
Uttam GhoshMeharry Medical College · Department of Computer Science & Data Science
Uttam Ghosh
Doctor of Philosophy
About
182
Publications
22,242
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,720
Citations
Citations since 2017
Introduction
Associate Professor of Cybersecurity, SMIEEE
Additional affiliations
January 2018 - December 2021
August 2016 - December 2017
January 2016 - June 2016
Education
March 2007 - June 2013
Publications
Publications (182)
p>This is a comprehensive survey on Cybersecurity and Quantum Theory.
</p
p>This is a comprehensive survey on Cybersecurity and Quantum Theory.
</p
The purpose of the present study is to comprehensively evaluate the present status of the Internet of Things (IoT) in fintech ecology and ahead. Study finds that the concept of communication between the devices and financial technology are not new yet only a considerable number of studies are done on IoT in fintech. Study highlights that both the I...
The 5G ecosystem is designed as a highly sophisticated and modularized architecture that decouples the radio access network (RAN), the multi-access edge computing (MEC) and the mobile core to enable different and scalable deployments. It leverages modern principles of virtualized network functions, microservices-based service chaining, and cloud-na...
Communicable diseases spread quickly among people and animals by an infectious medium, including bacteria, viruses, etc. Recently, the world has witnessed the biggest outbreak of the century due to the novel coronavirus (COVID-19) disease. The immaculate amalgamation of sensor technology helps people to deal with such diseases. This led to motivati...
The articles in this special section focus on security, trust, and privacy solutions for intelligent Internet of Vehicular Things.
Network Slicing (NS) technique is comprehensively reshaping the next-generation communication networks (e.g. 5G, 6G). Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) predominantly control the flow of service functions on NS to incorporate versatile applications as per user demands. In the virtualized-Software Defined Ne...
In recent years, cyber-physical systems (CPSs) have gained a lot of attention from academia, industry and government agencies, considered to be the world’s third wave of information technology, following computers and the internet [...]
In this study, we developed a Deep AggregatedAssemble Learning(DAAL) model to diagnose Epilepsy that usestwo-step learning and generates the final prediction utilizing theoutput predictions of the level 0 classifier model. In level 0 CNN,RNN and ANN model has been used, and then a predictionalgorithm has been used which predicts the final output fr...
One common neurological condition Parkinson is one of the diseases which might make it difficult for a patient to live a regular life like other people. It is a progressive neurodegenerative condition that is difficult to detect in the early stages. Traditional EEG-based PD diagnosis relies on arduous, time-consuming feature extraction that is done...
This articles in this special section focus on the issues and challenges related to security, trust, and privacy (STP) for the Intelligent Internet of Vehicles (IoVT). The IoT evolution have given birth to several new groundbreaking applications, such as the IoVT, smart cities, and cyber-physical systems. For IoVT, the vehicles include various smar...
Human activity recognition can deduce the behaviour of one or more people from a set of sensor measurements. Despite its widespread applications in monitoring activities, robotics, and visual surveillance, accurate, meticulous, precise and efficient human action recognition remains a challenging research area. As human beings are moving towards the...
Recent studies have shown that computed tomography (CT) scan images can characterize COVID-19 disease in patients. Several deep learning (DL) methods have been proposed for diagnosis in the literature, including convolutional neural networks (CNN). But, with inefficient patient classification models, the number of 'False Negatives' can put lives at...
Social Media has been growing and has provided the world with a platform to opine, debate, display and discuss like never before. It has a major influence in research areas that analyse human behaviour and social groups, and the phenomena of social interactions is even being used in areas such as Internet of Things. This constant stream of data con...
The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service....
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications. Several attacks were imposed on 3DES, a...
Now a days in EFL procedure of education the ability of reading became as significant belief and personal-efficacy reading as a basic understanding for students. By monitoring the acknowledged participates under the ballpark figure of large studying and methods of understanding, the impact of their observation is premeditated on reading of each one...
Coronavirus is a fatal disease that affects mammals and birds. Usually, this virus spreads in humans through aerial precipitation of any fluid secreted from the infected entity's body part. This type of virus is fatal than other unpremeditated viruses. Meanwhile, another class of coronavirus was developed in December 2019, named Novel Coronavirus (...
Nature inspired algorithm plays a very vibrant role in solving the different optimization problems these days. The fundamental attitude of naturalistic approaches is to boost the competence, improvement, proficiency, success in the task except from it to help in underrating the energy use, cost, size. Several computing techniques are taking the ben...
Cloud computing provides a service-oriented computing model to cloud users on a metered basis. Most of the cloud data centers are running on fossil fuels. It elevates the carbon emissions to the environment. Green cloud computing is the fusion of greenness in cloud computing to address the issues related to energy consumption and environmental sust...
—Swift evolution of novel computing and communi�cation technologies in beyond 5G networks (B5G) opens up the
possibilities for advanced techniques to tackle various issues,
which can not be solved by the existing frameworks. As the
number of devices continuously increases, blockchain can provide
a secure platform for communication among all the use...
Recent advances in energy conversion, information technology, the internet, new types of web, and communication technologies have enabled the interconnection of all physical objects, including sensors and actuators. Web‐enabled smart objects have paved the way for smart homes by enabling innovative services. In this work, the idea of using time ser...
TO BUILD a sustainable ecosystem, healthcare reinforced by the Internet of Things (IoT-Health) is a sector that makes a very useful contribution to society. With the aging of the world's population, the ability to monitor and protect people at home reduces costs and increases the quality of life. IoT healthcare has become a market with great potent...
The concept of a programmable network instantiates dedicated network slices for Unmanned Aerial Vehicle (UAV)-based on-demand communication layers which improve the efficiency of overall network performance. With the increasing random service demands, network resource allocation, retention, and release have become serious networking challenges. Oft...
Industrial Control Systems and Supervisory Control and Data Acquisition (ICS/SCADA) systems are profound backbones of the national critical infrastructures and are essential to the sustainability of society since they help monitoring and controlling the cyber-enable services, such as energy, transportation, healthcare, etc. Modern SCADA systems con...
—The creation of non-invasive Neuro-headset technology has resulted in a variety of applications such as control,
automation, and vehicular control. Unmanned Aerial Vehicles
(UAVs), mostly used in aerial communication, is a growing field
of study that may be applied to both defense and commercial
applications. As the need for drone control grows, r...
Swift evolution of novel computing and communication technologies in beyond 5G networks (B5G) opens up the possibilities for advanced techniques to tackle various issues which can not be solved by the existing frameworks. As the number of devices continuously increase, blockchain can provide a secure platform for communication among all the users i...
Swift evolution of novel computing and communication technologies in beyond 5G networks (B5G) opens up the possibilities for advanced techniques to tackle various issues which can not be solved by the existing frameworks. As the number of devices continuously increase, blockchain can provide a secure platform for communication among all the users i...
There are some problems in the network public opinion monitoring, such as long monitoring time, low monitoring accuracy and so on. The network public opinion information of colleges and universities is collected through the public opinion information collection module; the collected network public opinion information is cleaned, filled, corrected a...
This paper proposes a secure and transparent pharmaceutical supply chain system using a permissioned blockchain network. This work focuses on (i) Enhancing the security of origin information across the supply chain with proper identification and authentication among the supplier, distributor, and other members of the system, (ii) Secure storing of...
The rapid developments in hardware, software, and communication technologies have facilitated the spread of interconnected sensors, actuators, and heterogeneous devices such as single board computers, which collect and exchange a large amount of data to offer a new class of advanced services characterized by being available anywhere, at any time, a...
The unrelenting quest of humans to make computers a rational decision-making and reasoning machine to perform operations much like humans led to the development of Computational Intelligence. The health industry has been endowed with medical decision-making procedures, which include but are not limited to diagnosis, automated image infusion, and mo...
The Internet of Things (IoT) is confronting a massive paradigm shift with all new technologies which have tremendous potential to upgrade the lifestyle to a brand new level. It is a versatile concept with wide-ranging applications in the Industry 4.0 revolution, including but not limited to home automation, scientific research, military equipment,...
Early prediction of diabetes is often needed for a clinically effective outcome due to the existence of a relatively long asymptomatic period. Because of its long-term asymptomatic period, about 50% of the people suffering from diabetes are unidentified. It is only possible to make an early diagnosis of diabetes by thoroughly examining both common...
Adoption of Industrial Internet of Things (IIoT) can transform how industries operate and integrate IIoT to optimize the use of its assets and autonomously predict the failures and its maintenance processes by upholding the security with increased connectivity. IIoT thrive to provide smart security for cyber-physical systems and production processe...
Online portals provide an enormous amount of news articles every day. Over the years, numerous studies have concluded that news events have a significant impact on forecasting and interpreting the movement of stock prices. The creation of a framework for storing news-articles and collecting information for specific domains is an important and untes...
Obtaining timely and accurate traffic information is one of the most important problems in intelligent transportation system, which will make vehicles run smoothly, avoid road congestion, save road running time and reduce vehicle energy consumption. In the current Internet of Vehicles system, the traffic management center can learn from the feedbac...
Software-defined networking (SDN) provides flexibility in controlling, managing, and dynamically reconfiguring the distributed heterogeneous smart grid networks. Considerably less attention has been received to provide security in SDN-enabled smart grids. Centralized SDN controller protects smart grid networks against outside attacks only. Furtherm...
The papers in this special section focus on artificial intelligence (AI) and machine learning-enabled reconfigurable wireless networks. In recent years, we have witnessed rapid proliferation on development of fully programmable, protocol-independent data planes and languages for programming and algorithms for Artificial Intelligence (AI) and Machin...
The digital revolution has had both good and bad effects since the 1980s. COVID-19 was identified only a few weeks after the pandemic began. COVID-19’s rapid spread over the world, combined with the virus’s originality, necessitated novel solutions. Professional communication across numerous platforms is increasingly reliant on social media. The co...
Education has a critical role in societal progress. A strong educational system produces good citizens. Countries that scrimp on education fall behind in the drive for progress. The advancement of ICT has resulted in major and positive advancements in the educational system, allowing knowledge to be accessed from anywhere. Numerous of people are un...
In this work, the federated learning mechanism is introduced into the deep learning of medical models in Internet of Things (IoT)-based healthcare system. Cryptographic primitives, including masks and homomorphic encryption, are applied for further protecting local models, so as to prevent the adversary from inferring private medical data by variou...
Cyber-physical systems (CPS) based on cloud computing provides resources over the Internet and allow a variety of applications to be deployed to provide services for various industries. We proposed IoT-based healthcare cyber-physical system that provides effective resource utilization at fog and cloud levels with minimum execution cost. In addition...
In recent years, the corporate and industrial sectors have been experiencing significant transformations in vehicle-to-vehicle (V2V) communication. It can improve vehicle safety by giving signals to other vehicles wirelessly. The latest software, hardware, and technologies are applied to develop trusted applications that make V2V communication more...
The Internet of Vehicles (IoV) is flourishing and offers various applications relating to road safety, traffic and fuel efficiency, and infotainment. Dealing with security and privacy threats and managing the trust (detecting malicious and misbehaving peers) in IoV remains the most significant concern. Artificial Intelligence is one of the most rev...
In the modern world, there is a huge increase in the usage of various technologies which may produce heterogeneous data. Using the latest security algorithms like Triple Data Encryption Standard (TDES), Rivest Shamir Adleman (RSA), Advanced Encryption Standard (AES) these (heterogeneous) data are transferred over the internet. Despite of such good...
Energy production, management, distribution, and effective consumption have become an uphill challenge, especially digital disruption and technological advancements. Most of the technology enablers and devices demand continuous energy supply for uninterrupted operation. Effective energy management is essential to ensure that optimal
energy is dist...
Mobile ad hoc cloud (MAC) is one of the key enabling technologies for realizing mobile cyber-physical-social systems (MCPSSs). A MAC is a distributed computing infrastructure that enables mobile devices to share computing resources in an ad hoc environment. Resource allocation is one of the key components of MAC and plays a vital role in system and...
The automobile sector is experiencing tremendous changes with the proliferation of vehicular communications, intelligent transport systems, and self-contained motor vehicles during the last decade. Recent improvements in software, hardware, and communication system to create different applications and standards make these technologies conceivable....
Numerous data indicate that student attention is declining during online lectures. Teachers cannot, however, anticipate and accept a loss in focus or concentration when teaching. So to detect the attentiveness of the student we have proposed a system using EEG signal so that the teacher can automatically be informed of any student's lack of attenti...
In this paper, a graph neural net-based routing algorithm is designed which leverages global information from controller of a software-defined network to predict optimal path with minimum average delay between source and destination nodes in software-defined networks. Graph nets are used because of their generalization capability which allows the r...
To build a sustainable ecosystem, healthcare reinforced by the Internet of Things (IoT-Health) is a sector that makes a very useful contribution to society. With the aging of the world's population, the ability to monitor and protect people at home reduces costs and increases the quality of life. IoT healthcare has become a market with great potent...
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT) emerged as a booming technology that can provide better quality and facilities for the residents of smart cities. Smart cities can offer several services and have several applications in healthcare, transportation, education etc. Despite such a potential vision, the...
In recent years, vehicle theft has been increasing remarkably. It is a stigma to our society. The impacts of vehicle theft have been drastically affecting the social safety and economic condition of the whole world because of unavailability of a proper theft detection mechanism. The few existing vehicle anti-theft systems suffer from major problems...
Faster and energy-efficient data transmission is desired for massive Internet of Things (IoT) applications in sixth-generation networks. In such high speed networks, providing reliable data delivery with low delay, while maintaining energy-efficiency, is a challenging task. In this paper, a deep learning-based stochastic routing approach, called sm...
In this paper a memory dependent EOQ model has been studied with time varying holding cost, deterioration of the items and uniform demand rate. Since the financial variables possess memories, which make it appropriate for developing the memory dependent inventory model. To include the memory effect, fractional order derivative and fractional order...