Soubhik Chakraborty

ORCID: 0000-0003-3530-9027
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Music and Audio Processing
  • Cryptographic Implementations and Security
  • Algorithms and Data Compression
  • Coding theory and cryptography
  • Neuroscience and Music Perception
  • Computability, Logic, AI Algorithms
  • Music Technology and Sound Studies
  • Advanced Steganography and Watermarking Techniques
  • Advanced Combinatorial Mathematics
  • Machine Learning and Algorithms
  • Speech and Audio Processing
  • Mathematical Dynamics and Fractals
  • Indian and Buddhist Studies
  • Plant Water Relations and Carbon Dynamics
  • Advanced Statistical Methods and Models
  • Advanced Database Systems and Queries
  • Digital Media Forensic Detection
  • Music Therapy and Health
  • Agricultural Economics and Practices
  • Scientific Computing and Data Management
  • Hydrology and Drought Analysis
  • Mobile Ad Hoc Networks
  • Mathematics and Applications
  • Neural Networks and Applications

Birla Institute of Technology, Mesra
2013-2024

Birla Institute of Technology and Science, Pilani
2013

Tilka Manjhi Bhagalpur University
1998-2007

In recent years, our customers have expressed frustration in the traditional approach of using a combination disparate products to handle their streaming, transactional and analytical needs. The common practice stitching heterogeneous environments custom ways has caused enormous production woes by increasing development complexity total cost ownership. With SnappyData, an open source platform, we propose unified engine for real-time operational analytics, delivering stream OLTP OLAP single...

10.1145/2882903.2899408 article EN Proceedings of the 2022 International Conference on Management of Data 2016-06-16

Lightweight cryptography is essential for securing resource-limited devices like smart card, RFID (radio-frequency identification)tags, sensor network and embedded system. In this paper, we present a survey of lightweight block ciphers from both software hardware perspectives. This paper show the analysis on basis size, key number rounds, area in gate equivalent, speed, logic process as metrics comparison purpose. Also, comprehensive highlights strengths some security related issues terms...

10.1080/09720502.2020.1766764 article EN Journal of Discrete Mathematical Sciences and Cryptography 2020-06-24

Music has a versatile dimensionality; it can be used to express feelings, emotions and also as communicable language. its attributes have been in cryptography steganography from long time. Musical symbols notes are replacement/substitution cipher. Using music cipher or cover media not only enhances the security of message but reduces chance detected an encoded ciphered message. This paper proposes hybrid Polybius Playfair which encodes into sequence musical notes. The key matrix is generated...

10.14257/ijmue.2015.10.8.19 article EN International Journal of Multimedia and Ubiquitous Engineering 2015-10-31

Music can be used as a communicable language".Musical symbols and musical notes have been codes ciphers from early days.The art of encrypting messages using music is termed Musical cryptography it uses predefined set rules for composing pieces which in turn are cryptograms.Traditional algorithms applied to simple substitution cipher merely produced good sequences.To overcome this problem fuzzy logic based algorithm proposed paper.The paper proposes symmetric key one the n candidate encrypt...

10.14257/ijsia.2015.9.1.23 article EN International Journal of Security and Its Applications 2015-01-31

10.1007/s40010-020-00718-5 article EN Proceedings of the National Academy of Sciences India Section A Physical Sciences 2020-10-21

The paper questions the robustness of average case time complexity fast and popular quicksort algorithm. Among six standard probability distributions examined in paper, only continuous uniform, exponential normal are supporting it whereas others worst measure. To question -why we getting measure each is discredited? -- one logical answer under universal distribution equals complexity. This answer, which hard to challenge, however gives no idea as come umbrella universality. morale that...

10.48550/arxiv.0811.4376 preprint EN other-oa arXiv (Cornell University) 2008-01-01

Literary compositions are very often analyzed using various constituent units like words, phrases, sentences, and paragraphs. Unlike the conventional research that focuses on aforementioned units, our task is a statistical effort carried out most fundamental unit of any literary composition called varna , or character, followed by automated classification learning algorithms. This article case study Hindi adaptations two significant pieces, namely, Jana-Gaṇa-Mana Vande-Mātaram acknowledging...

10.1145/3589249 article EN ACM Transactions on Asian and Low-Resource Language Information Processing 2023-04-11

The bisection method is an iterative approach used in numerical analysis to find solutions nonlinear equations. main purpose of this paper study how the parameters a probability distribution characterizing coefficients cubic polynomial can influence convergence method. covers discrete and continuous distributions, including uniform, normal distributions. It was found that for both types uniform inputs, second-degree equation predict average iteration given parameter r, where r indicates...

10.47852/bonviewaaes32021322 article EN cc-by Archives of Advanced Engineering Science 2023-08-14

A raga is a melodic structure with fixed notes and set of rules characterizing certain mood endorsed through performance. By vadi swar meant that note which plays the most significant role in expressing raga. samvadi similarly second note. However, determination their significance has an element subjectivity hence we are motivated to find some truths objective analysis. The paper proposes probabilistic method detection demonstrates how relative frequency (relative number occurrences pitch)...

10.48550/arxiv.0809.3214 preprint EN other-oa arXiv (Cornell University) 2008-01-01

Measurable investigation of abstract content so as to bring bits knowledge into its expressive highlights has been a shared zone enthusiasm among the aficionados writing and measurements.The thought applying equivalent for mining critical perceptions with respect our huge legacy likewise intrigued antiquarians.There have several works on automated analysis poetry.Notwithstanding, adequate consideration not laid such in even Hindi-prose, leaving Hindi-poetry an almost total nonattendance any...

10.26855/jamc.2021.12.004 article EN Journal of Applied Mathematics and Computation 2021-10-18

While dealing with students in solving their assignments and projects of software development we have experienced that are ready to adopt agile process model because it is very close nature. It assumed certain concepts were already prevalent student fraternity. The factors considered here ‘quality code’, ‘preference group work’, ‘regular interaction teammate’, ‘responding changes’, ‘early testing’, ‘fast delivery working software’. Presence linear relationship, if any, was tested by testing...

10.14257/ijseia.2013.7.6.19 article EN International Journal of Software Engineering and Its Applications 2013-11-30

Blockchain has attracted tremendous attention in recent years due to its significant features including anonymity, security, immutability, and audibility. technology been used several nonmonetary applications, Internet-of-Things. Though blockchain limited resources, scalability is computationally expensive, resulting delays large bandwidth overhead that are unsuitable for many IoT devices. In this paper, we work on a lightweight approach suited needs provides end-to-end security....

10.3233/ida-230153 article EN Intelligent Data Analysis 2024-02-02

Summary In the rapidly evolving domain of Mobile Ad‐hoc Networks (MANETs), where their deployment spans critical military operations to essential organizational communication infrastructures, pervasive threat security breaches casts a long shadow on networks' operational integrity and reliability. Central among these threats are sleep deprivation attacks, particularly insidious form cyber aggression that exploits inherent decentralized self‐organizing characteristics MANETs exhaust energy...

10.1002/cpe.8118 article EN Concurrency and Computation Practice and Experience 2024-04-16
Coming Soon ...