Time filter

Source Type

Bandyopadhyay A.,Quantum Optics and Quantum Information Group | Bandyopadhyay A.,Hooghly Engineering and Technology College | Prabhakar S.,Quantum Optics and Quantum Information Group | Singh R.P.,Quantum Optics and Quantum Information Group
Physics Letters, Section A: General, Atomic and Solid State Physics | Year: 2011

We calculate the entanglement of a generalized elliptical vortex formed by quantized radiation field, using Wigner quasiprobability distribution function for such states. We find a critical squeezing parameter above which the entanglement is less for higher vorticity, which is counter intuitive. © 2011 Elsevier B.V.

Bandyopadhyay A.,Quantum Optics and Quantum Information Group | Bandyopadhyay A.,Hooghly Engineering and Technology College | Singh R.P.,Quantum Optics and Quantum Information Group
Optics Communications | Year: 2011

We calculate the Wigner quasiprobability distribution function of the quantum elliptical vortex in elliptical beam (EEV), produced by coupling squeezed coherent states of two modes. The coupling between the two modes is performed by using beam splitter (BS) or a dual channel directional coupler (DCDC). The quantum interference due to the coupling between the two modes promises the generation of controlled entanglement for quantum computation and quantum tomography. © 2010 Elsevier B.V. All rights reserved.

Dholey M.K.,Hooghly Engineering and Technology College | Khatun A.,Birbhum Institute of Engineering and Technology
Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012 | Year: 2012

Avoidance of collision in wireless ad-hoc network is important and CSMA/CA MAC protocol is playing a major role to avoid collision. CSMA/CA MAC protocol handle it using sort RTS/CTS control message. Though reliability of data transmission increase, it blocks some nodes unnecessarily due to RTS and CTS control message and also makes existence of hidden-terminal (HT) problem which reduces the network performance. In wireless Ad-hoc network the nodes are mobile, infrastructure less and communicate through their radio range. If we can reduce the number of blockage nodes the network performance will increase by utilizing those nodes as other communication's source, destination or relay. In this paper, we propose two methods by which wireless ad-hoc network performance will increase. First we propose a method for enhancement of CSMA/CA MAC protocol by unblocking the nodes using directional antenna and setting up NAV values of RTS/CTS control message considering directional antenna and modified the CSMA/CA timing diagram accordingly. The second method shows how the hidden-terminal problem is reduced by the proposed method. The analytical model explains the performance of CSMA/CA protocol with reduction of HT problem. © 2012 IEEE.

Dholey M.K.,Hooghly Engineering and Technology College | Biswas G.P.,Indian School of Mines
Procedia Computer Science | Year: 2015

Mobile Ad-hoc network (MANET) is infrastructure less, self-organizing bandwidth constraint on demand wireless network. MANET is a multi-hop wireless network therefore, needs an efficient routing protocol to transmit data packet from source to destination. MANET routing protocol can be divided as proactive, reactive and hybrid. In an ad-hoc network a node cannot identify the nodes that are beyond its radio range. The nodes in MANET are movable so, a fixed path cannot be defined in between source to a destination. In MANET's reactive routing protocol, like Dynamic Source Routing (DSR), a source node locate the destination before data transmission take place by broadcasting/flooding route request (RREQ) control message and establishes the path after receiving route reply (RREP) control message. During route discovery using DSR routing protocol a malicious node may enter in between source-destination path as an intermediate node or eavesdrop to the source by sending RREP control message before original RREPs (multiple path exists between source to destination) reach to the source with unexpected path information. As a result, without knowing anything source may deliver data packet to a different destination. In this paper, we identified the issues and proposed a solution to prevent to enter the malicious node in between source-destination path. In our proposal, initially we formed a group byconsidering neighbour nodes of an individual node from the original network and presented the way of communication by the group member using Diffie-Hellman group key (GDH) management scheme in the network through our proposed algorithm. Our proposed algorithm will prevent a malicious node to enter in between source-destination path during route discovery using DSR routing protocol. Further our technique prevents to gainaccess to any node in the network exceptthe group member hence malicious node cannot identify the source to sent RREP control message with wrong path information. © 2015 The Authors. Published by Elsevier B.V.

Das S.,Hooghly Engineering and Technology College | Roy A.,IIEST
Advances in Intelligent Systems and Computing | Year: 2016

An offline signature verification system based on feature extraction from signature images is introduced. Varieties of features such as geometric features, topological features and statistical features are extracted from signature images using Gabor filter technique. As all the features are not relevant, only the salient features are selected from the extracted one by a Rough Set Theory based reduct generation technique. Thus only the relevant features of the signatures are retained to reduce the dimension of feature vector so as to reduce the computation time and are used for offline signature verification. The experimental results are expressed using few parameters such as False Rejection Rate (FRR), False Acceptance Rate (FAR). © Springer India 2016.

Banerji A.,Hooghly Engineering and Technology College | Singh R.P.,Physical Research Laboratory | Bandyopadhyay A.,Hooghly Engineering and Technology College
Optics Communications | Year: 2014

The negativity of the Wigner function is discussed as a measure of the non-classicality and the quantum interference pattern obtained therein as a possible measure of the entanglement between the two modes of the vortex states. This measure of entanglement is compared with the results obtained from concurrence. © 2014 Elsevier B.V.

Biswas M.,Jadavpur University | Dam M.,Hooghly Engineering and Technology College
Microwave and Optical Technology Letters | Year: 2013

In this article, we present a simple, fast, and accurate CAD oriented cavity model to predict accurately the resonant frequency, input impedance, bandwidth, efficiency, and gain of an equilateral triangular patch antenna with and without air gap in between substrate and ground plane. The present model shows very close agreement with the previously reported experiments for a wide range of antenna parameters and feed locations compared to the other models. The experimental values of input impedance, bandwidth, efficiency, and gain with air gap are not available in open literature. So, we have performed a set of experiments to validate the present model with air gap. The present model without air gap for different substrate parameters are also validated with our own experiments. The accuracy of the present model is calculated with respect to the HFSS computation and experimental results. This model will be very useful for designing the MIC on semiconductor materials with εr > 10 and directly applied in portable wireless equipments. Copyright © 2013 Wiley Periodicals, Inc.

Sarkar K.,Jadavpur University | Chakraborty S.,Hooghly Engineering and Technology College
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

This paper reports about our work in the MIKE 2015, Shared Task on Sentiment Analysis in Indian Languages (SAIL) Tweets. We submitted runs for Hindi and Bengali. A multinomial Naïve Bayes based model has been used to implement our system. The system has been trained and tested on the dataset released for SAIL TWEET CONTEST 2015. Our system obtains accuracy of 50.75%, 48.82%, 41.20%, and 40.20% for Hindi constrained, Hindi unconstrained, Bengali constrained and Bengali unconstrained run respectively. © Springer International Publishing Switzerland 2015.

Sinha A.,Bengal Engineering and Science University | Sikdar Dey S.,Bengal Engineering and Science University | Chattopadhyay P.P.,Bengal Engineering and Science University | Datta S.,Hooghly Engineering and Technology College
Materials and Design | Year: 2013

Multi-objective genetic algorithm based searching is used for designing the process schedule of Ti-(∼49. at.%) Ni alloy, to achieve optimum mechanical property and shape recovery behavior. Artificial neural network technique based data driven models are developed to empirically describe the relationship between the processing conditions and the properties. The models are used as objective functions for the optimization process. The optimization search found to be helpful to design the decision space variables for the improvement in shape recovery behavior without sacrificing the mechanical properties of the alloy. The Pareto solutions have been used as the guideline to find the process schedules, which is validated by suitable experimentation. © 2012 Elsevier Ltd.

Bhowmik S.,Hooghly Engineering and Technology College | Acharyya S.,Maulana Abul Kalam Azad University of Technology
Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011 | Year: 2011

Evidently, information security is a sine qua non in the "modern life, With its sick hurry, its divided aims, Its heads o'ertaxed, its palsied hearts,⋯" . To protect our data against unauthorized access, from the time immemorial the first choice has always been to use cryptography. With rapid growth in the arena of multimedia technology, since digital image has become an important medium of communication, extensive research is still a dynamic process in this field. We also have concentrated on image data encryption in this work. The effectiveness of the protection through encryption depends on the algorithm applied and as well as on the quality of the 'key' used. If a 'key' is badly designed or haphazardly selected, obviously the protection fails to provide proper security and improper access can be gained on the secured information. The first algorithm in cryptographic system design is the algorithm to generate 'key'. It specifies the manner in which the 'key' is to be chosen. This work focuses on a totally new approach towards the 'key' generation for encryption algorithms. Here, Genetic Algorithm (GA), an important method of artificial intelligence has been applied to generate encryption 'key', which plays a vital role in any type of encryption. In our work, a hybridized technique called BlowGA is also proposed which is a combination of Blowfish and GA. Blowfish Algorithm is a conventional method of encryption. Our experimental observations show that the newly-proposed hybridized method BlowGA outperforms both GA and Blowfish Algorithm. © 2011 IEEE.

Loading Hooghly Engineering and Technology College collaborators
Loading Hooghly Engineering and Technology College collaborators