Somen Debnath

ORCID: 0000-0001-5422-004X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Liquid Crystal Research Advancements
  • Privacy-Preserving Technologies in Data
  • Molecular spectroscopy and chirality
  • Blockchain Technology Applications and Security
  • graph theory and CDMA systems
  • Plant Reproductive Biology
  • Control and Dynamics of Mobile Robots
  • Silkworms and Sericulture Research
  • Caching and Content Delivery
  • Surfactants and Colloidal Systems
  • Multi-Criteria Decision Making
  • Multi-Agent Systems and Negotiation
  • Robotics and Sensor-Based Localization
  • IoT-based Smart Home Systems
  • Robotic Path Planning Algorithms
  • Rough Sets and Fuzzy Logic
  • Genetic diversity and population structure
  • Fuzzy and Soft Set Theory
  • Security and Verification in Computing
  • User Authentication and Security Systems
  • Bluetooth and Wireless Communication Technologies
  • Sentiment Analysis and Opinion Mining
  • Sensor Technology and Measurement Systems

Mizoram University
2012-2024

Tripura University
2018-2024

Assam University
2013-2021

Pennsylvania State University
2005

University of Tulsa
2000-2005

Abstract Cloud computing provides outsourcing of services at a lower cost, making it popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, and reliability compared traditional methods. However, despite the benefits disaster recovery, scalability, resource backup, some organizations still prefer over due concerns about correctness security. Data integrity is critical issue...

10.1186/s13677-024-00605-z article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2024-02-15

Web pages - especially dynamically generated ones contain several items that cannot be classified as the "primary content," e.g., navigation sidebars, advertisements, copyright notices, etc. Most clients and end-users search for primary content, largely do not seek noninformative content. A tool assists an end-user or application to process information from automatically, must separate content sections" other sections. We call these sections "Web page blocks" just "blocks." First, a segment...

10.1109/tkde.2005.138 article EN IEEE Transactions on Knowledge and Data Engineering 2005-08-03

Liquid crystal (LC) materials are currently the dominant electronic in display technology because of ease control molecular orientation using an electric field. However, this requires fabrication two polarizers to create operational displays, reducing light transmission efficiency below 10%. It is therefore desirable develop new technologies enhance while maintaining or improving other properties such as modulation speed orientation. Here we report a uniaxial-oriented B7 smectic liquid...

10.1021/acsami.5b10554 article EN ACS Applied Materials & Interfaces 2016-01-19

Achiral unsymmetrical 2-methyl 3-amino-benzoic acid (2,6-substituted toluene)-derived four-ring bent-core liquid crystals with a polar fluoro or chloro substituent at one end and an alkyloxy group (butyl to dodecyl) the other have been synthesised by simple straightforward synthetic method. The molecular structure characterisation is consistent elemental spectroscopic analysis data. materials' thermal behaviour phase investigated differential scanning calorimetry polarising optical...

10.1080/02678292.2013.795625 article EN Liquid Crystals 2013-05-13

Under the assumption that agents remain in system for significant time periods, or agent composition changes only slowly Sen (1996) has previously presented a prescriptive strategy promoting and sustaining cooperation among self-interested agents. The adaptive, probabilistic policy prescribed promotes reciprocative improves both individual group performance long run. In short run, however, selfish could still exploit this paper we evaluate hypothesis exploitative tendencies of can be...

10.1109/icmas.2000.858464 article EN 2002-11-07

We report the effect of dispersion barium titanate (BaTiO3) nanoparticles (BNPs) in a four ring bent core nematic (BCN) liquid crystal. Polarizing optical microscopy reveals presence single phase pure and doped states. Polar switching has been observed system value spontaneous polarization (P s) increases with increase doping concentration BNPs BCN. Dielectric study shows lower frequency mode, which can be ascribed to formation cybotactic clusters. These clusters are also responsible for...

10.1088/1361-648x/aaa801 article EN Journal of Physics Condensed Matter 2018-01-16

This paper presents a technique of path planning mobile robot using artificial neural network, fuzzy logic and genetic algorithm. The network (ANN) is trained to choose from set n paths for the move

10.3233/his-130184 article EN International Journal of Hybrid Intelligent Systems 2014-01-13

Here, we report the first examples of achiral unsymmetrical three-ring bent-shaped liquid crystals comprising amide and imine linkages with transverse substituents methyl chloro moieties on central phenyl ring in core, exhibiting polar banana phases. The extensive intra inter molecular H-bonding induced novel mesomorphic One-dimensional stacking phase as well ferroelectric order promoted by intermolecular linkage is demonstrated. compounds exhibit multifunctional properties viz.,...

10.1080/02678292.2018.1461266 article EN Liquid Crystals 2018-04-24

Online cloud data storage is a rapidly growing pillar of the IT industry that offers owners an array attractive developments in highly sought-after online scalable services. Cloud users can easily access these services and have flexibility to manage their process effectively without worrying about deployment or maintenance personal devices. As result, number has increased purchase convenient cost-effective services, while Service Providers (CSP) are also rising meet this demand for appealing...

10.1109/access.2024.3389076 article EN cc-by-nc-nd IEEE Access 2024-01-01

The communication between different regional languages is always inevitable fact which requires a lot of effort to make meaningful in terms technology. machine translation methods have been endeavoured fill this impediment. Neural Machine Translation one the efforts recently gained remarkable enhancement matter human judgement over conventional approaches like phrase-based and statistical translation. Thus, advances neural approach influence challenge mind people. types online mobile...

10.1109/ccem50674.2020.00028 article EN 2020-11-01

Breast cancer normally occurs in women and most of it begin the ducts that carry milk to nipple.It is second leading cause death women.It causes abnormal cell growth breast spread other parts body.These cells form a tumor called malignant (cancerous).There are many risk factors which can increase chance developing cancer.Being woman, getting older genetic changes major for cancer.But not yet known exactly how some these cancerous.Imaging tests such as mammograms, ultrasound, MRI etc used...

10.22457/apam.v17n1a1 article EN Annals of Pure and Applied Mathematics 2018-04-03

This paper presents a technique of path planning mobile robot using artificial neural network and fuzzy logic. The (ANN) is trained to choose from set n paths for the move ahead towards destination. Fuzzy logic (FL) used avoid collisions when all are blocked by obstacles. Results show that combination these features computational efficient helping each other eliminate their individual limitations.

10.1109/isda.2012.6416528 article EN 2012-11-01

Cloud data access control is a very important issue especially when are outsourced into third-party cloud server. Recently, some researchers working to enhance the trust level of users by developing secured store CP-ABE (Cip hertext-Policy Attribute-Based Encryption) fruitful technology for such situation providing capability encrypted control. The existing mechanisms mostly centralized, where single key distribution center works as attribute authority and generates attributes along with...

10.3233/mgs-190304 article EN Multiagent and Grid Systems 2019-07-17

Suicide has always been a global issue and the detection of suicidal ideation in masses that are not under clinical care proves to be challenge. Fortunately, with explosion internet, studies have going on field for analysis posts social media. The identification pattern change identify user implies all users post regular basis, which includes only excludes irregular users. Keeping mind users, yet can express thoughts, aim paper is design general framework used analyze classify media centric...

10.1109/icccnt49239.2020.9225638 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2020-07-01

Online cloud data storage, a pillar of the IT industry, offers owners plethora attractive developments in highly sought-after online scalable storage services for them to willing new inventive and investment business profit. Today, most security research focuses on improving accuracy outsourced audits rather than paying attention internal external enemies who could hack server. Even though owner enviously envies auditing job stored trusted Third Party Auditor (TPA) save communication as well...

10.1109/access.2023.3343841 article EN cc-by-nc-nd IEEE Access 2023-01-01

Data outsourcing into the third party cloud server has been radically increasing with expanding popularity of computing. Recently, researchers are more attentive on privacy preserved secure outsourced data access control due to sensibility, gradually growth in size, dynamic n ature user, accessing lightweight device etc. Dynamic and efficient revocable using attribute based encryption (ABE) is most prominent technology for such situation. In this article, we concentrating summarize several...

10.3233/mgs-180297 article EN Multiagent and Grid Systems 2019-01-18

LawBot is a system of Internet based agents that help to collect and organize the statutes case histories relevant legal search. The includes an ontology maps colloquial terms corresponding terminology, thus simplifying system's use by people outside profession.

10.1109/4236.895013 article EN IEEE Internet Computing 2000-01-01
Coming Soon ...