• Home
  • Debajyoti Mukhopadhyay
Debajyoti Mukhopadhyay

Debajyoti Mukhopadhyay
Bennett University · School of Engineering & Applied Sciences

PhD(Computer Engineering)
Currently working in Software Defined Networking, and various aspects of Blockchain Technology.

About

251
Publications
150,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,492
Citations
Introduction
Dr. Debajyoti Mukhopadhyay has been the Founder Director of WIDiCoReL Research Lab since 2002. Currently he is the Dean at Bennett University. He was Director & Dean (R&D) at Mumbai University. He was Dean and Distinguished Professor at Adamas University. He was Dean (R&D) at MIT Pune University. He worked at Bell Communications Research, USA. He has guided 5 Ph.D. scholars in Computer area. He has authored over 225 publications, 1 Book, 40 Book Chapters and 3 patents till date.
Additional affiliations
June 2020 - November 2021
Bennett University
Position
  • Dean
Description
  • As the Dean of School of Engineering at Bennett University at Delhi-NCR region, heading all the activities of Various Departments in teaching, research, and administrations.
May 2018 - January 2020
University of Mumbai
Position
  • Head of Faculty
Description
  • Was responsible for the entire NHITM College.
August 2017 - March 2018
ADAMAS University
Position
  • Head of Faculty
Education
December 1994
Jadavpur University
Field of study
  • Computer Science
May 1984
Stevens Institute of Technology
Field of study
  • Computer Science
October 1979
Queen's University Belfast
Field of study
  • Computer Science

Publications

Publications (251)
Article
Full-text available
We envision that Artificial Intelligence (AI) will be able to behave like and subsequently will supersede the human intelligence. AI does get biased, and it is not unlikely that such bias could result in unwarranted and/or uncontrollable decisions, which so far has been observed in living beings, especially in humans. Some scientists and philosophe...
Article
Software-Defined Networking (SDN) is a programmable network architecture that allows network devices to be controlled remotely, but it is still highly susceptible to traditional attacks such as Address Resolution Protocol (ARP) Poisoning, ARP Flooding, and others. The classification of benign network traffic from ARP Poison and ARP Flooding attacks...
Article
With the advancement of communication technology, Telecare Medicine Information Systems (TMIS) provides convenient healthcare services for patients, doctors, and health organizations over the insecure Internet. As a result, when accessing sensitive medical data over an insecure connection, user privacy, data security, and user authentication is ver...
Preprint
Full-text available
This paper proposes a framework for a full fledged negotiation system that allows multi party multi issue negotiation. It focuses on the negotiation protocol to be observed and provides a platform for concurrent and independent negotiation on individual issues using the concept of multi threading. It depicts the architecture of an agent detailing i...
Conference Paper
Full-text available
The recent outbreak of coronavirus has impacted the whole world. The infectious respiratory disease has killed millions of people all over the world. The process of detecting the disease through RT-PCR and other tests is very time-consuming, and testing kits are not widely available. Chest x-rays and chest CT scans are also very effective technique...
Article
Full-text available
Software-Defined Networking (SDN) is a networking paradigm that has redefined the term network by making the network devices programmable. SDN helps network engineers to monitor the network expeditely, control the network from a central point, identify malicious traffic and link failure in easy and efficient manner. Besides such flexibility provide...
Chapter
The COVID-19 pandemic has rendered social distancing and use of face masks as an absolute necessity today. Coming out of the epidemic, we're going to see this as the new normal and therefore most workplaces will require an identification system to permit employees based on the compliance of protocols. To ensure minimal contact and security, automat...
Chapter
Full-text available
Nowadays, Question Answering (QA) systems are used as an automated assistant system for resolving queries in various messaging applications. Accessing a database to get specific information can be stressful and time-consuming if one does not have the much needed technical skills. Designing a QA system/chatbot that can generate the result by accessi...
Conference Paper
Full-text available
COVID-19 disease is an infectious disease caused by the Corona viruses. It is transmitted due to human-human interaction in human population. In the proposed work, we propose and study an epidemic model of COVID-19 disease by considering hospital facility to prevent the disease spreading. The aim of the study is to observe the effects of better hos...
Conference Paper
Full-text available
Borders play an integral part in a country's security, but Borders are extremely vulnerable and prone to terrorist assaults, illegal smuggling of drugs, and unauthorized immigration. To achieve improved situation analysis, it is essential to fuse sensor-based detection with drone surveillance system to aid the present surveillance system. A wide ra...
Conference Paper
Full-text available
Today's world is connected through the digital platforms Independent of Geographical location and to serve the needs of the administration process involved in educational we need the platform that help to work through network in a secured and transparent manner and due to the Blockchain core behaviors like transparent, confidentiality , Immutable,...
Conference Paper
Full-text available
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new networking architecture. Paper aim to classify the traffic into normal and malicious classes based on features given in dataset by using v...
Conference Paper
Full-text available
With the advent of evolution of cloud computing, large organizations have been scaling the on-premise IT infrastructure to the cloud. Although this being a popular practice, it lacks comprehensive efforts to study the aspects of automated negotiation of resources among cloud customers and providers. This paper proposes a full-fledged framework for...
Article
Full-text available
Quantum computers use the superposition of quantum bits or qubit’s in the two quantum states, which are |0> and |1> and work faster than classical computers. The qubits in the quantum computer are the basic unit of quantum information and replacement of the traditional bits 0 and 1 of classical computing. The n qubits can be simultaneously represen...
Article
Full-text available
The Blockchain or chain of blocks is a database whose records are stored equally in distributed nodes that make up a network, without central nodes that control others or have different information. This distributed scheme is one of its main advantages over other storage networks: it is practically impossible to hack because it is not enough to att...
Chapter
Full-text available
The acceleration of different social media platforms has alternated the way people communicate with each other it has also ensued in the rise of Cyberbullying cases on social media that has various adverse effects on an individual’s health. In this project, we aim to build a system that tackles Cyber bully by identifying the mean-spirited comments...
Chapter
Full-text available
In various service-based industries such as telecom industry, life insurance, hospitality, banking, and gaming, Churn Prediction plays an important role. Companies are trying to establish means for predicting potential clients to turnover in the telecom sector. Therefore, it is crucial to identify the factors that rising the churn of customers and...
Preprint
Full-text available
With the advent of evolution of cloud computing, large organizations have been scaling the on-premise IT infrastructure to the cloud. Although this being a popular practice, it lacks comprehensive efforts to study the aspects of automated negotiation of resources among cloud customers and providers. This paper proposes a full-fledged framework for...
Conference Paper
Full-text available
Churn Prediction plays an important role in various service-based industries like telecom industry, life insurance, hospitality, banking and gaming. In the telecom field, companies are seeking to develop means to predict potential customers to churn. Therefore, finding the factors that increase customer churn is important to take necessary actions...
Conference Paper
Full-text available
The acceleration of different social media platforms has alternated the way people communicate with each other it has also ensued in rise of Cyber bullying cases on social media that has various adverse effect on an individuals health. In this project, we aim to build a system that tackles Cyber bully by identifying the mean-spirited comments and a...
Article
Full-text available
Fleximove is an android application that is designed to be deployed to provide functionality to every type of user. This is an application designed to get interaction between different clients and Packing and Moving Companies. Fleximove is an online platform for service seekers and service providers. We will list excellent packing moving service pr...
Article
Full-text available
We all negotiate, formally or informally, in jobs, in day today lives and outcomes of negotiations affect those processes of life. Although negotiation is an intrinsic nature of human psyche, it is very complex phenomenon to implement using computing and internet for the various purposes in E Commerce. Automation of negotiation process poses unique...
Conference Paper
Full-text available
This era is thought to be the most secure, with everyone leaning towards security as compared to ease of interoperability. But, with the rise of gadgets, there is a rise in threats. Most of the threats lie in the insecure communication channel that is the Internet. The wireless networks have become the bull's eye for many attackers, since it is ver...
Conference Paper
Full-text available
Unchecked Fires can cause massive disasters leading to loss of human and animal life, property, forests, and other areas of vegetation and causing serious environmental damage. Moreover, fire has a tendency to spread rapidly over a small duration of time. Hence early detection is a very crucial factor when handling fire disasters. Recent studies ha...
Article
Full-text available
Negotiation is an iterative process where opponent and proponent exchange offers and counter offers with each other, with each iteration opponent can be modelled in more efficient way and an appropriate strategy can be selected for a particular opponent, i.e., by treating strategy as a dynamic component. This research focuses on web-service-based a...
Chapter
Full-text available
Economy of India highly depends on agriculture. Still traditional ways of recommendations are used for agriculture. Currently, agriculture is done based on various approximations of fertilizers quantity and the type of crop to be grown or planted. Agriculture highly depends on the nature of soil and climate. Therefore, it becomes important to make...
Article
Full-text available
The teaching and learning ecosystem is undergoing a massive transformation, hence it is increasingly becoming challenging for the faculty to effectively interact and teach students. With rapid changes, evolution, and augmentation in technology, the undergraduate courses are predominantly diversified with emphasis on specialization. As a matter of f...
Article
Full-text available
This paper proposes a new approach for controlling mouse movement using a real-time camera. Most of the existing approaches involve changing mouse parts such as adding more buttons or changing the position of the tracking ball. Instead, it proposes to change the hardware design. The method uses a camera and computer vision technology, such as image...
Chapter
Full-text available
World Wide Web (WWW) has brought revolution to millions of people who wish to access the huge information stored in WWW irrespective of the country they belong to. It may not be always possible to know the exact Uniform Resource Locator (URL) for information retrieval.
Chapter
Full-text available
Search Engines follow a set of rules, known as an algorithm, to rank Web-pages. Exactly how a particular Search Engine’s algorithm works is a trade secret. However, all major Search Engines follow the general rules.
Chapter
Full-text available
Domain-specific crawler creates a domain-specific Web-page repository by collecting domain-specific resources from the Internet [1, 2, 3, 4]. Domain-specific Web search engine basically searches domain-specific Web-pages from the domain-specific Web-page repository.
Chapter
Full-text available
In Chapter “ Domain-Specific Web-Page Prediction”, we have given a detailed design of Web-page prediction using Boolean bit mask. In this chapter we are going to present a mechanism of lucky searching, which saves Web searcher search time.
Chapter
Full-text available
In the previous two chapters, we have discussed the domain-specific Web crawler and improvement of efficiency by changing the structure of Web search engine resources.
Chapter
Full-text available
A Cellular Automata (CA) is an autonomous machine which evolves in discrete space and time. Study of the homogeneous structure of CA was initiated by Neumann (The theory of self-reproducing automata. University of Illinois Press, Urbana and London, 1966, [1]) to simulate physical systems. In last few decades, a large number of authors from diverse...
Chapter
Full-text available
In recent years, globalization has become one of the most basic and popular human trends. To globalize information, people always publish their documents in the Internet. As a result, the volume of information in Internet becomes huge and it is still growing at an alarming rate. To handle such huge volume of information, Web-searcher uses search en...
Chapter
Full-text available
In Chapter “ Domain Specific Crawler Design” we have discussed in detail various types of domain specific Web crawler. Web crawler crawls the Web-pages from World Wide Web (WWW) and store them in a repository. Domain specific Web crawlers crawl only domain specific Web-pages [1–4]. A domain specific Web search engine is produced search results by c...
Book
Full-text available
Searching the Web has become a natural process of our day-to-day life. Even a non-technical person with very little technical knowledge searches the Web by virtue of owning a cell phone handset with Internet connectivity. Mining the data follows as a part of the necessity to pick the best-suited data. However, this book entitled Web Searching and M...
Chapter
Full-text available
An overview of Web search engine and domain-specific Web search engine is presented in this chapter. Some recent issues in these areas and the methodology employed are also discussed. 1 Why Web Search Engine? In recent years, globalization has become one of the most basic and popular human trends. To globalize information, people always publish the...
Chapter
Full-text available
The researchers in artificial life inherit the tradition and epistemology of simulation.
Article
Full-text available
Weather based decision support for managing pests and diseases of crops requires use of information technology. This paper details a system developed using ontology, semantic web rule language and image processing techniques for management of pests and diseases on wines, particularly in hot tropical region of India. It aims at minimising use of pes...
Article
Full-text available
Negotiation is an iterative process where opponent and proponent exchange offers and counter offers with each other, with each iteration opponent can be modelled in more efficient way and an appropriate strategy can be selected for a particular opponent, i.e., by treating strategy as a dynamic component. This research focuses on web-service-based a...
Conference Paper
Full-text available
As the amount of urban vehicle grows rapidly, vehicle theft has become a shared concern for all citizens. Security and safety have always become a necessity for urban population. However, present anti-theft systems lack the tracking and monitoring function. Internet of things(IOT) has been governing the electronics era with cloud services dominatin...
Cover Page
Full-text available
Searching the Web has become a natural process of our day-to-day life. Even a non-technical person with very little technical knowledge searches the Web by virtue of owning a cell phone handset with Internet connectivity. Mining the data follows as a part of the necessity to pick the best-suited data. However, this book entitled Web Searching and M...
Article
Full-text available
Weather forecasting is a significant function in meteorology and has been one of the most systematically challenging troubles around the world.This scheme deals with the structure of a weather display method using small cost components so that any electronics hobbyist can construct it. As a replacement for using sensors to collect the weather data,...
Article
Full-text available
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via ro...
Article
Full-text available
Weather based decision support for managing pests and diseases of crops requires use of information technology. This paper details a system developed using ontology, semantic web rule language and image processing techniques for management of pests and diseases on wines, particularly in hot tropical region of India. It aims at minimising use of pes...
Conference Paper
Full-text available
Inventory management and supply chain are areas which have strong potential to benefit from Radio Frequency Identification technology. In the premises of a wholesale market, location tracking of a product itself becomes challenging for the buyers. The implemented application will help the buyer to locate required product and find the shortest path...
Conference Paper
Full-text available
Milk distribution and safety is of high concern as it involves the health of 90% of our society. Our project, milk distribution monitoring system targets the cold chain maintenance and milk spoilage avoidance. The system is based on Internet of Things and data mining. Traditionally milk is supplied in cans with minimum monitoring which may result i...
Conference Paper
Full-text available
We proposed a system to provide a recommendation system which will generate the user interested colleges list. This will be done by asking few questions related to the college like-college infrastructure, campus life, placement, sports and cultural activities. Information seeker will give ratings to the questions according to his interest rate. The...
Conference Paper
Full-text available
there are various challenges in healthcare sector one of them is medication Error. Impact of this medication error reflects on the patient's health and quality of care. This paper is going to present a clinical decision support system based on Evidence based treatment to reduce the medication errors during writing prescription. System is built on H...
Chapter
With the growth in IT infrastructure and advances in technologies, workflow scheduling poses many challenging issues for complex applications which require many computing resources. Hence, there is a requirement of a workflow management system adaptable with many cloud environments due to the heterogeneity of resources and applications. In this pap...