
Subrata ChowdhurySreenivasa Institute of Technology & Management Studies | SITAMS · Department of Computer Science & Engineering
Subrata Chowdhury
PhD
Thesis Assistance, Research Analyst & Publication Coordinator
About
68
Publications
11,496
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
575
Citations
Introduction
Dr .Subrata Chowdhury is working as Professor in the Csc Department of theSreenivasa Institute of Technology and Management Studies of R&D in IoT Cybersecurity , Machine Learning he published journal articles, Conference papers,Grants,patents,Guest Speaker for FDP, Conference and Webinars. Currently he is working on a funded project on Quantum Computing.How the Cryogenic systems are a major investment.Long waits for data can slow down development cycles and hinder production schedules.
Additional affiliations
December 2021 - January 2022
SVCET Engineering College (A) Chittoor
Position
- Professor (Assistant)
Description
- Currently I am working with the Computer science student I am handing the Master and the Undergraduate students in the technical lecture and research oriented work .
June 2017 - June 2021
Education
April 2012 - May 2015
Publications
Publications (68)
The widespread utilization of groundwater in various sectors, including households for drinking purposes and the agricultural and industrial domains, has elevated its status as an indispensable and crucial natural resource. Groundwater has seen significant changes in both quantity and quality factors. Water Quality Index (WQI), which is dependent o...
Medical images, in various formats, are used by clinicians to identify abnormalities or markers associated with certain conditions, such as cancers, diseases, abnormalities or other adverse health conditions. Deep learning algorithms use vast volumes of data to train the computer to recognise certain features in the images that are associated with...
So far, this pandemic has severely affected the education sector. As education undergoes a brilliant transformation with advancing technology, the digital acquisition of knowledge has yet to find widespread use-virtual exams. Faraway Proctoring offers several advantages of using manual and primarily based technology. Although this allows students t...
Citation: Verma, J.P.; Bhargav, S.; Bhavsar, M.; Bhattacharya, P.; Bostani, A.; Chowdhury, S.; Webber, J.; Mehbodniya, A. Graph-Based Extractive Text Summarization Sentence Scoring Scheme for Big Data Applications. Abstract: The recent advancements in big data and natural language processing (NLP) have necessitated proficient text mining (TM) schem...
In recent years, both machine learning and computer vision have seen growth in the use of multi-label categorization. SMOTE is now being utilized in existing research for data balance, and SMOTE does not consider that nearby examples may be from different classes when producing synthetic samples. As a result, there can be more class overlap and mor...
The prevalence of organic solid waste worldwide has turned into a problem that requires comprehensive treatment on all fronts. The amount of agricultural waste generated by agro-based industries has more than triplet. It not only pollutes the environment but also wastes a lot of beneficial biomass resources. These wastes may be utilized as a differ...
Spondylolisthesis is a chronic disease, and a timely diagnosis of it may help in avoiding surgery. Disease identification in x-ray radiographs is very challenging. Strengthening the feature extraction tool in VGG16 has improved the classification rate. But the fully connected layers of VGG16 are not efficient at capturing the positional structure o...
Te smart manufacturing system can become a linked network with the help of the Internet of Tings (IoT). Devices connected to the IoTare susceptible to various attacks and assaults. An efective protection plan is needed to ensure that the billions of IoTnodes are protected from these hazards. Te security mechanisms on IoT devices are inefective due...
In this study, a new switched-capacitor-based seven-level inverter topology with a photovoltaic system is presented. The proposed topology requires a smaller number of devices and has the ability to self-balance the voltage across the capacitor. The proposed topology configuration is simple and has the ability to extend to higher levels of voltage....
The engine tests aimed to produce comparable data for fuel consumption, exhaust emissions, and thermal efficiency. The computational fluid dynamics (CFD) program FLUENT was used to simulate the combustion parameters of a direct injection diesel engine. In-cylinder turbulence is controlled using the RNG k-model. The model’s conclusions are validated...
In this study, the load frequency control of a two-area thermal generation system based on renewable energy sources is considered. When solar generation is used in one of the control areas, the system becomes nonlinear and complicated. Zero deviations in the frequencies and the flow of power through the tie lines are achieved by considering load di...
In the current scenarios there is a lot of
development in the networking sector. Additionally needed are
quick operations and the capability to solve complex issues.
From several technical angles, IoT is being promoted to meet
these developments. Implementations of IoT confront
difficulties in handling such enormous volume of data
including issues...
Due to the convergence of healthcare and smart cities, information and technology are employed in health and medical procedures worldwide. Residents of smart cities now enjoy better lives and healthier bodies because to integration. The advent of smart watch technology and deep learning techniques has engendered a potential increase in performance...
Phishing leverages people's tendency to share personal information online. Phishing attacks often begin with an email and can be used for a variety of purposes. The cybercriminal will employ social engineering techniques to get the target to click on the link in the phishing email, which will take them to the infected website. These attacks become...
Currently, manufacturing industries focus on intelligent manufacturing. Prediction and monitoring of tool wear are essential in any material removal process, and implementation of a tool condition monitoring system (TCMS) is necessary. This work presents the flank wear prediction during the hard turning of EN8 steel using the deep learning (DL) alg...
Citation: Henry, A.; Gautam, S.; Khanna, S.; Rabie, K.; Shongwe, T.; Bhattacharya, P.; Sharma, B.; Chowdhury, S. Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors 2023, 23, 890. https://doi.org/10.3390/ s23020890 Academic Editors: Ali Ismail Awad, Abstract: Recently, with the massive growth o...
In pharmacokinetics, the clinical information collected from the patient is often much less than the complexity of the patient’s internal operations, hence the undetermined inverse problem has emerged as a challenge to solve it and find multiple possible point sets for considering the many possible implications of drug kinetics in the patient’s bod...
Recently, the networking industries have gone through tremendous changes. It demands high-speed operations and complex problem-solving abilities. To manage these evolutions Internet-of-Things (IoT) is a proposed solution from several technical corners. Numerous researchers and government organizations showing their interest to provide solutions wit...
Edge Detection is one of the discontinuity based image segmentation technique perform optimized function for detection, counting of people and other objects like vehicle, animals, etc in an image sequence. Edge detection is the technique bidding to designate the intensity changes concerned to the physical processes that have established them. Prewi...
This article presents the activities carried out in research for the development of a prototype digital stethoscope using a smartphone. First the importance of biomedical engineering in medical decisions and the key concepts of listening to body sound are discussed, with a focus on understanding how signals from the heart, lungs and tract gastroint...
Several organizations started to adopt the strategy to have data scientist professionals to help them identify the true value of the cost vs benefits and since data science is on fire for a quite long time, adopting the same comes in handy for several factors. i.e., investment, net profit, etc. At the same time, the clarity is missing around what d...
The Skin Lesion (SL) classification has recently received a lot of attention. Because of the significant resemblance between these skin lesions, physicians spend a lot of time analyzing them. A Deep Learning (DL) based automated categorization system can help clinicians recognize the type of SL and improve the patient's health. In this research, DL...
Solar photovoltaic (SPV) system fault diagnostics is vital in advanced supervision because it can alert users to catastrophic failure or greater risks. To provide green and clean energy using solar, it is mandatory to analyse various faults associated with photovoltaic system which can result in energy deficit and system breakdown and may lead to f...
is study deals with identifying the accident blackspots and the in uencing factors causing accidents using factored analysis in a medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the blackspots and the factors causing accidents was used for analysis. e most in uencing factors driving the acc...
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of th...
This paper deals with identifying the accident black spots and the influencing factors causing accidents using factored analysis in the medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the black spots and the factors causing accidents was used for analysis. The most influencing factors drivi...
In the year 2020, the word "pandemic" has become quite popular. A pandemic is a disease that spreads over a wide geographical region. The massive outbreak of coronavirus popularly known as COVID-19 has halted normal life worldwide. On 11th March 2020, the World Health Organization (WHO) quoted the COVID-19 outbreak as a "Pandemic". The outbreak pat...
In low voltage (LV) distribution systems, the problem of overvoltage is common during the
lower load intervals. This problem arises because of the high value of R/X ration of these systems.
Many techniques are available in literature to cope up with this problem at the converter level; mostly
these methods control the reactive or active power of th...
Deep learning is widely used to automate processes, improve performance, detect patterns, and solve problems. Thus, applications of deep learning are limitless. Particle swarm optimization is a computational method that optimizes a problem by trying to improve a candidate solution. Although many researchers proposed particle swarm optimization vari...
Economic growth in India purely depends on the Indian agricultural sector. In developing countries, the mechanization of agriculture plays a vital role in productivity. The research focuses on identifying which farmers in South Tamilnadu mostly use agricultural machinery. In this paper, we have taken farmer names and mobile numbers, choice of imple...
E-learning is an evolutionary concept, not a revolutionary concept since it has been introduced and practiced in
previous decades as well. The current research paper contributes to educational research based on the investigation of holistic
perspectives of the ongoing online teaching activities during the lockdown period. The article is built on a...
The web is among the main innovations of the 21st century which have impacted
our life. Today we have crossed each hindrance and have fundamentally had an impact
on the manner in which we use to talk, mess around, work, shop, make companions,
listen to music, see motion pictures, request food, take care of the bill,
welcome your companion on hi...
A sensor node comprises of enormous nodes which can a variety of tasks such as recognize, indulgence, communication, and influence resource. Data transmission is the main aspect from starting to target. Once it is transferred between the node and within-cluster, the congestion will arise either node or in a resource allotment. So that it will affec...
This book amalgamates interdisciplinary work amalgamating ocean engineering and computer science. The research results as presented in this book bring significant advancement to the shipping transportation industry, information technology and marine science.
Link of Submission: https://easychair.org/my/conference?conf=uavml2022
In this paper, we introduce a mobile application called CarSafe, in which data from the acceleration sensor integrated on smartphones is exploited to come up with an efficient classification algorithm. Two statuses, "Driving" or "Not driving," are monitored in the real-time manner. It enables automatic actions to help the driver safer. Also, from t...
Recently, the networking industries have gone through tremendous changes. It demands high-speed operations and complex problem-solving abilities. To manage these evolutions Internet-of-Things (IoT) is a proposed solution from several technical corners. Numerous researchers and government organizations showing their interest to provide solutions wit...
With the fast improvement of advanced innovation and market economy, to speed up the opposition in the market economy, extreme rivalry in the IoT industry additionally exists. Impact of human resources the executives partially decides the strength of the market seriousness of a venture; the exploration of human asset of the board of the IoT industr...
Human–computer interaction (HCI), alternatively man–machine interaction (MMI) or
computer–human interaction (CHI) is the study of interaction between people (users) and
computers.
• With today's technology and tools, and our motivation to create really effective and usable
interfaces and screens, why do we continue to produce systems that are ineff...
The extremely vibrant, scattered, and non-transparent nature of cloud computing formulate trust management a significant challenge. According to scholars the trust and security are the two issues that are in the topmost obstacles for adopting cloud computing. Also, SLA (Service Level Agreement) alone is not necessary to build trust between cloud be...
The huge usage of IoT devices and their deployment in multiple electronic machines need to address complex computing while processing their information from that device to any other network or cloud. Fog computing address those computing needs of IoT devices by managing the connectivity at the edge of their network by allocating resources virtually...
The growing blockchain technology proves promising
opportunities for enhancing the industrialized system and the
Internet of Things (IoT) by given that idleness, storage space, and
encryption for applications. Over the last few years, many new
applications have started to emerge in industrial IoT, and
blockchain technologies have attracted the atte...
Among all the reasons for the occurrence of road accidents, the human state of drowsiness and Underage driving contributes a major share. With the rigid implementation of traffic rules and national schemes, it does not result in decreasing the accidents. Hence, there is a need for automation of surveillance which strictly restricts the teen driving...
This paper plans to develop an effective machine learning system integrated with the Internet of Things (IoT) to predict the health insurance amount. IoT in healthcare enables interoperability, machine-to-machine communication, information exchange, and data movement that make healthcare service delivery effective. The model includes three phases (...
Wearable gadgets are at present at the core of pretty much every talk identified with the Internet of Things. The prerequisite for self-wellbeing checking and the preventive prescription is expanding because of the anticipated sensational increment in the number of elderly individuals until 2020. Created advances are really ready to decrease the ge...
The purpose of this sensors and the data which are been everyday storing in the database of the Servers are very much important and crucial and important measures are taken care for the healthcare of the person are been taken to make sure the content is not been manipulated or over written with the other content. Minutes by minutes thousand of byte...
This paper introduces the outline,
organization and experimental investigation
of a web of things (IOT)
framework, which is utilized to screen and
ensure the living condition of the natural life.
With a specific end goal to make the
framework address the issues of useful
applications and adjust to the nearby different
landform trademark, th...
The purpose of this sensors and the data which are been everyday storing in the database of the Servers are very much important and crucial and important measures are taken care for the healthcare of the person are been taken to make sure the content is not been manipulated or over written with the other content. Minutes by minutes thousand of byte...
The main purpose of this paper is to
develop a hybrid CPU scheduling algorithm that
combines round robin scheduling with priority
scheduling. This approach eradicates the drawbacks
of round robin scheduling and shows improvement
over the same. It is also found that this scheduling is
an improvement over priority scheduling.
Ground Work for a product in nearby location is an application which is used to search for a product availability and it's quantity in the nearest available stores. In general if any person wants a product, he must go in search for that either by walk or by vehicle. In Internet here are so many applications available to find the nearest shop but we...
The network sensors which offer the powerful conversion of the Sensor systems offer an incredible blend of conveyed detecting, registering, and communication. They loan themselves to innumerable applications and, in the meantime, offer various difficulties because of their characteristics, essentially the stringent vitality imperatives to which det...
The paper gives the introduction of the IoT, which lay forward the capabilties to detect and link with the world wide web with the connectivity to connect this with the physical objects into a cognate systems. On the other hand some severe concers as the part of the IoT, are been highlighted over the passage gateways of critical personal informatio...
cinnamon oil (CNO), clove oil (CLO) and ajwain oil (AJO) as an alternative to antibiotic growth
promoter (AGP) on growth performance, nutrient utilisation, nitrogen excretion, carcass characteristics,
and chemical and fatty acid composition of meat of broiler chickens. Four hundred
one-day-old broiler chicks were randomly divided into five dietary...
A study was conducted to evaluate the effect of three essential oils with different main chemical structures, i.e., cinnamon bark oil (CNO), clove bud oil (CLO) and ajwain seed oil (AJO) as an alternative to antibiotic growth promoter (AGP) on intestinal health, immune response and antioxidant status in broiler chickens. Four hundred one-day-old br...
Questions
Question (1)
As the world is moving on towards data security and Blockchain plays a key role in India specially with geo and cultural barriers how this technology is unique to solve data security.