Abhijit Pathak

Abhijit Pathak
BGC Trust University Bangladesh · Department of Computer Science and Engineering

M.Sc. (CSE), B.Sc. (CSE), MBA (Finance)
Assistant Professor, Department of Computer Science and Engineering, BGC Trust University Bangladesh (BGCTUB)

About

30
Publications
90,469
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
267
Citations
Citations since 2017
29 Research Items
267 Citations
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
Introduction
Abhijit Pathak works as the position of a Assistant Professor in the Department of Computer Science and Engineering, BGC Trust University Bangladesh. His present research focuses on ‘IoT’ and ‘Robotics’. He is particularly interested in Artificial Intelligence, Human-computer Interaction, Data Mining, Software Quality Assurance. At present, He is working as a Faculty Sponsor at BGCTUB ACM (Association for Computing Machinery) Student Chapter.
Additional affiliations
October 2010 - present
BGC Trust University Bangladesh
Position
  • Lecturer
April 2008 - March 2010
Premier University
Position
  • Lecturer
Education
September 2018 - October 2019
Port City International University
Field of study
  • Computer Science and Engineering
April 2003 - April 2007
Premier University
Field of study
  • Computer Science and Engineering

Publications

Publications (30)
Article
Full-text available
A fire has been one of the key problems that have not yet been resolved despite technological progress. The most critical thing related to fires was human casualties. As stopping the fire from happening might not be feasible, it would be better to reduce its effects in terms of human casualties. A smart semi-autonomous fire extinguish quadcopter ca...
Chapter
Full-text available
In the past decade, the rapid growth of digital data and global accessibility through the modern internet has seen a massive rise in machine learning research. In proportion to it, the medical data has also seen a massive surge of expansion. With the availability of structured clinical data, researchers have attracted scores to study clinical disea...
Conference Paper
Full-text available
Systems, known as apps, enabling them to find parking space during peak time in a city. Therefore, this research presents the development of such an app, which can be embedded with smartphones. Eventually, this will enable the drivers to check the availability of parking space in real-time. Consequently, the drivers will be able to park their vehic...
Chapter
Full-text available
Communication networks are used to transfer valuable and confidential information for a variety of purposes. As a result, they attract the attention of those who intend to steal or misuse information or disrupt or destroy storage or communication systems. In this paper, the authors try to explore some of the major issues related to achieving a reas...
Article
Full-text available
Nowadays, the online platform has been used by many educational institutions, to conduct tests, especially for secondary to tertiary level students. The most popular online test program is run by providing a user id and password to the candidates, and subsequently, they log in to the given web page to answer the questions. However, this system has...
Conference Paper
Communication networks are used to transfer valuable and confidential information for a variety of purposes. As a result, they attract the attention of those who intend to steal or misuse information or disrupt or destroy storage or communicating systems. In this paper, the authors try to explore some of the major issues related to achieving a...
Conference Paper
Although practical classes have become a reality through the advancement of communication and other technologies, traditional assessment methods are still very effective when it comes to testing. We can use the opportunity of online technology to experiment so that students can enjoy anytime anywhere conveniently and improve their education. While...
Conference Paper
Full-text available
Health-related problems are increasing day by day and people must spend a lot of money for their daily checkups as there is no easy and free access to their checkups. Android-based apps are intended to provide easy access and use to give users free access. Health care is one of the most important issues in modern times. As a result of the Covid-19...
Preprint
Full-text available
Crime is the most significant and dominant problem in our society, and its prevention is an important task. A large number of crimes are being committed daily. This requires tracking all crimes and maintaining a database that can be used for future reference. Analyzing this data is the current problem we face to maintain a proper dataset of crime a...
Chapter
Full-text available
Crime is the most significant and dominant problem in our society, and its prevention is an important task. A large number of crimes are being committed daily. This requires tracking all crimes and maintaining a database that can be used for future reference. Analyzing this data is the current problem we face to maintain a proper dataset of crime a...
Technical Report
Full-text available
ABHIJIT PATHAK has successfully completed "The Bits and Bytes of Computer Networking" an online non-credit course authorized by Google and offered through Coursera.
Technical Report
Full-text available
Abhijit Pathak has successfully completed "IoT (Internet of Things) Wireless & Cloud Computing Emerging Technologies" an online non-credit course authorized by Yonsei University and offered through Coursera.
Technical Report
Full-text available
Abhijit Pathak has successfully completed "Introduction and Programming with IoT Boards" an online non-credit course authorized by Pohang University of Science and Technology and offered through Coursera.
Article
Full-text available
Line follower is a smart autonomous robot that detects or follows a visible line embedded in the ground. The trail is predetermined and can be selected with a high contrast color or with a black line visible on the trail surface. Infrared sensors are used to detect these lines. Typically speaking, the area unit of the infrared sensors is used to lo...
Article
Full-text available
In the field of technical research the Internet of Things (IoT) has become an interesting topic. The device is interconnected over the internet. We usually think of IoT in terms of independently owned cars and smart homes, but in extreme practical matters one of the best applications of IoT technology. In many disciplines, IoT is increasing rapidly...
Article
Full-text available
Obstacle avoidance is an important task in robotics as the autonomous robot's aim is to reach the destination without collision. One type of autonomous robot that can detect obstacles and edges and take alternative paths free of obstacles and edges is a real-time obstacle avoiding edge detection robot. This paper proposes a robotic Robot with an in...
Article
Full-text available
This paper is about preserving the Karnaphuli River ecosystem by controlling the quality of the water. We know an ecosystem is a mechanism that includes interactions between a populations of living and non-living species. The environment comprises producers, primary customers, secondary consumers, thirdparty consumers and separators. This is a cycl...
Article
Full-text available
In much discipline, particularly in personalized healthcare, IoT is gaining rapidly increased interest. While, for example, body area sensor network (BASN) has been widely applied under the IoT system for universal health monitoring. ECG testing was widely accepted as a critical method for diagnosing cardiovascular diseases. This paper's main contr...
Article
Full-text available
Visually impaired people find it difficult to identify objects in front of them while walking down the street, which makes it risky. The smart stick comes as a way to define the world around them.In this paper, we propose a solution, presented in a smart stick with an infrared sensor to detect staircases and a pair of ultrasonic sensors in order to...
Preprint
Full-text available
Cyberspace is a great media for exchanging information and data in the arena of E-banking. Banks are under pressure for the establishment of digitalization in its day by day operations to satisfy the clients' need. But the abuse of information technology has become a menace in the banking sector of Bangladesh. Concealing of original source and usin...
Article
Full-text available
Cyberspace is a great media for exchanging information and data in the arena of E-banking. Banks are under pressure for the establishment of digitalization in its day by day operations to satisfy the clients' need. But the abuse of information technology has become a menace in the banking sector of Bangladesh. Concealing of original source and usin...
Article
Full-text available
Now-a-days, the natural irrigation system is under pressure due to the growing water shortages, which are mainly caused by population growth and climate change. Therefore, the control of water resources to increase the allocation of retained water is very important. It has been observed in the last two decades, especially in the Indian sub-continen...
Article
Full-text available
Current water quality monitoring system is a manual system with a monotonous process and is very time-consuming. This paper proposes a sensor-based water quality monitoring system. The system consists of several sensors which is used to measure physical and chemical parameters of the water. The main components of Wireless Sensor Network (WSN) inclu...
Article
Full-text available
Now-a-days, the natural irrigation system is under pressure due to the growing water shortages, which are mainly caused by population growth and climate change. Therefore, the control of water resources to increase the allocation of retained water is very important. It has been observed in the last two decades, especially in the Indian sub-continen...
Article
Full-text available
Line follower robot is one kind of autonomous robot which follows a line until that line exists. Generally, the line is drawn on the floor. It can be either black or white. The line can also be normal visible color or invisible magnetic field or electric field. The robot follows the line by using Infra-Red Ray (IR) sensors. There are five IR sensor...
Article
Full-text available
Developing a new agent in the analgesic field, plants secondary metabolites can be a good source for the Non-Steroidal Anti-inflammatory Drugs (NSAID) drug development. For this purpose we subjected the active compounds Clausena lansium of to reveal its potentiality by molecular docking analysis to find out its potent compound against COX-1 and COX...
Article
Full-text available
Background: To investigation antidiabetic activity of the isolated compounds of Ocimum sanctum against two responsible proteins α-amylase enzyme and Glucokinase. Methodology: For this purpose we subjected the active compounds of Ocimum sanctum of to reveal its potentiality by molecular docking analysis to find out its potent compound against Diabet...
Article
In this paper, the author proposes an optimal management for system on chip (SoC) memory by using the reserved memory components and solving the covering fault problem. This method will enable to realize many services, such as SoC diagnosis with given resolution of fault location, real-time functional testing of input patterns and analysis of outpu...
Article
Full-text available
Multi-criteria analysis (MCA) provides a more reasonable and scientific way in optimum area selection issue. The paper aimed to select the best area in Chittagong city, Bangladesh. A decision is the result of a comparison of one or more alternatives with respect to one or more criteria that we considered relevant for the task at hand. Multi-criteri...

Questions

Questions (36)
Question
Final qualification for major programs is a solid process that includes a variety of categories - oral and written tests, final viva project, internal and external reviews.
How are ICT tools used to translate real-life degree practice into an online qualification process in an integrated format? Mainly due to COVID-19 separation measures?
Question
The contribution to the IT sector is unclear. Maybe you need to focus the discussion on the tools / programs used for Integrated Reading. , Findings need to be linked to mixed learning and IT resources. Thank you
Question
I am thinking on ANN to detect it. At the same time image processing is must to trace fake currency. But is it enough to detect a fake currency 100%?
Question
The security of devices and the data they acquire, process, and transmit is often cited as a top concern in cyberspace. Cyberattacks can result in theft of data and sometimes even physical destruction. How Cybersecurity might affect the Development and Implementation of the Internet of Things (IoT), especially in Bangladesh?
Question
IoT is continuously changing the way we live, work and entertain. Because of IoT, immense opportunities and possibilities are being created for businesses to innovate in services and products. What are the skills or expertise that someone must learn or have to be successful in the IoT field?
Question
I need an account of grammarly premium account. Please help me to provide an account. Thanks.
Question
For time-critical applications, which Machine Learning-based scheduling algorithm is appropriate?
Question
I think tweeter is a better place to spend on your time than any other social media platform. There is no racial microaggression and shit posting in the name of memes in tweeter, unlike Facebook, TikTok, etc. Just facts, thoughts, and ideas and you will find humor writing more often for fun. Day in, day out constantly watching funny videos, images, and all of simp type people and their stupid acts have turned it as mental illness of ours. Now it seems that people deliberately want to look themselves fool to gain public attention. As reverse psychology, they are making ourselves fools by showing their videos and making cache out of it. So their marketing policy works and we are the real knob head end of the day. Aren't we??
Question
Can simulation/case study can be used to check Blockchain's appropriateness for IoT security?

Network

Cited By