Subrata Chowdhury

Subrata Chowdhury
Sreenivasa Institute of Technology & Management Studies | SITAMS · Department of Computer Science & Engineering

PhD
Thesis Assistance, Research Analyst & Publication Coordinator

About

105
Publications
18,344
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,051
Citations
Introduction
Dr .Subrata Chowdhury is working as Professor in the Csc Department of theSreenivasa Institute of Technology and Management Studies of R&D in IoT Cybersecurity , Machine Learning he published journal articles, Conference papers,Grants,patents,Guest Speaker for FDP, Conference and Webinars. Currently he is working on a funded project on Quantum Computing.How the Cryogenic systems are a major investment.Long waits for data can slow down development cycles and hinder production schedules.
Additional affiliations
December 2021 - January 2022
SVCET Engineering College (A) Chittoor
Position
  • Professor (Assistant)
Description
  • Currently I am working with the Computer science student I am handing the Master and the Undergraduate students in the technical lecture and research oriented work .
June 2017 - June 2021
Vels University
Position
  • Reseach Scholor
Description
  • I had pursued my PhD in this University.
Education
April 2012 - May 2015
VIT University
Field of study
  • Computer Applications

Publications

Publications (105)
Article
Full-text available
The distorted Born iterative (DBI) method is considered to obtain images with high-contrast and resolution. Besides satisfying the Born approximation condition, the frequency-hopping (FH) technique is necessary to gradually update the sound contrast from the first iteration and progress to the actual sound contrast of the imaged object in subsequen...
Article
Full-text available
Nowadays, image security is a crucial component of the scientific community. The transparent marking is often used to keep medical imaging information from being stolen without permission. In this work, a novel combination of blockchain-based encryption and invisible picture watermarking was presented. In order to achieve watermarking, edge detecti...
Article
Full-text available
Heavy rainfall has consistently acted as the primary catalyst for floods, resulting in numerous casualties and significant economic losses globally. Rainfall forecasting is accomplished by analysing existing rainfall data, which is then used to analyse the hydraulic system's features. Gaining an understanding of rainfall requirements is a crucial c...
Chapter
Antimicrobial resistance (AMR) is a global issue due to improper drug use in humans and animals. Antimicrobial peptides (AMPs) show promise in targeting bacteria with minimal harm to host cells and low risk of resistance development. Machine learning enhances accuracy in predicting AMPs. Common classifiers include SVM, RF, ANN, LGBM, and DT. This r...
Chapter
The Blockchain is transforming the entire industry into a divisive structure. Blockchain technology renders several services such as crowdfunding, Insurance, Healthcare, Governance, and Energy sectors. It improves the safety of the consumer as the sensitive information is hidden from the centralized servers. Blockchains provide security by tracking...
Chapter
Prediction of house prices often involves various external factors including population, location, area, and more. One of the most vital parameters involving house price forecast is by House Price Index (HPI). The volatility in house prices is measured using the House Price Index. Over the years, there have been a lot of traditional approaches in m...
Conference Paper
Prediction of house prices often involves various external factors including population, location, area, and more. One of the most vital parameters involving house price forecast is by House Price Index (HPI). The volatility in house prices is measured using the House Price Index. Over the years, there have been a lot of traditional approaches in m...
Conference Paper
After the widespread introduction of 5G cellular communications, the academic and business communities have begun to focus intently on the next generation of wireless communication systems, known as 6G. Vehicular edge computing (VEC) is one of the upcoming technologies that can guarantee the AI algorithms used in 6G networks will work reliably. To...
Conference Paper
Due to the exponential growth in the number of human and machine-type devices, the next 6G wireless networks. Network densification is required, including end device (ED) densification and base station (BS) densification. The strategies have been successful in the past, but not effective in the new more densely populated network. This article analy...
Conference Paper
This article introduces a method for classifying diabetes based on machine learning (ML) methods. In recent years, significant focus have been put onto increasing disease classification performance through the use of ML approaches. This paper outlines the use of five interpretable ML algorithms: Bagging classifier, Random Forest, AdaBoost, Multilay...
Chapter
Antimicrobial resistance (AMR) is a global issue due to improper drug use in humans and animals. Antimicrobial peptides (AMPs) show promise in targeting bacteria with minimal harm to host cells and low risk of resistance development. Machine learning enhances accuracy in predicting AMPs. Common classifiers include SVM, RF, ANN, LGBM, and DT. This r...
Preprint
Full-text available
The distorted Born iterative (DBI) method is considered to obtain images with high-contrast and resolution. Besides satisfying the Born approximation condition, the frequency-hopping (FH) technique is necessary to gradually update the sound contrast from the first iteration and progress to the actual sound contrast of the imaged object in subsequen...
Conference Paper
Full-text available
The idea and prototype of an Internet of Things (IoT) based health monitoring gadget are introduced in this paper. We concentrate on leveraging the cloud and IoT to monitor temperature an coronary heart rate in real-time. This design can be utilized for the early diagnosis of heart illnesses given the rising number of cardiac patients throughout th...
Article
Full-text available
A microgrid is a free-standing electrical network consisting of several energy sources and loads meant for specific applications or localized areas of operation. Power electronic converters are used in a microgrid for interfacing electrical sources and electrical loads of different power and voltage ratings with the standard bus bars of the microgr...
Article
The widespread utilization of groundwater in various sectors, including households for drinking purposes and the agricultural and industrial domains, has elevated its status as an indispensable and crucial natural resource. Groundwater has seen significant changes in both quantity and quality factors. Water Quality Index (WQI), which is dependent o...
Article
Full-text available
Improving the management of metastasis in pancreatic neuroendocrine tumors (PanNETs) is critical, as nearly half of patients with PanNETs present with liver metastases, and this accounts for the majority of patient mortality. We identified angiopoietin-2 (ANGPT2) as one of the most upregulated angiogenic factors in RNA-Seq data from human PanNET li...
Book
Medical images, in various formats, are used by clinicians to identify abnormalities or markers associated with certain conditions, such as cancers, diseases, abnormalities or other adverse health conditions. Deep learning algorithms use vast volumes of data to train the computer to recognise certain features in the images that are associated with...
Article
Full-text available
So far, this pandemic has severely affected the education sector. As education undergoes a brilliant transformation with advancing technology, the digital acquisition of knowledge has yet to find widespread use - virtual exams. Faraway Proctoring offers several advantages of using manual and primarily based technology. Although this allows students...
Article
Full-text available
Citation: Verma, J.P.; Bhargav, S.; Bhavsar, M.; Bhattacharya, P.; Bostani, A.; Chowdhury, S.; Webber, J.; Mehbodniya, A. Graph-Based Extractive Text Summarization Sentence Scoring Scheme for Big Data Applications. Abstract: The recent advancements in big data and natural language processing (NLP) have necessitated proficient text mining (TM) schem...
Article
Full-text available
In recent years, both machine learning and computer vision have seen growth in the use of multi-label categorization. SMOTE is now being utilized in existing research for data balance, and SMOTE does not consider that nearby examples may be from different classes when producing synthetic samples. As a result, there can be more class overlap and mor...
Article
Full-text available
The prevalence of organic solid waste worldwide has turned into a problem that requires comprehensive treatment on all fronts. The amount of agricultural waste generated by agro-based industries has more than triplet. It not only pollutes the environment but also wastes a lot of beneficial biomass resources. These wastes may be utilized as a differ...
Article
Full-text available
Spondylolisthesis is a chronic disease, and a timely diagnosis of it may help in avoiding surgery. Disease identification in x-ray radiographs is very challenging. Strengthening the feature extraction tool in VGG16 has improved the classification rate. But the fully connected layers of VGG16 are not efficient at capturing the positional structure o...
Article
Full-text available
Te smart manufacturing system can become a linked network with the help of the Internet of Tings (IoT). Devices connected to the IoTare susceptible to various attacks and assaults. An efective protection plan is needed to ensure that the billions of IoTnodes are protected from these hazards. Te security mechanisms on IoT devices are inefective due...
Article
Full-text available
In this study, a new switched-capacitor-based seven-level inverter topology with a photovoltaic system is presented. The proposed topology requires a smaller number of devices and has the ability to self-balance the voltage across the capacitor. The proposed topology configuration is simple and has the ability to extend to higher levels of voltage....
Article
Full-text available
The engine tests aimed to produce comparable data for fuel consumption, exhaust emissions, and thermal efficiency. The computational fluid dynamics (CFD) program FLUENT was used to simulate the combustion parameters of a direct injection diesel engine. In-cylinder turbulence is controlled using the RNG k-model. The model’s conclusions are validated...
Article
Full-text available
T-cell position in the tumor microenvironment determines the probability of target encounter and tumor killing. CD8+ T-cell exclusion from the tumor parenchyma is associated with poor response to immunotherapy, and yet the biology that underpins this distinct pattern remains unclear. Here we show that the vascular destabilizing factor angiopoietin-...
Article
Full-text available
In this study, the load frequency control of a two-area thermal generation system based on renewable energy sources is considered. When solar generation is used in one of the control areas, the system becomes nonlinear and complicated. Zero deviations in the frequencies and the flow of power through the tie lines are achieved by considering load di...
Conference Paper
In the current scenarios there is a lot of development in the networking sector. Additionally needed are quick operations and the capability to solve complex issues. From several technical angles, IoT is being promoted to meet these developments. Implementations of IoT confront difficulties in handling such enormous volume of data including issues...
Conference Paper
Due to the convergence of healthcare and smart cities, information and technology are employed in health and medical procedures worldwide. Residents of smart cities now enjoy better lives and healthier bodies because to integration. The advent of smart watch technology and deep learning techniques has engendered a potential increase in performance...
Article
Full-text available
Phishing leverages people's tendency to share personal information online. Phishing attacks often begin with an email and can be used for a variety of purposes. The cybercriminal will employ social engineering techniques to get the target to click on the link in the phishing email, which will take them to the infected website. These attacks become...
Article
Full-text available
Currently, manufacturing industries focus on intelligent manufacturing. Prediction and monitoring of tool wear are essential in any material removal process, and implementation of a tool condition monitoring system (TCMS) is necessary. This work presents the flank wear prediction during the hard turning of EN8 steel using the deep learning (DL) alg...
Article
Full-text available
Citation: Henry, A.; Gautam, S.; Khanna, S.; Rabie, K.; Shongwe, T.; Bhattacharya, P.; Sharma, B.; Chowdhury, S. Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors 2023, 23, 890. https://doi.org/10.3390/ s23020890 Academic Editors: Ali Ismail Awad, Abstract: Recently, with the massive growth o...
Article
Full-text available
In pharmacokinetics, the clinical information collected from the patient is often much less than the complexity of the patient’s internal operations, hence the undetermined inverse problem has emerged as a challenge to solve it and find multiple possible point sets for considering the many possible implications of drug kinetics in the patient’s bod...
Preprint
Full-text available
Recently, the networking industries have gone through tremendous changes. It demands high-speed operations and complex problem-solving abilities. To manage these evolutions Internet-of-Things (IoT) is a proposed solution from several technical corners. Numerous researchers and government organizations showing their interest to provide solutions wit...
Conference Paper
Edge Detection is one of the discontinuity based image segmentation technique perform optimized function for detection, counting of people and other objects like vehicle, animals, etc in an image sequence. Edge detection is the technique bidding to designate the intensity changes concerned to the physical processes that have established them. Prewi...
Conference Paper
Full-text available
This article presents the activities carried out in research for the development of a prototype digital stethoscope using a smartphone. First the importance of biomedical engineering in medical decisions and the key concepts of listening to body sound are discussed, with a focus on understanding how signals from the heart, lungs and tract gastroint...
Conference Paper
Several organizations started to adopt the strategy to have data scientist professionals to help them identify the true value of the cost vs benefits and since data science is on fire for a quite long time, adopting the same comes in handy for several factors. i.e., investment, net profit, etc. At the same time, the clarity is missing around what d...
Article
Full-text available
The Skin Lesion (SL) classification has recently received a lot of attention. Because of the significant resemblance between these skin lesions, physicians spend a lot of time analyzing them. A Deep Learning (DL) based automated categorization system can help clinicians recognize the type of SL and improve the patient's health. In this research, DL...
Article
Full-text available
Solar photovoltaic (SPV) system fault diagnostics is vital in advanced supervision because it can alert users to catastrophic failure or greater risks. To provide green and clean energy using solar, it is mandatory to analyse various faults associated with photovoltaic system which can result in energy deficit and system breakdown and may lead to f...
Article
Full-text available
is study deals with identifying the accident blackspots and the in uencing factors causing accidents using factored analysis in a medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the blackspots and the factors causing accidents was used for analysis. e most in uencing factors driving the acc...
Article
Full-text available
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of th...
Preprint
Full-text available
This paper deals with identifying the accident black spots and the influencing factors causing accidents using factored analysis in the medium-sized city (Tirunelveli) in India. From the literature review, the geospatial technique to identify the black spots and the factors causing accidents was used for analysis. The most influencing factors drivi...
Article
Full-text available
In the year 2020, the word "pandemic" has become quite popular. A pandemic is a disease that spreads over a wide geographical region. The massive outbreak of coronavirus popularly known as COVID-19 has halted normal life worldwide. On 11th March 2020, the World Health Organization (WHO) quoted the COVID-19 outbreak as a "Pandemic". The outbreak pat...
Article
Full-text available
In low voltage (LV) distribution systems, the problem of overvoltage is common during the lower load intervals. This problem arises because of the high value of R/X ration of these systems. Many techniques are available in literature to cope up with this problem at the converter level; mostly these methods control the reactive or active power of th...
Article
Full-text available
Deep learning is widely used to automate processes, improve performance, detect patterns, and solve problems. Thus, applications of deep learning are limitless. Particle swarm optimization is a computational method that optimizes a problem by trying to improve a candidate solution. Although many researchers proposed particle swarm optimization vari...
Article
Full-text available
Economic growth in India purely depends on the Indian agricultural sector. In developing countries, the mechanization of agriculture plays a vital role in productivity. The research focuses on identifying which farmers in South Tamilnadu mostly use agricultural machinery. In this paper, we have taken farmer names and mobile numbers, choice of imple...
Article
Full-text available
E-learning is an evolutionary concept, not a revolutionary concept since it has been introduced and practiced in previous decades as well. The current research paper contributes to educational research based on the investigation of holistic perspectives of the ongoing online teaching activities during the lockdown period. The article is built on a...
Book
The web is among the main innovations of the 21st century which have impacted our life. Today we have crossed each hindrance and have fundamentally had an impact on the manner in which we use to talk, mess around, work, shop, make companions, listen to music, see motion pictures, request food, take care of the bill, welcome your companion on hi...
Article
Full-text available
A sensor node comprises of enormous nodes which can a variety of tasks such as recognize, indulgence, communication, and influence resource. Data transmission is the main aspect from starting to target. Once it is transferred between the node and within-cluster, the congestion will arise either node or in a resource allotment. So that it will affec...
Book
Full-text available
This book amalgamates interdisciplinary work amalgamating ocean engineering and computer science. The research results as presented in this book bring significant advancement to the shipping transportation industry, information technology and marine science. Link of Submission: https://easychair.org/my/conference?conf=uavml2022
Article
Full-text available
In this paper, we introduce a mobile application called CarSafe, in which data from the acceleration sensor integrated on smartphones is exploited to come up with an efficient classification algorithm. Two statuses, "Driving" or "Not driving," are monitored in the real-time manner. It enables automatic actions to help the driver safer. Also, from t...