To Örebro University

oru.seÖrebro University Publications
Change search
Link to record
Permanent link

Direct link
Chakraborty, Subham
Publications (8 of 8) Show all publications
Shrestha, H., Megha, S., Chakraborty, S., Mazzara, M. & Kotorov, I. (2023). Face Mask Recognition Based on Two-Stage Detector. In: Ajith Abraham; Sabri Pllana; Gabriella Casalino; Kun Ma; Anu Bajaj (Ed.), Intelligent Systems Design and Applications: . Paper presented at 22nd International Conference on Intelligent Systems Design and Applications, ISDA 2022, Virtual, Online 12-14 December, 2022. (pp. 576-585). Springer Nature, 2
Open this publication in new window or tab >>Face Mask Recognition Based on Two-Stage Detector
Show others...
2023 (English)In: Intelligent Systems Design and Applications / [ed] Ajith Abraham; Sabri Pllana; Gabriella Casalino; Kun Ma; Anu Bajaj, Springer Nature, 2023, Vol. 2, p. 576-585Conference paper, Published paper (Refereed)
Abstract [en]

With the number of positive cases of Covid-19 infection is increasing, it is essential for everyone to wear a face mask and prevent the spread of Covid. As people are gathering in a large number at different locations, it is quite important for everyone to wear a face mask and prevent the covid spread. With the increase in the crowd gathering, it is often hard to see who is not wearing a mask. Although various techniques have been proposed earlier for face mask detection, the results have not been effective. This paper proposes region-based deep learning detection techniques for face mask detection using Faster R-CNN. The proposed model uses ResNet-50 as RPN which generates anchors and output region proposals. Later, ROI pooling is used to map the feature map in proposal to target dimensions. Finally, a classifier is used to output the final class and bounding box around the face. The proposed work attained a final mean average precision (mAP) of 45% over 30 epochs and achieved satisfactory performance.

Place, publisher, year, edition, pages
Springer Nature, 2023
Series
Lecture Notes in Networks and Systems, ISSN 2367-3370, E-ISSN 2367-3389 ; 2
Keywords
Anchors, COVID-19, Face mask detection, Non-maximum supression, Region proposal networks, Biometrics, Deep learning, Face recognition, Wear of materials, Bounding-box, Face masks, Feature map, Model use, Region proposal network, Region-based, Supression, Target dimensions
National Category
Computer graphics and computer vision
Identifiers
urn:nbn:se:oru:diva-118347 (URN)10.1007/978-3-031-35507-3_56 (DOI)2-s2.0-85163988986 (Scopus ID)9783031355066 (ISBN)9783031355073 (ISBN)
Conference
22nd International Conference on Intelligent Systems Design and Applications, ISDA 2022, Virtual, Online 12-14 December, 2022.
Available from: 2025-01-13 Created: 2025-01-13 Last updated: 2025-01-13Bibliographically approved
Chakraborty, S. & Thapaliya, A. (2019). Above the Clouds: A Brief Study. In: Mazzara, M., Meyer B.,Bruel J.-M., Petrenko A. (Ed.), Manuel MazzaraJean-Michel BruelBertrand MeyerAlexander Petrenko (Ed.), Software Technology: Methods and Tools. Paper presented at 51st International Conference, TOOLS 2019, Innopolis, Russia, October 15–17, 2019 (pp. 326-333). Springer, 11771
Open this publication in new window or tab >>Above the Clouds: A Brief Study
2019 (English)In: Software Technology: Methods and Tools / [ed] Manuel MazzaraJean-Michel BruelBertrand MeyerAlexander Petrenko, Springer, 2019, Vol. 11771, p. 326-333Conference paper, Published paper (Refereed)
Abstract [en]

Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications, business applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing and we also examine clouds from technical aspects. We highlight some of the opportunities in cloud computing underlining the importance of clouds showing why that technology must succeed and we have provided additional cloud computing problems that businesses may need to address. Finally, we discuss some of the issues that this area should deal with.

Place, publisher, year, edition, pages
Springer, 2019
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 11771
Keywords
Cloud computing, IoT
National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:oru:diva-80536 (URN)10.1007/978-3-030-29852-4_27 (DOI)2-s2.0-85075691463 (Scopus ID)
Conference
51st International Conference, TOOLS 2019, Innopolis, Russia, October 15–17, 2019
Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2020-03-10Bibliographically approved
Thapaliya, A., Elambo Atonge, D., Mazzara, M., Chakraborty, S., Afanasyev, I. & Ahmad, M. (2019). Digital Image Forgery. In: Artem V. Kruglov & Konstantin A. Aksyonov (Ed.), ITTCS 2019: Information Technologies, Telecommunications and Control Systems. Paper presented at 6th International Young Scientists Conference on Information Technologies, Telecommunications and Control Systems (ITTCS 2019), Innopolis/Yekaterinburg, Russia, December 6, 2019.. CEUR-WS.org, 2525, Article ID 36.
Open this publication in new window or tab >>Digital Image Forgery
Show others...
2019 (English)In: ITTCS 2019: Information Technologies, Telecommunications and Control Systems / [ed] Artem V. Kruglov & Konstantin A. Aksyonov, CEUR-WS.org , 2019, Vol. 2525, article id 36Conference paper, Published paper (Other academic)
Abstract [en]

Image control has disintegrated our trust of computerized pictures, with progressively unobtrusive fraud techniques representing a regularly expanding test to the integrity of images and their legitimacy. With the progress of advanced image controlling software and modifying tools, an electronic picture can be successively controlled. Checking the decency of pictures and recognizing indications of modifying without requiring extra pre-inserted data of the image is the basic field of inspection. In this paper, a study of such research commitments has been directed by following a well-defined and systematic procedure. There are different paths for modifying an image, for instance, copy-move, splicing, and re-sampling. This paper focuses on two types of digital image forgery detection which are copy move and splicing of image.

Place, publisher, year, edition, pages
CEUR-WS.org, 2019
National Category
Engineering and Technology Computer graphics and computer vision
Identifiers
urn:nbn:se:oru:diva-80537 (URN)
Conference
6th International Young Scientists Conference on Information Technologies, Telecommunications and Control Systems (ITTCS 2019), Innopolis/Yekaterinburg, Russia, December 6, 2019.
Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2025-02-01Bibliographically approved
Afanasyev, I., Kolotov, A., Rezin, R., Danilov, K., Mazzara, M., Chakraborty, S., . . . Ahmed, S. (2019). Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications.
Open this publication in new window or tab >>Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications
Show others...
2019 (English)Manuscript (preprint) (Other academic)
Abstract [en]

Decentralization, immutability and transparency make of Blockchain one of the most innovative technology of recent years. This paper presents an overview of solutions based on Blockchain technology for multi-agent robotic systems, and provide an analysis and classification of this emerging field. The reasons for implementing Blockchain in a multi-robot network may be to increase the interaction efficiency between agents by providing more trusted information exchange, reaching a consensus in trustless conditions, assessing robot productivity or detecting performance problems, identifying intruders, allocating plans and tasks, deploying distributed solutions and joint missions. Blockchain-based applications are discussed to demonstrate how distributed ledger can be used to extend the number of research platforms and libraries for multi-agent robotic systems.

National Category
Robotics and automation
Identifiers
urn:nbn:se:oru:diva-80543 (URN)
Note

arXiv:1907.07433

Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2025-02-09Bibliographically approved
Afanasyev, I., Mazzara, M., Chakraborty, S., Zhuchkov, N., Maksatbek, A., Kassab, M. & Distefano, S. (2019). Towards the Internet of Robotic Things: Analysis, Architecture, Components and Challenges.
Open this publication in new window or tab >>Towards the Internet of Robotic Things: Analysis, Architecture, Components and Challenges
Show others...
2019 (English)Manuscript (preprint) (Other academic)
Abstract [en]

Internet of Things (IoT) and robotics cannot be considered two separate domains these days. Internet of Robotics Things (IoRT) is a concept that has been recently introduced to describe the integration of robotics technologies in IoT scenarios. As a consequence, these two research fields have started interacting, and thus linking research communities. In this paper we intend to make further steps in joining the two communities and broaden the discussion on the development of this interdisciplinary field. The paper provides an overview, analysis and challenges of possible solutions for the Internet of Robotic Things, discussing the issues of the IoRT architecture, the integration of smart spaces and robotic applications.

National Category
Robotics and automation
Identifiers
urn:nbn:se:oru:diva-80544 (URN)
Note

arXiv:1907.03817

Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2025-02-09Bibliographically approved
Chakraborty, S., Das, S. & Patra, S. (2017). A Brief Study To Cloud. International Journal of Scientific & Engineering Research, 8(3), 50-54
Open this publication in new window or tab >>A Brief Study To Cloud
2017 (English)In: International Journal of Scientific & Engineering Research, ISSN 2229-5518, Vol. 8, no 3, p. 50-54Article in journal (Refereed) Published
Abstract [en]

Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with.

Place, publisher, year, edition, pages
Research Publication I J S E R, 2017
Keywords
Cloud Computing, SaaS, Paas, IaaS
National Category
Engineering and Technology Information Systems, Social aspects
Identifiers
urn:nbn:se:oru:diva-80496 (URN)
Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2023-05-29Bibliographically approved
Bhattacharyya, S., Chand, N. & Chakraborty, S. (2014). A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps. International Journal of Advanced Research in Computer Engineering & Technology, 3(2), 307-312
Open this publication in new window or tab >>A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps
2014 (English)In: International Journal of Advanced Research in Computer Engineering & Technology, ISSN 2278-1323, Vol. 3, no 2, p. 307-312Article in journal (Refereed) Published
Abstract [en]

One of the well-known digraph substitution cipher is the Playfair Cipher. It secures information mathematically by mangling message with key. The privacy of intended sender and receiver information is protected from eavesdropper. However the original 5 x 5 Playfair Cipher can support only 25 uppercase alphabets. Here we have implemented a new technique which includes a rectangular matrix having 10 columns and 9 rows and six iteration steps for encryption as well as decryption purpose. This 10 x 9 rectangular matrix includes all alphanumeric characters and some special characters. Cryptanalysis is done to show that the modified cipher is a strong one. Finally we have implemented this concept with the help of MATLAB.

Place, publisher, year, edition, pages
Shri Pannala Research Institute of Technology, 2014
Keywords
Playfair cipher, Substitution cipher, Special characters, Cryptanalysis, Symmetric encryption
National Category
Engineering and Technology Computer and Information Sciences
Identifiers
urn:nbn:se:oru:diva-80534 (URN)
Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2025-02-18Bibliographically approved
Bhattacharyya, S. & Chakraborty, S. (2014). Reconstruction of Human Faces from Its Eigenfaces. International Journal of Advanced Research In Computer Science and Software Engineering, 4(1), 209-215
Open this publication in new window or tab >>Reconstruction of Human Faces from Its Eigenfaces
2014 (English)In: International Journal of Advanced Research In Computer Science and Software Engineering, ISSN 2277-6451, E-ISSN 2277-128X, Vol. 4, no 1, p. 209-215Article in journal (Refereed) Published
Abstract [en]

Eigenface or Principal Components Analysis (PCA) methods have demonstrated their success in face recognition, detection and tracking. In this paper we have used this concept to reconstruct or represent a face as a linear combination of a set of basis images. The basis images are nothing but the eigenfaces. The idea is similar to represent a signal in the form of a linear combination of complex sinusoids called the Fourier Series. The main advantage is that the number of eigenfaces required is less than the number of face images in the database. Selection of number of eigefaces is important here. Here we investigate what is the number of minimum eigenface that is required for faithful production of a face image.

Place, publisher, year, edition, pages
Advanced Research International Publication House, 2014
Keywords
Face reconstruction, Eigen faces, Eigen vectors, Principal component analysis (PCA), Fourier Series
National Category
Engineering and Technology Computer graphics and computer vision
Identifiers
urn:nbn:se:oru:diva-80539 (URN)
Available from: 2020-03-10 Created: 2020-03-10 Last updated: 2025-02-01Bibliographically approved
Organisations

Search in DiVA

Show all publications