Study of implementing automated attendance system using face recognition technique N Kar, MK Debbarma, A Saha, DR Pal International Journal of computer and communication engineering 1 (2), 100-103, 2012 | 240 | 2012 |
Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people D Rudrapal, S Das, S Debbarma, N Kar, N Debbarma International Journal of Computer Applications 39 (12), 6-12, 2012 | 47 | 2012 |
Improved chaos-based video steganography using DNA alphabets N Kar, K Mandal, B Bhattacharya ICT Express 4 (1), 6-13, 2018 | 42 | 2018 |
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function Γ (-α β)=-β α Γ (β-α β) AK Das, N Kar International Conference on Advances in Cyber Security, 78-94, 2021 | 36 | 2021 |
Email spam detection using deep learning approach K Debnath, N Kar 2022 international conference on machine learning, big data, cloud and …, 2022 | 32 | 2022 |
An improved DNA based dual cover steganography P Das, S Deb, N Kar, B Bhattacharya Procedia Computer Science 46, 604-611, 2015 | 27 | 2015 |
Secure data communication and cryptography based on DNA based message encoding A Majumder, A Majumdar, T Podder, N Kar, M Sharma 2014 IEEE international conference on advanced communications, control and …, 2014 | 23 | 2014 |
Performance analysis of hierarchical and flat network routing protocols in wireless sensor network using Ns-2 A Jamatia, K Chakma, N Kar, D Rudrapal, S Debbarmai International Journal of Modeling and Optimization 5 (1), 40, 2015 | 20 | 2015 |
Static and dynamic software metrics complexity analysis in regression testing MK Debbarma, N Kar, A Saha 2012 International Conference on Computer Communication and Informatics, 1-6, 2012 | 20 | 2012 |
An advanced image encryption standard providing dual security: Encryption using hill cipher & RGB image steganography D Debnath, S Deb, N Kar 2015 International Conference on Computational Intelligence and Networks …, 2015 | 19 | 2015 |
A DNA based image steganography using 2D chaotic map P Das, N Kar 2014 International Conference on Electronics and Communication Systems …, 2014 | 15 | 2014 |
An improved data security using DNA sequencing N Kar, A Majumder, A Saha, A Jamatia, K Chakma, MC Pal Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare …, 2013 | 14 | 2013 |
A highly secure DNA based image steganography P Das, N Kar 2014 International Conference on Green Computing Communication and …, 2014 | 13 | 2014 |
Data security and cryptography based on DNA sequencing N Kar, A Majumder, A Saha, S Deb, MC Pal International Journal of Information Technology & Computer Science (IJITCS …, 2013 | 13 | 2013 |
DNA-based cryptographic approach toward information security A Majumdar, T Podder, A Majumder, N Kar, M Sharma Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015 | 10 | 2015 |
An Improved Chaos based medical image encryption using DNA encoding techniques A Das, AK Das, N Kar Advances in Computational Intelligence, Security and Internet of Things …, 2020 | 9 | 2020 |
Automated Load Shedding Period Control System D Rudrapal, S Das, A Pandey, N Kar International Journal on Computer Science and Engineering 3 (5), 1764-1772, 2011 | 9 | 2011 |
A Hierarchical Scheduling Approach for Symmetric Multiprocessing Based Real Time Systems on VxWorks K Chakma, S Debbarma, N Kar, N Debbarma, T Debbarma Lecture Notes on Software Engineering 1 (1), 61-65, 2013 | 8 | 2013 |
An approach towards multilevel and multiagent based intrusion detection system A Biswas, M Sharma, T Poddder, N Kar 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 7 | 2014 |
Angiographic correlation of ST segment depression on admission ECG in patient with NSTEMI M Ullah, M Khalequzzaman, SMA Habib, N Kar, MN Islam Bangladesh Heart Journal 21 (2), 72-77, 2006 | 7 | 2006 |