Alert button
Picture for Satyabrata Maity

Satyabrata Maity

Alert button

Fault Matters: Sensor Data Fusion for Detection of Faults using Dempster-Shafer Theory of Evidence in IoT-Based Applications

Add code
Bookmark button
Alert button
Jun 24, 2019
Nimisha Ghosh, Rourab Paul, Satyabrata Maity, Krishanu Maity, Sayantan Saha

Figure 1 for Fault Matters: Sensor Data Fusion for Detection of Faults using Dempster-Shafer Theory of Evidence in IoT-Based Applications
Figure 2 for Fault Matters: Sensor Data Fusion for Detection of Faults using Dempster-Shafer Theory of Evidence in IoT-Based Applications
Figure 3 for Fault Matters: Sensor Data Fusion for Detection of Faults using Dempster-Shafer Theory of Evidence in IoT-Based Applications
Figure 4 for Fault Matters: Sensor Data Fusion for Detection of Faults using Dempster-Shafer Theory of Evidence in IoT-Based Applications
Viaarxiv icon

A Novel Approach for Human Action Recognition from Silhouette Images

Add code
Bookmark button
Alert button
Oct 15, 2015
Satyabrata Maity, Debotosh Bhattacharjee, Amlan Chakrabarti

Figure 1 for A Novel Approach for Human Action Recognition from Silhouette Images
Figure 2 for A Novel Approach for Human Action Recognition from Silhouette Images
Figure 3 for A Novel Approach for Human Action Recognition from Silhouette Images
Figure 4 for A Novel Approach for Human Action Recognition from Silhouette Images
Viaarxiv icon

A brief experience on journey through hardware developments for image processing and its applications on Cryptography

Add code
Bookmark button
Alert button
Dec 27, 2012
Sangeet Saha, Chandrajit pal, Rourab paul, Satyabrata Maity, Suman Sau

Figure 1 for A brief experience on journey through hardware developments for image processing and its applications on Cryptography
Figure 2 for A brief experience on journey through hardware developments for image processing and its applications on Cryptography
Figure 3 for A brief experience on journey through hardware developments for image processing and its applications on Cryptography
Figure 4 for A brief experience on journey through hardware developments for image processing and its applications on Cryptography
Viaarxiv icon