Papers by Anirban Chakraborty
CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES , 2021
According to the World Health Organization, the coronavirus is one of the most common infections,... more According to the World Health Organization, the coronavirus is one of the most common infections, with the virus having infected more than 200 nations and infecting more than 81 million individuals so far. Many countries and health organisations are frantically attempting to halt the spread of the new coronavirus illness
MIDDLE EUROPEAN SCIENTIFIC BULLETIN , 2021
Artificial intelligence (AI) has strong logical reasoning abilities and the ability to learn on i... more Artificial intelligence (AI) has strong logical reasoning abilities and the ability to learn on its own, and it can mimic the human brain's thought process. Machine learning and other AI technologies have the potential to greatly enhance the existing method of anticancer medicine development. However, AI currently has several limits. This study investigates the evolution of artificial intelligence technologies in anti-cancer therapeutic research, such as deep learning and machine learning. At the same time, we are optimistic about AI's future.

CENTRAL ASIAN JOURNAL OF MEDICAL AND NATURAL SCIENCES , 2021
Artificial intelligence (AI) has infiltrated our everyday lives, and there have been extremely pr... more Artificial intelligence (AI) has infiltrated our everyday lives, and there have been extremely promising applications of AI in the area of health in the previous decade, including medical imaging, in vitro diagnostics, intelligent rehabilitation, and prognosis. Breast cancer is one of the most prevalent malignant tumors in women, and it poses a major danger to both physical and emotional health. Early detection of breast cancer by mammography, ultrasound, and magnetic resonance imaging (MRI) may greatly improve patients' prognoses. AI has shown exceptional performance in picture recognition tasks and has been extensively researched in breast cancer screening. This study discusses the history of artificial intelligence (AI) and its applications in breast medical imaging (mammography, ultrasound, and MRI), such as lesion recognition, segmentation, and classification; breast density evaluation; and breast cancer risk assessment. In addition, we examine the limitations and future prospects of using AI in medical imaging of the breast.

Information Technology In Industry, Web Of Science(SCI) Indexed, 2021
Home protection and privacy have become one of the most critical aspects in today's world. As tec... more Home protection and privacy have become one of the most critical aspects in today's world. As technology progresses at an exponential pace, the times are not far ahead for each house to be fitted with sophisticated security systems to deal with regular burglary and theft. But as one side of the tech progresses, so do its detrimental counterparts. DES encryption can be an indicator of how easily an encrypted piece of information can be deciphered. Not long after its release, DES encryption was referred to as 'unsafe' and with today's modern application, anything like DES might be an open invitation to hack. With many developments in the field, the technology has, in many respects, surpassed the use of biometrics (finger prints). Face recognition, nowadays, is present in almost every smart device that has some piece of information stored that holds importance to its users. With facial recognition gaining popularity, many tech companies have come with their own patent to make a technology related to Facial Recognition on the market. This paper suggests a somewhat related concept as to how home protection can be improved by using a face detection and recognition algorithm (Haar Cascade Classifier).

IJARCS, EBSCO Indexed, 2020
Image or video Face Identification is a popular subject for research in biometrics. Most public p... more Image or video Face Identification is a popular subject for research in biometrics. Most public places usually have video capture surveillance cameras and these devices have an important safety benefit. The identification of the face has played a significant role in the monitoring system since the entity does not need assistance. It is widely recognized all over the world. Uniqueness and Validation are the main benefits of facial recognition over other biometrics. Since, Human face is a highly variable and dynamic subject, the detection of the face in computer vision is a difficult problem. Precision and Recognition speed are a big problem in this area. The purpose of this paper is to test various facial detection and recognition approaches, and provide a full solution for facial detection and recognition in an image-based manner with a higher degree of accuracy and an improved response time. This suggests a solution focused on experiments carried out on different facial rich datasets with respect to topics, images, attitudes, ethnicity and color.

International Journal of Innovative Research in Computer Science & Technology (IJIRCST)- JGate Indexed, 2020
Wireless mobile computing is type of computation by which various mobile gadgets gives services t... more Wireless mobile computing is type of computation by which various mobile gadgets gives services to us at numerous ways. In wireless computing of mobile one can find the working of sensors ad hoc networks odysseys and rover etc. Not only has this wireless based mobile computing service also suggested that a user can take the services of networks any time anywhere without any disturbances[1]. This includes the physical location time place authentication etc. which paves way for making mobile services successful. The research paper also describes about merits and disadvantages of wireless mobile computing along with many challenges faced by it in remote areas. Additionally, this paper also states how we get adapted to the ecosystem of wireless network from the long process of wired networks. Mobile agent is one of the most important elements in computing. It is clearly described in this research paper. This research paper also throws ample amount of light on the working of sensors and its unique features[12]. Wireless computing makes our life totally comfortable by its outstanding services. Here all useful services of that are clearly mentioned. At last the conducting of wireless mobile computing in all areas of the world is much more important for the welfare of future generations [9]. This research paper describes about the steps with measures needed in implementing wireless computing everywhere.

International Organisation Of Research And Development (IORD)- Proquest Indexed, 2020
The purpose of this article is to estimate the purchasing and sale opportunities of houses on the... more The purpose of this article is to estimate the purchasing and sale opportunities of houses on the market by Machine learning techniques. For financial stability, the housing sector is quite critical. People seeking to purchase a new house appear to be more cautious in their expectations and sales tactics analyzing historical industry patterns and pricing levels, as well as potential changes. The index of our method consists of the price of the house and its efficiency metrics, such as the amount of renovation, the distance from the city center, the construction programs, the height of the property, the floor and the location of the apartment in the home, and there are several other criteria. Service includes a database that recognizes the preferences of its clients and then integrates machine learning software. The program will enable consumers invest in real estate without approaching brokers. It therefore reduces the uncertainties inherent with the deal. The program has a login ID and a pin. At the same time, when the user searches for an attribute, the value of the original attribute and the value of the predicted attribute are displayed.
Asian Journal Of Multidimensional Research(AJMR)-ICI Indexed, 2020
This paper provides a short review and future trends of the Artificial Neural Network (ANN) predi... more This paper provides a short review and future trends of the Artificial Neural Network (ANN) prediction methodology. It is used to maximize the prediction of the model with less experimental data dependency. In addition to various ANN training courses, the basic steps in MATLAB are recorded. The preparation is directed at reducing average error. The Artificial Neural Network model can effectively be used to forecast performance parameters that helps in picking up the process preparation and optimization of the machine parameters optimally.
Mukt Shabd- UGC Approved Journal, 2020
The Learning Machine is a data analysis method that automates the creation of an analytical model... more The Learning Machine is a data analysis method that automates the creation of an analytical model. It is an imaginary branch of knowledge that focuses on the assumption that machine data can be observed, that trends and decisions can be taken with a minimum of human capacity. Algorithms used for machine learning submitted data can be generated on the basis of new results.
International Journal of Trend in Scientific Research and Development (IJTSRD), 2020
Deep learning is a collection of machine learning algorithms utilizing multiple layers, with whic... more Deep learning is a collection of machine learning algorithms utilizing multiple layers, with which higher levels of raw data are slowly removed. For example, lower layers can recognize edges in image processing whereas higher layers may define concepts for humans such as numbers or letters or faces. In this paper we have done a literature survey of some other papers to know how useful is Deep Learning and how to define other Artificial Intelligence things using Deep Learning.

International Research Journal of Modernization in Engineering Technology and Science(IRJMETS), 2020
VAD is a reason for the trouble of discrimination between external noise and voice. VAD is an iss... more VAD is a reason for the trouble of discrimination between external noise and voice. VAD is an issue and for that reason various techniques have been suggested. Some are based upon power spectral density derived characteristics, and others utilize the signal periodicity. The goal of this paper is analyzing the combined utilization of resource and also filter functionality. A shared information based analysis demonstrates the source related functions, especially the proposed people, are much more discriminatory. The qualities are in addition of the input of a multi condition version education, synthetic neural community classifier. The integration of resource and also filter info is suggested as two approaches: the fusion of decision and function. Our tests demonstrate that the corresponding mistake speed of choice fusion is definitely decreased by 3%. In relation to the 150 minutes of information collected in world that is real, the last program proposed is when compared with 4 state of the art strategies. The program proposed results in a big improvement in reliability under all the conditions probably in the most complex VAD (twenty four per cent total, average) because of its strong source features, its multi condition instruction and also its highly effective info fusion.

International Journal of Progressive Research in Science and Engineering(IJPRSE), 2020
Cyber protection is obviously the discipline that will profit almost everyone from the introducti... more Cyber protection is obviously the discipline that will profit almost everyone from the introduction of AI. This is challenging to render a proposal to defend from strong system assaults. The usage of artificial intelligence techniques will help a lot. Where the weakness and slowness of conventional defence systems might be, artificial intelligence approaches may boost their complete implementation of the security program and provide dramatically improved protection against a growing range of cyber threats. While AI's information protection policies provide positive incentives, their usage has legitimized fears and threats. In order to promote better cyber protection initiatives, an alternate viewpoint of cyber earth connections is required where AI is reinforced with human consciousness, because neither people nor AI alone have historically proven to be effective in this specific field. Socially cautious use of AI approaches to mitigate more associated problems and risks is therefore necessary.
International Journal of Engineering Applied Sciences and Technology(IJEAST), 2020
Learning machine is a data analytical tool which automates the creation of the analytical model. ... more Learning machine is a data analytical tool which automates the creation of the analytical model. It's an imaginary branch of knowledge focused on the assumption that machine data can be observed, trends and with that decisions can be taken with minimum human ability. Algorithms used for the machine learning submit data and based on that new results may be generated.

International Journal of Advances in Engineering and Management (IJAEM), 2020
This paper deals with researches and literature reviews on Deep Neural Network. Inathe field of b... more This paper deals with researches and literature reviews on Deep Neural Network. Inathe field of biometrics, authentication, access-control, compliance, digital card, surveillance systems and face recognition (FR), identifying the procedure of human beings using facial imagery, is a multitude of hands-on applications. Convolutionary neural networks (Cov-Nets) have proven to be successful for FR, a form of deep networks. Some pre processing steps such as sampling must be taken for real-time systems before using in CovNets. Nevertheless, then full images are also transferred (all pixel values) to Cov-Nets as a input and all steps are performed by the network (feature collection, function filtering, training). That is why Cov-Nets are often difficult and time-taking to implement. Cov-Nets are in the growing stages, with very small accuracy, so they have high future scope. This paper offers a new sight of utilizing a deep neuralanetwork for facial recognition .A new approach is developed in this paper. In this approach facial features which are extracted are provided in place of providing raw pixel values asainput. This reduces the difficulty and gives the Yale faces data set accuracy of 97.05%.
International Journal of Advance Research and Innovative Ideas in Education(IJARIIE), 2020
This paper deals with Literature Review on some papers based on Neural Networks and also provides... more This paper deals with Literature Review on some papers based on Neural Networks and also provides Hypothesis on the types of Neural Networks. Neural Networks is now used in almost every field. It is very advanced and can work like Human Brain. It has different layers through which it can work and solve problems. Many weights are used to solve problems. Brief description of various uses of Neural Networks are stated in this paper.

International Journal Of Science And Research (IJSR), 2020
Late progress on wireless sensor networks has brought together numerous new conventions, particul... more Late progress on wireless sensor networks has brought together numerous new conventions, particularly for sensor networks with the critical concern of energy awareness. Such routing arrangements can vary from the implementation and design of the network. A reduced power strategy can be compiled and built by estimation to get emergency use of power and networking for Wireless Sensor Network for extending the lifespan of the Wireless Sensor Network. Sensor nodes are frequently collected in disjoint non-covered subsets called clusters to maintain a high adaptabilite and better data aggregation. This enables cluster hierarchical WSNs to increase life span for WSN, which combine the effective use of restricted-sensor node assets to reduce energy use. The motto of the paper is to give a brief idea of the advantages of all types of protocols of Wireless Sensor Networks.

International Journal Of Advanced Research in Engineering And Technology(IRAJET)-Scopus Indexed, 2020
Machine Learning is the core argument and artificial aspect classification of problem learning an... more Machine Learning is the core argument and artificial aspect classification of problem learning and decision making. Scientists therefore introduce machine learning, often used in the artificial mind. A significant method to automate a wide variety of activity like human brain is the artificial intelligence preparation framework. Machine Learning techniques require a planning program to gain search control of information for different applications automatically. Machine Learning plays an important role in the field of robotics. It contributes to decision-making and improves machine efficiency. Machine learning is applied in a large amount of application. It is the principle concept of intelligence system that helps to introduce artificial intelligence ingeniously and it also make artificial intelligence very advanced.

International Research Journal Of Engineering And Technology (IRJET), 2020
Private health records (PHR) is a variant of the patient details exchange for nursing, which enab... more Private health records (PHR) is a variant of the patient details exchange for nursing, which enables PHR homeowners to easily share their private health experience with the user, but not just as friends but also as experts of concern. And the family is talking of attribute-based primarily encoding (ABE) schemes for checking the management by the PHR owners of the outsourced PHR expertise. A patient-centered feature, focused primarily on PHR, which can provide flexible admission, as physicians, as single patients, as family and friends, for all interested people. Every PHR file is encrypted Associate in Nursing keeping at the edge of a function focused mostly access policies that control permissions to access the encrypted property in a highly-interest cloud. The primary authorisation role in the proposed program Associate in Nursing enables the access of individuals requiring them to enter the related PHR tool by the use of the proxy re-encryption theme to decrypt the specified PHR details. Mostly, the multi-authority feature is predominantly encoded. PHR information includes confidentiality and privacy.
Uploads
Papers by Anirban Chakraborty