default search action
Mrinal Kanti Ghose
Person information
- affiliation: GLA University, Mathura, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j8]Kushal Pokhrel, Nitul Dutta, Mrinal Kanti Ghose, Hiren Kumar Deva Sarma:
Performance Evaluation of Three Layer MIPv6 Architecture. Wirel. Pers. Commun. 128(2): 1259-1285 (2023) - 2021
- [j7]Abhijit Bera, Mrinal Kanti Ghose, Dibyendu Kumar Pal:
Sentiment Analysis of Multilingual Tweets Based on Natural Language Processing (NLP). Int. J. Syst. Dyn. Appl. 10(4): 1-12 (2021) - 2020
- [j6]Abhijit Bera, Mrinal Kanti Ghose, Dibyendu Kumar Pal:
Graph Classification Using Back Propagation Learning Algorithms. Int. J. Syst. Softw. Secur. Prot. 11(2): 1-12 (2020) - 2018
- [j5]Polash Banerjee, Mrinal Kanti Ghose, Ratika Pradhan:
AHP-based Spatial Air Quality Impact Assessment Model of vehicular traffic change due to highway broadening in Sikkim Himalaya. Ann. GIS 24(4): 287-302 (2018) - [j4]Kushal Pokhrel, Nitul Dutta, Mrinal Kanti Ghose, Hemali Vithalani, Hiren Kumar Deva Sarma, Zdzislaw Pólkowski:
Binding Lifetime Based Signaling Cost Analysis of Multilayer MIPv6. J. Comput. 13(3): 337-350 (2018) - 2015
- [j3]Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose:
Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection. Int. J. Netw. Secur. 17(5): 522-534 (2015) - 2014
- [j2]Nitul Dutta, Iti Saha Misra, Kushal Pokhrel, Mrinal Kanti Ghose:
Performance Analysis of Multilayer MIPv6 Architecture through Experimental Testbed. J. Networks 9(7): 1682-1691 (2014) - 2009
- [j1]Anil Kumar, Mrinal Kanti Ghose:
Overview of Information Security Using Genetic Algorithm and Chaos. Inf. Secur. J. A Glob. Perspect. 18(6): 306-315 (2009)
Conference and Workshop Papers
- 2020
- [c12]Prativa Rai, Mrinal Kanti Ghose, Hiren Kumar Deva Sarma:
An Analysis on the Impact of Utility Functions on the Performance of Game Theory Based Channel Allocation in Cognitive Radio Wireless Sensor Network. IEEE ANTS 2020: 1-6 - [c11]Prativa Rai, Mrinal Kanti Ghose, Hiren Kumar Deva Sarma:
Game Theory Based Energy Efficient Routing in Cognitive Radio Wireless Sensor Networks. iSES 2020: 35-39 - 2016
- [c10]Noorjahan Khatoon, Mrinal Kanti Ghose:
Steady Illumination Color Local Ternary Pattern as a Feature Extractor in Iris Authentication. IntelliSys (2) 2016: 966-973 - 2015
- [c9]Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose:
A novel approach for circular random grid with share authentication. ICACCI 2015: 1917-1923 - [c8]Pooja Rai, Sandeep Gurung, Mrinal Kanti Ghose:
A Discrete Wavelet Transform based Adaptive Steganography for Digital Images. WCI 2015: 432-437 - 2012
- [c7]Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose:
A Framework for P2P Botnet Detection Using SVM. CyberC 2012: 195-200 - 2010
- [c6]Anil Kumar, Mrinal Kanti Ghose:
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map. BAIP 2010: 34-38 - [c5]M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman, M. Boosha:
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm. CNSA 2010: 593-602 - [c4]M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman:
Mining Frequent and Associated Gene Expression Patterns from Spatial Gene Expression Data: A Proposed Approach. IC3 (1) 2010: 119-130 - [c3]Anil Kumar, Mrinal Kanti Ghose:
Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map. ICISTM 2010: 333-338 - 2009
- [c2]M. Shoaib Jameel, Anubhav, Nilesh Singh, Nitin Kumar Singh, Chingtham Tejbanta Singh, Mrinal Kanti Ghose:
An Intelligent Automatic Text Summarizer. IHCI 2009: 223-230 - [c1]Anil Kumar, Sucheta Sushan Ghose, Mrinal Kanti Ghose:
An Improved Secure Data Communication Using Blind Source Separation and Chaos. ISM 2009: 358-362
Informal and Other Publications
- 2012
- [i10]Roheet Bhatnagar, Mrinal Kanti Ghose:
Comparing Soft Computing Techniques For Early Stage Software Development Effort Estimations. CoRR abs/1204.6396 (2012) - 2011
- [i9]Chingtham Tejbanta Singh, G. Sahoo, Mrinal Kanti Ghose:
Artificial Immune Privileged Sites as an Enhancement to Immuno-Computing Paradigm. CoRR abs/1102.3971 (2011) - [i8]Chingtham Tejbanta Singh, G. Sahoo, Mrinal Kanti Ghose:
An Artificial Immune System Model for Multi-Agents Resource Sharing in Distributed Environments. CoRR abs/1103.2091 (2011) - [i7]Chingtham Tejbanta Singh, G. Sahoo, Mrinal Kanti Ghose:
An Unmanned Aerial Vehicle as Human-Assistant Robotics System. CoRR abs/1104.3681 (2011) - 2010
- [i6]M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman:
Mining Spatial Gene Expression Data Using Negative Association Rules. CoRR abs/1001.1991 (2010) - [i5]M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman:
Interestingness Measure for Mining Spatial Gene Expression Data using Association Rule. CoRR abs/1001.3498 (2010) - [i4]Ratika Pradhan, Mohan P. Pradhan, Ashish Bhusan, Ronak K. Pradhan, Mrinal Kanti Ghose:
Land-cover Classification and Mapping for Eastern Himalayan State Sikkim. CoRR abs/1003.4087 (2010) - [i3]Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, Mrinal Kanti Ghose:
Power-efficient Routing & Increased Yield Approach For WSNs. CoRR abs/1009.0630 (2010) - 2009
- [i2]Kalpana Sharma, Mrinal Kanti Ghose, Kuldeep:
Complete Security Framework for Wireless Sensor Networks. CoRR abs/0908.0122 (2009) - [i1]Samarjeet Borah, Mrinal Kanti Ghose:
Performance Analysis of AIM-K-means & K-means in Quality Cluster Generation. CoRR abs/0912.3983 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint