Dr. AVIJIT MONDAL | Asian School of Business Management (ASBM) (original) (raw)
Papers by Dr. AVIJIT MONDAL
African journal of biological science, (AFJBS) ISSN: 2663-2187, 2024
The increasing prevalence of cardiovascular diseases (CVDs) has become a major health concern. Ar... more The increasing prevalence of cardiovascular diseases (CVDs) has become a
major health concern. Arrhythmia is the deadliest heart condition of all
cardiovascular disorders. Thus, timely and precise arrhythmia diagnosis is
critical in preventing heart disease and abrupt cardiac death. Arrhythmia can be
discovered on an electrocardiogram (ECG) by observing irregular heart
electrical activity. The heart's electrical activity is recorded as an ECG signal,
which contains both normal and pathological information. Classification of ECG
patterns is critical for automatically diagnosing cardiac illness. This paper
discusses the various learning approaches for automatically distinguishing
different types of heartbeats. According to reported studies, the convolutional
neural network (CNN) model is the best option for classifying arrhythmia. An
ensemble of depth wise separable convolutional (DSC) neural networks
achieves the highest classification accuracy, 99.88%.
Springer Nature Singapore, 2024
The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet... more The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet challenges persist due to resource limitations and security concerns inherent to these devices. In response, this paper introduces a Dynamic Energy-Efficient Offloading Algorithm (DEEO), seamlessly integrated into the Mobile Edge-Cloud Computing (MECC) environment. DEEO empowers mobile devices to efficiently offload computationally intensive secure image transmission tasks to the nearest edge server or fog access point. This integration optimizes resource utilization, minimizes energy consumption, and ensures the confidentiality and integrity of sensitive medical image data. Through rigorous evaluations and comparative analysis, our approach demonstrates clear superiority over existing solutions. This integrated framework is poised to significantly enhance healthcare applications, offering heightened efficiency, elevated security, and an overall improved user experience.
Springer Nature Singapore Pte Ltd, 2024
In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encr... more In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encryption method that combines a hashing function, multi-wing chaotic mapping system, and genetics algorithm. The proposed method offers significant benefits in terms of efficiency in data authentication. Additionally, our proposed method does complementary and internal scrambling in order to increase security of the image. Secret key with features is used as a seeding value to generate a key DNA image from a hyper-chaotic system to eliminate the correlation between adjacent pixels by chaotic sequence. The complex dynamic behavior of the chaotic map generates random sequences for image diffusion. The propagation of information between a permuted DNA image and a key DNA image can be achieved through the use of DNA operations. Simulation results show that the proposed method used to authenticate …
IEEE Explore, 2022 OITS International Conference on Information Technology (OCIT), 2022
Cloud security is a branch of cyber security that focuses on securing cloud computing systems. It... more Cloud security is a branch of cyber security that
focuses on securing cloud computing systems. It is a method
for enterprises to use the internet to access storage and virtual
services while saving money on infrastructure, considered as
the next-generation architecture since it combines application
software and databases into big data centers. However, difficulties
with confidentiality, protection, integrity, and compliance may
surface when the information is not kept, examined, or computed
locally. A wide range of data security-related topics are covered
by cloud-based data security. For securing an organization’s
data across the network, data encryption is a common and
effective security strategy that is a great alternative. The most
vulnerable data is financial and payment systems, and medical
data, which can expose customers or clients critical information.
Several academics have also offered a range of approaches to
safeguards to maintain data privacy and security while it is being
transmitted, but there are still a lot of obstacles to the safety of
data that is being stored in the cloud. In this paper, several
research papers that have been authored and published in this
topic are thoroughly examined and analysed. This study gives
a review of the literature on different methods for establishing
data security in cloud environment.
Index Terms—Systematic literature review, Cloud computing,
Crypotgraphy, Information Security, Data Encryption, Decryption
Teaching Documents by Dr. AVIJIT MONDAL
www.learnabout-electronics.org
Clock Circuits Module 5.1 deals with clock oscillators, which are basically types of square wave ... more Clock Circuits Module 5.1 deals with clock oscillators, which are basically types of square wave generators or oscillators that produce a continuous stream of square waves or a continuous train of pulses (a "square" wave whose mark to space ratio is NOT 1:1). These pulses are used to sequence the actions of other devices in the sequential logic circuit so that all the actions taking place in the circuit are properly synchronised.
www.learnabout-electronics.org
www.learnabout-electronics.org Digital Electronics 4.0 Introduction to Combinational Logic Binary... more www.learnabout-electronics.org Digital Electronics 4.0 Introduction to Combinational Logic Binary Arithmetic Combinational logic has many uses in electronic systems. It is used to carry out the essential arithmetic, not only in computers and calculators, but also in navigation systems, robots and many other types of automatic machinery. Logical Decisions Mathematics and logical decision making also uses combinational logic in the form of Comparators, described in Module 4.3. These circuits decide whether one value is the same, larger or smaller than another value. Data Routing After making a logical decision, data may need to be routed to different parts of the electronic system, this routing is controlled by more combinational logic circuits such as data selectors, multiplexers and demultiplexers, which are described in Module 4.2. Encoding and Decoding When connecting a logic circuit with the outside world, incoming information from a keyboard or other input device must be changed (encoded) into an appropriate binary form. Also before binary data produced by the digital system can be used by an output device, such as a display, it must be decoded into a form that can be used by the display. Encoders and decoders used for such jobs are also combinational logic circuits, and are described in Module 4.4 DIGITAL ELECTRONICS 04.PDF 1 © E. COATES 2007-2014 www.learnabout-electronics.org Digital Electronics Module 4 4.1 Binary Arithmetic Circuits What you'll learn in Module 4.1 After studying this section, you should be able to: Understand the operation of Binary Adder Circuits.
www.learnabout-electronics.org
In this module, the differences and similarities between the various families of logic ICs availa... more In this module, the differences and similarities between the various families of logic ICs available are described, along with their important operating conditions. Logic 1 and Logic 0 are a bit more complex that 5V and 0V because these digital ICs are really little analogue circuits posing as 'Digital'. A sort of sheep in wolves clothing! Find out how logic gates actually work, and learn about the parameters that govern how the chips should be used. Special versions of the basic logic gates are also explained, such as Schmitt gates, open collectors, and buffers. The 74 series of logic ICs introduced in this module, has been the backbone of digital electronics for about the last 50 years. Although nowadays they have been replaced in many applications by bigger, faster smarter chips, the 74 series families continue to play an important role in electronics, and learning about them is a sound basis for understanding the vital basics of digital electronics.
www.learnabout-electronics.org
Digital Electronics 2.0 Digital Logic Introduction. Digital logic is the foundation, not only of ... more Digital Electronics 2.0 Digital Logic Introduction. Digital logic is the foundation, not only of computing but also many other electronic devices and control systems found in almost every part of modern life. This module introduces the basics of digital logic and shows how the whole of digital electronics depends on just seven types of logic gates, connected together with a minimum of additional components. Combinations of logic gates then form circuits that can perform specific tasks within larger circuits or systems. The process of producing complex circuits using combinations of basic devices is called Combinational Logic. There are many ways that a number of logic gates can be combined to perform a specific task. They may all work, but some combinations will perform the task that better than others. For example, a circuit designer may want to design a combinational logic circuit that uses the minimum number of gates, or performs the required task in the least time, or at the minimum cost. This module also introduces the way digital logic gates work and teaches you key methods by which a basic digital logic circuit design may be minimised, made more efficient and/or cheaper.
www.learnabout-electronics.org
Using the decimal system it is easy to count up to ten fingers, using just the fingers on two han... more Using the decimal system it is easy to count up to ten fingers, using just the fingers on two hands. In northern Britain farmers, for centuries, used an ancient Celtic counting system, based on 20 (also called a score), to count their animals, and its use still persisted even into the second half of the twentieth century. The binary system, based on 2, is just another special number system, and is used by digital electronic devices because digital circuits work on an electrical 'on or off' two state system, a number system based on 2 is therefore much easier for electronic devices to use. However binary is not a natural choice for human counting or calculation. This module explains how binary, and some other number systems used in electronics work, and how computers and calculators use different forms of binary to carry out calculations.
African journal of biological science, (AFJBS) ISSN: 2663-2187, 2024
The increasing prevalence of cardiovascular diseases (CVDs) has become a major health concern. Ar... more The increasing prevalence of cardiovascular diseases (CVDs) has become a
major health concern. Arrhythmia is the deadliest heart condition of all
cardiovascular disorders. Thus, timely and precise arrhythmia diagnosis is
critical in preventing heart disease and abrupt cardiac death. Arrhythmia can be
discovered on an electrocardiogram (ECG) by observing irregular heart
electrical activity. The heart's electrical activity is recorded as an ECG signal,
which contains both normal and pathological information. Classification of ECG
patterns is critical for automatically diagnosing cardiac illness. This paper
discusses the various learning approaches for automatically distinguishing
different types of heartbeats. According to reported studies, the convolutional
neural network (CNN) model is the best option for classifying arrhythmia. An
ensemble of depth wise separable convolutional (DSC) neural networks
achieves the highest classification accuracy, 99.88%.
Springer Nature Singapore, 2024
The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet... more The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet challenges persist due to resource limitations and security concerns inherent to these devices. In response, this paper introduces a Dynamic Energy-Efficient Offloading Algorithm (DEEO), seamlessly integrated into the Mobile Edge-Cloud Computing (MECC) environment. DEEO empowers mobile devices to efficiently offload computationally intensive secure image transmission tasks to the nearest edge server or fog access point. This integration optimizes resource utilization, minimizes energy consumption, and ensures the confidentiality and integrity of sensitive medical image data. Through rigorous evaluations and comparative analysis, our approach demonstrates clear superiority over existing solutions. This integrated framework is poised to significantly enhance healthcare applications, offering heightened efficiency, elevated security, and an overall improved user experience.
Springer Nature Singapore Pte Ltd, 2024
In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encr... more In this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encryption method that combines a hashing function, multi-wing chaotic mapping system, and genetics algorithm. The proposed method offers significant benefits in terms of efficiency in data authentication. Additionally, our proposed method does complementary and internal scrambling in order to increase security of the image. Secret key with features is used as a seeding value to generate a key DNA image from a hyper-chaotic system to eliminate the correlation between adjacent pixels by chaotic sequence. The complex dynamic behavior of the chaotic map generates random sequences for image diffusion. The propagation of information between a permuted DNA image and a key DNA image can be achieved through the use of DNA operations. Simulation results show that the proposed method used to authenticate …
IEEE Explore, 2022 OITS International Conference on Information Technology (OCIT), 2022
Cloud security is a branch of cyber security that focuses on securing cloud computing systems. It... more Cloud security is a branch of cyber security that
focuses on securing cloud computing systems. It is a method
for enterprises to use the internet to access storage and virtual
services while saving money on infrastructure, considered as
the next-generation architecture since it combines application
software and databases into big data centers. However, difficulties
with confidentiality, protection, integrity, and compliance may
surface when the information is not kept, examined, or computed
locally. A wide range of data security-related topics are covered
by cloud-based data security. For securing an organization’s
data across the network, data encryption is a common and
effective security strategy that is a great alternative. The most
vulnerable data is financial and payment systems, and medical
data, which can expose customers or clients critical information.
Several academics have also offered a range of approaches to
safeguards to maintain data privacy and security while it is being
transmitted, but there are still a lot of obstacles to the safety of
data that is being stored in the cloud. In this paper, several
research papers that have been authored and published in this
topic are thoroughly examined and analysed. This study gives
a review of the literature on different methods for establishing
data security in cloud environment.
Index Terms—Systematic literature review, Cloud computing,
Crypotgraphy, Information Security, Data Encryption, Decryption
www.learnabout-electronics.org
Clock Circuits Module 5.1 deals with clock oscillators, which are basically types of square wave ... more Clock Circuits Module 5.1 deals with clock oscillators, which are basically types of square wave generators or oscillators that produce a continuous stream of square waves or a continuous train of pulses (a "square" wave whose mark to space ratio is NOT 1:1). These pulses are used to sequence the actions of other devices in the sequential logic circuit so that all the actions taking place in the circuit are properly synchronised.
www.learnabout-electronics.org
www.learnabout-electronics.org Digital Electronics 4.0 Introduction to Combinational Logic Binary... more www.learnabout-electronics.org Digital Electronics 4.0 Introduction to Combinational Logic Binary Arithmetic Combinational logic has many uses in electronic systems. It is used to carry out the essential arithmetic, not only in computers and calculators, but also in navigation systems, robots and many other types of automatic machinery. Logical Decisions Mathematics and logical decision making also uses combinational logic in the form of Comparators, described in Module 4.3. These circuits decide whether one value is the same, larger or smaller than another value. Data Routing After making a logical decision, data may need to be routed to different parts of the electronic system, this routing is controlled by more combinational logic circuits such as data selectors, multiplexers and demultiplexers, which are described in Module 4.2. Encoding and Decoding When connecting a logic circuit with the outside world, incoming information from a keyboard or other input device must be changed (encoded) into an appropriate binary form. Also before binary data produced by the digital system can be used by an output device, such as a display, it must be decoded into a form that can be used by the display. Encoders and decoders used for such jobs are also combinational logic circuits, and are described in Module 4.4 DIGITAL ELECTRONICS 04.PDF 1 © E. COATES 2007-2014 www.learnabout-electronics.org Digital Electronics Module 4 4.1 Binary Arithmetic Circuits What you'll learn in Module 4.1 After studying this section, you should be able to: Understand the operation of Binary Adder Circuits.
www.learnabout-electronics.org
In this module, the differences and similarities between the various families of logic ICs availa... more In this module, the differences and similarities between the various families of logic ICs available are described, along with their important operating conditions. Logic 1 and Logic 0 are a bit more complex that 5V and 0V because these digital ICs are really little analogue circuits posing as 'Digital'. A sort of sheep in wolves clothing! Find out how logic gates actually work, and learn about the parameters that govern how the chips should be used. Special versions of the basic logic gates are also explained, such as Schmitt gates, open collectors, and buffers. The 74 series of logic ICs introduced in this module, has been the backbone of digital electronics for about the last 50 years. Although nowadays they have been replaced in many applications by bigger, faster smarter chips, the 74 series families continue to play an important role in electronics, and learning about them is a sound basis for understanding the vital basics of digital electronics.
www.learnabout-electronics.org
Digital Electronics 2.0 Digital Logic Introduction. Digital logic is the foundation, not only of ... more Digital Electronics 2.0 Digital Logic Introduction. Digital logic is the foundation, not only of computing but also many other electronic devices and control systems found in almost every part of modern life. This module introduces the basics of digital logic and shows how the whole of digital electronics depends on just seven types of logic gates, connected together with a minimum of additional components. Combinations of logic gates then form circuits that can perform specific tasks within larger circuits or systems. The process of producing complex circuits using combinations of basic devices is called Combinational Logic. There are many ways that a number of logic gates can be combined to perform a specific task. They may all work, but some combinations will perform the task that better than others. For example, a circuit designer may want to design a combinational logic circuit that uses the minimum number of gates, or performs the required task in the least time, or at the minimum cost. This module also introduces the way digital logic gates work and teaches you key methods by which a basic digital logic circuit design may be minimised, made more efficient and/or cheaper.
www.learnabout-electronics.org
Using the decimal system it is easy to count up to ten fingers, using just the fingers on two han... more Using the decimal system it is easy to count up to ten fingers, using just the fingers on two hands. In northern Britain farmers, for centuries, used an ancient Celtic counting system, based on 20 (also called a score), to count their animals, and its use still persisted even into the second half of the twentieth century. The binary system, based on 2, is just another special number system, and is used by digital electronic devices because digital circuits work on an electrical 'on or off' two state system, a number system based on 2 is therefore much easier for electronic devices to use. However binary is not a natural choice for human counting or calculation. This module explains how binary, and some other number systems used in electronics work, and how computers and calculators use different forms of binary to carry out calculations.