
Debajyoti MukhopadhyayBennett University · School of Engineering & Applied Sciences
Debajyoti Mukhopadhyay
PhD(Computer Engineering)
Currently working in Software Defined Networking, and various aspects of Blockchain Technology.
About
251
Publications
150,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,492
Citations
Introduction
Dr. Debajyoti Mukhopadhyay has been the Founder Director of WIDiCoReL Research Lab since 2002. Currently he is the Dean at Bennett University. He was Director & Dean (R&D) at Mumbai University. He was Dean and Distinguished Professor at Adamas University. He was Dean (R&D) at MIT Pune University. He worked at Bell Communications Research, USA. He has guided 5 Ph.D. scholars in Computer area. He has authored over 225 publications, 1 Book, 40 Book Chapters and 3 patents till date.
Additional affiliations
June 2020 - November 2021
Bennett University
Position
- Dean
Description
- As the Dean of School of Engineering at Bennett University at Delhi-NCR region, heading all the activities of Various Departments in teaching, research, and administrations.
May 2018 - January 2020
August 2017 - March 2018
ADAMAS University
Position
- Head of Faculty
Education
December 1994
May 1984
October 1979
Publications
Publications (251)
We envision that Artificial Intelligence (AI) will be able to behave like and subsequently will supersede the human intelligence. AI does get biased, and it is not unlikely that such bias could result in unwarranted and/or uncontrollable decisions, which so far has been observed in living beings, especially in humans. Some scientists and philosophe...
Software-Defined Networking (SDN) is a programmable network architecture that allows network devices to be controlled remotely, but it is still highly susceptible to traditional attacks such as Address Resolution Protocol (ARP) Poisoning, ARP Flooding, and others. The classification of benign network traffic from ARP Poison and ARP Flooding attacks...
With the advancement of communication technology, Telecare Medicine Information Systems (TMIS) provides convenient healthcare services for patients, doctors, and health organizations over the insecure Internet. As a result, when accessing sensitive medical data over an insecure connection, user privacy, data security, and user authentication is ver...
This paper proposes a framework for a full fledged negotiation system that allows multi party multi issue negotiation. It focuses on the negotiation protocol to be observed and provides a platform for concurrent and independent negotiation on individual issues using the concept of multi threading. It depicts the architecture of an agent detailing i...
The recent outbreak of coronavirus has impacted the whole world. The infectious respiratory disease has killed millions of people all over the world. The process of detecting the disease through RT-PCR and other tests is very time-consuming, and testing kits are not widely available. Chest x-rays and chest CT scans are also very effective technique...
Software-Defined Networking (SDN) is a networking paradigm that has redefined the term network by making the network devices programmable. SDN helps network engineers to monitor the network expeditely, control the network from a central point, identify malicious traffic and link failure in easy and efficient manner. Besides such flexibility provide...
The COVID-19 pandemic has rendered social distancing and use of face masks as an absolute necessity today. Coming out of the epidemic, we're going to see this as the new normal and therefore most workplaces will require an identification system to permit employees based on the compliance of protocols. To ensure minimal contact and security, automat...
Nowadays, Question Answering (QA) systems are used as an automated assistant system for resolving queries in various messaging applications. Accessing a database to get specific information can be stressful and time-consuming if one does not have the much needed technical skills. Designing a QA system/chatbot that can generate the result by accessi...
COVID-19 disease is an infectious disease caused by the Corona viruses. It is transmitted due to human-human interaction in human population. In the proposed work, we propose and study an epidemic model of COVID-19 disease by considering hospital facility to prevent the disease spreading. The aim of the study is to observe the effects of better hos...
Borders play an integral part in a country's security, but Borders are extremely vulnerable and prone to terrorist assaults, illegal smuggling of drugs, and unauthorized immigration. To achieve improved situation analysis, it is essential to fuse sensor-based detection with drone surveillance system to aid the present surveillance system. A wide ra...
Today's world is connected through the digital platforms Independent of Geographical location and to serve the needs of the administration process involved in educational we need the platform that help to work through network in a secured and transparent manner and due to the Blockchain core behaviors like transparent, confidentiality , Immutable,...
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new networking architecture. Paper aim to classify the traffic into normal and malicious classes based on features given in dataset by using v...
With the advent of evolution of cloud computing, large organizations have been scaling the on-premise IT infrastructure to the cloud. Although this being a popular practice, it lacks comprehensive efforts to study the aspects of automated negotiation of resources among cloud customers and providers. This paper proposes a full-fledged framework for...
Quantum computers use the superposition of quantum bits or qubit’s in
the two quantum states, which are |0> and |1> and work faster than classical computers.
The qubits in the quantum computer are the basic unit of quantum information and replacement of the traditional bits 0 and 1 of classical computing. The n qubits can be simultaneously represen...
The Blockchain or chain of blocks is a database whose records are stored equally in distributed nodes that make up a network, without central nodes that control others or have different information. This distributed scheme is one of its main advantages over other storage networks: it is practically impossible to hack because it is not enough to att...
The acceleration of different social media platforms has alternated the way people communicate with each other it has also ensued in the rise of Cyberbullying cases on social media that has various adverse effects on an individual’s health. In this project, we aim to build a system that tackles Cyber bully by identifying the mean-spirited comments...
In various service-based industries such as telecom industry, life insurance, hospitality, banking, and gaming, Churn Prediction plays an important role. Companies are trying to establish means for predicting potential clients to turnover in the telecom sector. Therefore, it is crucial to identify the factors that rising the churn of customers and...
With the advent of evolution of cloud computing, large organizations have been scaling the on-premise IT infrastructure to the cloud. Although this being a popular practice, it lacks comprehensive efforts to study the aspects of automated negotiation of resources among cloud customers and providers. This paper proposes a full-fledged framework for...
Churn Prediction plays an important role in various service-based
industries like telecom industry, life insurance, hospitality, banking and gaming.
In the telecom field, companies are seeking to develop means to predict
potential customers to churn. Therefore, finding the factors that increase
customer churn is important to take necessary actions...
The acceleration of different social media platforms has alternated
the way people communicate with each other it has also ensued in rise of Cyber bullying cases on social media that has various adverse effect on an individuals health. In this project, we aim to build a system that tackles Cyber bully by identifying the mean-spirited comments and a...
Fleximove is an android application that is designed to be deployed to provide functionality to every type of user. This is an application designed to get interaction between different clients and Packing and Moving Companies. Fleximove is an online platform for service seekers and service providers. We will list excellent packing moving service pr...
We all negotiate, formally or informally, in jobs, in day today lives and outcomes of negotiations affect those processes of life. Although negotiation is an intrinsic nature of human psyche, it is very complex phenomenon to implement using computing and internet for the various purposes in E Commerce. Automation of negotiation process poses unique...
This era is thought to be the most secure, with everyone leaning towards security as compared to ease of interoperability. But, with the rise of gadgets, there is a rise in threats. Most of the threats lie in the insecure communication channel that is the Internet. The wireless networks have become the bull's eye for many attackers, since it is ver...
Unchecked Fires can cause massive disasters leading to loss of human and animal life, property, forests, and other areas of vegetation and causing serious environmental damage. Moreover, fire has a tendency to spread rapidly over a small duration of time. Hence early detection is a very crucial factor when handling fire disasters. Recent studies ha...
Negotiation is an iterative process where opponent and proponent exchange offers and counter offers with each other, with each iteration opponent can be modelled in more efficient way and an appropriate strategy can be selected for a particular opponent, i.e., by treating strategy as a dynamic component. This research focuses on web-service-based a...
Economy of India highly depends on agriculture. Still traditional ways of recommendations are used for agriculture. Currently, agriculture is done based on various approximations of fertilizers quantity and the type of crop to be grown or planted. Agriculture highly depends on the nature of soil and climate. Therefore, it becomes important to make...
The teaching and learning ecosystem is undergoing a massive transformation, hence it is increasingly becoming challenging for the faculty to effectively interact and teach students. With rapid changes, evolution, and augmentation in technology, the undergraduate courses are predominantly diversified with emphasis on specialization. As a matter of f...
This paper proposes a new approach for controlling mouse movement using a real-time camera. Most of the existing approaches involve changing mouse parts such as adding more buttons or changing the position of the tracking ball. Instead, it proposes to change the hardware design. The method uses a camera and computer vision technology, such as image...
World Wide Web (WWW) has brought revolution to millions of people who wish to access the huge information stored in WWW irrespective of the country they belong to. It may not be always possible to know the exact Uniform Resource Locator (URL) for information retrieval.
Search Engines follow a set of rules, known as an algorithm, to rank Web-pages. Exactly how a particular Search Engine’s algorithm works is a trade secret. However, all major Search Engines follow the general rules.
Domain-specific crawler creates a domain-specific Web-page repository by collecting domain-specific resources from the Internet [1, 2, 3, 4]. Domain-specific Web search engine basically searches domain-specific Web-pages from the domain-specific Web-page repository.
In Chapter “ Domain-Specific Web-Page Prediction”, we have given a detailed design of Web-page prediction using Boolean bit mask. In this chapter we are going to present a mechanism of lucky searching, which saves Web searcher search time.
In the previous two chapters, we have discussed the domain-specific Web crawler and improvement of efficiency by changing the structure of Web search engine resources.
A Cellular Automata (CA) is an autonomous machine which evolves in discrete space and time. Study of the homogeneous structure of CA was initiated by Neumann (The theory of self-reproducing automata. University of Illinois Press, Urbana and London, 1966, [1]) to simulate physical systems. In last few decades, a large number of authors from diverse...
In recent years, globalization has become one of the most basic and popular human trends. To globalize information, people always publish their documents in the Internet. As a result, the volume of information in Internet becomes huge and it is still growing at an alarming rate. To handle such huge volume of information, Web-searcher uses search en...
In Chapter “ Domain Specific Crawler Design” we have discussed in detail various types of domain specific Web crawler. Web crawler crawls the Web-pages from World Wide Web (WWW) and store them in a repository. Domain specific Web crawlers crawl only domain specific Web-pages [1–4]. A domain specific Web search engine is produced search results by c...
Searching the Web has become a natural process of our day-to-day life. Even a non-technical person with very little technical knowledge searches the Web by virtue of owning a cell phone handset with Internet connectivity. Mining the data follows as a part of the necessity to pick the best-suited data. However, this book entitled Web Searching and M...
An overview of Web search engine and domain-specific Web search engine is presented in this chapter. Some recent issues in these areas and the methodology employed are also discussed. 1 Why Web Search Engine? In recent years, globalization has become one of the most basic and popular human trends. To globalize information, people always publish the...
The researchers in artificial life inherit the tradition and epistemology of simulation.
Weather based decision support for managing pests and diseases of crops requires use of information technology. This paper details a system developed using ontology, semantic web rule language and image processing techniques for management of pests and diseases on wines, particularly in hot tropical region of India. It aims at minimising use of pes...
Negotiation is an iterative process where opponent and proponent exchange offers and counter offers with each other, with each iteration opponent can be modelled in more efficient way and an appropriate strategy can be selected for a particular opponent, i.e., by treating strategy as a dynamic component. This research focuses on web-service-based a...
As the amount of urban vehicle grows rapidly, vehicle theft has become a shared concern for all citizens. Security and safety have always become a necessity for urban population. However, present anti-theft systems lack the tracking and monitoring function. Internet of things(IOT) has been governing the electronics era with cloud services dominatin...
Searching the Web has become a natural process of our day-to-day life. Even a non-technical person with very little technical knowledge searches the Web by virtue of owning a cell phone handset with Internet connectivity. Mining the data follows as a part of the necessity to pick the best-suited data. However, this book entitled Web Searching and M...
Weather forecasting is a significant function in meteorology and has been one of the most systematically challenging troubles around the world.This scheme deals with the structure of a weather display method using small cost components so that any electronics hobbyist can construct it. As a replacement for using sensors to collect the weather data,...
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via ro...
Weather based decision support for managing pests and diseases of crops requires use of information technology. This paper details a system developed using ontology, semantic web rule language and image processing techniques for management of pests and diseases on wines, particularly in hot tropical region of India. It aims at minimising use of pes...
Inventory management and supply chain are areas which have strong potential to benefit from Radio Frequency Identification technology. In the premises of a wholesale market, location tracking of a product itself becomes challenging for the buyers. The implemented application will help the buyer to locate required product and find the shortest path...
Milk distribution and safety is of high concern as it involves the health of 90% of our society. Our project, milk distribution monitoring system targets the cold chain maintenance and milk spoilage avoidance. The system is based on Internet of Things and data mining. Traditionally milk is supplied in cans with minimum monitoring which may result i...
We proposed a system to provide a recommendation system which will generate the user interested colleges list. This will be done by asking few questions related to the college like-college infrastructure, campus life, placement, sports and cultural activities. Information seeker will give ratings to the questions according to his interest rate. The...
there are various challenges in healthcare sector one of them is medication Error. Impact of this medication error reflects on the patient's health and quality of care. This paper is going to present a clinical decision support system based on Evidence based treatment to reduce the medication errors during writing prescription. System is built on H...
With the growth in IT infrastructure and advances in technologies, workflow scheduling poses many challenging issues for complex applications which require many computing resources. Hence, there is a requirement of a workflow management system adaptable with many cloud environments due to the heterogeneity of resources and applications. In this pap...