An algorithm for generating only desired permutations for solving Sudoku puzzle AK Maji, S Jana, RK Pal Procedia Technology 10, 392-399, 2013 | 26 | 2013 |
A novel Sudoku solving technique using column based permutation S Jana, AK Maji, RK Pal 2015 International Symposium on Advanced Computing and Communication (ISACC …, 2015 | 16 | 2015 |
An exhaustive study on different sudoku solving techniques AK Maji, S Jana, S Roy, RK Pal International Journal of Computer Science Issues (IJCSI) 11 (2), 247, 2014 | 16 | 2014 |
A novel hybrid genetic algorithm-based firefly mating algorithm for solving sudoku S Jana, A Dey, AK Maji, RK Pal Innovations in Systems and Software Engineering 17 (3), 261-275, 2021 | 12 | 2021 |
A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding S Jana, AK Maji, RK Pal Innovations in Systems and Software Engineering 15, 65-73, 2019 | 10 | 2019 |
Generating a suitable hash function using sudoku for blockchain network S Jana, ES Sharma, A Khan, AK Maji, RK Pal International Conference on Frontiers in Computing and Systems, 161-171, 2022 | 7 | 2022 |
A Novel Time-Stamp-Based Audio Encryption Scheme Using Sudoku Puzzle. RKP S. Jana, N. Dutta, A. K. Maji Lecture Notes in Networks and Systems 404, 159-169, 2022 | 7* | 2022 |
A Novel Image Steganographic Scheme Using Sudoku Puzzle D Dey, A Bandyopadhyay, S Jana, AK Maji, RK Pal Advanced Computing and Systems for Security: Volume Three, 85-100, 2017 | 6 | 2017 |
A novel search tree-based 3d sudoku solver S Jana, M Mallik, AK Maji, RK Pal Proceedings of the International Conference on Computing and Communication …, 2021 | 5 | 2021 |
A comprehensive sudoku instance generator AK Maji, S Jana, RK Pal Advanced Computing and Systems for Security: Volume 2, 215-233, 2016 | 4 | 2016 |
A robust video steganographic scheme using sudoku puzzle for secured data hiding S Jana, AK Maji, RK Pal Social Transformation–Digital Way: 52nd Annual Convention of the Computer …, 2018 | 3 | 2018 |
Solving Sudoku Using Neighbourhood-Based Mutation Approach of Genetic Algorithm S Jana, A Dey, AK Maji, RK Pal Advanced Computing and Systems for Security: Volume 13, 153-167, 2022 | 2 | 2022 |
Improving security of SPN-type block cipher against fault attack G Maity, S Jana, M Mantri, J Bhaumik International Conference on Communication, Devices and Computing, 115-126, 2017 | 1 | 2017 |
Yet Another Move Towards Securing Video Using Sudoku in Fernet RKP S Jana, M Sen, A Khan, A K Maji NEXT-GENERATION SYSTEM AND SECURE COMPUTING, WILEY-SCRIVENER, 2024 | | 2024 |
Analyzing the Effectiveness of Different Machine Learning Approaches towards Solving Sudoku Puzzle RKP S. Jana, M. Sen, A. Khan, A. K. Maji 2nd International Conference on Data, Electronics and Computing(ICDEC 2023), 2023 | | 2023 |
A METHOD FOR EFFICIENT OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS THROUGH GENETIC ALGORITHM AP S. Barman, S. Koley, P. P.Acharjya, J. Samanta, Dr. M. Sen, S. Jana, R.K ... IN Patent 42/2,023, 2023 | | 2023 |
A Novel Video Encryption Scheme Using Giant Sudoku for Secured Data Transmission S Jana, M Sen, A Khan, AK Maji, RK Pal International Symposium on Applied Computing for Software and Smart Systems …, 2023 | | 2023 |
Generating a Suitable Hash Function Using Sudoku for Blockchain Network Check for updates S Jana, ES Sharma, A Khan, AK Maji, RK Pal Proceedings of International Conference on Frontiers in Computing and …, 2023 | | 2023 |
Design and Analysis of a Modified 3D Sudoku Solver S Jana, M Mallik, A Khan, AK Maji, RK and Pal IEEE Access, ISSN: 2169-3536 Online ISSN: 2169-3536 11, pp. 27352-27368, 2023 | | 2023 |
AI-Based DBMS Controlled Speech Recognition Model for Some Common Computing Commands M Sen, S Jana, S Bhattacharya, G Maity Novel Research and Development Approaches in Heterogeneous Systems and …, 2023 | | 2023 |