Subrata Chowdhury

Subrata Chowdhury
Sreenivasa Institute of Technology & Management Studies | SITAMS · Department of Computer Science & Engineering

PhD

About

39
Publications
7,730
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
313
Citations
Citations since 2017
38 Research Items
313 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Introduction
Dr .Subrata Chowdhury is working as Professor in the Csc Department of theSreenivasa Institute of Technology and Management Studies of R&D in IoT Cybersecurity , Machine Learning he published journal articles, Conference papers,Grants,patents,Guest Speaker for FDP, Conference and Webinars. Currently he is working on a funded project on Quantum Computing.How the Cryogenic systems are a major investment.Long waits for data can slow down development cycles and hinder production schedules.
Additional affiliations
December 2021 - January 2022
SVCET Engineering College (A) Chittoor
Position
  • Professor (Assistant)
Description
  • Currently I am working with the Computer science student I am handing the Master and the Undergraduate students in the technical lecture and research oriented work .
June 2017 - June 2021
Vels University
Position
  • Reseach Scholor
Description
  • I had pursued my PhD in this University.
Education
April 2012 - May 2015
VIT University
Field of study
  • Computer Applications

Publications

Publications (39)
Article
Full-text available
Currently, manufacturing industries focus on intelligent manufacturing. Prediction and monitoring of tool wear are essential in any material removal process, and implementation of a tool condition monitoring system (TCMS) is necessary. This work presents the flank wear prediction during the hard turning of EN8 steel using the deep learning (DL) alg...
Article
Full-text available
Citation: Henry, A.; Gautam, S.; Khanna, S.; Rabie, K.; Shongwe, T.; Bhattacharya, P.; Sharma, B.; Chowdhury, S. Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors 2023, 23, 890. https://doi.org/10.3390/ s23020890 Academic Editors: Ali Ismail Awad, Abstract: Recently, with the massive growth o...
Preprint
Full-text available
Recently, the networking industries have gone through tremendous changes. It demands high-speed operations and complex problem-solving abilities. To manage these evolutions Internet-of-Things (IoT) is a proposed solution from several technical corners. Numerous researchers and government organizations showing their interest to provide solutions wit...
Conference Paper
Edge Detection is one of the discontinuity based image segmentation technique perform optimized function for detection, counting of people and other objects like vehicle, animals, etc in an image sequence. Edge detection is the technique bidding to designate the intensity changes concerned to the physical processes that have established them. Prewi...
Conference Paper
This article presents the activities carried out in research for the development of a prototype digital stethoscope using a smartphone. First the importance of biomedical engineering in medical decisions and the key concepts of listening to body sound are discussed, with a focus on understanding how signals from the heart, lungs and tract gastroint...
Conference Paper
Several organizations started to adopt the strategy to have data scientist professionals to help them identify the true value of the cost vs benefits and since data science is on fire for a quite long time, adopting the same comes in handy for several factors. i.e., investment, net profit, etc. At the same time, the clarity is missing around what d...
Article
Full-text available
The Skin Lesion (SL) classification has recently received a lot of attention. Because of the significant resemblance between these skin lesions, physicians spend a lot of time analyzing them. A Deep Learning (DL) based automated categorization system can help clinicians recognize the type of SL and improve the patient's health. In this research, DL...
Article
Full-text available
Solar photovoltaic (SPV) system fault diagnostics is vital in advanced supervision because it can alert users to catastrophic failure or greater risks. To provide green and clean energy using solar, it is mandatory to analyse various faults associated with photovoltaic system which can result in energy deficit and system breakdown and may lead to f...
Article
Full-text available
is study deals with identifying the accident blackspots and the in uencing factors causing accidents using factored analysis in a medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the blackspots and the factors causing accidents was used for analysis. e most in uencing factors driving the acc...
Article
Full-text available
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of th...
Preprint
Full-text available
This paper deals with identifying the accident black spots and the influencing factors causing accidents using factored analysis in the medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the black spots and the factors causing accidents was used for analysis. The most influencing factors drivi...
Article
Full-text available
In the year 2020, the word "pandemic" has become quite popular. A pandemic is a disease that spreads over a wide geographical region. The massive outbreak of coronavirus popularly known as COVID-19 has halted normal life worldwide. On 11th March 2020, the World Health Organization (WHO) quoted the COVID-19 outbreak as a "Pandemic". The outbreak pat...
Article
Full-text available
In low voltage (LV) distribution systems, the problem of overvoltage is common during the lower load intervals. This problem arises because of the high value of R/X ration of these systems. Many techniques are available in literature to cope up with this problem at the converter level; mostly these methods control the reactive or active power of th...
Article
Full-text available
Deep learning is widely used to automate processes, improve performance, detect patterns, and solve problems. Thus, applications of deep learning are limitless. Particle swarm optimization is a computational method that optimizes a problem by trying to improve a candidate solution. Although many researchers proposed particle swarm optimization vari...
Article
Full-text available
Economic growth in India purely depends on the Indian agricultural sector. In developing countries, the mechanization of agriculture plays a vital role in productivity. The research focuses on identifying which farmers in South Tamilnadu mostly use agricultural machinery. In this paper, we have taken farmer names and mobile numbers, choice of imple...
Article
Full-text available
E-learning is an evolutionary concept, not a revolutionary concept since it has been introduced and practiced in previous decades as well. The current research paper contributes to educational research based on the investigation of holistic perspectives of the ongoing online teaching activities during the lockdown period. The article is built on a...
Book
The web is among the main innovations of the 21st century which have impacted our life. Today we have crossed each hindrance and have fundamentally had an impact on the manner in which we use to talk, mess around, work, shop, make companions, listen to music, see motion pictures, request food, take care of the bill, welcome your companion on hi...
Article
Full-text available
A sensor node comprises of enormous nodes which can a variety of tasks such as recognize, indulgence, communication, and influence resource. Data transmission is the main aspect from starting to target. Once it is transferred between the node and within-cluster, the congestion will arise either node or in a resource allotment. So that it will affec...
Book
Full-text available
This book amalgamates interdisciplinary work amalgamating ocean engineering and computer science. The research results as presented in this book bring significant advancement to the shipping transportation industry, information technology and marine science. Link of Submission: https://easychair.org/my/conference?conf=uavml2022
Article
Full-text available
In this paper, we introduce a mobile application called CarSafe, in which data from the acceleration sensor integrated on smartphones is exploited to come up with an efficient classification algorithm. Two statuses, "Driving" or "Not driving," are monitored in the real-time manner. It enables automatic actions to help the driver safer. Also, from t...
Article
Full-text available
Recently, the networking industries have gone through tremendous changes. It demands high-speed operations and complex problem-solving abilities. To manage these evolutions Internet-of-Things (IoT) is a proposed solution from several technical corners. Numerous researchers and government organizations showing their interest to provide solutions wit...
Book
Human–computer interaction (HCI), alternatively man–machine interaction (MMI) or computer–human interaction (CHI) is the study of interaction between people (users) and computers. • With today's technology and tools, and our motivation to create really effective and usable interfaces and screens, why do we continue to produce systems that are ineff...
Article
Full-text available
The extremely vibrant, scattered, and non-transparent nature of cloud computing formulate trust management a significant challenge. According to scholars the trust and security are the two issues that are in the topmost obstacles for adopting cloud computing. Also, SLA (Service Level Agreement) alone is not necessary to build trust between cloud be...
Article
The huge usage of IoT devices and their deployment in multiple electronic machines need to address complex computing while processing their information from that device to any other network or cloud. Fog computing address those computing needs of IoT devices by managing the connectivity at the edge of their network by allocating resources virtually...
Article
The growing blockchain technology proves promising opportunities for enhancing the industrialized system and the Internet of Things (IoT) by given that idleness, storage space, and encryption for applications. Over the last few years, many new applications have started to emerge in industrial IoT, and blockchain technologies have attracted the atte...
Article
Full-text available
Among all the reasons for the occurrence of road accidents, the human state of drowsiness and Underage driving contributes a major share. With the rigid implementation of traffic rules and national schemes, it does not result in decreasing the accidents. Hence, there is a need for automation of surveillance which strictly restricts the teen driving...
Article
This paper plans to develop an effective machine learning system integrated with the Internet of Things (IoT) to predict the health insurance amount. IoT in healthcare enables interoperability, machine-to-machine communication, information exchange, and data movement that make healthcare service delivery effective. The model includes three phases (...
Article
Full-text available
Wearable gadgets are at present at the core of pretty much every talk identified with the Internet of Things. The prerequisite for self-wellbeing checking and the preventive prescription is expanding because of the anticipated sensational increment in the number of elderly individuals until 2020. Created advances are really ready to decrease the ge...
Article
Full-text available
The purpose of this sensors and the data which are been everyday storing in the database of the Servers are very much important and crucial and important measures are taken care for the healthcare of the person are been taken to make sure the content is not been manipulated or over written with the other content. Minutes by minutes thousand of byte...
Article
This paper introduces the outline, organization and experimental investigation of a web of things (IOT) framework, which is utilized to screen and ensure the living condition of the natural life. With a specific end goal to make the framework address the issues of useful applications and adjust to the nearby different landform trademark, th...
Article
The purpose of this sensors and the data which are been everyday storing in the database of the Servers are very much important and crucial and important measures are taken care for the healthcare of the person are been taken to make sure the content is not been manipulated or over written with the other content. Minutes by minutes thousand of byte...
Article
Full-text available
The main purpose of this paper is to develop a hybrid CPU scheduling algorithm that combines round robin scheduling with priority scheduling. This approach eradicates the drawbacks of round robin scheduling and shows improvement over the same. It is also found that this scheduling is an improvement over priority scheduling.
Article
Ground Work for a product in nearby location is an application which is used to search for a product availability and it's quantity in the nearest available stores. In general if any person wants a product, he must go in search for that either by walk or by vehicle. In Internet here are so many applications available to find the nearest shop but we...
Conference Paper
Full-text available
The network sensors which offer the powerful conversion of the Sensor systems offer an incredible blend of conveyed detecting, registering, and communication. They loan themselves to innumerable applications and, in the meantime, offer various difficulties because of their characteristics, essentially the stringent vitality imperatives to which det...
Article
The paper gives the introduction of the IoT, which lay forward the capabilties to detect and link with the world wide web with the connectivity to connect this with the physical objects into a cognate systems. On the other hand some severe concers as the part of the IoT, are been highlighted over the passage gateways of critical personal informatio...

Questions

Question (1)
Question
As the world is moving on towards data security and Blockchain plays a key role in India specially with geo and cultural barriers how this technology is unique to solve data security.

Network

Cited By

Projects

Projects (5)
Project
The transportation systems play an important role in the economic development of nations through carried cargo between countries. The development of intelligent transportation systems (ITS) becomes more and more significant in shipping transportation with the aim of decreasing maritime accidents and risk management along with ship energy efficiency management and communication systems. The contributions of research plays a vital role in R&D of devices and autonomous underwater vehicles (AUV) and communication systems. The utilization of information technology (IT) in intelligent transportation system(ITS) is ongoing. Especially, the development of Industry 4.0 is a big milestone in science and technology. Machine learning techniques are efficient tools to predict and evaluate working performance and reliability of uncertain motion and nonlinear dynamic systems in ocean engineering. Therefore, research into machine learning techniques in these specific fields in of high importance currently.
Project
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare management system for the transportation industry to ensure smooth operation of the global supply-chain ecosystem. Furthermore, public transportation also plays a key role in spreading the pandemic. Therefore, it is very important to adopt appropriate measures to contain the spread of the virus through transportation industry. Machine Learning (ML) techniques and the Internet of Things (IoT) are being employed effectively in the public healthcare systems to help the patients and doctors to predict, prevent, (remotely) monitor and treat various diseases, especially the contiguous ones like COVID-19. Therefore, ML algorithms, as well as the methodologies, are expected to play a vital role in intelligent healthcare management systems, especially with the continuity of the spreading of the pandemic.
Project
Introduced last year by Atos, Q-score is a free and open-source quantum metric that applies to all programmable quantum processors. Q-score measures a quantum system’s effectiveness at handling real-life problems which traditional computers cannot solve, rather than simply measuring its theoretical performance. It is the only metrics system based on near-term available quantum algorithms and measures a quantum system’s capacity to solve practical operational problems.