Pinaki Ghosh

Pinaki Ghosh
  • PhD (Computer Engineering), M.Tech, B.E.
  • Professor (Associate) at Chitkara University

About

30
Publications
4,291
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
246
Citations
Current institution
Chitkara University
Current position
  • Professor (Associate)
Additional affiliations
February 2019 - present
Chitkara University
Position
  • Professor (Associate)
October 2015 - February 2019
Mody University of Science and Technology
Position
  • Professor (Assistant)
August 2010 - October 2015
Atmiya Institute Of Technology & Science
Position
  • Professor (Assistant)
Education
June 2012 - January 2018
RK University
Field of study
  • Computer Engineering
September 2001 - April 2004
Rajiv Gandhi Technical University
Field of study
  • Computer Science and Engineering
August 1996 - May 2000
Barkatullah University
Field of study
  • Computer Science and Engineering

Publications

Publications (30)
Conference Paper
Machine learning offers a variety of techniques for use in diverse fields. Massive quantities of student data are produced in educational institutions, and machine-learning techniques are a precious tool for identifying patterns in individuals' behavior. Academicians can learn valuable data concerning the students' expertise and how it relates to t...
Chapter
Forecasting stock market pricing is essential in the current marketplace. As a result, academics’ interest in innovative ways to forecast the stock exchange has surged. Throughout this investigation, previous studies had insufficient knowledge, such as sociological climate. In this research, we are presenting an ensemble machine learning method (WE...
Chapter
Heart attack is the number one cause of global mortality. As per World Health Organization (WHO), 17.9 million lives are lost each year from heart-related diseases, representing 32% of all deaths worldwide. The cases of heart attacks are increasing day by day at an alarming rate. It is essential to predict any such risks. This paper is focused on w...
Chapter
An increase in the volume of vehicles in metropolitan areas increases various issues, i.e., traffic jams, pollution, parking issues, noise, security, and accidental causes. Heavy traffic harm the social system because a large amount of time is squandered on it and then responsible for controlling the vehicle congestion problems is essential. An IoV...
Chapter
Early-stage detection of breast cancer disease and its accurate diagnosis have been always challenging for the healthcare professional. An IoT healthcare system can play a vital role in this field. The existing diagnosis technique does not efficiently identify breast cancer in the beginning phases, and many of the women struggled from such a deadly...
Article
Time series is the analysis of historical data which is used to analyse the past trend and then to determine the future directions. This helps organizations to make a proper plan and develop the appropriate strategic decision in the right direction. One such example is the analysis of the currency exchange rate. Prior information on the currency ex...
Article
In computer programming jargon, a library can be defined as a collection of prewritten routines that are compiled in advance for use by a programmer. Owing to the popularity of android the developer community envisions the development of android libraries for Android application developers to minimize the coding effort. The focus of this paper revo...
Research
Full-text available
Breast cancer is second leading invasive cancer causes death after lung cancer. The accurate diagnosis is a very crucial aspect of breast cancer treatment. For this purpose, data mining techniques guide doctors in correct decision-making for diagnosis. This paper demonstrates various data mining methods for breast cancer diagnosis. The proposed alg...
Conference Paper
Full-text available
Leach is a wireless sensor network routing protocol. Leach protocol work on cluster formation of wireless sensor network. It consists of two phases of leach protocol. In first setup phase of leach protocol it choose appropriate node for becoming cluster head of particular cluster. In second phase of leach protocol member nodes of cluster send data...
Article
A computer network is any set of computing nodes which has the ability of exchanging data by interacting with each other meaningfully, allowing resource sharing in a proper manner. The collection of computers is interconnected by communication channels, which need to be secure for better information exchange. This field of networking consists of sp...

Network

Cited By