Sudipta Sahana

Sudipta Sahana
University of Engineering & Management Kolkata

Doctor of Engineering

About

48
Publications
2,604
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
111
Citations
Citations since 2017
39 Research Items
95 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520

Publications

Publications (48)
Chapter
Since human experts may overlook significant signs from one side of the planet to the next, woods fire is continuing and it is harming many timberland properties as well as honest creatures’ lives and furthermore causing a lot of ecological contaminations, so here is a drive we have taken to anticipate the causes of backwoods fire and h In this stu...
Chapter
Sensors are essential to collect information from the environment. Smart sensing technology can use artificial intelligence (AI) and machine learning (ML) techniques to enhance the process of information acquisition. AI and ML techniques in smart sensors can improve the process of collection of data and reduce the exchange of data within the networ...
Preprint
Full-text available
Privacy protection is an essential section of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments. The aim of side-channel attacks is to extract secrets from systems. This can be through measurement and analysis of physical parameters. Execution time, electromagn...
Article
Full-text available
Data mining is the important tools used for the prediction based computing. It used many advanced techniques to predict the data and classification is one of them. The concept of classification based on the supervised learning whereas the clustering is based on the unsupervised machine learning. In this work, concept of factor analysis has been app...
Chapter
Corona viruses are large family of viruses that may affect human and animals. Middle East respiratory syndrome (MERS) and severe acute respiratory syndrome (SARS) are the respiratory infections caused by several corona viruses in human. COVID-19 is an infectious disease due to most recently discovered Corona virus. This Corona Virus Disease (COVID-...
Chapter
An image that holds both high spatial and spectral information is the most preferred one. A panchromatic (PAN) image contains high spatial resolution, whereas a multispectral (MS) image contains high spectral information. Pan-sharpening is a technique that combines more than one image into a single image that has been used after extracting the spat...
Chapter
Weather forecasting is the solicitation of science and technology which in together predicts the state of the atmosphere for a given location. It has always been an important application in meteorological field, and it is one of the most scientifically and technologically challenging problem around the world. Various predictions and work have been...
Chapter
Optimization is a searching technique by which we can find the best solution from all the feasible solutions. There are two types of optimization problems depending up on the type of variable that is continuous and discrete. Discrete optimization is one kind of optimization technique where we will wait for an object like an integer, permutation, or...
Chapter
Now days, enormous amount of the data are generated and collected from different domains and analyze of all these data manually is tedious task. Therefore, Knowledge Discovery in Databases (KDD) process have to used to find potentially, valid, novel, and explicable patterns in data. Lately, delicate registering turned out to be increasingly more al...
Chapter
Full-text available
Road accidents are a major problem these days. A few of them are due to the human errors while controlling the traffic signals. In this era of advanced technologies, there are many ways to prevent these kinds of blunders. This paper describes an automatic traffic signal which works on piezoelectric power. The traffic lights are working only when th...
Article
Full-text available
An Internet bot performs automated tasks over the Internet. This software application is also known as a web robot or robot or simply bot, Typically, bots runs simple and structurally repetitive tasks, at a much higher rate than would be possible for a human alone. This effort is to help the users by providing all the basic student’s academic detai...
Chapter
Assessment in the field of the prediction plays an important role to make the prediction fruitful otherwise wrong assessment will give the wrong inference about the data set. A lot of statistical and soft computing model used in area of prediction to make it more optimal. Therefore, the clustering technique has been used for the assessment on avera...
Chapter
Smart cities play a vital role in the lifestyle of humans, and these are just like smart phones, which provide information to persons based on their different needs. Several governments/private organizations are planning to make many cities as smart cities with the help of big data. As for the smart phone, many technologies are required to make it...
Article
Cloud load balancing has become one of the most vital aspects of Cloud computing that has captured the attention of IT organizations and business firms in recent years. Among the issues related to this particular aspect, one such issue which needs to be addressed is the issue of effectively serving the clients' requests among multiple servers using...
Chapter
The techniques behind Data mining play a significant task in health care field. The techniques are mainly involved in prediction-based computing. A wide variety of algorithms are available in data mining. Data mining has many modern data analysis techniques like classification and prediction which may be utilized for this purpose. Classification is...
Chapter
In digital communication secure communication sessions must be provided. The data transmitted across the global network should be more secure so that any Intruder can’t interpret the data. To improve the security features in case of data transmission and data hiding Cryptography and Steganography are the two popular methods. In this paper, we are p...
Article
The proliferation of Cloud Computing has opened new and attractive offerings for consumers. Cloud Service Providers promote and market packages of cloud computing services that cater to diverse opportunities and user applications. While this has obvious advantages, there are certain factors that are a cause for concern. Monitoring the underlying in...
Chapter
Elegant cultivation practices are the extreme significance for several economies to encourage its expansion and improvement and solve the problem like lack of food and food uncertainty to make sure that people will be happy. Moreover, these efforts typically need huge funds which are beyond the range of the people reach. Therefore, this one is the...
Article
The cloud network contains a number of nodes and the most powerful node is used to better run the virtual machine. Virtual machine allocation in the cloud network is a challenging task, as it is needed to find the most efficient node. We are proposing a mechanism by which we can find an efficient node to allocate a virtual machine for the execution...
Chapter
This chapter contains sections titled: Introduction Security Concerns of Cloud Computing Security Tools in Cloud Cloud Service Vulnerabilities Cloud Computing Security Best Practices Conclusion
Conference Paper
Full-text available
The world is moving fast and getting faster every day, with this changing world one needs to be dynamic and fast in every aspect of life. In this scenario vehicles are the only thing which helps people in a very faithful manner, so this also needs to be available easily and should be allowed in your country to ride it freely and legally. It is also...
Chapter
Big-data-analyzed finding patterns derive meaning and make decisions on data to produce responses to the world with intelligence. It is an emerging area used in business intelligence (BI) for competitive advantage to analyze the structured, semi-structured, and unstructured data stored in different formats. As the big data technology continues to e...
Chapter
In the modern world, information can comprise large amounts of data generated from personal and business use. Cloud computing provides an efficient way of handling those data. The introduction of Fog computing is a useful addition in the scenario of Cloud computing. Apart from data storing and processing, it offers various services to the users con...
Chapter
The rise in demand for cloud computing services has thrown sharply into focus the subject of energy efficiency and cooling methods. The words “green” and “computing” can often translate into commercial and production successes, vendors and consumers alike are keen to optimize the services offered through cloud data centers as much as possible. Whil...
Chapter
Although Outcome-Based Education has not been affluently realized and implemented in public education amid plentiful countries, it has been effectively espoused in the technical fields in India. Outcome-Based Education has become a substance of conversation in facade of public media, encompassing a tinge of squabble. Critics differentiate this modu...
Chapter
Cloud computing has opened up a whole new vista wherein it is possible to segregate and compartmentalize the process of constructing infrastructure with the intent of providing certain services to end users from the very business itself. In this paper, we have introduced a communication network that is aimed at augmenting network performance in sit...
Research Proposal
Full-text available
Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of...
Patent
This invention relates to a hybrid solar-wind twin charger for mobiles and in particular, this invention relates to a twin charger for mobiles in which its hybrid system has more desired output whereas the wind energy controller circuit regulates the wind energy by shunting or shorting the excess energy. This invention relates to a twin charger for...
Article
The world that we inhabit today is vastly dependent on digital data than it ever was before. The need to process and store digital information is of paramount interest. This, therefore, has given rise to techniques and processes that can considerably reduce access times of data stored. It is important to understand though, that despite recent advan...
Article
Full-text available
As one of the most sought-after technologies in the world today, cloud computing finds a prominent place among researchers, service providers, hardware and software engineers, and consumers alike. Among the key services provided by cloud computing, the most widely used is storage on the cloud. To ensure a high degree of reliability and an almost co...
Article
Full-text available
Crohn's disease is one class inflammatory bowel disease (IBD) affect any part from mouth to anus of gastrointestinal tract. Genome based wide association studies has fruitfully identified vulnerability of loci that can be triggered by environmental factors ensuing troubling inborn or intestinal blockade. In this paper, an effort has been made to as...
Article
Full-text available
Tracking of Quality of Service (QoS) parameters in real-time within a cloud computing system is a major challenge as it involves monitoring each every resource parameter. Such resources may constitute virtual machines, storage devices, network equipment, allied appliances, etc. Examination of physical resources being used to host the virtualized sy...
Article
Full-text available
Cloud storage is an emergent technology which is widely used nowadays although there are some certain restrictions. There are many applications such as software for processing customer records in consumed electricity, employee records in MNCs, accessing a single email from a mailbox etc. which involves retrieving a single data from a database consi...
Article
Full-text available
Cloud computing has firmly installed itself as a highly evolved concept for hosting and providing hardware and software resources across networks and the Internet. With rapidly emerging markets, cloud service providers have come up against a significant hurdle. Aspiring to remain firmly competitive in the long run, cloud service providers have real...
Article
Full-text available
There are technology and tools that allow complex processing of voluminous data, today. This paper proposes a similar system which aims at easing the process of data storage and retrieval on cloud networks with special focus on providing optimum access over varying Internet connection speeds. The proposed system relies on constantly calculating the...
Article
Full-text available
Mobile ad hoc network is a self organized & dynamic multi hop wireless network comprised of mobile nodes that communicate with each other without any fixed infrastructure. Different solution proposed for scaling down the large size of networks, one of the most intrinsic approaches is clustering techniques which evolved an important role in mobile a...

Network

Cited By