Papers by Rajdeep Chowdhury
Proceedings of the 3rd International Conference C2E2, Mankundu, West Bengal, India, 15th-16th January, 2016., 2016
International Journal of Advanced Computer Science and Applications, 2015
The facets that this image editor deals with to innovate in designing this software which would h... more The facets that this image editor deals with to innovate in designing this software which would help us in image viewing and editing, thereby making modifications in digital images to view different effects without destroying the original image.
In this paper, the Double Based Number System is shown along with its allied applications. We wou... more In this paper, the Double Based Number System is shown along with its allied applications. We would like to discuss the application of this Number System in the area of digital signal processing. We would like to illustrate and emphasize the discussion with concrete examples of finite impulse response filtering. The application of Double Based Number System is mainly in the area of digital signal processing and finite impulse response filtering, which also allows us for an efficient implementation of the basic arithmetic operations and considerable hardware reductions in look-up table size. Number Systems are primarily chosen to enable a reduction of the complexity of the arithmetic operations as the computational complexity of algorithms crucially depends upon the number of zeros of the input data in the corresponding Number System. Experimentally, it has been observed and shown that the expected number of zeros in the representation of arbitrary integers in the Binary Signed-digit Number System tends to show that, on average for long word.
The data warehouse architectural design using proposed pseudo mesh schema have been the conceptua... more The data warehouse architectural design using proposed pseudo mesh schema have been the conceptualization backbone towards design, analysis and performance enhancement of the data warehouse by implementation and simulation of P2P technology on proposed pseudo mesh architecture. A set of dimension tables interlinked with one another, ensuring enhancement in the time complexity of the data warehouse is presented through the formulation of the proposed work. Fact tables and dimension tables have been used here, in their normalized form, to diminish redundancy. The notion of pseudo mesh schema architecture, conforming interlinking of all dimension tables and fact tables to one another, have been proposed at the very inception of the devised work. The number of links between various peers in the system could be precisely calculated using n(n-1)/2, wherein n exemplifies the number of peers in attendance within the structure. To comprehensively emphasize the simulation methodology adhered, diverse networks are associated to each other using routers. The structure is evidently flexible, as any increase or decrease of one or more databases within the structure, does not affect the entire schema of the data warehouse in concern. The structure uses the perception of fact views connecting with existing dimension tables. Peer-to-Peer or P2P technology enables unswerving allotment of computer resources amid two or more computers within a computer network. In a P2P technology, apiece computer operate as mini server, where apiece computer could share its resources with other computers proficiently. The equivalent notion has been implemented in the data warehouse architectural design using proposed pseudo mesh schema, where apiece dimension table in the architecture act as super peer and in consequence form a peer community, with collection of peers. Apiece peer within similar peer community or from unlike peer community could have unswerving relationship amid them using view fact table(s). The improvement in efficiency by reduction of ineffectual searches and utilization of fewer resources is ensured by formulating unswerving exchange of records amid peers using view fact table(s).
Data warehousing has evolved with every passing decade and it has come a long way from its incept... more Data warehousing has evolved with every passing decade and it has come a long way from its inception and the modern era has made it an adequate part of pre-existing analytical methodologies. In the present status, data warehousing has evolved into a system which is capable of furnishing key performance metrics to high-level management, ensuring capability of analytical strength to middle-level management and aligning to the ability of providing corrective data to-and-fro back to low-level based on the basis of information derived from the analytical system.
Data warehouse is a set of integrated databases deliberated to sustain decision-making and proble... more Data warehouse is a set of integrated databases deliberated to sustain decision-making and problem solving, embracing highly abridged data. Data warehouse happens to be progressively acknowledged subject for contemporary researchers with respect to contemporary inclination of industry and organizational purview. Data warehouse is one of the imperative contrivances for decision support system. Data warehouse is a repository which contains all the organizations data in entire capacity. Concentration of hacking has been intensifying diurnally; hence the incorporation of security mechanism has become a decisive concern for any organization in shielding the sensitive data.
A set of dimension tables interlinked with one another, ensuring improvement in the time complexi... more A set of dimension tables interlinked with one another, ensuring improvement in the time complexity of a data warehouse is presented through the formulation. Fact tables and dimension tables have been used here, in their normalized form, to diminish redundancy. The notion of pseudo mesh schema architecture, conforming interlinking of all dimension tables and fact tables to one another, have been proposed at the very inception of the devised work. The number of links can be precisely calculated using n (n-1)/2, wherein n embodies the number of tables present within the structure. The structure is obviously a flexible one, as any increase or decrease of one or more databases within the structure, doesn't affect the entire schema structure of the data warehouse in concern. The structure uses the concept of fact views to connect with the existing dimension tables.
Geo-Encryption is an encryption modus operandi that uses positional information such as latitude,... more Geo-Encryption is an encryption modus operandi that uses positional information such as latitude, longitude and altitude. The modus operandi endows with an additional stratum of security over the traditional cryptographic system. The proposed system exchanges information and keys in a secured mode, wherein exchange of keys, also known as "positional-lock" is ensured in the first phase and exchange of information is ensured in the second phase.
Solar energy primarily refers to the proper employment of solar radiation for practical ends. It ... more Solar energy primarily refers to the proper employment of solar radiation for practical ends. It should also be kept in mind that all renewable energies barring geothermal energy and tidal energy obtain their energy from the sun. Solar energy is an alternative and an unconventional source of energy which is renewable and obtainable in massive amount to congregate the global need as well as ensure it to be environmentally secured. The formulation of the compiled paper emphasize on the manufacturing energy from solar radiation using photovoltaic cells. An assortment of storage systems for solar energy (converted into other forms, like, Sealed Lead Acid (SLA) Batteries, Phase Change Storage and Solar Pond, etc.) are also being discussed amid. The focal intention of the research work is to design and develop a low cost solar powered lighting system using Compact Fluorescent Lamp (CFL) technology for India, so that it could gratify the nation's emergent demand for electricity, sustai...
2012 International Conference on Informatics, Electronics & Vision (ICIEV), 2012
The paper emphasizes on the effort of using the concept of gears and their distinguished genre in... more The paper emphasizes on the effort of using the concept of gears and their distinguished genre in producing a unique technique for secured data transfer over a network.
2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014
Data warehouse is a set of incorporated databases deliberated to protract decision-making and pro... more Data warehouse is a set of incorporated databases deliberated to protract decision-making and problem solving, espousing highly condensed data. Data warehouse happens to be increasingly accepted subject for contemporary researchers with respect to contemporary proclivity of industry and organizational purview.
2014 1st International Conference on Non Conventional Energy (ICONCE 2014), 2014
Automation is an imperative expression, applied to every field for enhancement in the speed of hu... more Automation is an imperative expression, applied to every field for enhancement in the speed of human life in contemporary, technical and societal facet. Nowadays, automatic instruments confer immense influence in corporate and industrial existence. In the compiled paper, advancement and up gradation aspects en route for enhancement of rubber plant industry performance is ensured essentially by introducing scholastic support through the proposed CDGN Model, adhering to solar energy. Solar energy, specifically apposite employment of solar radiation for realistic ends, should be reserved in wits, and that all renewable energies excluding geothermal energy and tidal energy attain their energy from the sun is conformed. Solar energy is an unconventional foundation of energy which is renewable and available in considerable quantity to assemble the global need as well as make certain it to be environmentally tenable, in diversified perspective. Grounding of the compiled paper accentuate on automated manufacturing of the rubber products like tires from raw materials, with aid of solar radiation using photovoltaic cells. The basic notion that is conjured up amid the compilation of the formulated paper is to furnish the concerned rubber plant industry considered here as component of the case study, with automation, advancement and up gradation aspects en route for performance enhancement, in addition to the scholastic aid, employing the proposed CDGN Model.
2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), 2012
The work presents the manner in which the Logarithmic Formula Generated Seed Based Cryptographic ... more The work presents the manner in which the Logarithmic Formula Generated Seed Based Cryptographic Technique [LFGSCT] (de)ciphers the fragmented plain text, maintaining certain modus operandi. The model formulation of the proposed technique has been conceptualized and devised to generate arbitrary sequence of characters, in order to engender the seed using the generated logarithmic formula. The impetus following seed generation is encryption of the actual text based on the proposed Alphanumeric Number System [ANS]. Portraying in a nutshell would emphasize that the actual text has been divided into blocks of ten characters, ordered by the proposed number system. After the fragmentation, the encryption technique continues with the use of the generated seed, followed by the proposed Rubik Rotation Algorithm [RRA], and engaged to randomize the encrypted text. The concept fundamentally embodies the crispness of the proposed technique. During the decryption technique, the seed is retrieved from the cipher text, and an effortless backtracking logic is pursued to restore the actual text. The proposed methodology can be used with utmost ease for both encryption and decryption of any text at disposal. The proposed methodology will ensure immense use during encryption of emails, which is enormously important as well as significant in data transfer and network security.
Business Process Management Journal, 2003
Electronic customer relationship management (eCRM) has become the latest paradigm in the world of... more Electronic customer relationship management (eCRM) has become the latest paradigm in the world of customer relationship management. Recent business surveys suggest that up to 50 per cent of such implementations do not yield measurable returns on investment. A secondary analysis of 13 case studies suggests that many of these limited success implementations can be attributed to usability and resistance factors.
Despite of modern findings in security mechanisms, a vast scope lies ahead of researchers to exte... more Despite of modern findings in security mechanisms, a vast scope lies ahead of researchers to extend their innovative proposals in the field of network security, especially in the genre of cryptography. The formulation of the proposed technique lies with the essence of cryptography, in alliance with steganography, restoring the USP of the proposed technique. The proposed technique involves rich utilization of distinct secret keys, matrices and scripter. The concept of image hiding is an innovative tool adhered by the researchers to culminate the corresponding cipher text in the form of a stego image. An effective methodology of steganography incorporated in the paper, ensuring an addition to the technique using the formulated object in devising the flow of the model, coined as RNS Model, has been extensively attained. The paper highlights the concept of image hiding through the development of effective algorithm based on a proposed model, which can be quite effectively incorporated in business organizations to address the issues of data security.
Uploads
Papers by Rajdeep Chowdhury