@kgec.edu.in
Associate Professor, Department of Computer Science and Engineering
Kalyani Government Engineering College, Kalyani, India
Computer Science, Computer Vision and Pattern Recognition, Artificial Intelligence, Computer Networks and Communications
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Gopa Mandal, Santanu Dam, Kousik Dasgupta, and Paramartha Dutta
Springer Nature Switzerland
Rakhi Chakraborty, Kousik Dasgupta, Debashis Das, Sourav Banerjee, and Uttam Ghosh
Springer Nature Switzerland
Arka Dutta, Abhishek Baral, Sayan Kundu, Sayantan Biswas, Kousik Dasgupta, and Hasanujaman
Springer Nature Switzerland
Debashis Das, Sourav Banerjee, Kousik Dasgupta, Pushpita Chatterjee, Uttam Ghosh, and Utpal Biswas
ACM
Fifth-generation (5G) wireless networks are now operational to deploy all over the world. The technology of 5G’s objective is to link heterogeneous machines and devices with significant improvements high quality of service (QoS), internet bandwidth, and improved system throughput to enable several upright applications. Despite all these benefits that 5G will provide, still, significant issues need to be resolved, such as decentralization, transparency, and risks associated with data interoperability, network privacy, and security vulnerabilities. Modern networks link an enormous number of devices to the Internet, and in this complicated situation, the use of BC and SDN has been effectively advocated to assure security, privacy, and secrecy. This study offers a blockchain-enabled SDN framework for securing transactions that makes use of Software Defined Network (SDN) and Network Function Virtualization (NFV) to overcome these issues. The proposed framework can address the man-in-the-middle attack between control and data plane in SDN networks. A controller authentication scheme is provided using smart contracts. Smart contracts automatically authenticate the SDN controller to increase the efficiency of controller verification. The communicated data can also be authenticated using smart contracts. The proposed framework can enhance network transparency, data security, and user privacy. Each SDN controller can access verifiable data using the proposed framework.
Debashis Das, Sourav Banerjee, Rakhi Chakraborty, Kousik Dasgupta, Pushpita Chatterjee, and Uttam Ghosh
IEEE
Cyber-Physical Systems (CPS) are becoming increasingly common in various domains, including industrial control systems, smart cities, and healthcare. However, the security of CPS is a major concern due to its interconnected and heterogeneous nature. In this paper, we propose a Blockchain-based security management framework for CPS to address the security challenges of CPS. The framework leverages the unique features of Blockchain, such as decentralization, immutability, and transparency, to ensure the integrity and confidentiality of data exchanged among devices. We describe the architecture of the proposed framework and explain its key components, including Blockchain nodes, smart contracts, and security policies. Our work contributes to the field of CPS security by providing a novel approach to secure CPS using Blockchain technology. The proposed framework can be applied to various domains, including smart cities, healthcare, and industrial control systems. The framework can also be extended to handle more advanced security scenarios, such as dynamic security policies and real-time threat detection. In this framework, we build a decentralized controller-to-controller (C2C) communication system to make CPS more scalable, secure, private, and reliable. We make a miner-as-a-controller selection algorithm to choose a miner controller for a given session.
Joydev Hazra, Aditi Roy Chowdhury, Kousik Dasgupta, and Paramartha Dutta
Springer Nature Singapore
Debashis Das, Kousik Dasgupta, and Utpal Biswas
Elsevier BV
Prakash Banerjee, Saptak Bhattacherjee, Kousik Dasgupta, and Shibaprasad Sen
Springer Science and Business Media LLC
Arnab Dey and Kousik Dasgupta
Springer Singapore
Joydev Hazra, Aditi Roy Chowdhury, Kousik Dasgupta, and Paramartha Dutta
Springer Science and Business Media LLC
Prakash Banerjee, Saptak Bhattacherjee, and Kousik Dasgupta
Springer Nature Singapore
Aditi Roy Chowdhury, Joydev Hazra, Kousik Dasgupta, and Paramartha Dutta
Springer Science and Business Media LLC
Ratan Kumar Basak, Ritam Chatterjee, Paramartha Dutta, and Kousik Dasgupta
Springer Science and Business Media LLC
Arnab Dey and Kousik Dasgupta
IEEE
The demand of facial expression based computing is increasing day by day as this can be widely used in various sectors and are in huge demand across the globe. Human being displays their emotions through facial expressions. The aim of this research is to classify human emotions in live environment. We have implemented and trained the model using two powerful machine learning models namely Gradient Boosting (GB) Classifier and K-Nearest Neighbour (KNN) approach for classification of facial expressions with best accuracy possible. We have used combination of various datasets for this study. The efficiency of the model performed much better when we convert the image into grayscale and apply CLAHE equalization technique. We have used a novel approach for recognizing facial expressions with webcam using Gradient Boosting approach. We achieved maximum accuracy of 81% using GB Classifier and 73% utilizing K- Nearest Neighbour algorithm. The training time is faster than deep learning methods and the results prove to be efficient. The model is trained after finding the best hyper parameters. The model can be used to track the mood of the people in real-time especially during pandemic situation.
Santanu Dam, Gopa Mandal, Kousik Dasgupta, and Parmartha Dutta
IGI Global
This book chapter proposes use of Ant Colony Optimization (ACO), a novel computational intelligence technique for balancing loads of virtual machine in cloud computing. Computational intelligence(CI), includes study of designing bio-inspired artificial agents for finding out probable optimal solution. So the central goal of CI can be said as, basic understanding of the principal, which helps to mimic intelligent behavior from the nature for artifact systems. Basic strands of ACO is to design an intelligent multi-agent systems imputed by the collective behavior of ants. From the perspective of operation research, it's a meta-heuristic. Cloud computing is a one of the emerging technology. It's enables applications to run on virtualized resources over the distributed environment. Despite these still some problems need to be take care, which includes load balancing. The proposed algorithm tries to balance loads and optimize the response time by distributing dynamic workload in to the entire system evenly.
Aditi Roy Chowdhury, Joydev Hazra, Kousik Dasgupta, and Paramartha Dutta
Springer International Publishing
Suchira Banerjee and Kousik Dasgupta
Springer Singapore
Jyotsna K. Mandal, Somnath Mukhopadhyay, Paramartha Dutta, and Kousik Dasgupta
Springer Science and Business Media LLC
Gopa Mandal, Santanu Dam, Kousik Dasgupta, and Paramartha Dutta
Springer Singapore
Prakash Banerjee, Kousik Dasgupta, Subhajit Chatterjee, and Rajib Banerjee
IEEE
Presently abnormality or anomaly detection from video streams of surveillance system has drawn quite a significant research interest. Modern surveillance system uses pervasive CCTV for recording surveillance video, so recording or capturing of video is not a problem. The main difficulties lie in the availability of human resources to observe and analyze the video clips for long hours. They are not only very exhaustive but are mostly quite costly. Automatically finding of abnormal or risky behavior significantly decreases the overhead to label and annotate the surveillance videos of huge number of hours. In the proposed technique abnormal changes in a surveillance frame is detected and achieved through image quality estimation by using Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM). The proposed anomaly detection is done automatically at the remote place of surveillance where uncorrelated (less similar) frames of the video represents anomalies or abnormality. False alarms are avoided by sending the reference and abnormal frame the control room using 1-D DWT and 2-D DWT at the remote surveillance place. The results reported are quite encouraging and the model will suitably work in any wireless communication domain
Lakshmi Mandal and Kousik Dasgupta
IEEE
Many times we use Vedic Sutras knowingly or unknowingly. For example, when we use i<-i-1 or i<-i+1 in our programming we use ‘EkanyunenaPurvena’ and ‘EkadhikinaPurvena’ Sutras respectively. Similarly, in computer's multiplier unit, many Vedic Sutras are being used. In our proposed application we have developed user interface for Vedic Multiplication and Vedic Addition in a calculator which is designed for Android based devices. This application reduces the complexity of mathematical calculations with the help of Vedic Mathematics. Vedic Multiplication and Vedic Addition, in our proposed calculator, can provide faster result than traditional methods. On the other hand, Vedic Multiplication and Vedic Addition consumes less power. Therefore, our proposed application not only saving power consumption but also speeds-up basic mathematical operations and reduces the computational overhead.
Gopa Mandal, Santanu Dam, Kousik Dasgupta, and Paramartha Dutta
Springer Singapore