Sourav Saha
YOU?
Author Swipe
View article: Learning to localize image forgery using boundary‐preserving mask R‐ <scp>CNN</scp>
Learning to localize image forgery using boundary‐preserving mask R‐ <span>CNN</span> Open
Digital image manipulation is a growing concern in multimedia security. Many existing forgery detection methods struggle with accurately localizing manipulated regions—especially near boundaries—and often fail to generalize across differen…
View article: A comparative analysis of fetal outcomes in pre-eclampsia and eclampsia: insights from vaginal, cesarean, and forceps deliveries
A comparative analysis of fetal outcomes in pre-eclampsia and eclampsia: insights from vaginal, cesarean, and forceps deliveries Open
Background: Pre-eclampsia and eclampsia are significant complications of pregnancy, characterized by hypertension and potential multi-organ dysfunction, which pose serious risks to both maternal and fetal health. This study aimed to analyz…
View article: Transforming HR Into A Green Strategic Partner: A Case Study Of TATA Power’s Sustainable Workforce Model
Transforming HR Into A Green Strategic Partner: A Case Study Of TATA Power’s Sustainable Workforce Model Open
This case study strategically examines how Tata Power has transformed its Human Resource (HR) function into a green strategic partner to align with its long-term sustainability objectives. The research investigates how HR initiatives— part…
View article: Complications and Reasons for Failure in Labor Induction in Pre-Eclampsia & Eclampsia: A Focus on Fetal Distress and Prolonged First Stage
Complications and Reasons for Failure in Labor Induction in Pre-Eclampsia & Eclampsia: A Focus on Fetal Distress and Prolonged First Stage Open
View article: Design & Development of a Cost-Effective User-Friendly Fall Detection Device Using IOT Technology
Design & Development of a Cost-Effective User-Friendly Fall Detection Device Using IOT Technology Open
Falls are a crucial health problem mainly among the older people and the newly born babies too. In recent years, there are many systems that aimed at detecting the falls has increased adequately. This kind of device is aimed to provide for…
View article: Explainability of Text Processing and Retrieval Methods: A Survey
Explainability of Text Processing and Retrieval Methods: A Survey Open
Deep Learning and Machine Learning based models have become extremely popular in text processing and information retrieval. However, the non-linear structures present inside the networks make these models largely inscrutable. A significant…
View article: An Introduction to Kernel and Operator Learning Methods for Homogenization by Self-consistent Clustering Analysis
An Introduction to Kernel and Operator Learning Methods for Homogenization by Self-consistent Clustering Analysis Open
Recent advances in operator learning theory have improved our knowledge about learning maps between infinite dimensional spaces. However, for large-scale engineering problems such as concurrent multiscale simulation for mechanical properti…
View article: Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications Open
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assum…
View article: Bangla Image Caption Generation through CNN-Transformer based Encoder-Decoder Network
Bangla Image Caption Generation through CNN-Transformer based Encoder-Decoder Network Open
Automatic Image Captioning is the never-ending effort of creating syntactically and validating the accuracy of textual descriptions of an image in natural language with context. The encoder-decoder structure used throughout existing Bengal…
View article: An approach to GIS-based traffic information system using Spatial Oracle
An approach to GIS-based traffic information system using Spatial Oracle Open
Traffic congestion is a threat to the economical, environmental, social and sustainable development of a city. The traffic management has always been an issue of concern for urban areas of a city. Geographic information system (GIS) offers…
View article: An approach to GIS-based traffic information system using Spatial Oracle
An approach to GIS-based traffic information system using Spatial Oracle Open
Traffic congestion is a threat to the economical, environmental, social and sustainable development of a city. The traffic management has always been an issue of concern for urban areas of a city. Geographic information system (GIS) offers…
View article: A quasi-visibility graph based clique-extraction heuristic model for partitioning of planar shape
A quasi-visibility graph based clique-extraction heuristic model for partitioning of planar shape Open
This paper presents a graph theoretical model to partition polygonal approximation of a shape into visually meaningful constituent parts based on a heuristic approach. The proposed model introduces a new concept of approximated vertex-visi…
View article: A quasi-visibility graph based clique-extraction heuristic model for partitioning of planar shape
A quasi-visibility graph based clique-extraction heuristic model for partitioning of planar shape Open
This paper presents a graph theoretical model to partition polygonal approximation of a shape into visually meaningful constituent parts based on a heuristic approach. The proposed model introduces a new concept of approximated vertex-visi…
View article: Enhanced Session Initiation Protocols for Emergency Healthcare\n Applications
Enhanced Session Initiation Protocols for Emergency Healthcare\n Applications Open
In medical emergencies, an instant and secure messaging is an important\nservice to provide quality healthcare services. A session initiation protocol\n(SIP) is an IP-based multimedia and telephony communication protocol used to\nprovide i…
View article: Enhanced Session Initiation Protocols for Emergency Healthcare Applications
Enhanced Session Initiation Protocols for Emergency Healthcare Applications Open
In medical emergencies, an instant and secure messaging is an important service to provide quality healthcare services. A session initiation protocol (SIP) is an IP-based multimedia and telephony communication protocol used to provide inst…
View article: A Heuristic Strategy for Sub-Optimal ThickEdged Polygonal Approximation of 2-D Planar Shape
A Heuristic Strategy for Sub-Optimal ThickEdged Polygonal Approximation of 2-D Planar Shape Open
This paper presents a heuristic approach to approximate a two-dimensional planar shape using a thick-edged polygonal representation based on some optimal criteria.The optimal criteria primarily focus on derivation of minimal thickness for …
View article: A New Evaluation Measure for Feature Subset Selection with Genetic Algorithm
A New Evaluation Measure for Feature Subset Selection with Genetic Algorithm Open
Feature selection is one of the most important preprocessing steps for a data mining, pattern recognition or machine learning problem. Finding an optimal subset of features, among all the combinations is a NP-Complete problem. Lot of resea…