OALib Journal期刊

ISSN: 2333-9721




2017 ( 4 )

2016 ( 5 )

2015 ( 176 )

2014 ( 203 )


匹配条件: “Kumarjit Banerjee” ,找到相关结果约2172条。
Performance Analysis for Detection and Location of Human Faces in Digital Image With Different Color Spaces for Different Image Formats
Satyendra Nath Mandal,Kumarjit Banerjee
International Journal of Image, Graphics and Signal Processing , 2012,
Abstract: A human eye can detect a face in an image whether it is in a digital image or also in some video. The same thing is highly challenging for a machine. There are lots of algorithms available to detect human face. In this paper, a technique has been made to detect and locate the position of human faces in digital images. This approach has two steps. First, training the artificial neural network using Levenberg–Marquardt training algorithm and then the proposed algorithm has been used to detect and locate the position of the human faces from digital image. The proposed algorithm has been implemented for six color spaces which are RGB, YES, YUV, YCbCr, YIQ and CMY for each of the image formats bmp, jpeg, gif, tiff and png. For each color space training has been made for the image formats bmp, jpeg, gif, tiff and png. Finally, one color space and particular image format has been selected for face detection and location in digital image based on the performance and accuracy.
Deterministic and Probabilistic Approach in Primality Checking for RSA Algorithm
Kumarjit Banerjee,Satyendra Nath Mandal,Sanjoy Das
Journal of Theoretical Physics and Cryptography , 2013,
Abstract: The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American [1]. The security level of this algorithm very much depends on two large prime numbers [2]. In this paper two distinct approaches have been dealt with for primality checking. These are deterministic approach and probabilistic approach. For the deterministic approach, it has chosen modified trial division and for probabilistic approach, Miller-Rabin algorithm is considered. The different kinds of attacks on RSA and their remedy are also being discussed. This includes the chosen cipher text attacks, short private key exponent attack and frequency attack. Apart from these attacks, discussion has been made on how to choose the primes for the RSA algorithm. The time complexity has been demonstrated for the various algorithms implemented and compared with others. Finally the future modifications and expectations arising out of the current limitations have also been stated at the end.
Convergence of drainage networks to the Brownian web
Kumarjit Saha,Anish Sarkar
Mathematics , 2015,
Abstract: Fontes et. al. (2004), obtained criteria to study weak convergence to the Brownian web. Among them condition $(B_2)$ is often verified by applying FKG type positive correlation inequality, together with a bound on the distribution of the coalescence time between two paths. However, FKG is a strong property that is difficult to verify for most models. Here we propose an alternate methodology to verify condition $(B_2)$ which depends mainly on the Markovian structure and does not use any correlation inequality. We also show that this new method can be applied for three discrete drainage network models in the basin of attraction of Brownian web to verify $(B_2)$.
Random directed forest and the Brownian web
Rahul Roy,Kumarjit Saha,Anish Sarkar
Mathematics , 2013,
Abstract: Consider the $d$ dimensional lattice $\mathbb{Z}^d$ where each vertex is open or closed with probability $p$ or $1-p$ respectively. An open vertex $\mathbb{u} := (\mathbb{u}(1), \mathbb{u}(2),...,\mathbb{u}(d))$ is connected by an edge to another open vertex which has the minimum $L_1$ distance among all the open vertices with $\mathbb{x}(d)>\mathbb{u}(d)$. It is shown that this random graph is a tree almost surely for $d=2$ and 3 and it is an infinite collection of disjoint trees for $d\geq 4$. In addition for $d=2$, we show that when properly scaled, family of its paths converges in distribution to the Brownian web.
Hack's law in a drainage network model: a Brownian web approach
Rahul Roy,Kumarjit Saha,Anish Sarkar
Mathematics , 2015,
Abstract: Hack (1957), while studying the drainage system in the Shenandoah valley and the adjacent mountains of Virginia, observed a power law relation $l \sim a^{0.6}$ between the length $l$ of a stream from its source to a divide and the area $a$ of the basin that collects the precipitation contributing to the stream as tributaries. We study the tributary structure of Howard's drainage network model of headward growth and branching studied by Gangopadhyay et al. (2004). We show that the exponent of Hack's law is $2/3$ for Howard's model. Our study is based on a scaling of the process whereby the limit of the watershed area of a stream is area of a Brownian excursion process. To obtain this we define a dual of the model and show that under diffusive scaling, both the original network and its dual converge jointly to the standard Brownian web and its dual.
The Role of Magnesium in Superalloys—A Review  [PDF]
Kumkum Banerjee
Materials Sciences and Applications (MSA) , 2011, DOI: 10.4236/msa.2011.29168
Abstract: The role of magnesium (Mg) in improving the high temperature mechanical properties of the superalloys, like creep, fatigue, tensile ductility, impact toughness etc. have been vividly studied by several authors. On the other hand, very few authors have contradicted the view of any beneficial effect of Mg on the mechanical properties. This review presents a summary of the open literature related to the effect of Mg on the microstructure and mechanical properties of superalloys and from which further metallurgical research on the unexamined topics are proposed.
On the Theory of Topological Computation in the Lowest Landau Level of QHE  [PDF]
Dipti Banerjee
Journal of Quantum Information Science (JQIS) , 2011, DOI: 10.4236/jqis.2011.13017
Abstract: We have studied the formation of Hall-qubit in lowest Landau level of (LLL) Quantum Hall effect due to the Aharonov-Bhom oscillation of quasiparticles.The spin echo method plays the key role in the topological entanglement of qubits. The proper ratio of fluxes for maximally entangling qubits has also been pointed out. The generation of higher Quantum Hall state may be possible with the help of quantum teleportation.
Modeling Stress Intensity Factor of Rail Steel under Situation of Growing Fatigue Crack—A Novel Technique  [PDF]
Upamanyu Banerjee
Open Journal of Metal (OJMetal) , 2012, DOI: 10.4236/ojmetal.2012.23011
Abstract: Simulation of stress intensity factor as function of rolling contact fatigue cracks of railway tracks and the vehicle load is made with the help of COMSOL Multiphysics software. It is found that the critical stress intensity factor i.e. 41.6 MPa. m1/2 is reached at a stress level of 32 MPa and at the crack size 11.5 × 10-2 m.Noting the power law variation of acoustic emission count with increase in crack size (analogous to Paris Law), the simulation was further carried out to model the dependence of measured AE count with the stress intensity factor ahead of a growing RCF crack tip. It is demonstrated that AE measurement can be effective to trigger a control loop for avoidance of fatigue failure of railway track. In view of potential difference in the intensity of back scattered light from surface irregularities, a model is developed to find out the threshold intensity of scattered light that insures safety in the railway system against fatigue failure.
Workplace Identities of Women in the US Labor Market  [PDF]
Dina Banerjee
Sociology Mind (SM) , 2013, DOI: 10.4236/sm.2013.31004

In this paper, I examine the effects of gender and race/ethnicity on American workers’ workplace identities. Literature on gender, work, and occupation suggests that gender and race are significant predictors of workers’ workplace identities. Literature also posits that self-perceived competency and reflected appraisals from others in workplaces also contribute considerably to workers’ workplace identities. However, there exists hardly any empirical study that explores the impacts of gender, race, workers’ self-perceived competency, and their reflected appraisals altogether on their workplace identities. That is what I accomplished in this study. Deriving the data from the National Study of Changing Workforce (NSCW: 2008) I ask: 1) Do women and men workers in America differ in their perceptions of workplace identities; 2) Do non-white and white workers in America differ in their perceptions of workplace identities; and 3) Do gender and race of the workers impact their workplace identities when self-perceived competency and reflected appraisals enter the equation? Analyses are based on quantitative methods. Results show that workers’ self-perceived competency and their reflected appraisals are more significant predictors of their workplace identities than gender or race.


Audit of Epilepsy Clinics in South East Thames: Are We NICE?  [PDF]
Somnath Banerjee, Sanjay Sahi
Journal of Behavioral and Brain Science (JBBS) , 2011, DOI: 10.4236/jbbs.2011.12010
Abstract: Background: NICE has suggested that paediatric epilepsy services should undergo regular audit. An audit was done to gain a snapshot across South East Thames clinics. Method: Audit in South East Thames was conducted in 2010. Results: In 86.5% seizure classification and in 42.8% a syndromic diagnosis was made. cQT interval was calculated in 10.1% cases and 91.8% had an EEG. In 48.5% adverse effects of drugs were communicated. 41.3% were given information leaflets/directed to the appropriate website. In 70.7% developmental/academic progress was documented. 61% had a written care plan. 70.2% had the copy letter to parents/carers whereas it was sent to School & Child Health in 35.1%. 23.1% had access to specialist epilepsy nurse. Conclusions: This audit was a snapshot. The results showed that the care of children with epilepsy is consistent with the NICE guidelines in many aspects but patchy in the UK.

Copyright © 2008-2017 Open Access Library. All rights reserved.