Anirban Mitra

ORCID: 0000-0002-6639-4407
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Rough Sets and Fuzzy Logic
  • Complex Network Analysis Techniques
  • Data Mining Algorithms and Applications
  • Emotion and Mood Recognition
  • EEG and Brain-Computer Interfaces
  • Graph Theory and Algorithms
  • Data Management and Algorithms
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Medical Image Segmentation Techniques
  • Retinal Imaging and Analysis
  • Advanced Malware Detection Techniques
  • Advanced Text Analysis Techniques
  • Natural Language Processing Techniques
  • Privacy, Security, and Data Protection
  • Opinion Dynamics and Social Influence
  • Advanced Data Storage Technologies
  • Sentiment Analysis and Opinion Mining
  • Glaucoma and retinal disorders
  • Distributed and Parallel Computing Systems
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Metaheuristic Optimization Algorithms Research
  • Advanced Database Systems and Queries
  • Cellular Automata and Applications

University of Pittsburgh
2020-2024

North Eastern Hill University
2023

Amity University
2019-2023

Techno India Group (India)
2022-2023

BRAC University
2022

Vignan's Foundation for Science, Technology & Research
2017-2020

University of Calcutta
2018-2020

Aditya Birla (India)
2018-2019

Berhampur University
2008-2016

Aster Medcity
2015

Image registration is one of the popular image transformation models in satellite and medical imaging currently. refers to mapping with two or more than images. The ground-breaking fusion whale optimization algorithm nonrigid demons (WOA-NDR) applied current work improve registration's precision effectiveness. NDR an effective method for aligning images that have pliable structures. Nevertheless, it frequently runs into issues local minima massive deformations. To address these issues,...

10.11591/ijece.v15i2.pp2372-2380 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2025-01-26

This research proposes a novel security solution for IoT networks by integrating Practical Byzantine Fault Tolerance (PBFT) with Elliptic Curve Cryptography (ECC). The approach aims to enhance authentication, ensure data integrity, and optimize resource use in resource-constrained environments. By combining ECC's lightweight cryptographic capabilities PBFT's consensus model, the system achieves high performance, scalability, robust fault tolerance, providing secure framework communication....

10.55041/ijsrem42761 article EN INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 2025-03-14

In our day-to-day life, the proper perception of emotion plays an important role in human decision making and behavior. Nowadays, a lot research is focused on evocation precise detection emotion, which can be later utilized different set arena. There good amount through parameters extracted via Face Recognition Speech Modulation, etc. However, there huge question accuracy or effectiveness these results as features controlled manipulated by subject/person. So, next approach usage...

10.1149/10701.12535ecst article EN ECS Transactions 2022-04-24

Community effect and inter community communication relationship is one of the important aspects social network analysis. Studying detection analyzing behaviors communities can give us information about group as well actors in group. Using graph mining techniques, knowledge extraction possible from graph. In our work, we started with discussion on related definitions some available algorithms for network. Further, propose a new simple algorithm finding using techniques. An example verifies...

10.1109/ichpca.2014.7045335 article EN 2014-12-01

Smart agriculture systems with combinations of advanced technologies are used in an attempt to increase the competence certain farming activities and standard living for farm employees by reducing significant labor tedious tasks. Internet-of-things-based sensors capable providing such information about smart then acting upon predictions using data analysis. The proposed methodology works alongside a cloud-based server mobile-based device (ideally Android/iOS device) assist user regulating...

10.3390/sym12030457 article EN Symmetry 2020-03-13

Cache eviction algorithms are used widely in operating systems, databases and other systems that use caches to speed up execution by caching data is the application. There many policies such as MRU (Most Recently Used), MFU Frequently LRU (Least Used) LFU which each have their advantages drawbacks hence specific scenarios. By far, most algorithm LRU, both for its $O(1)$ of operation well close resemblance kind behaviour expected applications. The also has desirable real world workloads....

10.48550/arxiv.2110.11602 preprint EN public-domain arXiv (Cornell University) 2021-01-01

The development of several popular social networks in recent days and publication network data has led to the danger disclosure sensitive information individuals. This necessitated preservation privacy before such data. There are algorithms developed preserve micro But these cannot be applied directly as nodes have structural properties along with their labels. k-anonymity l-diversity efficient tools anonymise So efforts been made find out similar handle anonymisation. In this paper we...

10.1109/cason.2012.6412390 article EN 2012-11-01

Properties of approximations sets establish that lower approximation union is not equal to the their in general and a similar result holds for upper intersection sets. This confirms observation there loss information distributed knowledge base than an integrated one. We obtain necessary sufficient conditions equalities hold above two properties. find are ambiguities types rough theorems reduce these ambiguities. Novotny Pawlak introduced three (bottom, top total) equalities, which show...

10.1504/ijgcrsis.2010.036978 article EN International Journal of Granular Computing Rough Sets and Intelligent Systems 2010-01-01

This paper focuses on solving the problem of classification and clustering in social network by using Rough Set. When data set consists missing or uncertain then is proved to be an efficient tool. To solve a under domain network, must satisfy fundamental property rough i.e., attribute holds true for equivalence relation. Hence, before implementing specific it redefined way that properties transitive, symmetric reflexive should true. In this paper, we have studied concept Fiksel's societal...

10.1109/iadcc.2013.6514272 article EN 2013-02-01

This paper describes the method of representation Dynamic Social Network. Authors begin discussion with a formal introduction where they had brought out need emergence Network and its application in various fields science. has carried forward description two models Portions is review work. In followed section this work, about how these can be represented as one basic type Finite State Machine. Finally concludes real life example MANETS.

10.1016/j.procs.2016.03.079 article EN Procedia Computer Science 2016-01-01
Coming Soon ...