
Proceedings of the Information Systems, Technology and Management, 2010

2009
An intelligent search technique for network security administration.
Int. J. Artif. Intell. Soft Comput., 2009

2008
Traffic Grooming in Optical WDM Mesh Networks.
Proceedings of the IEEE Reglon 10 Colloquium and Third International Conference on Industrial and Information Systems, 2008

2007
Security Threat Prediction in a Local Area Network Using Statistical Model.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

A Two Stage Recognition Scheme for Handwritten Tamil Characters.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

An Artificial Intelligence Based Approach for Risk Management Using Attack Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

HPRS: A Hybrid P2P Reputation System using File and Peer Rating.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A bidirectional linear semi-systolic architecture for DCT-domain image resizing processor.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2002
Low bit rate video compression using relative fractal coding.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
On the theory of bags and lists.
Inf. Sci., 2001

1986
A note on convex hull algorithms.
Pattern Recognit., 1986


  Loading...