Pranab Kumar Banerjee

Learn More
— We introduce an effective approach for automatic offline au-injuries, illness, temperature, age and emotional state as well thentication of handwritten samples where the forgeries are skillfully done, as external factors such as alcohols and drugs [3] – an original i.e., the true and forgery sample appearances are almost alike. Subtle details piece of(More)
Phase eigen subspace based face recognition under varying lighting conditions is proposed. Universal subspace analysis is exploited in frequency domain and phase spectrum is extracted instead of using raw spatial data of face images. Improved results are obtained when simplified bi-directional associative memory neural network is used as classifier. The(More)
Certain security attacks specific to Mobile Ad Hoc Networks (MANETs) such as black hole attacks, gray hole attacks and blackmail attacks and also flooding attacks are lethal in terms of hampering availability of network service. In this paper, we propose a protocol for detecting flooding, black hole, gray hole and blackmail attacks and taking measures(More)
In this paper, Multi-Band (MB) OFDM system for Ultra-wideband communication is analysed. Among the many Channel models described in the literature, S-V model is considered for propagation of the MB-OFDM system. The authors have found that complete analysis of the system was not done in the literature. Different code rates were considered as per the(More)
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly(More)
Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme(More)
Human visual system can identify larger defects taking place on the woven fabric. But it is very difficult to classify and identify the small fabric defects by a human inspector. In the textile industries the defect detection by a human inspector affects the production tremendously. Thus this paper gives a solution of this problem by developing an automatic(More)
In cellular mobile communication system the existing distributed dynamic channel allocation algorithms suffer from high message complexity and channel acquisition time. To contend this problem, in this paper, a modified distributed dynamic channel allocation algorithm be called as Reduced Search In Update (RSU) is proposed, which takes into considerations(More)
  • 1