Dr. Indrajit Bhattacharya
Dr. Indrajit Bhattacharya
Kalyani Government Engineering College
Verified email at
Cited by
Cited by
Offline signature verification using pixel matching technique
I Bhattacharya, P Ghosh, S Biswas
Procedia Technology 10, 970-977, 2013
Optimal placement of readers in an RFID network using particle swarm optimization
I Bhattacharya, UK Roy
International Journal of Computer Networks & Communications 2 (6), 225-234, 2010
Analysis and Early Detection of Rumors in a Post Disaster Scenario
T Mondal, P Pramanik, I Bhattacharya, N Boral, S Ghosh
Information Systems Frontiers, 1-19, 2018
DirMove: direction of movement based routing in DTN architecture for post-disaster scenario
AK Gupta, I Bhattacharya, PS Banerjee, JK Mandal, A Mukherjee
Wireless Networks 22, 723-740, 2016
A study on data aggregation techniques in wireless sensor network in static and dynamic scenarios
K Sarangi, I Bhattacharya
Innovations in systems and software engineering 15, 3-16, 2019
A co-operative approach to thwart selfish and black-hole attacks in DTN for post disaster scenario
AK Gupta, I Bhattacharya, PS Banerjee, JK Mandal
2014 Fourth International Conference of Emerging Applications of Information …, 2014
TrackMe-a low power location tracking system using smart phone sensors
S Saha, S Chatterjee, AK Gupta, I Bhattacharya, T Mondal
2015 International Conference on Computing and Network Communications …, 2015
On design and implementation of a scalable and reliable Sync system for delay tolerant challenged networks
PS Paul, BC Ghosh, K De, S Saha, S Nandi, S Saha, I Bhattacharya, ...
2016 8th International Conference on Communication Systems and Networks …, 2016
Advances in intelligent computing
JK Mandal, P Dutta, S Mukhopadhyay
Springer, 2019
A multi-criteria evaluation approach in navigation technique for micro-jet for damage & need assessment in disaster response scenarios
T Mondal, I Bhattacharya, P Pramanik, N Boral, J Roy, S Saha, S Saha
Knowledge-Based Systems 162, 220-237, 2018
Parameter selection and performance study in particle swarm optimization
I Bhattacharya, S Samanta
AIP Conference Proceedings 1298 (1), 564-570, 2010
Distribution of deficient resources in disaster response situation using particle swarm optimization
T Mondal, N Boral, I Bhattacharya, J Das, P Pramanik
International Journal of Disaster Risk Reduction 41, 101308, 2019
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way
AK Gupta, JK Mandal, I Bhattacharya
International Journal of Information and Computer Security 9 (1-2), 130-155, 2017
Smart navigation and dynamic path planning of a micro-jet in a post disaster scenario
T Mondal, J Roy, I Bhattacharya, S Chakraborty, A Saha, S Saha
Proceedings of the Second ACM SIGSPATIALInternational Workshop on the Use of …, 2016
Embedding an extra layer of data compression scheme for efficient management of big-data
S Pal, I Das, S Majumder, AK Gupta, I Bhattacharya
Information Systems Design and Intelligent Applications: Proceedings of …, 2015
RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network
I Bhattcharya, P Sarkar, P Basu
International Journal of Information Technology and Computer Science (IJITCS …, 2014
Energy-aware cluster based node scheduling algorithm in wireless sensor network for preserving maximum network life time
S Dasgupta, I Bhattacharya, G Bose
2009 Proceeding of International Conference on Methods and Models in …, 2009
Contemporary Advances in Innovative and Applicable Information Technology
JK Mandal, D Sinha, JP Bandopadhyay
Springer Singapore, 2019
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario
AK Gupta, JK Mandal, I Bhattacharya, T Mondal, SS Shaw
Peer-to-Peer Networking and Applications 11, 162-180, 2018
Towards development of FOPL based tweet summarization technique in a post disaster scenario: From survey to solution
T Mondal, P Pramanik, I Bhattacharya, A Saha, N Boral
2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017
The system can't perform the operation now. Try again later.
Articles 1–20