Different edge detection techniques: A review C Ghosh, S Majumder, S Ray, S Datta, SN Mandal Electronic Systems and Intelligent Computing: Proceedings of ESIC 2020, 885-898, 2020 | 10 | 2020 |
Analysis of v-net architecture for iris segmentation in unconstrained scenarios A Banerjee, C Ghosh, SN Mandal SN Computer Science 3 (3), 208, 2022 | 7 | 2022 |
Simplistic deep learning for Japanese handwritten digit recognition A Ghosh, A Mukherjee, C Ghosh Intelligent Techniques and Applications in Science and Technology …, 2020 | 4 | 2020 |
DIFFERENT VULNERABILITIES AND CHALLENGES OF QUANTUM KEY DISTRIBUTION PROTOCOL: A REVIEW C Ghosh, A Parag, S Datta International Journal of Advanced Research in Computer Science 8 (8), 307-311, 2017 | 4 | 2017 |
Usage of Internet of Things in Home Automation Systems: A Review S Majumder, S Ray, C Ghosh, S Datta Modeling, Simulation and Optimization: Proceedings of CoMSO 2020 206, 57, 2021 | 2 | 2021 |
An efficient approach to remove specular reflection from non-ideal eye image MA Sohail, C Ghosh, S Mondal Proceedings of the International Conference on Computing and Communication …, 2021 | 2 | 2021 |
Image Encryption: A New Approach Using Genetic Algorithm C GHOSH, M SATYENDRANATH International Conference on Emerging Trends in Computer Science and …, 2016 | 1 | 2016 |
Improvement of Security in Playfair Cipher. C Ghosh, SN Mandal International Journal of Advanced Research in Computer Science 5 (4), 2014 | | 2014 |
A Combined Method for Image Encryption C Ghosh, SN Mandal National Conference on Advances in Engineering and Technology, 40-44, 2014 | | 2014 |