Machine learning for soil fertility and plant nutrient management using back propagation neural networks S Koley Shivnath Ghosh, Santanu Koley (2014)“Machine Learning for Soil Fertility and …, 2014 | 81 | 2014 |
Cloud computing: a multi-workflow scheduling algorithm with dynamic reusability M Adhikari, S Koley Arabian Journal for Science and Engineering 43, 645-660, 2018 | 27 | 2018 |
A Novel Approach of Secret Message Passing Through Text Steganography S Koley, KK Mandal IEEE, 2016 | 15 | 2016 |
Present scenario of cybercrime in India and its preventions S Kumar, S Koley, U Kuamr IJSER 6 (4), 1972-1976, 2015 | 13 | 2015 |
A mathematical model for secret message passing using Steganography KK Mandal, S Koley, S Dhar 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 12 | 2016 |
Cloud Computing with CDroid OS based on Fujitsu Server for Mobile Technology S Koley, S Ghosh Bilingual International Conference on Information Technology: Yesterday …, 2015 | 8 | 2015 |
Number system oriented text steganography in various language for short messages S Koley, KK Mandal Computational Intelligence, Communications, and Business Analytics: First …, 2017 | 6 | 2017 |
CDroid in Fujitsu server for mobile cloud S Koley, S Ghosh Data Analytics and Business Intelligence: Emerging Paradigms 80, 2014 | 6 | 2014 |
Cdroid: Used In Fujitsu Server For Mobile Cloud S Koley, N Singh http://aarf.asia/gejer2.php?p=Volume2,Issue7,September2014 2 (7), 2321-1717, 2014 | 6 | 2014 |
A review on forensic science and criminal investigation through a deep learning framework PP Acharjya, S Koley, S Barman Aiding Forensic Investigation Through Deep Learning and Machine Learning …, 2022 | 4 | 2022 |
Cloud computing: a new era of saving precious lives in the developing world S Koley, R Agarwal, R Jain Skit Research Journal 5 (1), 2015 | 4 | 2015 |
A Life Saving Cloud Computing Architecture for Mobility of Sufferings S Koley, S Ghosh 9th INDIACom, 5.239-5.244, 2015 | 4 | 2015 |
A smart emergency exit system based on IoT for fire perils PP Acharjya, S Koley, S Chattopadhyay Proceedings of International Conference on Advanced Computing Applications …, 2022 | 3 | 2022 |
6. Big data security issues with challenges and solutions S Koley Big Data Security 3, 95-142, 2019 | 3 | 2019 |
Number system oriented text steganography in English language for short messages: A decimal approach KK Mandal, S Koley, S Mondal Intelligent Computing and Information and Communication: Proceedings of 2nd …, 2018 | 3 | 2018 |
Big data architecture with mobile cloud in CDroid operating system for storing huge data S Koley, S Nandy, P Dutta, S Dhar, T Sur 2016 International Conference on Computing, Analytics and Security Trends …, 2016 | 3 | 2016 |
Ambient energy harvesting from colored multiplicative noise S Mondal, S Koley Energy Reports 8, 129-133, 2022 | 2 | 2022 |
A Study of CPU Scheduling Techniques in Comparison PP Acharjya, S Koley, S Barman, R Mukherjee Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11 (2), 896-905, 2020 | 2 | 2020 |
Review on Data Analysis of Cryptocurrency P Keshari, S Koley, KK Mandal, PK Singh Proceedings of 2nd International Conference on Advanced Computing and …, 2019 | 2 | 2019 |
Applications of artificial intelligence and machine learning‐enabled businesses: A SWOT analysis for human society S Koley, S Sengupta, B Biswas, K Datta, M Jana, A Mitra Artificial Intelligence‐Enabled Businesses: How to Develop Strategies for …, 2025 | 1 | 2025 |