default search action
Banani Saha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sudipto Bhattacharjee, Banani Saha, Sudipto Saha:
Symptom-based drug prediction of lifestyle-related chronic diseases using unsupervised machine learning techniques. Comput. Biol. Medicine 174: 108413 (2024) - [j12]Ratul Chowdhury, Tamal Chakraborty, Shankhadeep Purkait, Banani Saha:
SE2CURA - design and implementation of a robust ensemble learning based 2-tier intrusion detection system for real time traffic. Multim. Tools Appl. 83(13): 38567-38609 (2024) - [j11]Sarbani Dasgupta, Banani Saha:
Big data analysis on medical field for drug recommendation using apriori algorithm and deep learning. Multim. Tools Appl. 83(35): 83029-83051 (2024) - 2023
- [j10]Anjan Kumar Payra, Banani Saha, Anupam Ghosh:
MM-CCNB: Essential protein prediction using MAX-MIN strategies and compartment of common neighboring approach. Comput. Methods Programs Biomed. 228: 107247 (2023) - [j9]Ratul Chowdhury, Shibaprasad Sen, Arpan Goswami, Shankhadeep Purkait, Banani Saha:
An implementation of bi-phase network intrusion detection system by using real-time traffic analysis. Expert Syst. Appl. 224: 119831 (2023) - [j8]Soma Hazra, Shaurjya Mandal, Banani Saha, Sunirmal Khatua:
UMTSS: a unifocal motion tracking surveillance system for multi-object tracking in videos. Multim. Tools Appl. 82(8): 12401-12422 (2023) - [j7]Arpita Sanyal Bhaduri, Amit Saha, Banani Saha, Amlan Chakrabarti:
Robust quantum circuit for clique problem with intermediate qudits. Nano Commun. Networks 37: 100466 (2023) - [i5]Prokash Barman, Banani Saha:
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication. CoRR abs/2311.11392 (2023) - [i4]Prokash Barman, Banani Saha:
DNA Encoded Elliptic Curve Cryptography System for IoT Security. CoRR abs/2311.11393 (2023) - [i3]Prokash Barman, Banani Saha:
Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network. CoRR abs/2311.11864 (2023) - 2022
- [j6]Sudipto Bhattacharjee, Banani Saha, Parthasarathi Bhattacharyya, Sudipto Saha:
LHSPred: A web based application for predicting lung health severity. Biomed. Signal Process. Control. 77: 103745 (2022) - [j5]Arpita Sanyal (Bhaduri), Amit Saha, Banani Saha, Amlan Chakrabarti:
Circuit design for clique problem and its implementation on quantum computer. IET Quantum Commun. 3(1): 30-49 (2022) - [j4]Sudipto Bhattacharjee, Banani Saha, Parthasarathi Bhattacharyya, Sudipto Saha:
Classification of obstructive and non-obstructive pulmonary diseases on the basis of spirometry using machine learning techniques. J. Comput. Sci. 63: 101768 (2022) - [j3]Ratul Chowdhury, Shibaprasad Sen, Arindam Roy, Banani Saha:
An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multim. Tools Appl. 81(28): 41225-41247 (2022) - [j2]Sarbani Dasgupta, Banani Saha:
HMA-ID mechanism: a hybrid mayfly optimisation based apriori approach for intrusion detection in big data application. Telecommun. Syst. 80(1): 77-89 (2022) - [i2]Arpita Sanyal (Bhaduri), Amit Saha, Banani Saha, Amlan Chakrabarti:
Robust Quantum Circuit for Clique Problem with Intermediate Qudits. CoRR abs/2211.07947 (2022) - 2021
- [j1]Anjan Kumar Payra, Banani Saha, Anupam Ghosh:
Ortho_Sim_Loc: Essential protein prediction using orthology and priority-based similarity approach. Comput. Biol. Chem. 92: 107503 (2021) - 2020
- [i1]Arpita Sanyal (Bhaduri), Amit Saha, Banani Saha, Amlan Chakrabarti:
Circuit Synthesis of Maximum Clique Problem using Combinatorial Approach of Classical-Quantum Hybrid Model. CoRR abs/2004.10596 (2020)
2010 – 2019
- 2019
- [c5]Nandita Gautam, Debdoot Das, Sunirmal Khatua, Banani Saha:
Real Time Key Frame Extraction Through Parallel Computation of Entropy Difference. CISIM 2019: 337-346 - [c4]Sarbani Dasgupta, Banani Saha:
Towards the Speed Enhancement of Association Rule Mining Algorithm for Intrusion Detection System. IBICA 2019: 1-9 - 2016
- [c3]Supriyo Banerjee, Biswajit Maiti, Banani Saha:
Analysis of Eavesdropping in QKD with Qutrit Photon States. ACSS (1) 2016: 161-171 - 2014
- [c2]Boudhayan Bhattacharya, Banani Saha:
Signalling Cost Analysis of Community Model. FICTA (2) 2014: 49-56 - 2011
- [c1]Anshuman Biswas, Banani Saha, Saswati Guha:
Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks. ADCONS 2011: 297-305
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint